Warning: Permanently added '10.128.10.55' (ECDSA) to the list of known hosts.
2019/05/30 13:50:18 fuzzer started
[   55.057171] audit: type=1400 audit(1559224218.248:36): avc:  denied  { map } for  pid=7924 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
2019/05/30 13:50:20 dialing manager at 10.128.0.105:37607
2019/05/30 13:50:20 syscalls: 2457
2019/05/30 13:50:20 code coverage: enabled
2019/05/30 13:50:20 comparison tracing: enabled
2019/05/30 13:50:20 extra coverage: extra coverage is not supported by the kernel
2019/05/30 13:50:20 setuid sandbox: enabled
2019/05/30 13:50:20 namespace sandbox: enabled
2019/05/30 13:50:20 Android sandbox: /sys/fs/selinux/policy does not exist
2019/05/30 13:50:20 fault injection: enabled
2019/05/30 13:50:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/05/30 13:50:20 net packet injection: enabled
2019/05/30 13:50:20 net device setup: enabled
13:50:27 executing program 0:
r0 = socket(0x1e, 0x805, 0x0)
r1 = socket(0x1e, 0x20000000805, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x0, 0x3ff}, 0x94)
close(r0)

[   64.627840] audit: type=1400 audit(1559224227.818:37): avc:  denied  { map } for  pid=7942 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14989 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[   64.752670] IPVS: ftp: loaded support on port[0] = 21
[   64.762916] NET: Registered protocol family 30
[   64.768111] Failed to register TIPC socket type
13:50:28 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f80)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="27afbc003157db2cadae1ac28e2ee82100a162727844bb9277e85ea638ceffb525c686a522139858e0fa943d605218c35eadb756fb4fd02e5e574a1f2d2e3a7791f82845e6da193ad03e3c5893db95bee0ccfd5a0f972ee88adce67dcb213da16fa75b4eb34d94b4672c0e1bf844dc46d66fd17454d36aabb838b4fff5cd23f54d6ec8d721b7a803e5da", 0x8a}], 0x1}], 0x1, 0x0)
syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa200f01e542f66188d0c4e1b19165ab39ff5bf9e2f90f0fcab0c442d1b6265ef04229894300000000bac7bae4c6c462a59be8240000dbc46440983af4ad660f3a62d45c48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae8a8a657c7c730f8052043822de0fa10000000026460f740346d9f880ba0000000083c442fd333fdf0804f4c441a5609c8ba800000054838b")

[   65.013228] IPVS: ftp: loaded support on port[0] = 21
[   65.030354] NET: Registered protocol family 30
[   65.035018] Failed to register TIPC socket type
13:50:28 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x2b0}}, 0x0)
syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100")

[   65.391312] IPVS: ftp: loaded support on port[0] = 21
[   65.409962] NET: Registered protocol family 30
[   65.414577] Failed to register TIPC socket type
13:50:28 executing program 3:
r0 = socket(0xa, 0x2, 0x0)
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth1_to_team\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="ffff00000000000000000000000000000000000060"]})
setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000080), 0x4)

[   65.852692] IPVS: ftp: loaded support on port[0] = 21
[   65.870176] NET: Registered protocol family 30
[   65.874773] Failed to register TIPC socket type
13:50:29 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x22b}}, 0x0)
syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100")

[   66.453615] IPVS: ftp: loaded support on port[0] = 21
[   66.480112] NET: Registered protocol family 30
[   66.484753] Failed to register TIPC socket type
13:50:30 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x119}}, 0x0)
syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d5430fc7f314c1ab5be2f9660f3a0fae5e09320000ba20ba20d1dcfac4817d73d74ec482310d46f449f216c863fa43c4c2750ade35dbae660f38086e6fc4e1a05d6b06aa420f383c02c401405c6bfd42af68d768f833fefbe890ab90ab660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c")

