Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. [ 43.730573] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/05 06:28:19 fuzzer started [ 43.943652] audit: type=1400 audit(1559716099.368:36): avc: denied { map } for pid=7046 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 45.783981] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/05 06:28:22 dialing manager at 10.128.0.105:44623 2019/06/05 06:28:22 syscalls: 2444 2019/06/05 06:28:22 code coverage: enabled 2019/06/05 06:28:22 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/05 06:28:22 extra coverage: extra coverage is not supported by the kernel 2019/06/05 06:28:22 setuid sandbox: enabled 2019/06/05 06:28:22 namespace sandbox: enabled 2019/06/05 06:28:22 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/05 06:28:22 fault injection: enabled 2019/06/05 06:28:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/05 06:28:22 net packet injection: enabled 2019/06/05 06:28:22 net device setup: enabled [ 47.721693] random: crng init done 06:28:25 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000180), &(0x7f00000003c0)=0x4) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r4, r5, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 06:28:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff3c, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 06:28:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 06:28:25 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 06:28:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) 06:28:25 executing program 4: r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf488, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 49.890551] audit: type=1400 audit(1559716105.318:37): avc: denied { map } for pid=7046 comm="syz-fuzzer" path="/root/syzkaller-shm564838000" dev="sda1" ino=16494 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 49.934836] audit: type=1400 audit(1559716105.318:38): avc: denied { map } for pid=7063 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13451 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 50.133126] IPVS: ftp: loaded support on port[0] = 21 [ 50.411545] NET: Registered protocol family 30 [ 50.416225] Failed to register TIPC socket type [ 51.324798] IPVS: ftp: loaded support on port[0] = 21 [ 51.352697] NET: Registered protocol family 30 [ 51.388589] Failed to register TIPC socket type [ 51.489503] chnl_net:caif_netlink_parms(): no params data found [ 51.744699] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.821304] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.850558] device bridge_slave_0 entered promiscuous mode [ 51.931426] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.008590] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.134356] device bridge_slave_1 entered promiscuous mode [ 52.481897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 52.702957] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 53.242469] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 53.368420] team0: Port device team_slave_0 added [ 53.592385] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 53.741192] team0: Port device team_slave_1 added [ 53.912286] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.227151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 54.807874] device hsr_slave_0 entered promiscuous mode [ 55.123778] device hsr_slave_1 entered promiscuous mode [ 55.360625] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 55.487054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 55.708722] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 56.202579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.330675] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.461650] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.467902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.483827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.577773] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 56.676550] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.791666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.798918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.832496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.895514] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.902089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.037087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.111133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.118862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.161860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.240886] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.247385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.319175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.380316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.460826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.513418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.587777] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.620510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.636063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.694092] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.753503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.806373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.824830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.885665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 