Warning: Permanently added '10.128.10.47' (ECDSA) to the list of known hosts. [ 46.920950] random: sshd: uninitialized urandom read (32 bytes read) 2019/05/29 13:46:38 fuzzer started [ 47.130890] audit: type=1400 audit(1559137598.912:36): avc: denied { map } for pid=7315 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 49.027944] random: cc1: uninitialized urandom read (8 bytes read) 2019/05/29 13:46:41 dialing manager at 10.128.0.105:40437 2019/05/29 13:46:41 syscalls: 2441 2019/05/29 13:46:41 code coverage: enabled 2019/05/29 13:46:41 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/05/29 13:46:41 extra coverage: extra coverage is not supported by the kernel 2019/05/29 13:46:41 setuid sandbox: enabled 2019/05/29 13:46:41 namespace sandbox: enabled 2019/05/29 13:46:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/29 13:46:41 fault injection: enabled 2019/05/29 13:46:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/29 13:46:41 net packet injection: enabled 2019/05/29 13:46:41 net device setup: enabled 13:46:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000140)=""/122) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r2, r3, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) 13:46:43 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000480)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='overlay\x00', 0x8, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB], 0x1}}, 0x44801) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f00000006c0)}], 0x1, 0x0) epoll_create1(0x80000) capset(&(0x7f0000000040)={0x19980330}, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000080)={0x0, 0x81, 0xff3e}) bind$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f0000000100)=@full={0xb, @dev, @null, 0x0, [@rose, @null, @bcast, @null, @null]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) 13:46:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth0_to_hsr\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_mtu(r1, 0x0, 0x32, &(0x7f0000000200), 0x4) 13:46:43 executing program 1: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x40000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001200)="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") ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) syz_execute_func(&(0x7f00000010c0)="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") 13:46:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x1}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 13:46:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="f2af91cd800f0124eda133fa20430fbafce842f66188d0db911c65ab39ff5bf9e2f98d359aad00000f944d92c442d1b6265e090000bac7bae4c6d18f26088f6524000034c4644098c42221976b0772afaf48140e660f76cc433d0065d76ec863fa43c4a19b5da200800000f043835a00a9f340aec4c2fd22f2730f8052043822de0fe5f8a1830000006320006320d325f610000046d9f880ba0000000083df0804f4c441a5609c8ba800000054838b") [ 51.782188] audit: type=1400 audit(1559137603.562:37): avc: denied { map } for pid=7315 comm="syz-fuzzer" path="/root/syzkaller-shm908481123" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 51.845937] audit: type=1400 audit(1559137603.582:38): avc: denied { map } for pid=7332 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1187 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 52.540299] IPVS: ftp: loaded support on port[0] = 21 [ 52.851597] NET: Registered protocol family 30 [ 52.856217] Failed to register TIPC socket type [ 53.775915] IPVS: ftp: loaded support on port[0] = 21 [ 53.811481] NET: Registered protocol family 30 [ 53.816124] Failed to register TIPC socket type [ 53.833383] chnl_net:caif_netlink_parms(): no params data found [ 54.159888] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.220997] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.270159] device bridge_slave_0 entered promiscuous mode [ 54.299027] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.345170] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.402297] device bridge_slave_1 entered promiscuous mode [ 54.712144] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 54.970975] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 55.642631] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 55.790853] team0: Port device team_slave_0 added [ 55.962197] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 56.073864] team0: Port device team_slave_1 added [ 56.284021] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 56.513763] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 57.226567] device hsr_slave_0 entered promiscuous mode [ 57.625978] device hsr_slave_1 entered promiscuous mode [ 58.155674] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 58.386393] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 58.667729] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.343355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.361116] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.704320] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.800243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.808233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.902159] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 