[ 33.082934] kauditd_printk_skb: 9 callbacks suppressed [ 33.082941] audit: type=1800 audit(1559601378.958:33): pid=6859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 33.110921] audit: type=1800 audit(1559601378.958:34): pid=6859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 70.579454] random: sshd: uninitialized urandom read (32 bytes read) [ 71.063861] audit: type=1400 audit(1559601416.938:35): avc: denied { map } for pid=7032 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 71.131108] random: sshd: uninitialized urandom read (32 bytes read) [ 71.609791] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.35' (ECDSA) to the list of known hosts. [ 77.413719] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/03 22:37:03 fuzzer started [ 77.612081] audit: type=1400 audit(1559601423.488:36): avc: denied { map } for pid=7041 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 79.523267] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/03 22:37:06 dialing manager at 10.128.0.105:42191 2019/06/03 22:37:06 syscalls: 2440 2019/06/03 22:37:06 code coverage: enabled 2019/06/03 22:37:06 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/03 22:37:06 extra coverage: extra coverage is not supported by the kernel 2019/06/03 22:37:06 setuid sandbox: enabled 2019/06/03 22:37:06 namespace sandbox: enabled 2019/06/03 22:37:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 22:37:06 fault injection: enabled 2019/06/03 22:37:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 22:37:06 net packet injection: enabled 2019/06/03 22:37:06 net device setup: enabled [ 81.706907] random: crng init done 22:37:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 22:37:11 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x242, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000002c0)='\"ystem_u:object_rIss(K\xe4\xd0A\x80\x18\xf8_epec_t:s0\x00', 0x290, 0x0) 22:37:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 22:37:11 executing program 1: prctl$PR_SET_CHILD_SUBREAPER(0x21, 0x1) prctl$PR_MCE_KILL_GET(0x22) 22:37:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x3, 0x163) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 22:37:11 executing program 4: r0 = socket$inet(0x2, 0x3, 0x800000800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000080)=0xc) [ 85.666001] audit: type=1400 audit(1559601431.538:37): avc: denied { map } for pid=7041 comm="syz-fuzzer" path="/root/syzkaller-shm041989876" dev="sda1" ino=16488 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 85.710522] audit: type=1400 audit(1559601431.558:38): avc: denied { map } for pid=7058 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13801 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 86.310225] IPVS: ftp: loaded support on port[0] = 21 [ 86.581303] NET: Registered protocol family 30 [ 86.586672] Failed to register TIPC socket type [ 87.474838] IPVS: ftp: loaded support on port[0] = 21 [ 87.510434] NET: Registered protocol family 30 [ 87.515220] Failed to register TIPC socket type [ 87.588296] chnl_net:caif_netlink_parms(): no params data found [ 87.852567] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.050956] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.175528] device bridge_slave_0 entered promiscuous mode [ 88.256599] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.360146] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.450135] device bridge_slave_1 entered promiscuous mode [ 88.762308] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 88.996938] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 89.430586] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 89.438123] team0: Port device team_slave_0 added [ 89.685306] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 89.860652] team0: Port device team_slave_1 added [ 90.013486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 90.385500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 90.857071] device hsr_slave_0 entered promiscuous mode [ 91.045551] device hsr_slave_1 entered promiscuous mode [ 91.258724] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 91.455626] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 91.741859] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 92.387398] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.582707] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 92.700908] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.707116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.741170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.920996] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 92.927114] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.165667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 93.280958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.288971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.400522] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.407036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.537929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 93.643355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.655303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.750633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.824356] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.830783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.989766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 94.050414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.151605] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 94.158558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.325210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 94.384710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 94.399548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.508029] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 94.580227] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.591622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.635775] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.725449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 