Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts. [ 53.066652] random: sshd: uninitialized urandom read (32 bytes read) 2019/05/29 15:35:12 fuzzer started [ 53.262130] audit: type=1400 audit(1559144112.684:36): avc: denied { map } for pid=7090 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 54.922937] random: cc1: uninitialized urandom read (8 bytes read) 2019/05/29 15:35:15 dialing manager at 10.128.0.105:40437 2019/05/29 15:35:15 syscalls: 2441 2019/05/29 15:35:15 code coverage: enabled 2019/05/29 15:35:15 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/05/29 15:35:15 extra coverage: extra coverage is not supported by the kernel 2019/05/29 15:35:15 setuid sandbox: enabled 2019/05/29 15:35:15 namespace sandbox: enabled 2019/05/29 15:35:15 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/29 15:35:15 fault injection: enabled 2019/05/29 15:35:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/29 15:35:15 net packet injection: enabled 2019/05/29 15:35:15 net device setup: enabled 15:35:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032000000acc200000104000002000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae64af0e68fd043482c8"], 0x1) sendfile(r3, r4, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000270ff2)='net/fib_trie\x00') bind$alg(r5, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r7 = accept4$alg(r5, 0x0, 0x0, 0x0) sendfile(r7, r6, 0x0, 0x3fc) 15:35:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) socket$inet6(0xa, 0x10, 0x0) r2 = dup(r1) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffb) 15:35:18 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x96a, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) write(r0, &(0x7f0000000080)="a8", 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce000008020002aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee468dcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12f2400f125200111d54111d00") sendfile(r0, r0, &(0x7f0000000040), 0xff8) 15:35:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r1, r1, 0x0, 0x8000fffffffb) 15:35:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="f2af91930f0124eda133fa20430fbafce842f66188d0d4e1801491ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a9f340ae955baaaa420f383c02c401405c6bfdc462458c2368d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4ebef26450f01dd9c0f01c4288ba6452e0000c46148551c7180") 15:35:18 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c0f20fd0b436f40000000f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa64680b0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") [ 58.589472] audit: type=1400 audit(1559144118.004:37): avc: denied { map } for pid=7090 comm="syz-fuzzer" path="/root/syzkaller-shm166831394" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 58.640875] audit: type=1400 audit(1559144118.004:38): avc: denied { map } for pid=7108 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 59.480237] IPVS: ftp: loaded support on port[0] = 21 [ 59.741342] NET: Registered protocol family 30 [ 59.745953] Failed to register TIPC socket type [ 60.655404] IPVS: ftp: loaded support on port[0] = 21 [ 60.684103] NET: Registered protocol family 30 [ 60.688758] Failed to register TIPC socket type [ 60.705625] chnl_net:caif_netlink_parms(): no params data found [ 60.974454] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.010136] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.050176] device bridge_slave_0 entered promiscuous mode [ 61.090853] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.097301] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.141201] device bridge_slave_1 entered promiscuous mode [ 61.288698] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.521109] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.233831] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.313028] team0: Port device team_slave_0 added [ 62.493299] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.601567] team0: Port device team_slave_1 added [ 62.803749] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.044018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.882727] device hsr_slave_0 entered promiscuous mode [ 64.242895] device hsr_slave_1 entered promiscuous mode [ 64.603621] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 64.863165] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 65.276757] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.962748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.144193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 66.301739] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.307997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.333386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.540966] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 66.547123] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.709685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.870934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.878872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.992325] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.998880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.157518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 