[ 53.211435] audit: type=1400 audit(1559715421.395:36): avc: denied { map } for pid=6996 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.11' (ECDSA) to the list of known hosts. [ 57.062058] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/05 06:17:05 fuzzer started [ 57.256032] audit: type=1400 audit(1559715425.435:37): avc: denied { map } for pid=7000 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 59.021089] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/05 06:17:08 dialing manager at 10.128.0.105:44623 2019/06/05 06:17:08 syscalls: 2444 2019/06/05 06:17:08 code coverage: enabled 2019/06/05 06:17:08 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/05 06:17:08 extra coverage: extra coverage is not supported by the kernel 2019/06/05 06:17:08 setuid sandbox: enabled 2019/06/05 06:17:08 namespace sandbox: enabled 2019/06/05 06:17:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/05 06:17:08 fault injection: enabled 2019/06/05 06:17:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/05 06:17:08 net packet injection: enabled 2019/06/05 06:17:08 net device setup: enabled [ 61.027637] random: crng init done 06:17:11 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1) fcntl$setown(r2, 0x8, 0x0) sendfile(r3, r4, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x1000000030a6d) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl(r5, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r6, r5) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) 06:17:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 06:17:11 executing program 5: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) readv(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000640)=""/144, 0x90}, {&(0x7f0000000700)=""/173, 0xad}], 0x2, &(0x7f0000000940)=[{0x0}, {&(0x7f0000000140)}, {&(0x7f0000000180)}, {&(0x7f0000000880)=""/177, 0xb1}], 0x4, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x5, {0x9}}, 0x18) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 06:17:11 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0xfffffffffffffffd, 0x1bd) 06:17:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x2c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x300]}, {[], @icmpv6=@time_exceed={0xffffff85, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:17:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x1ce, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 63.022613] audit: type=1400 audit(1559715431.205:38): avc: denied { map } for pid=7000 comm="syz-fuzzer" path="/root/syzkaller-shm712802297" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 63.070528] audit: type=1400 audit(1559715431.205:39): avc: denied { map } for pid=7017 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13797 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 63.380164] IPVS: ftp: loaded support on port[0] = 21 [ 63.671224] NET: Registered protocol family 30 [ 63.675836] Failed to register TIPC socket type [ 64.566314] IPVS: ftp: loaded support on port[0] = 21 [ 64.615256] chnl_net:caif_netlink_parms(): no params data found [ 64.617806] NET: Registered protocol family 30 [ 64.669214] Failed to register TIPC socket type [ 64.905000] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.970116] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.017154] device bridge_slave_0 entered promiscuous mode [ 65.061953] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.068395] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.130986] device bridge_slave_1 entered promiscuous mode [ 65.540768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 65.799291] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.320641] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 66.424882] team0: Port device team_slave_0 added [ 66.601983] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 66.741282] team0: Port device team_slave_1 added [ 66.927118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 67.245341] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 67.797501] device hsr_slave_0 entered promiscuous mode [ 67.935482] device hsr_slave_1 entered promiscuous mode [ 68.169675] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 68.365745] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 68.641849] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.282689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.435866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.601656] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.607857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.642094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.812159] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 69.818312] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.061545] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.150274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.158139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.262529] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.269019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.400996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.504474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.527722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.631352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.701058] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.707440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.828786] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 