Warning: Permanently added '10.128.0.210' (ECDSA) to the list of known hosts. [ 66.380849] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/05 17:12:18 fuzzer started [ 66.577367] audit: type=1400 audit(1559754738.530:36): avc: denied { map } for pid=6993 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 68.291988] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/05 17:12:20 dialing manager at 10.128.0.105:44623 2019/06/05 17:12:20 syscalls: 2444 2019/06/05 17:12:20 code coverage: enabled 2019/06/05 17:12:20 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/05 17:12:20 extra coverage: extra coverage is not supported by the kernel 2019/06/05 17:12:20 setuid sandbox: enabled 2019/06/05 17:12:20 namespace sandbox: enabled 2019/06/05 17:12:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/05 17:12:20 fault injection: enabled 2019/06/05 17:12:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/05 17:12:20 net packet injection: enabled 2019/06/05 17:12:20 net device setup: enabled [ 70.294137] random: crng init done 17:12:26 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x800000000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 17:12:26 executing program 0: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x1000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 74.572350] audit: type=1400 audit(1559754746.530:37): avc: denied { map } for pid=6993 comm="syz-fuzzer" path="/root/syzkaller-shm183038010" dev="sda1" ino=16488 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 17:12:26 executing program 3: r0 = socket$inet(0x10, 0x2, 0xc) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010207041dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 17:12:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x4000000000000003, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f00000000c0)) 17:12:26 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$P9_RREAD(r1, &(0x7f0000002980)={0xb}, 0xb) sendfile(r0, r1, 0x0, 0xffff) 17:12:26 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000840), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7fffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = getpgrp(0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000000c0)=0x7fffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000180)=0x126, 0x4) r4 = dup(r3) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000000, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x80000001, 0x56a, 0x0, 0x8, 0x2, 0xffffffffffffffff}, &(0x7f0000000200)={0x5, 0x5, 0x3f, 0x2}, 0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0xfff}, 0x8}) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r1, 0x201, &(0x7f0000000400)={&(0x7f0000000740)}) ioctl$int_in(r3, 0x5452, &(0x7f0000000580)=0xe2b) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setrlimit(0xf, &(0x7f0000000540)={0xba6, 0x3fb}) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) finit_module(r5, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x2) ftruncate(r5, 0x2007fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) [ 74.603702] audit: type=1400 audit(1559754746.540:38): avc: denied { map } for pid=7010 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13806 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 75.490310] IPVS: ftp: loaded support on port[0] = 21 [ 75.731252] NET: Registered protocol family 30 [ 75.735869] Failed to register TIPC socket type [ 76.642605] IPVS: ftp: loaded support on port[0] = 21 [ 76.687649] NET: Registered protocol family 30 [ 76.743957] Failed to register TIPC socket type [ 76.764218] chnl_net:caif_netlink_parms(): no params data found [ 77.152064] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.160456] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.300179] device bridge_slave_0 entered promiscuous mode [ 77.411522] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.417985] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.471823] device bridge_slave_1 entered promiscuous mode [ 77.773522] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 78.087069] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 78.622804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.740883] team0: Port device team_slave_0 added [ 78.951783] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 79.051255] team0: Port device team_slave_1 added [ 79.232726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.646428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 80.271750] device hsr_slave_0 entered promiscuous mode [ 80.470569] device hsr_slave_1 entered promiscuous mode [ 80.546664] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 80.676385] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 80.921538] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 81.469402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.695111] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 81.809425] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 81.920962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.928723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.055400] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 82.140121] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.271801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 82.278863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.310552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.318254] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.325199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.545810] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 82.662725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.669858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.765722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.861203] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.867612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.995789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 