67.270558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.278541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.391933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.399797] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.406246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.601814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.700681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.788108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.840280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.942207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 67.949277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.964864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.048431] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.168844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 68.232789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.258636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.355606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 68.440802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.448551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.547009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 68.640550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.648276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.765014] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 68.840174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.951903] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 69.126501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.555854] audit: type=1400 audit(1559144128.974:39): avc: denied { map } for pid=7727 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27677 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 69.630061] hrtimer: interrupt took 52566 ns [ 69.689337] kasan: CONFIG_KASAN_INLINE enabled [ 69.736426] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 69.799472] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 69.805751] Modules linked in: [ 69.808963] CPU: 0 PID: 7731 Comm: syz-executor.0 Not tainted 4.14.122 #16 [ 69.816171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.825591] task: ffff8880719f6640 task.stack: ffff888094580000 [ 69.831672] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 69.836359] RSP: 0018:ffff888094587478 EFLAGS: 00010a06 [ 69.841739] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc9000602e000 [ 69.849211] RDX: 1bd5a0000000000c RSI: ffffffff84cc751f RDI: dead000000000060 [ 69.856495] RBP: ffff888094587508 R08: ffff8880902ea288 R09: ffffed101296d89c [ 69.863781] R10: ffffed101296d89b R11: ffff888094b6c4dd R12: dffffc0000000000 [ 69.871065] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3b20 [ 69.878353] FS: 00007fbdd50e9700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 69.886627] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 69.892716] CR2: 00000000006197e0 CR3: 000000007b0c2000 CR4: 00000000001406f0 [ 69.900007] Call Trace: [ 69.902621] ? seq_list_next+0x5e/0x80 [ 69.906566] seq_read+0xb46/0x1280 [ 69.910225] ? trace_hardirqs_on_caller+0x400/0x590 [ 69.915475] ? seq_lseek+0x3c0/0x3c0 [ 69.919214] ? seq_lseek+0x3c0/0x3c0 [ 69.922979] ? proc_reg_read+0x92/0x170 [ 69.926976] proc_reg_read+0xfa/0x170 [ 69.930884] ? seq_lseek+0x3c0/0x3c0 [ 69.934617] do_iter_read+0x3e2/0x5b0 [ 69.938432] vfs_readv+0xd3/0x130 [ 69.941898] ? compat_rw_copy_check_uvector+0x310/0x310 [ 69.947365] ? push_pipe+0x3e6/0x780 [ 69.951578] ? iov_iter_pipe+0x9f/0x2c0 [ 69.955656] default_file_splice_read+0x421/0x7b0 [ 69.960523] ? do_splice_direct+0x230/0x230 [ 69.964864] ? __sanitizer_cov_trace_pc+0x23/0x60 [ 69.969732] ? __inode_security_revalidate+0xd6/0x130 [ 69.974953] ? avc_policy_seqno+0x9/0x20 [ 69.980449] ? selinux_file_permission+0x85/0x480 [ 69.985499] ? security_file_permission+0x89/0x1f0 [ 69.990536] ? rw_verify_area+0xea/0x2b0 [ 69.994611] ? do_splice_direct+0x230/0x230 [ 69.998955] do_splice_to+0x105/0x170 [ 70.002780] splice_direct_to_actor+0x222/0x7b0 [ 70.007476] ? generic_pipe_buf_nosteal+0x10/0x10 [ 70.012337] ? do_splice_to+0x170/0x170 [ 70.016334] ? rw_verify_area+0xea/0x2b0 [ 70.020437] do_splice_direct+0x18d/0x230 [ 70.024598] ? splice_direct_to_actor+0x7b0/0x7b0 [ 70.029457] ? rw_verify_area+0xea/0x2b0 [ 70.033526] do_sendfile+0x4db/0xbd0 [ 70.037340] ? do_compat_pwritev64+0x140/0x140 [ 70.042026] ? put_timespec64+0xb4/0x100 [ 70.046198] ? nsecs_to_jiffies+0x30/0x30 [ 70.050364] SyS_sendfile64+0x102/0x110 [ 70.054353] ? SyS_sendfile+0x130/0x130 [ 70.058344] ? do_syscall_64+0x53/0x640 [ 70.062506] ? SyS_sendfile+0x130/0x130 [ 70.066521] do_syscall_64+0x1e8/0x640 [ 70.070420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 70.075282] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 70.080505] RIP: 0033:0x459279 [ 70.083692] RSP: 002b:00007fbdd50e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 70.091507] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 70.099310] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 70.106593] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 70.113874] R10: 0000000000008000 R11: 0000000000000246 R12: 00007fbdd50e96d4 [ 70.121236] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 70.128519] Code: 06 00 00 e8 61 2e 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 70.147948] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff888094587478 [ 70.177028] ---[ end trace fa69d87da365a91a ]--- [ 70.186562] Kernel panic - not syncing: Fatal exception [ 70.193118] Kernel Offset: disabled [ 70.196755] Rebooting in 86400 seconds..