Warning: Permanently added '10.128.0.16' (ECDSA) to the list of known hosts. 2019/05/29 22:24:45 fuzzer started [ 64.730132] audit: type=1400 audit(1559168685.439:36): avc: denied { map } for pid=7914 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/29 22:24:47 dialing manager at 10.128.0.105:33829 2019/05/29 22:24:47 syscalls: 2457 2019/05/29 22:24:47 code coverage: enabled 2019/05/29 22:24:47 comparison tracing: enabled 2019/05/29 22:24:47 extra coverage: extra coverage is not supported by the kernel 2019/05/29 22:24:47 setuid sandbox: enabled 2019/05/29 22:24:47 namespace sandbox: enabled 2019/05/29 22:24:47 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/29 22:24:47 fault injection: enabled 2019/05/29 22:24:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/29 22:24:47 net packet injection: enabled 2019/05/29 22:24:47 net device setup: enabled 22:24:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2be57544ea9517bd57623e8d1b2092eaf197a166e0179d29bcf69e60a1f8946e5a5511afc9bdfa44a9b135ec3b111970e78bc7a6310d73ed2d6bc5574bc285726ab7c4d74ac6fdbe03d3a4930d759dd39f75823aa0d849875f", 0x59}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000200)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801cf5ab39fd5bf9e2f9660f3a0fae5e090000bac7e4c65849db023c1fb63a3af4f3af49f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c027336d70fc7f83666420f383a6539f3ab0f14e746d9f8a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") [ 72.419887] audit: type=1400 audit(1559168693.129:37): avc: denied { map } for pid=7931 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 72.543945] IPVS: ftp: loaded support on port[0] = 21 [ 72.553914] NET: Registered protocol family 30 [ 72.558812] Failed to register TIPC socket type 22:24:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)="074e0978a138f269eab3232b4ecbec7dfcf3d955daaf50f6b3b918b7aac9195fa2dec30a303f0d9dd4c1cd5a0e1704d02ba2268f8848fc59229f9926760e196187d69d7b969aefc70eb33e0eeade294f49e214d46e202bc5272653c18b10937003bf6414584880e1bd9a5ee671c58a68a934", 0x72}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000480)="52decb91930f0124eda133fa20430fbafce842f66188d8d4e180441487ab5bf9e2f9660f3a0fae5e090000ba660f3830c0f3acc4817d73d74e67f30fb24e3849f216c863fa438036a9f35544aeaec48379049a0100000000aa420f383c028401f1b8d571d571f873fe122f080864660f38323c8ff083ca02000000b7ebef26450f01dd9c0f01c4288ba6452e0000c4611c71f29d") [ 72.810245] IPVS: ftp: loaded support on port[0] = 21 [ 72.848395] NET: Registered protocol family 30 [ 72.853027] Failed to register TIPC socket type 22:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36167f6444b666b5023d6da31997c5864183bb5548d8d5210899d6b5b6d5efcd76ffd06e0800000000000000d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb21093"], 0x66}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f3b7c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 73.192368] IPVS: ftp: loaded support on port[0] = 21 [ 73.218095] NET: Registered protocol family 30 [ 73.222712] Failed to register TIPC socket type 22:24:54 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, &(0x7f0000000000)=0x5, 0x8, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 73.659535] IPVS: ftp: loaded support on port[0] = 21 [ 73.678516] NET: Registered protocol family 30 [ 73.683173] Failed to register TIPC socket type [ 74.956714] chnl_net:caif_netlink_parms(): no params data found 22:24:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="38b6896da1f06ac9c25b85b27e0d47253975ca48ad37b116c50a15e2a6b5d8cbe66023292a13114422c825ac2064881694807af3b4b049639b7555478c4810b5c3544340dcf0ed2fa314b84822bfb4aa"], 0x50}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0efab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) [ 75.376735] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.383496] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.471993] device bridge_slave_0 entered promiscuous mode [ 75.530809] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.605203] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.676820] device bridge_slave_1 entered promiscuous mode [ 76.246511] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.622300] IPVS: ftp: loaded support on port[0] = 21 [ 76.655371] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.799225] NET: Registered protocol family 30 [ 76.803852] Failed to register TIPC socket type [ 77.196710] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 77.364755] team0: Port device team_slave_0 added [ 77.609047] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 77.776054] team0: Port device team_slave_1 added [ 78.137114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 