Warning: Permanently added '10.128.0.154' (ECDSA) to the list of known hosts. [ 40.250637] random: sshd: uninitialized urandom read (32 bytes read) 2019/05/31 13:52:54 fuzzer started [ 40.455538] audit: type=1400 audit(1559310774.625:36): avc: denied { map } for pid=7002 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 42.358125] random: cc1: uninitialized urandom read (8 bytes read) 2019/05/31 13:52:57 dialing manager at 10.128.0.105:43453 2019/05/31 13:52:57 syscalls: 2441 2019/05/31 13:52:57 code coverage: enabled 2019/05/31 13:52:57 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/05/31 13:52:57 extra coverage: extra coverage is not supported by the kernel 2019/05/31 13:52:57 setuid sandbox: enabled 2019/05/31 13:52:57 namespace sandbox: enabled 2019/05/31 13:52:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/31 13:52:57 fault injection: enabled 2019/05/31 13:52:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/31 13:52:57 net packet injection: enabled 2019/05/31 13:52:57 net device setup: enabled [ 44.727776] random: crng init done 13:53:00 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032000000acc200000104000002000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae64af0e68fd043482c8"], 0x1) sendfile(r3, r4, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000270ff2)='net/fib_trie\x00') bind$alg(r5, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r7 = accept4$alg(r5, 0x0, 0x0, 0x0) sendfile(r7, r6, 0x0, 0x3fc) 13:53:00 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x1}) 13:53:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fdatasync(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8b90936d300081452b05eece1d72024c6c7989"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) read(r4, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)=""/136, 0x88}, 0xbf}, {{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {&(0x7f0000000580)=""/225, 0xe1}, {&(0x7f0000000800)}], 0x3, &(0x7f00000008c0)=""/91, 0x5b}, 0x3}], 0x2, 0x0, 0x0) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f0000000700)=0x8, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\'', 0x1ff) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, 0x0, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='\x00', 0x1, 0x3) dup2(r3, r4) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000680), &(0x7f0000000300)=0x68) perf_event_open(0x0, 0x0, 0x4000, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000040)) 13:53:00 executing program 3: r0 = getpgrp(0x0) r1 = gettid() mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x100000001}) rt_sigtimedwait(&(0x7f0000001ff8)={0x3ffff}, &(0x7f0000f0aff0), 0x0, 0x8) 13:53:00 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 13:53:00 executing program 4: syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) unshare(0x20400) socket$inet_udplite(0x2, 0x2, 0x88) inotify_init1(0x0) dup(r0) syz_execute_func(&(0x7f0000000180)="b11391cd808e6b006969ef69dc00d9c462b93816d090c4413927fdfdf91cc1c7c7e4c653fbc1c481b486e71010f42892f9f345a67950ea01ef420f62850000000018675dd1d97c7e7f7f0f5726400f2d4d181801fedff64444c1066200c482fdbae53300b1b182010804f40ebd890f000000") [ 46.042039] audit: type=1400 audit(1559310780.205:37): avc: denied { map } for pid=7002 comm="syz-fuzzer" path="/root/syzkaller-shm391719357" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 46.080731] audit: type=1400 audit(1559310780.225:38): avc: denied { map } for pid=7019 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13768 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 46.203809] IPVS: ftp: loaded support on port[0] = 21 [ 46.461932] NET: Registered protocol family 30 [ 46.466536] Failed to register TIPC socket type [ 47.286591] IPVS: ftp: loaded support on port[0] = 21 [ 47.304911] NET: Registered protocol family 30 [ 47.327850] Failed to register TIPC socket type [ 47.459283] chnl_net:caif_netlink_parms(): no params data found [ 47.702141] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.710869] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.757578] device bridge_slave_0 entered promiscuous mode [ 47.838326] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.972920] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.057945] device bridge_slave_1 entered promiscuous mode [ 48.362416] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.592059] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 49.061015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.200920] team0: Port device team_slave_0 added [ 49.343251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.440632] team0: Port device team_slave_1 added [ 49.631574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.825486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.355924] device hsr_slave_0 entered promiscuous mode [ 50.503012] device hsr_slave_1 entered promiscuous mode [ 50.633849] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 50.790505] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 50.981573] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.552943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.698512] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.851893] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.858146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.871723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.009569] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 52.120800] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.272601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.279681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.312392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.321123] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.327611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.573585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.641959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.649146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.750625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.821501] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.827902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.939516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 