94.783620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.810624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.894927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 94.961378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.968998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.064715] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 95.121265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.173030] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 95.353553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.864902] sctp: [Deprecated]: syz-executor.5 (pid 7677) Use of int in max_burst socket option deprecated. [ 95.864902] Use struct sctp_assoc_value instead [ 96.042742] sctp: [Deprecated]: syz-executor.5 (pid 7673) Use of int in max_burst socket option deprecated. [ 96.042742] Use struct sctp_assoc_value instead 22:37:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) [ 96.207774] sctp: [Deprecated]: syz-executor.5 (pid 7703) Use of int in max_burst socket option deprecated. [ 96.207774] Use struct sctp_assoc_value instead 22:37:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) [ 96.356210] syz-executor.5 (7703) used greatest stack depth: 24016 bytes left [ 96.382259] sctp: [Deprecated]: syz-executor.5 (pid 7707) Use of int in max_burst socket option deprecated. [ 96.382259] Use struct sctp_assoc_value instead 22:37:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) [ 96.544478] sctp: [Deprecated]: syz-executor.5 (pid 7711) Use of int in max_burst socket option deprecated. [ 96.544478] Use struct sctp_assoc_value instead 22:37:22 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000180), &(0x7f00000003c0)=0x4) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r4, r5, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 96.727013] audit: type=1400 audit(1559601442.598:39): avc: denied { map } for pid=7714 comm="syz-executor.5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27102 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 96.790045] hrtimer: interrupt took 35627 ns [ 96.839698] kasan: CONFIG_KASAN_INLINE enabled [ 96.846781] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 96.860858] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 96.867108] Modules linked in: [ 96.870317] CPU: 0 PID: 7716 Comm: syz-executor.5 Not tainted 4.14.123 #17 [ 96.877834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.887198] task: ffff888092ba8640 task.stack: ffff888079740000 [ 96.893272] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 96.897938] RSP: 0018:ffff888079747478 EFLAGS: 00010a06 [ 96.903302] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc9000603e000 [ 96.910664] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 96.917954] RBP: ffff888079747508 R08: ffff8880a046b548 R09: ffffed1010246224 [ 96.925230] R10: ffffed1010246223 R11: ffff88808123111d R12: dffffc0000000000 [ 96.932591] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 96.939890] FS: 00007f7b5fa07700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 96.948136] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 96.954046] CR2: 0000001b2ce2a000 CR3: 00000000867ba000 CR4: 00000000001406f0 [ 96.961325] Call Trace: [ 96.963923] ? seq_list_next+0x5e/0x80 [ 96.967846] seq_read+0xb46/0x1280 [ 96.971398] ? seq_lseek+0x3c0/0x3c0 [ 96.975119] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 96.980062] proc_reg_read+0xfa/0x170 [ 96.983870] ? seq_lseek+0x3c0/0x3c0 [ 96.987588] do_iter_read+0x3e2/0x5b0 [ 96.991403] vfs_readv+0xd3/0x130 [ 96.994858] ? compat_rw_copy_check_uvector+0x310/0x310 [ 97.000226] ? push_pipe+0x3e6/0x780 [ 97.003952] ? iov_iter_pipe+0x9f/0x2c0 [ 97.007956] default_file_splice_read+0x421/0x7b0 [ 97.012826] ? __kmalloc+0x15d/0x7a0 [ 97.016544] ? alloc_pipe_info+0x15c/0x380 [ 97.020790] ? splice_direct_to_actor+0x5d2/0x7b0 [ 97.025647] ? do_splice_direct+0x18d/0x230 [ 97.029983] ? do_splice_direct+0x230/0x230 [ 97.034309] ? trace_hardirqs_on+0x10/0x10 [ 97.038550] ? save_trace+0x290/0x290 [ 97.042355] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 97.047133] ? check_preemption_disabled+0x3c/0x250 [ 97.052157] ? retint_kernel+0x2d/0x2d [ 97.056078] ? do_splice_to+0x82/0x170 [ 97.059968] ? do_splice_direct+0x230/0x230 [ 97.064304] do_splice_to+0x105/0x170 [ 97.068113] splice_direct_to_actor+0x222/0x7b0 [ 97.072787] ? generic_pipe_buf_nosteal+0x10/0x10 [ 97.077637] ? do_splice_to+0x170/0x170 [ 97.081618] ? rw_verify_area+0xea/0x2b0 [ 97.085685] do_splice_direct+0x18d/0x230 [ 97.089843] ? splice_direct_to_actor+0x7b0/0x7b0 [ 97.094694] ? rw_verify_area+0xea/0x2b0 [ 97.098770] do_sendfile+0x4db/0xbd0 [ 97.102499] ? do_compat_pwritev64+0x140/0x140 [ 97.107085] ? put_timespec64+0xb4/0x100 [ 97.111175] ? nsecs_to_jiffies+0x30/0x30 [ 97.115331] SyS_sendfile64+0x102/0x110 [ 97.119335] ? SyS_sendfile+0x130/0x130 [ 97.123317] ? do_syscall_64+0x53/0x640 [ 97.127309] ? SyS_sendfile+0x130/0x130 [ 97.131299] do_syscall_64+0x1e8/0x640 [ 97.135193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 97.140043] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.145234] RIP: 0033:0x459279 [ 97.148422] RSP: 002b:00007f7b5fa06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 97.156135] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 97.163677] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 97.170955] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 97.178231] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f7b5fa076d4 [ 97.185514] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 97.223462] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 97.244668] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff888079747478 [ 97.259901] ---[ end trace 71fabbc72a34b98e ]--- [ 97.265232] Kernel panic - not syncing: Fatal exception [ 97.271629] Kernel Offset: disabled [ 97.275262] Rebooting in 86400 seconds..