[....] Starting OpenBSD Secure Shell server: sshd[ 29.176278] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 45.104170] random: sshd: uninitialized urandom read (32 bytes read) [ 45.510559] kauditd_printk_skb: 9 callbacks suppressed [ 45.510567] audit: type=1400 audit(1559637573.060:35): avc: denied { map } for pid=6828 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 45.566092] random: sshd: uninitialized urandom read (32 bytes read) [ 46.186710] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. [ 51.716631] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/04 08:39:39 fuzzer started [ 51.906458] audit: type=1400 audit(1559637579.450:36): avc: denied { map } for pid=6837 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 53.751080] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/04 08:39:42 dialing manager at 10.128.0.105:38803 2019/06/04 08:39:42 syscalls: 2444 2019/06/04 08:39:42 code coverage: enabled 2019/06/04 08:39:42 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/04 08:39:42 extra coverage: extra coverage is not supported by the kernel 2019/06/04 08:39:42 setuid sandbox: enabled 2019/06/04 08:39:42 namespace sandbox: enabled 2019/06/04 08:39:42 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/04 08:39:42 fault injection: enabled 2019/06/04 08:39:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/04 08:39:42 net packet injection: enabled 2019/06/04 08:39:42 net device setup: enabled [ 55.508862] random: crng init done 08:39:46 executing program 0: r0 = memfd_create(&(0x7f00000028c0)='/deV/\x00\xe1\xb1c$I\xd0](\x10\xbbZ\x19\xd0\x14\x96}%\xed\x85\xb1YT\x9c\xf8@f\xa0\xd0G\x10-,\xc3+\xb8i\xc0\xaf\xbf\xfc\x99\x95\x835\xab\xeaH\b\"\x82\x82\x7f:k\xfe\xeb\x97\xd1\xbb&I\xe8\xf9\xe0\xab^\xbb\xbeY\xbf\x9f\xe3\xa5\xae\xfc\x93\xe2\xcfC\x8f\x89\xcbqB\x90a\xd3o8\xb1\xfa\xae\xe6\xb2\xaf\xfb\x1a\x10\xd5\x82\xb1$Q\x8c\x13\x9b\xc7z\xecM\x00\x01z\x8f\xdb\xb4\x82\x05S[\x85\xd9c\x16\x8dg?\x91y\xd3\xffN\xe9\x8bg\xe7\xfe<\xca#`(\xf5\xa7\x05\xc7\x12W\x94\xbc;\'\x1a\xa2\b)\x1a\xec\xec_i\xb8F\xb0\x06\x00bG\xb1\xbb\xdfx\xf8\x98\xda@\xe5M\xd0\xe4\xf0\x01V\x11/\xfa\x83\xe6^\xf0XfT\x90\xb1&D\xd1\x16a\x99\a#\xa5#\xbb\x99Fp\x92\x03\xcf\x8f\x85i\x81\xb1\x9e\x9a\a\x95\x17\xd84YT\f)\x1aSD\x19\x9d\x0e\x99!\x87\xe2?\xf2j\xfcS\xcb%C\x9b\xf8\x93\xd17\xf1\x97G\xa0g\xb5\xde\x1a\xc7\x83\xc1\x17\xcc\xd8\xf4\x15\xe5\x0e\xa7\x91N\xa3\x93\xe5&H\x7f\x1d\xd9\xa8)', 0x0) ftruncate(r0, 0x9b6) ftruncate(r0, 0x0) 08:39:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000180)="25cecd654529ff0a5c22b91a88b0a6eb9c", 0x11, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r2, r1}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 08:39:46 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) 08:39:46 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x20000000) 08:39:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) 08:39:46 executing program 4: unshare(0x24020400) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) getdents(r0, &(0x7f0000000340)=""/4096, 0x1000) [ 58.594655] audit: type=1400 audit(1559637586.140:37): avc: denied { map } for pid=6837 comm="syz-fuzzer" path="/root/syzkaller-shm142970663" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 58.670164] audit: type=1400 audit(1559637586.170:38): avc: denied { map } for pid=6854 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 59.590199] IPVS: ftp: loaded support on port[0] = 21 [ 59.881256] NET: Registered protocol family 30 [ 59.885875] Failed to register TIPC socket type [ 60.738331] IPVS: ftp: loaded support on port[0] = 21 [ 60.754399] NET: Registered protocol family 30 [ 60.759034] Failed to register TIPC socket type [ 60.893909] chnl_net:caif_netlink_parms(): no params data found [ 61.199174] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.261643] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.290132] device bridge_slave_0 entered promiscuous mode [ 61.341459] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.396451] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.502761] device bridge_slave_1 entered promiscuous mode [ 61.865152] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.053226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.531610] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.681142] team0: Port device team_slave_0 added [ 62.802181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.901539] team0: Port device team_slave_1 added [ 63.066068] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.276780] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.886994] device hsr_slave_0 entered promiscuous mode [ 63.994722] device hsr_slave_1 entered promiscuous mode [ 64.158403] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 64.270715] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 64.538660] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.144610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.316480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.461799] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.543836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.557048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.665861] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 65.762381] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.871662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 65.878742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.908798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.994995] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.001585] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.167090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.230609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.237809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.328186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.403028] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.409429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.494320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 