[....] Starting OpenBSD Secure Shell server: sshd[ 29.091866] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 30.857676] random: sshd: uninitialized urandom read (32 bytes read) [ 31.169138] kauditd_printk_skb: 9 callbacks suppressed [ 31.169146] audit: type=1400 audit(1559813861.999:35): avc: denied { map } for pid=6833 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 31.225826] random: sshd: uninitialized urandom read (32 bytes read) [ 31.819201] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.244' (ECDSA) to the list of known hosts. [ 37.433593] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/06 09:37:48 fuzzer started [ 37.625890] audit: type=1400 audit(1559813868.459:36): avc: denied { map } for pid=6844 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 39.412040] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/06 09:37:51 dialing manager at 10.128.0.105:45331 2019/06/06 09:37:51 syscalls: 2444 2019/06/06 09:37:51 code coverage: enabled 2019/06/06 09:37:51 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/06 09:37:51 extra coverage: extra coverage is not supported by the kernel 2019/06/06 09:37:51 setuid sandbox: enabled 2019/06/06 09:37:51 namespace sandbox: enabled 2019/06/06 09:37:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/06 09:37:51 fault injection: enabled 2019/06/06 09:37:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/06 09:37:51 net packet injection: enabled 2019/06/06 09:37:51 net device setup: enabled [ 41.574440] random: crng init done 09:37:54 executing program 0: sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000240)='\xacm\\\xbd\xaa\xc1\x94\xe5{\xcf\xf3\x1c\xdbZ\xc8\xc5\xa4i\x89\x8d\xb8\xe1P\x81') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in=@multicast1, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000080)) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) creat(0x0, 0x0) pipe2(0x0, 0x80000) setgroups(0x0, 0x0) 09:37:54 executing program 1: unshare(0x400) bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="00000001000000c3e000950000fa0000"], 0x0, 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 43.470734] audit: type=1400 audit(1559813874.299:37): avc: denied { map } for pid=6844 comm="syz-fuzzer" path="/root/syzkaller-shm337626598" dev="sda1" ino=16492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 09:37:54 executing program 2: r0 = socket(0x11, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x8000000000000080) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000140)={{0x9d, @broadcast, 0x4e22, 0x3, 'sed\x00', 0x29, 0x2, 0x38}, {@broadcast, 0x0, 0x2, 0xdc, 0xfffffffffffffffd}}, 0x44) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x400000009) lookup_dcookie(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0xc0090300}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r3, 0x300, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000010) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000008c0)=0x0) waitid(0x1, r4, &(0x7f0000000900), 0x80000000, &(0x7f0000000980)) r5 = gettid() ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000040)='rose0\x00'}) clone(0x80001000, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x11) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) recvfrom$packet(r0, &(0x7f00000003c0)=""/67, 0x43, 0x0, &(0x7f0000000880)={0x11, 0xf5, r6, 0x1, 0x8001, 0x6, @random="3fd125415008"}, 0x14) bind$bt_rfcomm(r0, &(0x7f0000000200)={0x1f, {0x0, 0x0, 0x4, 0x1f, 0x9, 0x6}, 0x80000001}, 0xa) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000440)) rt_sigtimedwait(&(0x7f0000000240)={0x9}, &(0x7f0000000280), &(0x7f0000000300)={0x0, 0x989680}, 0x8) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000380)) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f00000005c0)=ANY=[@ANYBLOB="d2d3ef45a213c9040534a33e0fdc2ebff5500c0f6f6812797c4ad383f2fe70a53e6c8678956c5e878aee58475741b198863a3ce78e91942615143bd8d33412ba59c1a698558898007fefc28588ce51729864343923a03f8702d72b81722caa957be7004c72e7c020e70bafd5862b792965fef728f1bd8fb8c41d37f50713cd115528f2"]) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffbd, &(0x7f00000000c0)=0x9) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000680)=""/204) 09:37:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x10000000001) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:37:54 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 09:37:54 executing program 4: sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540), 0x22a}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1bc, 0x0) [ 43.497709] audit: type=1400 audit(1559813874.309:38): avc: denied { map } for pid=6862 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13811 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 43.693150] IPVS: ftp: loaded support on port[0] = 21 [ 43.901535] NET: Registered protocol family 30 [ 43.906273] Failed to register TIPC socket type [ 44.758188] IPVS: ftp: loaded support on port[0] = 21 [ 44.773854] NET: Registered protocol family 30 [ 44.778500] Failed to register TIPC socket type [ 44.864921] chnl_net:caif_netlink_parms(): no params data found [ 45.173697] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.240144] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.247643] device bridge_slave_0 entered promiscuous mode [ 45.341462] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.347923] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.467516] device bridge_slave_1 entered promiscuous mode [ 45.855587] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 46.062130] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 46.401467] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 46.550513] team0: Port device team_slave_0 added [ 46.718530] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 46.842474] team0: Port device team_slave_1 