57.941229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.949291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.039806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 58.088728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.098230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.162537] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 58.168742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.281523] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 58.401200] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.304866] hrtimer: interrupt took 26275 ns [ 59.358194] audit: type=1400 audit(1559716114.778:39): avc: denied { map } for pid=7604 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27070 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 59.636962] kasan: CONFIG_KASAN_INLINE enabled [ 59.726243] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 59.910686] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 59.916969] Modules linked in: [ 59.920181] CPU: 1 PID: 7622 Comm: syz-executor.0 Not tainted 4.14.123 #17 [ 59.927198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.936561] task: ffff888096c501c0 task.stack: ffff88806f5e0000 [ 59.942640] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 59.947310] RSP: 0018:ffff88806f5e7478 EFLAGS: 00010a06 [ 59.952775] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc9000623f000 [ 59.960044] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 59.967319] RBP: ffff88806f5e7508 R08: ffff888096905c88 R09: ffffed100d80fcd4 [ 59.974860] R10: ffffed100d80fcd3 R11: ffff88806c07e69d R12: dffffc0000000000 [ 59.982223] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 59.989499] FS: 00007f4bdecb1700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 59.997820] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 60.003713] CR2: 00007fcec9f1d1b0 CR3: 000000008fd20000 CR4: 00000000001406e0 [ 60.010993] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 60.018276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 60.025553] Call Trace: [ 60.028161] ? seq_list_next+0x5e/0x80 [ 60.032064] seq_read+0xb46/0x1280 [ 60.035617] ? seq_lseek+0x3c0/0x3c0 [ 60.039338] ? avc_policy_seqno+0x9/0x20 [ 60.043411] ? selinux_file_permission+0x85/0x480 [ 60.048521] proc_reg_read+0xfa/0x170 [ 60.052328] ? seq_lseek+0x3c0/0x3c0 [ 60.056053] do_iter_read+0x3e2/0x5b0 [ 60.059868] vfs_readv+0xd3/0x130 [ 60.063334] ? compat_rw_copy_check_uvector+0x310/0x310 [ 60.068714] ? push_pipe+0x3e6/0x780 [ 60.072447] ? iov_iter_pipe+0x9f/0x2c0 [ 60.076428] default_file_splice_read+0x421/0x7b0 [ 60.081279] ? __kmalloc+0x15d/0x7a0 [ 60.084999] ? alloc_pipe_info+0x15c/0x380 [ 60.089237] ? splice_direct_to_actor+0x5d2/0x7b0 [ 60.094077] ? do_splice_direct+0x18d/0x230 [ 60.098404] ? do_splice_direct+0x230/0x230 [ 60.102735] ? trace_hardirqs_on+0x10/0x10 [ 60.106991] ? save_trace+0x290/0x290 [ 60.110810] ? save_trace+0x290/0x290 [ 60.114631] ? __inode_security_revalidate+0xd6/0x130 [ 60.119832] ? avc_policy_seqno+0x9/0x20 [ 60.123901] ? selinux_file_permission+0x85/0x480 [ 60.128761] ? security_file_permission+0x89/0x1f0 [ 60.133697] ? rw_verify_area+0xea/0x2b0 [ 60.137764] ? do_splice_direct+0x230/0x230 [ 60.142095] do_splice_to+0x105/0x170 [ 60.145910] splice_direct_to_actor+0x222/0x7b0 [ 60.150590] ? generic_pipe_buf_nosteal+0x10/0x10 [ 60.155451] ? do_splice_to+0x170/0x170 [ 60.159433] ? rw_verify_area+0xea/0x2b0 [ 60.163502] do_splice_direct+0x18d/0x230 [ 60.168452] ? splice_direct_to_actor+0x7b0/0x7b0 [ 60.173308] ? rw_verify_area+0xea/0x2b0 [ 60.179201] do_sendfile+0x4db/0xbd0 [ 60.182968] ? do_compat_pwritev64+0x140/0x140 [ 60.187563] ? put_timespec64+0xb4/0x100 [ 60.191639] ? nsecs_to_jiffies+0x30/0x30 [ 60.195809] SyS_sendfile64+0x102/0x110 [ 60.199798] ? SyS_sendfile+0x130/0x130 [ 60.203782] ? do_syscall_64+0x53/0x640 [ 60.207776] ? SyS_sendfile+0x130/0x130 [ 60.211752] do_syscall_64+0x1e8/0x640 [ 60.215647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 60.220507] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 60.225701] RIP: 0033:0x459279 [ 60.228903] RSP: 002b:00007f4bdecb0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 60.236625] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 60.243986] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 60.251359] RBP: 000000000075c060 R08: 0000000000000000 R09: 0000000000000000 [ 60.258636] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f4bdecb16d4 [ 60.265929] R13: 00000000004c65f3 R14: 00000000004db2a8 R15: 00000000ffffffff [ 60.278592] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 60.297826] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff88806f5e7478 [ 60.651429] ---[ end trace 61c52403cd14a38d ]--- [ 60.659996] Kernel panic - not syncing: Fatal exception [ 60.671123] Kernel Offset: disabled [ 60.674749] Rebooting in 86400 seconds..