[   67.201494] IPVS: ftp: loaded support on port[0] = 21
[   67.219849] NET: Registered protocol family 30
[   67.224456] Failed to register TIPC socket type
[   68.024144] chnl_net:caif_netlink_parms(): no params data found
[   68.800567] bridge0: port 1(bridge_slave_0) entered blocking state
[   68.916800] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.051373] device bridge_slave_0 entered promiscuous mode
[   69.138494] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.144959] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.256767] device bridge_slave_1 entered promiscuous mode
[   69.734010] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   70.012845] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   70.808120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   70.896714] team0: Port device team_slave_0 added
[   71.127233] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   71.302318] team0: Port device team_slave_1 added
[   71.518069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   71.797916] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   72.544218] device hsr_slave_0 entered promiscuous mode
[   72.830366] device hsr_slave_1 entered promiscuous mode
[   73.189707] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   73.382591] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   73.537820] IPVS: ftp: loaded support on port[0] = 21
[   73.637534] NET: Registered protocol family 30
[   73.642198] Failed to register TIPC socket type
[   73.838423] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   74.703244] 8021q: adding VLAN 0 to HW filter on device bond0
[   74.938042] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   75.112607] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   75.225793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   75.234406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   75.387373] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   75.393581] 8021q: adding VLAN 0 to HW filter on device team0
[   75.729500] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   75.812536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   75.877397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   75.986169] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.992703] bridge0: port 1(bridge_slave_0) entered forwarding state
[   76.208284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   76.215442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   76.238297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   76.326230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   76.456400] bridge0: port 2(bridge_slave_1) entered blocking state
[   76.462815] bridge0: port 2(bridge_slave_1) entered forwarding state
[   76.655632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   76.677960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   76.803543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   76.940989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   76.952177] IPVS: ftp: loaded support on port[0] = 21
[   77.121000] NET: Registered protocol family 30
[   77.127458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   77.134475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   77.197808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   77.229791] Failed to register TIPC socket type
[   77.391775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   77.517253] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   77.524559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   77.632720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   77.733471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   77.830567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   77.858828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   78.018199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   78.025310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   78.086319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   78.280045] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   78.356574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   78.486569] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   78.698195] 8021q: adding VLAN 0 to HW filter on device batadv0
[   78.909497] audit: type=1400 audit(1559224242.098:38): avc:  denied  { associate } for  pid=7943 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
13:50:42 executing program 0:
r0 = socket(0x1e, 0x805, 0x0)
r1 = socket(0x1e, 0x20000000805, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x0, 0x3ff}, 0x94)
close(r0)

13:50:43 executing program 0:
r0 = socket(0x1e, 0x805, 0x0)
r1 = socket(0x1e, 0x20000000805, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x0, 0x3ff}, 0x94)
close(r0)

[   80.098267] IPVS: ftp: loaded support on port[0] = 21
[   80.147903] NET: Registered protocol family 30
[   80.152532] Failed to register TIPC socket type
13:50:43 executing program 0:
r0 = socket(0x1e, 0x805, 0x0)
r1 = socket(0x1e, 0x20000000805, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x0, 0x3ff}, 0x94)
close(r0)

