[Kernel-packages] [Bug 1921211] Re: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump
This was fixed with linux 4.4.0-211.243 in Ubuntu 16.04 ESM (Infra). ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1921211 Title: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Released Bug description: [Impact] We have some Ubuntu 16.04 hosts (in Hyper-V) being used for testing some Ubuntu 20.04 container. As part of the testing we were attempting to take a memory dump of a container running SQL Server with Ubuntu 20.04 on the Ubuntu 16.04 host we started seeing kernel panic and core dump. It started happening after a specific Xenial kernel update on the host. 4.4.0-204-generic - Systems that are crashing 4.4.0-201-generic - Systems that are able to capture dump Note from the developer indicates following logging showing up. Now the following is output right after I attempt to start the dump. (gdb, attach ###, generate-core-file /var/opt/mssql/log/rdorr.delme.core) [Fri Mar 19 20:01:38 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:01:41 2021] cni0: port 9(vethdec5d2b7) entered forwarding state [Fri Mar 19 20:02:42 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:03:04 2021] [ cut here ] [Fri Mar 19 20:03:04 2021] kernel BUG at /build/linux-qlAbvR/linux-4.4.0/mm/memory.c:3214! [Fri Mar 19 20:03:04 2021] invalid opcode: [#1] SMP [Fri Mar 19 20:03:04 2021] Modules linked in: veth vxlan ip6_udp_tunnel udp_tunnel xt_statistic xt_nat ipt_REJECT nf_reject_ipv4 xt_tcpudp ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs libcrc32c ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6_tables xt_comment xt_mark xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables br_netfilter bridge stp llc aufs overlay nls_utf8 isofs crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd input_leds serio_raw i2c_piix4 hv_balloon hyperv_fb 8250_fintek joydev mac_hid autofs4 hid_generic hv_utils hid_hyperv ptp hv_netvsc hid hv_storvsc pps_core [Fri Mar 19 20:03:04 2021] hyperv_keyboard scsi_transport_fc psmouse pata_acpi hv_vmbus floppy fjes [Fri Mar 19 20:03:04 2021] CPU: 1 PID: 24869 Comm: gdb Tainted: G W 4.4.0-204-generic #236-Ubuntu [Fri Mar 19 20:03:04 2021] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090007 05/18/2018 [Fri Mar 19 20:03:04 2021] task: 880db9229c80 ti: 880d93b9c000 task.ti: 880d93b9c000 [Fri Mar 19 20:03:04 2021] RIP: 0010:[] [] handle_mm_fault+0x13de/0x1b80 [Fri Mar 19 20:03:04 2021] RSP: 0018:880d93b9fc28 EFLAGS: 00010246 [Fri Mar 19 20:03:04 2021] RAX: 0100 RBX: RCX: 0120 [Fri Mar 19 20:03:04 2021] RDX: 880ea635f3e8 RSI: 3000 RDI: [Fri Mar 19 20:03:04 2021] RBP: 880d93b9fce8 R08: 3ff32179a120 R09: 007d [Fri Mar 19 20:03:04 2021] R10: 880003e8 R11: 03e8 R12: 8800ea672708 [Fri Mar 19 20:03:04 2021] R13: R14: 00010247d000 R15: 8800f27fe400 [Fri Mar 19 20:03:04 2021] FS: 7fdc26061600() GS:88102564() knlGS: [Fri Mar 19 20:03:04 2021] CS: 0010 DS: ES: CR0: 80050033 [Fri Mar 19 20:03:04 2021] CR2: 55e3a0011290 CR3: 000d93ba4000 CR4: 00160670 [Fri Mar 19 20:03:04 2021] Stack: [Fri Mar 19 20:03:04 2021] 81082929 fffd 81082252 880d93b9fca8 [Fri Mar 19 20:03:04 2021] 811c7bca 8800f27fe400 00010247d000 880e74a88090 [Fri Mar 19 20:03:04 2021] 3a98d7f0 880e0001 880003e8 0017 [Fri Mar 19 20:03:04 2021] Call Trace: [Fri Mar 19 20:03:04 2021] [] ? mm_access+0x79/0xa0 [Fri Mar 19 20:03:04 2021] [] ? mmput+0x12/0x130 [Fri Mar 19 20:03:04 2021] [] ? follow_page_pte+0x1ca/0x3d0 [Fri Mar 19 20:03:04 2021] [] ? follow_page_mask+0x214/0x3a0 [Fri Mar 19 20:03:04 2021] [] __get_user_pages+0x130/0x680 [Fri Mar 19 20:03:04 2021] [] ? path_openat+0x348/0x1360 [Fri Mar 19 20:03:04 2021] [] get_user_pages+0x34/0x40 [Fri Mar 19 20:03:04 2021] [] __access_remote_vm+0xe4/0x2d0 [Fri Mar 19 20:03:04 2021] [] ? alloc_pages_current+0x8c/0x110 [Fri Mar 19 20:03:04 2021] [] access_remote_vm+0x1f/0x30 [Fri Mar 19 20:03:04 2021] [] mem_rw.isra.16+0xfa/0x190 [Fri Mar 19
