[ 44.408136] audit: type=1800 audit(1558837099.993:30): pid=7692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 48.744189] kauditd_printk_skb: 4 callbacks suppressed [ 48.744204] audit: type=1400 audit(1558837104.363:35): avc: denied { map } for pid=7866 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.219' (ECDSA) to the list of known hosts. 2019/05/26 02:18:31 fuzzer started [ 55.471676] audit: type=1400 audit(1558837111.093:36): avc: denied { map } for pid=7875 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/26 02:18:33 dialing manager at 10.128.0.105:44295 2019/05/26 02:18:33 syscalls: 2457 2019/05/26 02:18:33 code coverage: enabled 2019/05/26 02:18:33 comparison tracing: enabled 2019/05/26 02:18:33 extra coverage: extra coverage is not supported by the kernel 2019/05/26 02:18:33 setuid sandbox: enabled 2019/05/26 02:18:33 namespace sandbox: enabled 2019/05/26 02:18:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/26 02:18:33 fault injection: enabled 2019/05/26 02:18:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/26 02:18:33 net packet injection: enabled 2019/05/26 02:18:33 net device setup: enabled 02:18:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0000a36ccfdc8ae64d46ea4895d203bc94c65d65eb7c9bc1580000f321de0427e98ed551969b9a02f75a174fd903c27a02ff6b9ef5ca592ff1c8c2f90e0000000000000000101a71af09416357203ed43b7e10ec74ae6dd65ce67b80aa17d7070000edd3c1a35413e9082498c43222a3bfb0120dbaac96790a9e5908cd24ba9156098e5e46a84a943ad4"], 0x8a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d5430fc7f314c1ab5be2f9660f3a0fae5e09320000ba20ba20d1dcfac4817d73d74ec482310d46f449f216c863fa43c4c2750ade35dbae660f38086e6fc4e1a05d6b06aa420f383c02c401405c6bfd42af68d768f833fefbe890ab90ab660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 63.325174] audit: type=1400 audit(1558837118.943:37): avc: denied { map } for pid=7893 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14193 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 63.418480] IPVS: ftp: loaded support on port[0] = 21 [ 63.428545] NET: Registered protocol family 30 [ 63.433157] Failed to register TIPC socket type 02:18:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000340)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="02000000bf01000001000000000d8ff240f3a6b643000000ba010000087d00002123002fde042774602f36cddbc6ba87b3b3312d91f7fbcd2616891244b66640003d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3a40000000b9eaceeae2cb7df923371fd5e88c07109310447fd0b311245765d6"], 0x86}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 63.754641] IPVS: ftp: loaded support on port[0] = 21 [ 63.772255] NET: Registered protocol family 30 [ 63.776875] Failed to register TIPC socket type 02:18:39 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") poll(&(0x7f00000000c0)=[{}, {}, {r0, 0x8000}, {r0}], 0x4, 0x2d2) [ 64.064678] IPVS: ftp: loaded support on port[0] = 21 [ 64.081406] NET: Registered protocol family 30 [ 64.086016] Failed to register TIPC socket type 02:18:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x40}}, 0x0) syz_execute_func(&(0x7f0000000280)="91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 64.594924] IPVS: ftp: loaded support on port[0] = 21 [ 64.622665] NET: Registered protocol family 30 [ 64.637320] Failed to register TIPC socket type 02:18:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bridge\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x3c}}, 0x0) syz_execute_func(&(0x7f0000000280)="91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 65.150230] IPVS: ftp: loaded support on port[0] = 21 [ 65.180269] NET: Registered protocol family 30 [ 65.184889] Failed to register TIPC socket type [ 66.495930] chnl_net:caif_netlink_parms(): no params data found [ 66.904682] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.967317] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.031804] device bridge_slave_0 entered promiscuous mode [ 67.089131] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.095604] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.168420] device bridge_slave_1 entered promiscuous mode [ 67.622597] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 67.885839] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 68.370106] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 68.538185] team0: Port device team_slave_0 added [ 68.730471] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 68.859275] team0: Port device team_slave_1 added [ 69.236157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 69.507783] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 70.122231] device hsr_slave_0 entered promiscuous mode [ 70.301365] device hsr_slave_1 entered promiscuous mode [ 70.462133] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 70.592756] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 70.859986] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 71.492336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.659691] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.838935] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 