[   80.296860] kmem_cache_destroy TIPC: Slab cache still has objects
[   80.314328] CPU: 0 PID: 8567 Comm: syz-executor.3 Not tainted 4.19.46 #18
[   80.321274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   80.330639] Call Trace:
[   80.333249]  dump_stack+0x172/0x1f0
[   80.336919]  kmem_cache_destroy.cold+0x15/0x1a
[   80.341528]  proto_unregister+0x1d5/0x4e0
[   80.345698]  tipc_socket_init.cold+0x33/0x47
[   80.350129]  tipc_init_net+0x2ed/0x570
[   80.354021]  ? tipc_exit_net+0x40/0x40
[   80.357925]  ops_init+0xb3/0x410
[   80.361310]  setup_net+0x2d3/0x740
[   80.364870]  ? lock_acquire+0x16f/0x3f0
[   80.368861]  ? ops_init+0x410/0x410
[   80.372521]  copy_net_ns+0x1df/0x340
[   80.376245]  create_new_namespaces+0x400/0x7b0
[   80.380846]  unshare_nsproxy_namespaces+0xc2/0x200
[   80.385823]  ksys_unshare+0x440/0x980
[   80.389649]  ? walk_process_tree+0x2c0/0x2c0
[   80.394080]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[   80.398847]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   80.404220]  ? do_syscall_64+0x26/0x620
[   80.408227]  ? lockdep_hardirqs_on+0x415/0x5d0
[   80.412840]  __x64_sys_unshare+0x31/0x40
[   80.416942]  do_syscall_64+0xfd/0x620
[   80.420773]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   80.425980] RIP: 0033:0x45bd47
[   80.429172] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00
[   80.448080] RSP: 002b:00007ffd6f280838 EFLAGS: 00000206 ORIG_RAX: 0000000000000110
[   80.455799] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47
[   80.463079] RDX: 0000000000000000 RSI: 00007ffd6f2807e0 RDI: 0000000040000000
[   80.470350] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005
[   80.477633] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000075c9a8
[   80.484930] R13: 00007ffd6f280aa8 R14: 0000000000000000 R15: 0000000000000000
13:50:43 executing program 0:
r0 = socket(0x1e, 0x805, 0x0)
r1 = socket(0x1e, 0x20000000805, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x0, 0x3ff}, 0x94)
close(r0)