70.904227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.982442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.989321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.141569] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 71.148519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.171917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.179568] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.293897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.360245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.368634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.433646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 71.504944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.522182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.582465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 71.631867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.639435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.748766] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 71.830582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.944678] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 72.091941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.567188] audit: type=1400 audit(1559715440.745:40): avc: denied { map } for pid=7631 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=26597 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 72.616364] hrtimer: interrupt took 25071 ns [ 72.696000] kasan: CONFIG_KASAN_INLINE enabled [ 72.739921] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 72.801964] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 72.808243] Modules linked in: [ 72.811444] CPU: 1 PID: 7639 Comm: syz-executor.0 Not tainted 4.14.123 #17 [ 72.818466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.827826] task: ffff888098494080 task.stack: ffff888071a98000 [ 72.833986] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 72.838651] RSP: 0018:ffff888071a9f478 EFLAGS: 00010a06 [ 72.844019] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc9000603e000 [ 72.851287] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 72.858623] RBP: ffff888071a9f508 R08: ffff888090328448 R09: ffffed100e28dd3c [ 72.865890] R10: ffffed100e28dd3b R11: ffff88807146e9dd R12: dffffc0000000000 [ 72.873167] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 72.880444] FS: 00007f8921719700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 72.888674] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 72.894558] CR2: 000000000061c500 CR3: 0000000090857000 CR4: 00000000001406e0 [ 72.901832] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 72.909106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 72.916373] Call Trace: [ 72.918974] ? seq_list_next+0x5e/0x80 [ 72.922867] seq_read+0xb46/0x1280 [ 72.926411] ? seq_lseek+0x3c0/0x3c0 [ 72.930124] ? avc_policy_seqno+0x9/0x20 [ 72.934193] ? selinux_file_permission+0x85/0x480 [ 72.939036] proc_reg_read+0xfa/0x170 [ 72.942858] ? seq_lseek+0x3c0/0x3c0 [ 72.946571] do_iter_read+0x3e2/0x5b0 [ 72.950381] vfs_readv+0xd3/0x130 [ 72.953833] ? compat_rw_copy_check_uvector+0x310/0x310 [ 72.959191] ? retint_kernel+0x2d/0x2d [ 72.963082] ? trace_hardirqs_on_caller+0x400/0x590 [ 72.968112] default_file_splice_read+0x421/0x7b0 [ 72.972955] ? __kmalloc+0x15d/0x7a0 [ 72.976666] ? alloc_pipe_info+0x15c/0x380 [ 72.980901] ? splice_direct_to_actor+0x5d2/0x7b0 [ 72.985740] ? do_splice_direct+0x18d/0x230 [ 72.990064] ? do_splice_direct+0x230/0x230 [ 72.994387] ? trace_hardirqs_on+0x10/0x10 [ 72.998627] ? trace_hardirqs_on_caller+0x400/0x590 [ 73.003654] ? __inode_security_revalidate+0xd6/0x130 [ 73.008846] ? avc_policy_seqno+0x9/0x20 [ 73.012905] ? selinux_file_permission+0x85/0x480 [ 73.017755] ? security_file_permission+0x89/0x1f0 [ 73.022681] ? rw_verify_area+0xea/0x2b0 [ 73.026736] ? do_splice_direct+0x230/0x230 [ 73.031053] do_splice_to+0x105/0x170 [ 73.034851] splice_direct_to_actor+0x222/0x7b0 [ 73.039519] ? generic_pipe_buf_nosteal+0x10/0x10 [ 73.044363] ? do_splice_to+0x170/0x170 [ 73.048335] ? rw_verify_area+0xea/0x2b0 [ 73.052663] do_splice_direct+0x18d/0x230 [ 73.056807] ? splice_direct_to_actor+0x7b0/0x7b0 [ 73.061676] ? rw_verify_area+0xea/0x2b0 [ 73.065750] do_sendfile+0x4db/0xbd0 [ 73.069472] ? do_compat_pwritev64+0x140/0x140 [ 73.074054] ? put_timespec64+0xb4/0x100 [ 73.078142] ? nsecs_to_jiffies+0x30/0x30 [ 73.082293] SyS_sendfile64+0x102/0x110 [ 73.086267] ? SyS_sendfile+0x130/0x130 [ 73.090252] ? do_syscall_64+0x53/0x640 [ 73.094226] ? SyS_sendfile+0x130/0x130 [ 73.098200] do_syscall_64+0x1e8/0x640 [ 73.102092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 73.106940] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 73.112127] RIP: 0033:0x459279 [ 73.115311] RSP: 002b:00007f8921718c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 73.123109] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 73.130373] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 73.137641] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 73.144906] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f89217196d4 [ 73.152176] R13: 00000000004c65f3 R14: 00000000004db2a8 R15: 00000000ffffffff [ 73.159444] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 73.178672] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff888071a9f478 [ 73.217193] ---[ end trace 407eadd7dfb48aa4 ]--- [ 73.222263] Kernel panic - not syncing: Fatal exception [ 73.228828] Kernel Offset: disabled [ 73.232456] Rebooting in 86400 seconds..