[ 33.993534] audit: type=1800 audit(1559709253.862:33): pid=6901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 34.035868] audit: type=1800 audit(1559709253.862:34): pid=6901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 [ 34.053588] random: sshd: uninitialized urandom read (32 bytes read) [ 34.337299] audit: type=1400 audit(1559709254.202:35): avc: denied { map } for pid=7071 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 34.389603] random: sshd: uninitialized urandom read (32 bytes read) [ 35.070503] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.196' (ECDSA) to the list of known hosts. syzkaller login: [ 40.712170] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/05 04:34:20 fuzzer started [ 40.922940] audit: type=1400 audit(1559709260.792:36): avc: denied { map } for pid=7081 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 42.706218] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/05 04:34:23 dialing manager at 10.128.0.105:44623 2019/06/05 04:34:23 syscalls: 2444 2019/06/05 04:34:23 code coverage: enabled 2019/06/05 04:34:23 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/05 04:34:23 extra coverage: extra coverage is not supported by the kernel 2019/06/05 04:34:23 setuid sandbox: enabled 2019/06/05 04:34:23 namespace sandbox: enabled 2019/06/05 04:34:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/05 04:34:23 fault injection: enabled 2019/06/05 04:34:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/05 04:34:23 net packet injection: enabled 2019/06/05 04:34:23 net device setup: enabled [ 44.548223] random: crng init done 04:34:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000052001f0014f9f423002c04091c006e301c983ca1b96d309c32000000000000b5", 0x24) 04:34:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x40001) write$evdev(r0, 0x0, 0x0) 04:34:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="2c63536e746578743d73ed1c61646d5f752c726f6f74636f6e746578743d55"]) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 04:34:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) recvfrom$netrom(0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x800027000000) 04:34:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 04:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 46.246953] audit: type=1400 audit(1559709266.112:37): avc: denied { map } for pid=7081 comm="syz-fuzzer" path="/root/syzkaller-shm131635943" dev="sda1" ino=16499 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 46.310286] audit: type=1400 audit(1559709266.122:38): avc: denied { map } for pid=7100 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13690 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 47.130206] IPVS: ftp: loaded support on port[0] = 21 [ 47.411203] NET: Registered protocol family 30 [ 47.415811] Failed to register TIPC socket type [ 48.323655] IPVS: ftp: loaded support on port[0] = 21 [ 48.356522] NET: Registered protocol family 30 [ 48.376089] Failed to register TIPC socket type [ 48.506457] chnl_net:caif_netlink_parms(): no params data found [ 48.760679] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.767431] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.821240] device bridge_slave_0 entered promiscuous mode [ 48.864682] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.946129] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.032594] device bridge_slave_1 entered promiscuous mode [ 49.441620] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 49.643549] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 50.131596] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 50.139106] team0: Port device team_slave_0 added [ 50.411832] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 50.419139] team0: Port device team_slave_1 added [ 50.722159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.955938] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.671609] device hsr_slave_0 entered promiscuous mode [ 51.834432] device hsr_slave_1 entered promiscuous mode [ 52.048528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 52.191263] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 52.482343] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.071663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.271599] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.398705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 53.504110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.524608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.629763] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 53.732938] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.845853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 53.940734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.948851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.070632] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.077150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.207793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 54.323092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.331420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.438388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.506248] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.512802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.624137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 54.721261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.803774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 54.884326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.984029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 55.050801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.058755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.130766] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.230765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 55.237696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.291026] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.371411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 