78.368199] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 22:24:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="02000000f321de042774602f36cddb4aa287b3b34e2d91f7fbcd26167f6444b666b5f5e26bda1997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b99edb7bb88981d787e7d7fef7b927f2d7fe297b65b515"], 0x64}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d5430fc7f314c1ab5be2f9660f3a0fae5e09320000ba20ba20d1dcfac4817d73d74ec482310d46f449f216c863fa43c4c2750ade35dbae660f38086e6fc4e1a05d6b06aa420f383c02c401405c6bfd42af68d768f833fefbe890ab90ab660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 79.481153] device hsr_slave_0 entered promiscuous mode [ 79.903002] device hsr_slave_1 entered promiscuous mode [ 80.381844] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 80.501585] IPVS: ftp: loaded support on port[0] = 21 [ 80.575994] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 80.638080] NET: Registered protocol family 30 [ 80.692168] Failed to register TIPC socket type [ 80.909137] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 81.523929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.725824] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 81.887286] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 81.893567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.916570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.038168] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 82.154396] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.315635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 82.323922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.360704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.466395] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.473027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.627148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 82.715321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.722691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.815910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.896149] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.902698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.050105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 83.165395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.229814] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 83.325905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.410796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 83.514500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.522663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.646447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 83.653876] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.674886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.734712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.794737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 83.802847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.829351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.935742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 84.005756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.013566] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.127755] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 84.133840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.364963] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 84.516855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.617763] audit: type=1400 audit(1559168705.329:38): avc: denied { associate } for pid=7932 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 22:25:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c586ffffffff51c8d5210899d6b5b6d5efcd76ffc06e3e62e26c761a6047d17f3aed967ad21fd5e810447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1c"], 0xe6}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 22:25:09 executing program 0: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) bind$xdp(r0, &(0x7f0000000340), 0x10) [ 88.393088] IPVS: ftp: loaded support on port[0] = 21 [ 88.404524] NET: Registered protocol family 30 [ 88.410067] Failed to register TIPC socket type [ 88.449538] IPVS: ftp: loaded support on port[0] = 21 [ 88.464129] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 88.472195] WARNING: CPU: 1 PID: 8240 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 88.480282] Kernel panic - not syncing: panic_on_warn set ... [ 88.480282] [ 88.487851] CPU: 1 PID: 8240 Comm: syz-executor.5 Not tainted 4.19.46 #18 [ 88.494808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.504209] Call Trace: [ 88.506811] [ 88.508979] dump_stack+0x172/0x1f0 [ 88.512619] panic+0x263/0x507 [ 88.515820] ? __warn_printk+0xf3/0xf3 [ 88.519807] ? kmem_cache_free.cold+0x1c/0x23 [ 88.524668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.530230] ? __warn.cold+0x5/0x4a [ 88.533886] ? __warn+0xe8/0x1d0 [ 88.537286] ? kmem_cache_free.cold+0x1c/0x23 [ 88.541817] __warn.cold+0x20/0x4a [ 88.545392] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 88.550012] ? kmem_cache_free.cold+0x1c/0x23 [ 88.554623] report_bug+0x263/0x2b0 [ 88.558278] do_error_trap+0x204/0x360 [ 88.562198] ? math_error+0x340/0x340 [ 88.566034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.571683] ? wake_up_klogd+0x99/0xd0 [ 88.575586] ? error_entry+0x76/0xd0 [ 88.579306] ? trace_hardirqs_off_caller+0x65/0x220 [ 88.584352] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.589227] do_invalid_op+0x1b/0x20 [ 88.592948] invalid_op+0x14/0x20 [ 88.596408] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 88.601522] Code: e8 25 8d 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 40 45 54 87 48 c7 c7 18 64 38 88 49 8b 54 24 58 e8 34 43 b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 40 45 54 87 48 c7 c7 18 [ 88.620451] RSP: 0018:ffff8880ae907cf8 EFLAGS: 00010286 [ 88.625828] RAX: 0000000000000046 RBX: ffff888075c27480 RCX: 0000000000000000 [ 88.633106] RDX: 0000000000000000 RSI: ffffffff81559e76 RDI: ffffed1015d20f91 [ 88.640385] RBP: ffff8880ae907d18 R08: 0000000000000046 R09: ffffed1015d24fe9 [ 88.647751] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff88809301d900 [ 88.655029] R13: 0000000000000000 R14: ffff88809301d900 R15: ffff888075c27790 [ 88.662334] ? vprintk_func+0x86/0x189 [ 88.666268] ? kmem_cache_free.cold+0x1c/0x23 [ 88.670775] __sk_destruct+0x4b4/0x6d0 [ 88.674679] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 88.680060] sk_destruct+0x7b/0x90 [ 88.683769] __sk_free+0xce/0x300 [ 88.687709] sk_free+0x42/0x50 [ 88.690908] tipc_sk_callback+0x48/0x60 [ 88.694889] rcu_process_callbacks+0xba0/0x1a30 [ 88.699592] ? __rcu_read_unlock+0x170/0x170 [ 88.704010] ? __lock_is_held+0xb6/0x140 [ 88.708272] __do_softirq+0x25c/0x921 [ 88.712106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.718176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 88.723823] irq_exit+0x180/0x1d0 [ 88.727295] smp_apic_timer_interrupt+0x13b/0x550 [ 88.732159] apic_timer_interrupt+0xf/0x20 [ 88.736661] [ 88.739091] RIP: 0010:lock_release+0x47a/0xa30 [ 88.743768] Code: 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 a7 03 00 00 48 83 3d dd d9 1f 07 00 0f 84 65 02 00 00 48 8b bd 68 ff ff ff 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 c7 04 03 00 00 00 [ 88.762767] RSP: 0018:ffff88806c377af0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 88.770495] RAX: 1ffffffff10e46d9 RBX: 1ffff1100d86ef64 RCX: 1ffff1101284f5d6 [ 88.777797] RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 0000000000000282 [ 88.785515] RBP: ffff88806c377ba8 R08: ffff88809427a640 R09: 0000000000000001 [ 88.793258] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: ffff88809427a640 [ 88.800549] R13: ffffffff85c88b6c R14: 0000000000000003 R15: ffff88806c377b80 [ 88.807847] ? inet_twsk_purge+0x3ec/0x5f0 [ 88.812143] ? lock_downgrade+0x810/0x810 [ 88.816317] ? kasan_check_read+0x11/0x20 [ 88.820500] inet_twsk_purge+0x413/0x5f0 [ 88.824612] ? ip_queue_xmit+0x70/0x70 [ 88.828572] ? dccp_v4_exit_batch+0x20/0x20 [ 88.832912] dccp_v4_exit_batch+0x1a/0x20 [ 88.837087] ops_exit_list.isra.0+0xfc/0x150 [ 88.841521] setup_net+0x400/0x740 [ 88.845071] ? ops_init+0x410/0x410 [ 88.848814] copy_net_ns+0x1df/0x340 [ 88.853204] create_new_namespaces+0x400/0x7b0 [ 88.858239] unshare_nsproxy_namespaces+0xc2/0x200 [ 88.863698] ksys_unshare+0x440/0x980 [ 88.867756] ? walk_process_tree+0x2c0/0x2c0 [ 88.872489] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 88.877780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 88.883528] ? do_syscall_64+0x26/0x620 [ 88.887938] ? lockdep_hardirqs_on+0x415/0x5d0 [ 88.892887] __x64_sys_unshare+0x31/0x40 [ 88.897409] do_syscall_64+0xfd/0x620 [ 88.901471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 88.907469] RIP: 0033:0x45bd47 [ 88.911156] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 88.931113] RSP: 002b:00007fff042e8568 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 88.938846] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 88.946414] RDX: 0000000000000000 RSI: 00007fff042e8510 RDI: 0000000040000000 [ 88.953700] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 88.961005] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000075c9a8 [ 88.968297] R13: 00007fff042e87d8 R14: 0000000000000000 R15: 0000000000000000 [ 88.976697] Kernel Offset: disabled [ 88.980416] Rebooting in 86400 seconds..