added [ 46.948309] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.192832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.779063] device hsr_slave_0 entered promiscuous mode [ 48.164661] device hsr_slave_1 entered promiscuous mode [ 48.339633] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 48.436238] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 48.664649] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.196989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.333240] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 49.513797] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 49.520176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.528324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.703288] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 49.742082] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.883755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.989421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.020605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.102204] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.108723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.242784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 50.251358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.327922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.394862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.480398] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.488142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.594429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.640783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 50.658765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.740892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 50.757159] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.820181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 50.828099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.907270] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.951483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.958594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 51.002392] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.058586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 51.130273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.137909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.208798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 51.250682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 51.258439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.322421] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 51.328520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.452247] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 51.550385] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.274126] kasan: CONFIG_KASAN_INLINE enabled [ 52.346357] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 52.422416] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 52.428856] Modules linked in: [ 52.432068] CPU: 0 PID: 7459 Comm: syz-executor.0 Not tainted 4.14.123 #17 [ 52.439102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.448472] task: ffff88809f722180 task.stack: ffff888072e68000 [ 52.454565] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 52.459245] RSP: 0018:ffff888072e6f930 EFLAGS: 00010a06 [ 52.467452] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90005e3d000 [ 52.474734] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 52.482108] RBP: ffff888072e6f9c0 R08: ffff888091f91208 R09: ffffed101338291f [ 52.489402] R10: ffffed101338291e R11: ffff888099c148f5 R12: dead000000000100 [ 52.496687] R13: ffffffff86ee3fe0 R14: dffffc0000000000 R15: 0000000000000076 [ 52.504054] FS: 00007ff5623e3700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 52.512398] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.518304] CR2: 000000000061c500 CR3: 0000000092d7e000 CR4: 00000000001406f0 [ 52.525717] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.533024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.540384] Call Trace: [ 52.542965] ? seq_list_next+0x5e/0x80 [ 52.546986] traverse+0x319/0x880 [ 52.550435] ? seq_hlist_next+0xc0/0xc0 [ 52.554392] seq_read+0x9e5/0x1280 [ 52.557917] ? retint_kernel+0x2d/0x2d [ 52.561793] ? trace_hardirqs_on_caller+0x400/0x590 [ 52.567334] ? seq_lseek+0x3c0/0x3c0 [ 52.571034] ? check_preemption_disabled+0x3c/0x250 [ 52.576048] ? retint_kernel+0x2d/0x2d [ 52.579922] proc_reg_read+0xfa/0x170 [ 52.583712] ? seq_lseek+0x3c0/0x3c0 [ 52.587777] do_iter_read+0x3e2/0x5b0 [ 52.591570] vfs_readv+0xd3/0x130 [ 52.595326] ? compat_rw_copy_check_uvector+0x310/0x310 [ 52.601004] ? __fget+0x237/0x370 [ 52.604450] ? __fget_light+0x172/0x1f0 [ 52.608417] do_preadv+0x15d/0x200 [ 52.611945] ? do_readv+0x220/0x220 [ 52.616285] ? SyS_writev+0x30/0x30 [ 52.619901] SyS_preadv+0x31/0x40 [ 52.623371] do_syscall_64+0x1e8/0x640 [ 52.627280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 52.632194] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 52.637629] RIP: 0033:0x459279 [ 52.640804] RSP: 002b:00007ff5623e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 52.649405] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 52.656848] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000005 [ 52.666739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 52.674331] R10: 0000400000000000 R11: 0000000000000246 R12: 00007ff5623e36d4 [ 52.681593] R13: 00000000004c614c R14: 00000000004da9a8 R15: 00000000ffffffff [ 52.688862] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 52.708775] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff888072e6f930 [ 52.724653] ---[ end trace b4b3a37f27bd312c ]--- [ 52.729516] Kernel panic - not syncing: Fatal exception [ 52.736623] Kernel Offset: disabled [ 52.740267] Rebooting in 86400 seconds..