59.908307] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.122974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.190193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.198216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.261554] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.268109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.396614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.443609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.453558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.501812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.541740] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.548277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.622706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.631101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.706520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.770834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.788471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.878393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.906705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.001304] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.008254] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.051681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.090799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.193246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 61.261478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.269211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.376097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 61.481465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.494649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.578517] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 61.650515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.765632] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 61.945705] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.469298] audit: type=1400 audit(1559137614.242:39): avc: denied { map } for pid=7898 comm="syz-executor.5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27279 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 62.570041] hrtimer: interrupt took 38666 ns [ 62.642677] kasan: CONFIG_KASAN_INLINE enabled [ 62.647624] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 62.756961] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 62.763261] Modules linked in: [ 62.766477] CPU: 0 PID: 7908 Comm: syz-executor.5 Not tainted 4.14.122 #16 [ 62.773501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.782874] task: ffff88808aea6740 task.stack: ffff88806d7e0000 [ 62.789011] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 62.793704] RSP: 0018:ffff88806d7e7478 EFLAGS: 00010a06 [ 62.799448] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc9000603e000 [ 62.806741] RDX: 1bd5a0000000000c RSI: ffffffff84cc751f RDI: dead000000000060 [ 62.814061] RBP: ffff88806d7e7508 R08: ffff8880a5735488 R09: ffffed10110f9dfc [ 62.821441] R10: ffffed10110f9dfb R11: ffff8880887cefdd R12: dffffc0000000000 [ 62.829077] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3b20 [ 62.836448] FS: 00007f8b5161b700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 62.844704] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 62.850628] CR2: 00007f8b515f9db8 CR3: 000000008df33000 CR4: 00000000001406f0 [ 62.857932] Call Trace: [ 62.860581] ? seq_list_next+0x17/0x80 [ 62.864491] ? seq_list_next+0x2c/0x80 [ 62.868400] ? seq_list_next+0x5e/0x80 [ 62.872312] seq_read+0xb46/0x1280 [ 62.875945] ? seq_lseek+0x3c0/0x3c0 [ 62.879741] ? check_preemption_disabled+0x3c/0x250 [ 62.884832] ? retint_kernel+0x2d/0x2d [ 62.888761] proc_reg_read+0xfa/0x170 [ 62.892590] ? seq_lseek+0x3c0/0x3c0 [ 62.896324] do_iter_read+0x3e2/0x5b0 [ 62.900176] vfs_readv+0xd3/0x130 [ 62.903647] ? compat_rw_copy_check_uvector+0x310/0x310 [ 62.909044] ? push_pipe+0x3e6/0x780 [ 62.912794] ? iov_iter_pipe+0x9f/0x2c0 [ 62.916793] default_file_splice_read+0x421/0x7b0 [ 62.921679] ? __kmalloc+0x15d/0x7a0 [ 62.925414] ? alloc_pipe_info+0x15c/0x380 [ 62.929672] ? splice_direct_to_actor+0x5d2/0x7b0 [ 62.934565] ? do_splice_direct+0x18d/0x230 [ 62.939521] ? do_splice_direct+0x230/0x230 [ 62.943878] ? trace_hardirqs_on+0x10/0x10 [ 62.948134] ? trace_hardirqs_on_caller+0x400/0x590 [ 62.953171] ? save_trace+0x290/0x290 [ 62.957015] ? __inode_security_revalidate+0xd6/0x130 [ 62.962240] ? avc_policy_seqno+0x9/0x20 [ 62.966322] ? selinux_file_permission+0x85/0x480 [ 62.971183] ? security_file_permission+0x89/0x1f0 [ 62.976134] ? rw_verify_area+0xea/0x2b0 [ 62.980211] ? do_splice_direct+0x230/0x230 [ 62.984545] do_splice_to+0x105/0x170 [ 62.988366] splice_direct_to_actor+0x222/0x7b0 [ 62.993094] ? generic_pipe_buf_nosteal+0x10/0x10 [ 62.998828] ? do_splice_to+0x170/0x170 [ 63.002830] ? rw_verify_area+0xea/0x2b0 [ 63.006910] do_splice_direct+0x18d/0x230 [ 63.011086] ? splice_direct_to_actor+0x7b0/0x7b0 [ 63.015957] ? rw_verify_area+0xea/0x2b0 [ 63.020040] do_sendfile+0x4db/0xbd0 [ 63.023784] ? do_compat_pwritev64+0x140/0x140 [ 63.028788] ? put_timespec64+0xb4/0x100 [ 63.032877] ? nsecs_to_jiffies+0x30/0x30 [ 63.037049] SyS_sendfile64+0x102/0x110 [ 63.041139] ? SyS_sendfile+0x130/0x130 [ 63.045154] ? do_syscall_64+0x53/0x640 [ 63.049153] ? SyS_sendfile+0x130/0x130 [ 63.053233] do_syscall_64+0x1e8/0x640 [ 63.057137] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 63.062085] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 63.067292] RIP: 0033:0x459279 [ 63.070518] RSP: 002b:00007f8b5161ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 63.078239] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 63.085613] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 63.092898] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 63.100644] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f8b5161b6d4 [ 63.109077] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 63.116625] Code: 06 00 00 e8 61 2e 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 63.136245] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff88806d7e7478 [ 63.444448] ---[ end trace 56fc453b594e5556 ]--- [ 63.449644] Kernel panic - not syncing: Fatal exception [ 63.456218] Kernel Offset: disabled [ 63.459973] Rebooting in 86400 seconds..