71.845194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.868788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.070018] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 72.098092] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.317817] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.324881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.349107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.448604] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.455133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.600551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.705226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.713729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.798856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.858664] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.865046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.984264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.068577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.191714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.246356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.325254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.394529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.426039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 02:18:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x196}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 73.530593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.155897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.176774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.688049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.768023] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 75.197758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.205722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.474001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 76.018069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.026083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.057335] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 77.107451] IPVS: ftp: loaded support on port[0] = 21 [ 77.116566] NET: Registered protocol family 30 [ 77.567293] Failed to register TIPC socket type [ 77.719229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.197940] audit: type=1400 audit(1558837133.823:38): avc: denied { associate } for pid=7894 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 79.376775] IPVS: ftp: loaded support on port[0] = 21 [ 79.592325] NET: Registered protocol family 30 [ 79.596959] Failed to register TIPC socket type [ 79.618032] IPVS: ftp: loaded support on port[0] = 21 [ 79.799149] NET: Registered protocol family 30 [ 79.916732] Failed to register TIPC socket type 02:18:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0000a36ccfdc8ae64d46ea4895d203bc94c65d65eb7c9bc1580000f321de0427e98ed551969b9a02f75a174fd903c27a02ff6b9ef5ca592ff1c8c2f90e0000000000000000101a71af09416357203ed43b7e10ec74ae6dd65ce67b80aa17d7070000edd3c1a35413e9082498c43222a3bfb0120dbaac96790a9e5908cd24ba9156098e5e46a84a943ad4"], 0x8a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d5430fc7f314c1ab5be2f9660f3a0fae5e09320000ba20ba20d1dcfac4817d73d74ec482310d46f449f216c863fa43c4c2750ade35dbae660f38086e6fc4e1a05d6b06aa420f383c02c401405c6bfd42af68d768f833fefbe890ab90ab660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 81.414492] IPVS: ftp: loaded support on port[0] = 21 [ 81.435768] NET: Registered protocol family 30 [ 81.459524] Failed to register TIPC socket type 02:18:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0000a36ccfdc8ae64d46ea4895d203bc94c65d65eb7c9bc1580000f321de0427e98ed551969b9a02f75a174fd903c27a02ff6b9ef5ca592ff1c8c2f90e0000000000000000101a71af09416357203ed43b7e10ec74ae6dd65ce67b80aa17d7070000edd3c1a35413e9082498c43222a3bfb0120dbaac96790a9e5908cd24ba9156098e5e46a84a943ad4"], 0x8a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d5430fc7f314c1ab5be2f9660f3a0fae5e09320000ba20ba20d1dcfac4817d73d74ec482310d46f449f216c863fa43c4c2750ade35dbae660f38086e6fc4e1a05d6b06aa420f383c02c401405c6bfd42af68d768f833fefbe890ab90ab660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 81.823757] IPVS: ftp: loaded support on port[0] = 21 [ 81.851357] NET: Registered protocol family 30 [ 81.855984] Failed to register TIPC socket type 02:18:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0000a36ccfdc8ae64d46ea4895d203bc94c65d65eb7c9bc1580000f321de0427e98ed551969b9a02f75a174fd903c27a02ff6b9ef5ca592ff1c8c2f90e0000000000000000101a71af09416357203ed43b7e10ec74ae6dd65ce67b80aa17d7070000edd3c1a35413e9082498c43222a3bfb0120dbaac96790a9e5908cd24ba9156098e5e46a84a943ad4"], 0x8a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d5430fc7f314c1ab5be2f9660f3a0fae5e09320000ba20ba20d1dcfac4817d73d74ec482310d46f449f216c863fa43c4c2750ade35dbae660f38086e6fc4e1a05d6b06aa420f383c02c401405c6bfd42af68d768f833fefbe890ab90ab660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 02:18:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r1, r2, 0x0, 0x8000) [ 83.791399] kasan: CONFIG_KASAN_INLINE enabled [ 83.807516] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 