83.075230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.143871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 83.226411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.334527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 83.390347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.398220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.503861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 83.600671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.607820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.700630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.769096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 83.850257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.857902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.952462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 83.959538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.969107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.118370] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 84.190412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.301732] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 84.445742] 8021q: adding VLAN 0 to HW filter on device batadv0 17:12:36 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1) fcntl$setown(r2, 0x8, 0x0) sendfile(r3, r4, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x1000000030a6d) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl(r5, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r6, r5) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5024, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) [ 85.036148] hrtimer: interrupt took 35133 ns [ 85.048657] audit: type=1400 audit(1559754756.990:39): avc: denied { map } for pid=7622 comm="syz-executor.5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=26992 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 85.167356] kasan: CONFIG_KASAN_INLINE enabled [ 85.182650] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 85.199846] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 85.206100] Modules linked in: [ 85.209315] CPU: 1 PID: 7636 Comm: syz-executor.5 Not tainted 4.14.123 #17 [ 85.216421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.225794] task: ffff88808091a480 task.stack: ffff88806f390000 [ 85.231880] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 85.236545] RSP: 0018:ffff88806f397478 EFLAGS: 00010a06 [ 85.241911] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90006046000 [ 85.249206] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 85.256650] RBP: ffff88806f397508 R08: ffff8880a5f477c8 R09: ffffed100d76c47c [ 85.263951] R10: ffffed100d76c47b R11: ffff88806bb623dd R12: dffffc0000000000 [ 85.271228] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 85.278501] FS: 00007f55e0e26700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 85.286725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 85.292608] CR2: 0000001b31e2a000 CR3: 0000000086d3d000 CR4: 00000000001406e0 [ 85.299876] Call Trace: [ 85.302477] ? seq_list_next+0x5e/0x80 [ 85.306381] seq_read+0xb46/0x1280 [ 85.309958] ? trace_hardirqs_on_caller+0x400/0x590 [ 85.315010] ? seq_lseek+0x3c0/0x3c0 [ 85.318732] ? proc_reg_read+0x24/0x170 [ 85.322718] proc_reg_read+0xfa/0x170 [ 85.326527] ? seq_lseek+0x3c0/0x3c0 [ 85.330256] do_iter_read+0x3e2/0x5b0 [ 85.334061] vfs_readv+0xd3/0x130 [ 85.337517] ? compat_rw_copy_check_uvector+0x310/0x310 [ 85.342890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 85.347805] default_file_splice_read+0x421/0x7b0 [ 85.352681] ? __kmalloc+0x15d/0x7a0 [ 85.356398] ? alloc_pipe_info+0x15c/0x380 [ 85.360632] ? splice_direct_to_actor+0x5d2/0x7b0 [ 85.365470] ? do_splice_direct+0x18d/0x230 [ 85.369798] ? do_splice_direct+0x230/0x230 [ 85.374123] ? trace_hardirqs_on_caller+0x400/0x590 [ 85.379145] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 85.383904] ? check_preemption_disabled+0x3c/0x250 [ 85.388931] ? check_preemption_disabled+0x3c/0x250 [ 85.393960] ? retint_kernel+0x2d/0x2d [ 85.397863] ? do_splice_to+0x82/0x170 [ 85.401759] ? do_splice_direct+0x230/0x230 [ 85.406081] do_splice_to+0x105/0x170 [ 85.409881] splice_direct_to_actor+0x222/0x7b0 [ 85.414552] ? generic_pipe_buf_nosteal+0x10/0x10 [ 85.419572] ? do_splice_to+0x170/0x170 [ 85.423554] ? rw_verify_area+0xea/0x2b0 [ 85.427619] do_splice_direct+0x18d/0x230 [ 85.431773] ? splice_direct_to_actor+0x7b0/0x7b0 [ 85.436622] ? do_sendfile+0x388/0xbd0 [ 85.440514] do_sendfile+0x4db/0xbd0 [ 85.444237] ? do_compat_pwritev64+0x140/0x140 [ 85.448822] ? put_timespec64+0xb4/0x100 [ 85.452887] ? nsecs_to_jiffies+0x30/0x30 [ 85.457037] SyS_sendfile64+0x102/0x110 [ 85.461015] ? SyS_sendfile+0x130/0x130 [ 85.464992] ? do_syscall_64+0x53/0x640 [ 85.468975] ? SyS_sendfile+0x130/0x130 [ 85.472957] do_syscall_64+0x1e8/0x640 [ 85.476849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.481704] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 85.486888] RIP: 0033:0x459279 [ 85.490074] RSP: 002b:00007f55e0e25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 85.497782] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 85.505055] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 85.512330] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 85.519611] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f55e0e266d4 [ 85.526882] R13: 00000000004c65f3 R14: 00000000004db2a8 R15: 00000000ffffffff [ 85.534159] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 85.553388] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff88806f397478 [ 85.583398] ---[ end trace 4ce27ab51c70893f ]--- [ 85.588256] Kernel panic - not syncing: Fatal exception [ 85.594716] Kernel Offset: disabled [ 85.598359] Rebooting in 86400 seconds..