53.044238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.113507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.182909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.252029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 53.258980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.291126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.408795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 53.451042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.458086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.531829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.592804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 53.688208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 53.763533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.786094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.860675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.881135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.957851] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 54.038592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.148767] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 54.241287] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.558677] audit: type=1400 audit(1559310788.725:39): avc: denied { map } for pid=7634 comm="syz-executor.5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=28785 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 54.610030] hrtimer: interrupt took 29136 ns [ 54.661797] kasan: CONFIG_KASAN_INLINE enabled [ 54.666631] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 54.700704] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 54.707003] Modules linked in: [ 54.710202] CPU: 1 PID: 7643 Comm: syz-executor.5 Not tainted 4.14.122 #16 [ 54.717209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.726570] task: ffff888065bce040 task.stack: ffff888099228000 [ 54.732643] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 54.737303] RSP: 0018:ffff88809922f478 EFLAGS: 00010a06 [ 54.742662] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90006036000 [ 54.749929] RDX: 1bd5a0000000000c RSI: ffffffff84cc751f RDI: dead000000000060 [ 54.757195] RBP: ffff88809922f508 R08: ffff8880a5033b88 R09: ffffed100ce1adbc [ 54.764463] R10: ffffed100ce1adbb R11: ffff8880670d6ddd R12: dffffc0000000000 [ 54.771728] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3b20 [ 54.779093] FS: 00007f8e84fbc700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 54.787312] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 54.793186] CR2: 00007ff827ef49de CR3: 00000000a5900000 CR4: 00000000001406e0 [ 54.800542] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 54.807809] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 54.815072] Call Trace: [ 54.817666] ? seq_list_next+0x5e/0x80 [ 54.821554] seq_read+0xb46/0x1280 [ 54.825107] ? seq_lseek+0x3c0/0x3c0 [ 54.828819] ? selinux_file_permission+0x85/0x480 [ 54.833662] proc_reg_read+0xfa/0x170 [ 54.837460] ? seq_lseek+0x3c0/0x3c0 [ 54.841262] do_iter_read+0x3e2/0x5b0 [ 54.845062] vfs_readv+0xd3/0x130 [ 54.848512] ? retint_kernel+0x2d/0x2d [ 54.852401] ? compat_rw_copy_check_uvector+0x310/0x310 [ 54.857764] ? __sanitizer_cov_trace_pc+0x4a/0x60 [ 54.862722] ? iov_iter_pipe+0x9f/0x2c0 [ 54.866696] default_file_splice_read+0x421/0x7b0 [ 54.871536] ? __kmalloc+0x15d/0x7a0 [ 54.875252] ? alloc_pipe_info+0x15c/0x380 [ 54.879482] ? splice_direct_to_actor+0x5d2/0x7b0 [ 54.884321] ? do_splice_direct+0x18d/0x230 [ 54.888641] ? do_splice_direct+0x230/0x230 [ 54.892952] ? trace_hardirqs_on+0x10/0x10 [ 54.897179] ? trace_hardirqs_on_caller+0x400/0x590 [ 54.902190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 54.906935] ? save_trace+0x290/0x290 [ 54.910724] ? save_trace+0x290/0x290 [ 54.914527] ? __inode_security_revalidate+0xd6/0x130 [ 54.919796] ? avc_policy_seqno+0x9/0x20 [ 54.923849] ? selinux_file_permission+0x85/0x480 [ 54.928682] ? security_file_permission+0x89/0x1f0 [ 54.933605] ? rw_verify_area+0xea/0x2b0 [ 54.937656] ? do_splice_direct+0x230/0x230 [ 54.942712] do_splice_to+0x105/0x170 [ 54.946500] splice_direct_to_actor+0x222/0x7b0 [ 54.951160] ? generic_pipe_buf_nosteal+0x10/0x10 [ 54.955991] ? do_splice_to+0x170/0x170 [ 54.959959] ? rw_verify_area+0xea/0x2b0 [ 54.964008] do_splice_direct+0x18d/0x230 [ 54.968149] ? splice_direct_to_actor+0x7b0/0x7b0 [ 54.972982] ? rw_verify_area+0xea/0x2b0 [ 54.977034] do_sendfile+0x4db/0xbd0 [ 54.980740] ? do_compat_pwritev64+0x140/0x140 [ 54.985312] ? put_timespec64+0xb4/0x100 [ 54.989371] ? nsecs_to_jiffies+0x30/0x30 [ 54.993514] SyS_sendfile64+0x102/0x110 [ 54.997483] ? SyS_sendfile+0x130/0x130 [ 55.001450] ? do_syscall_64+0x53/0x640 [ 55.005417] ? SyS_sendfile+0x130/0x130 [ 55.009380] do_syscall_64+0x1e8/0x640 [ 55.013261] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 55.018103] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 55.023283] RIP: 0033:0x459279 [ 55.026462] RSP: 002b:00007f8e84fbbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 55.034161] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 55.041595] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 55.048886] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 55.056148] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f8e84fbc6d4 [ 55.063410] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 55.070719] Code: 06 00 00 e8 61 2e 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 55.089927] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff88809922f478 [ 55.110121] ---[ end trace 48c994c05ac732fe ]--- [ 55.115836] Kernel panic - not syncing: Fatal exception [ 55.122262] Kernel Offset: disabled [ 55.125881] Rebooting in 86400 seconds..