83.836044] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 83.842418] CPU: 0 PID: 8566 Comm: syz-executor.0 Not tainted 4.19.46 #18 [ 83.849342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.858721] RIP: 0010:proto_seq_show+0x52/0x8e0 [ 83.863493] Code: 00 00 e8 a1 56 0c fc 48 8d bb 50 ff ff ff 48 8d 83 70 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 d2 07 00 00 48 83 bb 50 ff ff ff 01 19 c0 83 e0 [ 83.882404] RSP: 0018:ffff888091f9f3d0 EFLAGS: 00010a06 [ 83.887775] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90005e77000 [ 83.895047] RDX: 1bd5a0000000000a RSI: ffffffff855ea8df RDI: dead000000000050 [ 83.902320] RBP: ffff888091f9f460 R08: ffff888090d3e2c0 R09: ffffed100f10b08b [ 83.909607] R10: ffffed100f10b08a R11: ffff888078858453 R12: 00000000000002d4 [ 83.916878] R13: dead000000000100 R14: ffffffff87dc6ae0 R15: 0000000000001000 [ 83.924155] FS: 00007f16195d8700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 83.932381] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 83.938263] CR2: 0000001b31125000 CR3: 0000000088780000 CR4: 00000000001406f0 [ 83.945528] Call Trace: [ 83.948124] ? seq_list_next+0x5e/0x80 [ 83.952014] seq_read+0xaae/0x1110 [ 83.955565] ? seq_dentry+0x2d0/0x2d0 [ 83.959383] proc_reg_read+0x1f8/0x2b0 [ 83.963273] ? proc_reg_unlocked_ioctl+0x2a0/0x2a0 [ 83.968211] ? security_file_permission+0x89/0x230 [ 83.973144] ? rw_verify_area+0x118/0x360 [ 83.977294] do_iter_read+0x490/0x640 [ 83.981392] ? dup_iter+0x280/0x280 [ 83.985033] vfs_readv+0xf0/0x160 [ 83.988508] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 83.993875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.999462] ? push_pipe+0x417/0x7a0 [ 84.003203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.008769] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 84.013899] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 84.018919] ? iov_iter_pipe+0xbe/0x2f0 [ 84.022898] default_file_splice_read+0x478/0x890 [ 84.027742] ? save_stack+0x45/0xd0 [ 84.031373] ? kasan_kmalloc+0xce/0xf0 [ 84.035256] ? __kmalloc+0x15d/0x750 [ 84.038971] ? iter_file_splice_write+0xbd0/0xbd0 [ 84.043816] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 84.048660] ? percpu_ref_put_many+0x94/0x190 [ 84.053192] ? __inode_security_revalidate+0xda/0x120 [ 84.058383] ? avc_policy_seqno+0xd/0x70 [ 84.062446] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 84.067483] ? security_file_permission+0x89/0x230 [ 84.072413] ? iter_file_splice_write+0xbd0/0xbd0 [ 84.077265] do_splice_to+0x127/0x180 [ 84.081073] splice_direct_to_actor+0x256/0x890 [ 84.085743] ? generic_pipe_buf_nosteal+0x10/0x10 [ 84.090594] ? do_splice_to+0x180/0x180 [ 84.094571] ? security_file_permission+0x89/0x230 [ 84.099503] ? rw_verify_area+0x118/0x360 [ 84.103656] do_splice_direct+0x1da/0x2a0 [ 84.107807] ? splice_direct_to_actor+0x890/0x890 [ 84.112652] ? security_file_permission+0x89/0x230 [ 84.117581] ? rw_verify_area+0x118/0x360 [ 84.121726] do_sendfile+0x597/0xce0 [ 84.125444] ? do_compat_pwritev64+0x1c0/0x1c0 [ 84.130034] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.135572] ? put_timespec64+0xda/0x140 [ 84.139636] __x64_sys_sendfile64+0x1dd/0x220 [ 84.144128] ? __ia32_sys_sendfile+0x230/0x230 [ 84.148706] ? do_syscall_64+0x26/0x620 [ 84.153077] ? lockdep_hardirqs_on+0x415/0x5d0 [ 84.157658] ? trace_hardirqs_on+0x67/0x220 [ 84.161978] do_syscall_64+0xfd/0x620 [ 84.165778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 84.170965] RIP: 0033:0x459279 [ 84.174157] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 84.193063] RSP: 002b:00007f16195d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 84.200776] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 84.208046] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 84.215309] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 84.222572] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f16195d86d4 [ 84.229835] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 84.237102] Modules linked in: [ 84.374045] ---[ end trace 8ef4e96020c0e17a ]--- [ 84.379136] RIP: 0010:proto_seq_show+0x52/0x8e0 [ 84.383825] Code: 00 00 e8 a1 56 0c fc 48 8d bb 50 ff ff ff 48 8d 83 70 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 d2 07 00 00 48 83 bb 50 ff ff ff 01 19 c0 83 e0 [ 84.402779] RSP: 0018:ffff888091f9f3d0 EFLAGS: 00010a06 [ 84.414743] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90005e77000 [ 84.422088] RDX: 1bd5a0000000000a RSI: ffffffff855ea8df RDI: dead000000000050 [ 84.429625] RBP: ffff888091f9f460 R08: ffff888090d3e2c0 R09: ffffed100f10b08b [ 84.436919] R10: ffffed100f10b08a R11: ffff888078858453 R12: 00000000000002d4 [ 84.444281] R13: dead000000000100 R14: ffffffff87dc6ae0 R15: 0000000000001000 [ 84.451629] FS: 00007f16195d8700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 84.460242] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 84.466243] CR2: 00007ffd25414f2c CR3: 0000000088780000 CR4: 00000000001406f0 [ 84.487681] Kernel panic - not syncing: Fatal exception [ 84.494064] Kernel Offset: disabled [ 84.497695] Rebooting in 86400 seconds..