[   80.602048] IPVS: ftp: loaded support on port[0] = 21
[   80.649928] NET: Registered protocol family 30
[   80.654562] Failed to register TIPC socket type
[   80.675681] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048
[   80.683726] WARNING: CPU: 0 PID: 8567 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23
[   80.691703] Kernel panic - not syncing: panic_on_warn set ...
[   80.691703] 
[   80.699084] CPU: 0 PID: 8567 Comm: syz-executor.3 Not tainted 4.19.46 #18
[   80.706007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   80.715357] Call Trace:
[   80.717942]  <IRQ>
[   80.720101]  dump_stack+0x172/0x1f0
[   80.723738]  panic+0x263/0x507
[   80.726934]  ? __warn_printk+0xf3/0xf3
[   80.730834]  ? kmem_cache_free.cold+0x1c/0x23
[   80.735338]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   80.740878]  ? __warn.cold+0x5/0x4a
[   80.744517]  ? __warn+0xe8/0x1d0
[   80.747896]  ? kmem_cache_free.cold+0x1c/0x23
[   80.752398]  __warn.cold+0x20/0x4a
[   80.755968]  ? lockdep_hardirqs_on+0x19b/0x5d0
[   80.760563]  ? kmem_cache_free.cold+0x1c/0x23
[   80.765072]  report_bug+0x263/0x2b0
[   80.768732]  do_error_trap+0x204/0x360
[   80.772642]  ? math_error+0x340/0x340
[   80.776474]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   80.782029]  ? wake_up_klogd+0x99/0xd0
[   80.785925]  ? error_entry+0x76/0xd0
[   80.789655]  ? trace_hardirqs_off_caller+0x65/0x220
[   80.794692]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   80.799544]  do_invalid_op+0x1b/0x20
[   80.803260]  invalid_op+0x14/0x20
[   80.806718] RIP: 0010:kmem_cache_free.cold+0x1c/0x23
[   80.811827] Code: e8 25 8d 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 40 45 54 87 48 c7 c7 18 64 38 88 49 8b 54 24 58 e8 34 43 b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 40 45 54 87 48 c7 c7 18
[   80.830731] RSP: 0018:ffff8880ae807cf8 EFLAGS: 00010286
[   80.836123] RAX: 0000000000000046 RBX: ffff8880730d5500 RCX: 0000000000000000
[   80.843407] RDX: 0000000000000000 RSI: ffffffff81559e76 RDI: ffffed1015d00f91
[   80.850682] RBP: ffff8880ae807d18 R08: 0000000000000046 R09: ffffed1015d04fe9
[   80.857954] R10: ffffed1015d04fe8 R11: ffff8880ae827f47 R12: ffff888074f28a80
[   80.865224] R13: 0000000000000000 R14: ffff888074f28a80 R15: ffff8880730d5810
[   80.872532]  ? vprintk_func+0x86/0x189
[   80.876426]  ? kmem_cache_free.cold+0x1c/0x23
[   80.880978]  __sk_destruct+0x4b4/0x6d0
[   80.884903]  ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0
[   80.890270]  sk_destruct+0x7b/0x90
[   80.893815]  __sk_free+0xce/0x300
[   80.897295]  sk_free+0x42/0x50
[   80.900499]  tipc_sk_callback+0x48/0x60
[   80.904476]  rcu_process_callbacks+0xba0/0x1a30
[   80.909151]  ? __rcu_read_unlock+0x170/0x170
[   80.913563]  ? __lock_is_held+0xb6/0x140
[   80.917651]  __do_softirq+0x25c/0x921
[   80.921458]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   80.926994]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[   80.932541]  irq_exit+0x180/0x1d0
[   80.935996]  smp_apic_timer_interrupt+0x13b/0x550
[   80.940842]  apic_timer_interrupt+0xf/0x20
[   80.945080]  </IRQ>
[   80.947321] RIP: 0010:lock_acquire+0x1ea/0x3f0
[   80.951917] Code: 7c 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 c4 01 00 00 48 83 3d 3a d2 1f 07 00 0f 84 38 01 00 00 48 8b 7d c8 57 9d <0f> 1f 44 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b
[   80.970819] RSP: 0018:ffff8880748b7b58 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[   80.978527] RAX: 1ffffffff10e46d9 RBX: ffff8880987ac300 RCX: 00000000125cef8f
[   80.985792] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000282
[   80.993058] RBP: ffff8880748b7ba0 R08: 0000000000000000 R09: 0000000000000001
[   81.000331] R10: ffff8880987acba8 R11: 7cd6c7618ea1509d R12: ffffffff8879d860
[   81.007607] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002
[   81.014934]  inet_twsk_purge+0xc0/0x5f0
[   81.018921]  ? inet_twsk_purge+0x7e/0x5f0
[   81.023079]  ? dccp_v6_send_check+0x3f0/0x3f0
[   81.027581]  ? dccp_v6_exit_batch+0x20/0x20
[   81.031906]  dccp_v6_exit_batch+0x1a/0x20
[   81.036058]  ops_exit_list.isra.0+0xfc/0x150
[   81.040470]  setup_net+0x400/0x740
[   81.044015]  ? ops_init+0x410/0x410
[   81.047672]  copy_net_ns+0x1df/0x340
[   81.051391]  create_new_namespaces+0x400/0x7b0
[   81.055994]  unshare_nsproxy_namespaces+0xc2/0x200
[   81.060948]  ksys_unshare+0x440/0x980
[   81.064755]  ? walk_process_tree+0x2c0/0x2c0
[   81.069196]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[   81.073956]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   81.079319]  ? do_syscall_64+0x26/0x620
[   81.083295]  ? lockdep_hardirqs_on+0x415/0x5d0
[   81.087880]  __x64_sys_unshare+0x31/0x40
[   81.091981]  do_syscall_64+0xfd/0x620
[   81.095798]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   81.100985] RIP: 0033:0x45bd47
[   81.104190] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00
[   81.123087] RSP: 002b:00007ffd6f280838 EFLAGS: 00000206 ORIG_RAX: 0000000000000110
[   81.130796] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47
[   81.138065] RDX: 0000000000000000 RSI: 00007ffd6f2807e0 RDI: 0000000040000000
[   81.145341] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005
[   81.152617] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000075c9a8
[   81.159896] R13: 00007ffd6f280aa8 R14: 0000000000000000 R15: 0000000000000000
[   81.168370] Kernel Offset: disabled
[   81.172068] Rebooting in 86400 seconds..