[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 9.853544] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.933282] random: crng init done Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2018/09/22 03:41:56 fuzzer started 2018/09/22 03:41:58 dialing manager at 10.128.0.26:46873 2018/09/22 03:41:58 syscalls: 1 2018/09/22 03:41:58 code coverage: enabled 2018/09/22 03:41:58 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/09/22 03:41:58 setuid sandbox: enabled 2018/09/22 03:41:58 namespace sandbox: enabled 2018/09/22 03:41:58 Android sandbox: /sys/fs/selinux/policy does not exist 2018/09/22 03:41:58 fault injection: kernel does not have systematic fault injection support 2018/09/22 03:41:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/22 03:41:58 net packed injection: enabled 2018/09/22 03:41:58 net device setup: enabled 03:43:02 executing program 0: 03:43:02 executing program 5: 03:43:02 executing program 1: 03:43:02 executing program 2: 03:43:02 executing program 3: 03:43:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000000)={"7369743000000000b5c4b9026c7fc5e5", @ifru_addrs=@in={0x2, 0x4e20}}) [ 104.088044] audit: type=1400 audit(1537587789.999:5): avc: denied { associate } for pid=2103 comm="syz-executor5" name="syz5" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 03:43:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000002980), 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40046607, &(0x7f0000000400)) listen(r0, 0x7f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x1ff) r2 = memfd_create(&(0x7f0000000180)='syz1\x00', 0x0) write$P9_RFSYNC(r2, &(0x7f0000000240)={0x7, 0x33, 0x1}, 0x7) sendto$inet6(r1, &(0x7f0000000380), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$selinux_context(r5, &(0x7f0000000000)='system_u:object_r:crontab_exec_t:s0\x00', 0xfffffffffffffe84) write(0xffffffffffffffff, &(0x7f0000000380), 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000280)={0x77359400}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000440)={'security\x00', 0xc4, "4e8b4b1e7fa37c911d43b7dfc1540065d6ebc0e2cf063a33e71b902574450eb6fcc611bb94c232461f22877f4a2e09f7f448f8a2ef823ff78d796ab6ab52f030b8fea1243b4a37836d692868843a8998fea04a0bc474078acbead561a51093ca99b61c426c9382417876b70a4bcff2d634050eca0d4f941bfec0542fd99b2bd8823b4175d0b0e455f150e292c18a967fdc5c383f9af93bc9c8b8578b5ed8ba7d2084ab94919aea43e1e3acfd6d899dd2159976a615f1279aaf23ce57319edb9be03d5b84"}, &(0x7f00000002c0)=0xe8) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0xffff}, 0x1c) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000540)=ANY=[@ANYBLOB="0000000000000000000080006c4c97163cb402495a1ebf453f0001000000000000000000"]) listen(r3, 0x400000000000) renameat(r4, &(0x7f0000000340)='./bus\x00', r4, &(0x7f0000000380)='./bus\x00') r6 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(r6, 0x6, 0x1a, &(0x7f00000003c0)="a511d63ef4328d3e4e043d386651e7940518d24e023cb7ca79b352ec9c89ca98636cdabf44898afe5b15b35abfcbfc6f5c60b890805d", 0x36) 03:43:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff000000000000006c0b00000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000400000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000c673831b26b9ab000000000000000000000000000000000000cd6a0316adf55e188900139f"], 0x1}}, 0x0) 03:43:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x2}, 0x20) sendmsg(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)}, 0x0) 03:43:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x802, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x6, 0x0, [], [{0x9, 0x80000000, 0x0, 0x7fffffff, 0xb1d, 0x7}, {0xffffffffffffffc0, 0xbcb, 0x5, 0x0, 0x40, 0x7}], [[], [], [], [], [], []]}) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r2 