66.560771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.622031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 66.660205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.741185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 66.748328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.771054] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.913641] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.985762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.001423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.009181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.108654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 67.181254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.188904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.265898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 67.338604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.357911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.462316] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 67.468416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.605251] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 67.771028] 8021q: adding VLAN 0 to HW filter on device batadv0 08:39:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) 08:39:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) 08:39:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) 08:39:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000180), &(0x7f00000003c0)=0x4) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) keyctl$session_to_parent(0x12) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r4, r5, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 68.340034] hrtimer: interrupt took 34436 ns [ 68.347585] audit: type=1400 audit(1559637595.880:39): avc: denied { map } for pid=7503 comm="syz-executor.3" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=26502 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 68.458027] kasan: CONFIG_KASAN_INLINE enabled [ 68.464468] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 68.474637] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 68.480897] Modules linked in: [ 68.484090] CPU: 0 PID: 7509 Comm: syz-executor.3 Not tainted 4.14.123 #17 [ 68.491095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.500449] task: ffff8880a07d4500 task.stack: ffff88806fe98000 [ 68.506508] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 68.511170] RSP: 0018:ffff88806fe9f478 EFLAGS: 00010a06 [ 68.516527] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90006448000 [ 68.523791] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 68.531145] RBP: ffff88806fe9f508 R08: ffff8880a4deb448 R09: ffffed1014b9659c [ 68.538415] R10: ffffed1014b9659b R11: ffff8880a5cb2cdd R12: dffffc0000000000 [ 68.545705] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 68.552990] FS: 00007f2e6b377700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 68.561231] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 68.567110] CR2: 0000001b3032a000 CR3: 0000000095572000 CR4: 00000000001406f0 [ 68.574374] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 68.581634] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 68.588905] Call Trace: [ 68.591496] ? seq_list_next+0x5e/0x80 [ 68.595379] seq_read+0xb46/0x1280 [ 68.598921] ? seq_lseek+0x3c0/0x3c0 [ 68.602630] ? avc_policy_seqno+0x9/0x20 [ 68.606688] ? selinux_file_permission+0x85/0x480 [ 68.611527] proc_reg_read+0xfa/0x170 [ 68.615320] ? seq_lseek+0x3c0/0x3c0 [ 68.619034] do_iter_read+0x3e2/0x5b0 [ 68.622841] vfs_readv+0xd3/0x130 [ 68.626292] ? compat_rw_copy_check_uvector+0x310/0x310 [ 68.634164] ? push_pipe+0x3e6/0x780 [ 68.637881] ? iov_iter_pipe+0x9f/0x2c0 [ 68.641849] default_file_splice_read+0x421/0x7b0 [ 68.646684] ? retint_kernel+0x2d/0x2d [ 68.650567] ? do_splice_direct+0x230/0x230 [ 68.654883] ? check_preemption_disabled+0x3c/0x250 [ 68.659914] ? __inode_security_revalidate+0xd6/0x130 [ 68.665101] ? avc_policy_seqno+0x9/0x20 [ 68.669159] ? selinux_file_permission+0x85/0x480 [ 68.673999] ? security_file_permission+0x89/0x1f0 [ 68.678929] ? rw_verify_area+0xea/0x2b0 [ 68.683072] ? do_splice_direct+0x230/0x230 [ 68.687386] do_splice_to+0x105/0x170 [ 68.691183] splice_direct_to_actor+0x222/0x7b0 [ 68.695859] ? generic_pipe_buf_nosteal+0x10/0x10 [ 68.700710] ? do_splice_to+0x170/0x170 [ 68.704684] ? rw_verify_area+0xea/0x2b0 [ 68.708737] do_splice_direct+0x18d/0x230 [ 68.712879] ? splice_direct_to_actor+0x7b0/0x7b0 [ 68.717719] ? rw_verify_area+0xea/0x2b0 [ 68.721783] ? do_sendfile+0x292/0xbd0 [ 68.725671] do_sendfile+0x4db/0xbd0 [ 68.729386] ? do_compat_pwritev64+0x140/0x140 [ 68.733965] ? put_timespec64+0xb4/0x100 [ 68.738021] ? nsecs_to_jiffies+0x30/0x30 [ 68.742168] SyS_sendfile64+0x102/0x110 [ 68.746228] ? SyS_sendfile+0x130/0x130 [ 68.750281] ? do_syscall_64+0x53/0x640 [ 68.754253] ? SyS_sendfile+0x130/0x130 [ 68.758226] do_syscall_64+0x1e8/0x640 [ 68.762108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 68.766950] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 68.772134] RIP: 0033:0x459279 [ 68.775316] RSP: 002b:00007f2e6b376c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 68.783022] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 68.790318] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 68.798858] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 68.806124] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f2e6b3776d4 [ 68.813388] R13: 00000000004c65f3 R14: 00000000004db2a8 R15: 00000000ffffffff [ 68.820655] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 68.839911] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff88806fe9f478 [ 68.855106] ---[ end trace 33327c22c7b2f455 ]--- [ 68.860245] Kernel panic - not syncing: Fatal exception [ 68.866995] Kernel Offset: disabled [ 68.870622] Rebooting in 86400 seconds..