55.378866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.437069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.515590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 55.601394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.609119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.715733] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 55.745610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.886337] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 56.033085] 8021q: adding VLAN 0 to HW filter on device batadv0 04:34:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x40001) write$evdev(r0, 0x0, 0x0) 04:34:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x40001) write$evdev(r0, 0x0, 0x0) 04:34:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x40001) write$evdev(r0, 0x0, 0x0) 04:34:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x3) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000003fffffe500dcea1523674e4fc200000000000000000000000000000008225bc600000000049dec26a8eb0cf100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000c86a6d0000000000000000686a96ee87ce00000000000000000000bff0e7c972e359a70000000032118300acc400b048173dfe97d9000104000400000000090000004ba3185441d8ef0ba5194719b68644e3b64f21174d5afe55a7c6cfc26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612bb8601000080000000000000063887e2662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd4900000000000000000000586d733524deed0c349a7f62089fde1399217c9720b4f6b17e8d689b913b84436c04b6fdac37f4f0ef451a"], 0x1) fcntl$setown(r2, 0x8, 0x0) sendfile(r3, r4, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x1000000030a6d) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl(r5, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r6, r5) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5024, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) [ 57.006714] hrtimer: interrupt took 37262 ns [ 57.014813] audit: type=1400 audit(1559709276.882:39): avc: denied { map } for pid=7741 comm="syz-executor.5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27701 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 57.087249] kasan: CONFIG_KASAN_INLINE enabled [ 57.092468] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 57.099967] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 57.106196] Modules linked in: [ 57.109397] CPU: 0 PID: 7743 Comm: syz-executor.5 Not tainted 4.14.123 #17 [ 57.116415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.125778] task: ffff8880a1a18180 task.stack: ffff88806a778000 [ 57.131888] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 57.136551] RSP: 0018:ffff88806a77f478 EFLAGS: 00010a06 [ 57.141953] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc9000601e000 [ 57.149223] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 57.156492] RBP: ffff88806a77f508 R08: ffff8880a5675648 R09: ffffed10130c3494 [ 57.163770] R10: ffffed10130c3493 R11: ffff88809861a49d R12: dffffc0000000000 [ 57.171050] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 57.178322] FS: 00007f98fb4cf700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 57.186546] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 57.192430] CR2: 0000000020001000 CR3: 000000008f7f4000 CR4: 00000000001406f0 [ 57.199702] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 57.207004] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 57.214276] Call Trace: [ 57.216884] ? seq_list_next+0x5e/0x80 [ 57.220783] seq_read+0xb46/0x1280 [ 57.224360] ? seq_lseek+0x3c0/0x3c0 [ 57.228079] ? avc_policy_seqno+0x9/0x20 [ 57.232140] ? selinux_file_permission+0x85/0x480 [ 57.237003] proc_reg_read+0xfa/0x170 [ 57.240811] ? seq_lseek+0x3c0/0x3c0 [ 57.244529] do_iter_read+0x3e2/0x5b0 [ 57.248330] vfs_readv+0xd3/0x130 [ 57.251801] ? compat_rw_copy_check_uvector+0x310/0x310 [ 57.257167] ? push_pipe+0x3e6/0x780 [ 57.260897] ? iov_iter_pipe+0x9f/0x2c0 [ 57.264874] default_file_splice_read+0x421/0x7b0 [ 57.270083] ? __kmalloc+0x15d/0x7a0 [ 57.273800] ? alloc_pipe_info+0x15c/0x380 [ 57.278058] ? splice_direct_to_actor+0x5d2/0x7b0 [ 57.282908] ? do_splice_direct+0x18d/0x230 [ 57.287234] ? do_splice_direct+0x230/0x230 [ 57.291560] ? trace_hardirqs_on+0x10/0x10 [ 57.295817] ? save_trace+0x290/0x290 [ 57.299618] ? save_trace+0x290/0x290 [ 57.303430] ? __inode_security_revalidate+0xd6/0x130 [ 57.308626] ? avc_policy_seqno+0x9/0x20 [ 57.312699] ? selinux_file_permission+0x85/0x480 [ 57.317560] ? security_file_permission+0x89/0x1f0 [ 57.322494] ? rw_verify_area+0xea/0x2b0 [ 57.326566] ? do_splice_direct+0x230/0x230 [ 57.330893] do_splice_to+0x105/0x170 [ 57.334699] splice_direct_to_actor+0x222/0x7b0 [ 57.339368] ? generic_pipe_buf_nosteal+0x10/0x10 [ 57.344207] ? do_splice_to+0x170/0x170 [ 57.348198] ? rw_verify_area+0xea/0x2b0 [ 57.352263] do_splice_direct+0x18d/0x230 [ 57.356414] ? splice_direct_to_actor+0x7b0/0x7b0 [ 57.361262] ? rw_verify_area+0xea/0x2b0 [ 57.365322] do_sendfile+0x4db/0xbd0 [ 57.369042] ? do_compat_pwritev64+0x140/0x140 [ 57.373633] ? SyS_sendfile64+0x5c/0x110 [ 57.377704] SyS_sendfile64+0x102/0x110 [ 57.381676] ? SyS_sendfile+0x130/0x130 [ 57.385648] ? do_syscall_64+0x53/0x640 [ 57.389620] ? SyS_sendfile+0x130/0x130 [ 57.393610] do_syscall_64+0x1e8/0x640 [ 57.397514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 57.402413] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 57.407603] RIP: 0033:0x459279 [ 57.410795] RSP: 002b:00007f98fb4cec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 57.418508] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 57.425785] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 57.433070] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 57.440429] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f98fb4cf6d4 [ 57.447805] R13: 00000000004c65f3 R14: 00000000004db2a8 R15: 00000000ffffffff [ 57.455082] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 57.474310] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff88806a77f478 [ 57.488896] ---[ end trace 688a78a5cc393941 ]--- [ 57.493862] Kernel panic - not syncing: Fatal exception [ 57.500284] Kernel Offset: disabled [ 57.503936] Rebooting in 86400 seconds..