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x8007ffc) sendfile(r1, r2, 0x0, 0x400008bca) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000000c0)) [ 104.395017] hrtimer: interrupt took 25124 ns 03:43:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="7f000046006b"], 0x6) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaa8d9c00070066ea0000e9ff00000000000000000000aa0000000000089078"], &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x60, &(0x7f00000001c0)={0x0, 'bridge_slave_0\x00'}, 0x18) 03:43:10 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup.cpu/syz1\x00', 0x1ff) 03:43:10 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000010071260000000000006706000002000000bf25000000000000620500000e0000007365000000000000bf540000000000000704000004faff003d4301000000000095000000000000005d54090000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf25000000000000070500000e0000001f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000200)=0x10, 0x80000) 03:43:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00'}, 0x48) close(r0) 03:43:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r2, r1, 0x0, 0xad, &(0x7f0000000080)='GPL\x00'}, 0x30) [ 104.677646] audit: type=1400 audit(1537587790.589:6): avc: denied { prog_load } for pid=4786 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 104.707587] audit: type=1400 audit(1537587790.619:7): avc: denied { prog_run } for pid=4786 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:43:10 executing program 2: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') writev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)='+4', 0x2}], 0x1) getpid() 03:43:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="6272696467653000000004000100", 0x10) sendto$unix(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0xd0000e0}, 0x63) 03:43:10 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)="295ee1311f") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000156, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) [ 104.811880] updating oom_score_adj for 4814 (syz-executor2) from 0 to 4 because it shares mm with 4806 (syz-executor2). Report if this is unexpected. [ 104.824042] raw_sendmsg: syz-executor4 forgot to set AF_INET. Fix it! [ 104.866556] ================================================================== [ 104.873929] BUG: KASAN: out-of-bounds in __unwind_start+0x368/0x3b0 [ 104.880310] Read of size 8 at addr ffff8801a3a6f810 by task syz-executor0/4824 [ 104.887639] [ 104.889245] CPU: 1 PID: 4824 Comm: syz-executor0 Not tainted 4.9.128+ #41 [ 104.896141] ffff8801c9def788 ffffffff81af2469 ffffea00068e9bc0 ffff8801a3a6f810 [ 104.904140] 0000000000000000 ffff8801a3a6f818 ffff8801c8a00000 ffff8801c9def7c0 [ 104.912137] ffffffff814e13cb ffff8801a3a6f810 0000000000000008 0000000000000000 [ 104.920152] Call Trace: [ 104.922716] [] dump_stack+0xc1/0x128 [ 104.928063] [] print_address_description+0x6c/0x234 [ 104.934702] [] kasan_report.cold.6+0x242/0x2fe [ 104.940913] [] ? __unwind_start+0x368/0x3b0 [ 104.946861] [] __asan_report_load8_noabort+0x14/0x20 [ 104.953586] [] __unwind_start+0x368/0x3b0 [ 104.959358] [] __save_stack_trace+0x59/0xf0 [ 104.965320] [] save_stack_trace_tsk+0x48/0x70 [ 104.971441] [] proc_pid_stack+0x148/0x220 [ 104.977213] [] ? lock_trace+0xc0/0xc0 [ 104.982669] [] ? get_pid_task+0x9b/0x140 [ 104.988366] [] proc_single_show+0xfd/0x170 [ 104.994235] [] seq_read+0x4b6/0x12d0 [ 104.999571] [] ? seq_lseek+0x3c0/0x3c0 [ 105.005083] [] ? __fsnotify_inode_delete+0x30/0x30 [ 105.011637] [] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 105.020106] [] do_loop_readv_writev.part.1+0xd5/0x280 [ 105.026921] [] do_readv_writev+0x56e/0x7b0 [ 105.032787] [] ? vfs_write+0x520/0x520 [ 105.038302] [] ? kcov_ioctl+0x24/0x1c0 [ 105.043814] [] ? check_preemption_disabled+0x3b/0x170 [ 105.050628] [] ? check_preemption_disabled+0x3b/0x170 [ 105.057444] [] ? __fget+0x214/0x3d0 [ 105.062694] [] ? __fget+0x23b/0x3d0 [ 105.067946] [] ? __fget+0x47/0x3d0 [ 105.073107] [] vfs_readv+0x84/0xc0 [ 105.078287] [] do_preadv+0x197/0x240 [ 105.083625] [] ? do_readv+0x260/0x260 [ 105.089048] [] ? security_file_ioctl+0x8f/0xc0 [ 105.095253] [] SyS_preadv+0x30/0x40 [ 105.100511] [] ? SyS_writev+0x30/0x30 [ 105.105934] [] do_syscall_64+0x19f/0x480 [ 105.111798] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 105.118696] [ 105.120321] The buggy address belongs to the page: [ 105.125223] page:ffffea00068e9bc0 count:0 mapcount:0 mapping: (null) index:0x0 [ 105.133467] flags: 0x4000000000000000() [ 105.137413] page dumped because: kasan: bad access detected [ 105.143094] [ 105.144693] Memory state around the buggy address: [ 105.149595] ffff8801a3a6f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 105.156930] ffff8801a3a6f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 105.164260] >ffff8801a3a6f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 105.171595] ^ [ 105.175714] ffff8801a3a6f880: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f2 [ 105.183052] ffff8801a3a6f900: f2 f2 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 105.190379] ================================================================== [ 105.197707] Disabling lock debugging due to kernel taint [ 105.203642] Kernel panic - not syncing: panic_on_warn set ... [ 105.203642] [ 105.211038] CPU: 0 PID: 4824 Comm: syz-executor0 Tainted: G B 4.9.128+ #41 [ 105.219167] ffff8801c9def6e8 ffffffff81af2469 ffffffff82c34968 00000000ffffffff [ 105.227228] 0000000000000000 0000000000000000 ffff8801c8a00000 ffff8801c9def7a8 [ 105.235321] ffffffff813df985 0000000041b58ab3 ffffffff82c2896b ffffffff813df7c6 [ 105.243383] Call Trace: [ 105.245972] [] dump_stack+0xc1/0x128 [ 105.251339] [] panic+0x1bf/0x39f [ 105.256351] [] ? add_taint.cold.6+0x16/0x16 [ 105.262320] [] ? ___preempt_schedule+0x16/0x18 [ 105.268557] [] kasan_end_report+0x47/0x4f [ 105.274346] [] kasan_report.cold.6+0x76/0x2fe [ 105.280501] [] ? __unwind_start+0x368/0x3b0 [ 105.286497] [] __asan_report_load8_noabort+0x14/0x20 [ 105.293245] [] __unwind_start+0x368/0x3b0 [ 105.299046] [] __save_stack_trace+0x59/0xf0 [ 105.305034] [] save_stack_trace_tsk+0x48/0x70 [ 105.311172] [] proc_pid_stack+0x148/0x220 [ 105.316965] [] ? lock_trace+0xc0/0xc0 [ 105.322433] [] ? get_pid_task+0x9b/0x140 [ 105.328137] [] proc_single_show+0xfd/0x170 [ 105.334037] [] seq_read+0x4b6/0x12d0 [ 105.339423] [] ? seq_lseek+0x3c0/0x3c0 [ 105.344952] [] ? __fsnotify_inode_delete+0x30/0x30 [ 105.351528] [] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 105.360011] [] do_loop_readv_writev.part.1+0xd5/0x280 [ 105.366825] [] do_readv_writev+0x56e/0x7b0 [ 105.372684] [] ? vfs_write+0x520/0x520 [ 105.378196] [] ? kcov_ioctl+0x24/0x1c0 [ 105.383710] [] ? check_preemption_disabled+0x3b/0x170 [ 105.390526] [] ? check_preemption_disabled+0x3b/0x170 [ 105.397339] [] ? __fget+0x214/0x3d0 [ 105.402590] [] ? __fget+0x23b/0x3d0 [ 105.407844] [] ? __fget+0x47/0x3d0 [ 105.413009] [] vfs_readv+0x84/0xc0 [ 105.418170] [] do_preadv+0x197/0x240 [ 105.423510] [] ? do_readv+0x260/0x260 [ 105.428935] [] ? security_file_ioctl+0x8f/0xc0 [ 105.435155] [] SyS_preadv+0x30/0x40 [ 105.440405] [] ? SyS_writev+0x30/0x30 [ 105.445831] [] do_syscall_64+0x19f/0x480 [ 105.451520] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 105.458759] Kernel Offset: disabled [ 105.462370] Rebooting in 86400 seconds..