[Kernel-packages] [Bug 1921211] Re: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump
I verified the version in esm-proposed fixes the issue. I used the following steps to verify it: Using a Xenial VM with >2GB of memory (that's a requirement of the mysql server docker we are using): $ sudo apt install docker.io gdb $ sudo docker pull mcr.microsoft.com/mssql/server:2019-latest $ sudo docker run -e "ACCEPT_EULA=Y" -e "SA_PASSWORD=" -p 1433:1433 --name sql1 -h sql1 -d mcr.microsoft.com/mssql/server:2019-latest $ sudo ps -ef | grep sql # get the pid $ sudo gdb -p PID (gdb) generate-core-file ./core With 4.4.0-210.242 I get a kernel bug. With 4.4.0-211.243 it either succeeds or oomkiller kicks in if memory is not enough. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1921211 Title: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Committed Bug description: [Impact] We have some Ubuntu 16.04 hosts (in Hyper-V) being used for testing some Ubuntu 20.04 container. As part of the testing we were attempting to take a memory dump of a container running SQL Server with Ubuntu 20.04 on the Ubuntu 16.04 host we started seeing kernel panic and core dump. It started happening after a specific Xenial kernel update on the host. 4.4.0-204-generic - Systems that are crashing 4.4.0-201-generic - Systems that are able to capture dump Note from the developer indicates following logging showing up. Now the following is output right after I attempt to start the dump. (gdb, attach ###, generate-core-file /var/opt/mssql/log/rdorr.delme.core) [Fri Mar 19 20:01:38 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:01:41 2021] cni0: port 9(vethdec5d2b7) entered forwarding state [Fri Mar 19 20:02:42 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:03:04 2021] [ cut here ] [Fri Mar 19 20:03:04 2021] kernel BUG at /build/linux-qlAbvR/linux-4.4.0/mm/memory.c:3214! [Fri Mar 19 20:03:04 2021] invalid opcode: [#1] SMP [Fri Mar 19 20:03:04 2021] Modules linked in: veth vxlan ip6_udp_tunnel udp_tunnel xt_statistic xt_nat ipt_REJECT nf_reject_ipv4 xt_tcpudp ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs libcrc32c ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6_tables xt_comment xt_mark xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables br_netfilter bridge stp llc aufs overlay nls_utf8 isofs crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd input_leds serio_raw i2c_piix4 hv_balloon hyperv_fb 8250_fintek joydev mac_hid autofs4 hid_generic hv_utils hid_hyperv ptp hv_netvsc hid hv_storvsc pps_core [Fri Mar 19 20:03:04 2021] hyperv_keyboard scsi_transport_fc psmouse pata_acpi hv_vmbus floppy fjes [Fri Mar 19 20:03:04 2021] CPU: 1 PID: 24869 Comm: gdb Tainted: G W 4.4.0-204-generic #236-Ubuntu [Fri Mar 19 20:03:04 2021] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090007 05/18/2018 [Fri Mar 19 20:03:04 2021] task: 880db9229c80 ti: 880d93b9c000 task.ti: 880d93b9c000 [Fri Mar 19 20:03:04 2021] RIP: 0010:[] [] handle_mm_fault+0x13de/0x1b80 [Fri Mar 19 20:03:04 2021] RSP: 0018:880d93b9fc28 EFLAGS: 00010246 [Fri Mar 19 20:03:04 2021] RAX: 0100 RBX: RCX: 0120 [Fri Mar 19 20:03:04 2021] RDX: 880ea635f3e8 RSI: 3000 RDI: [Fri Mar 19 20:03:04 2021] RBP: 880d93b9fce8 R08: 3ff32179a120 R09: 007d [Fri Mar 19 20:03:04 2021] R10: 880003e8 R11: 03e8 R12: 8800ea672708 [Fri Mar 19 20:03:04 2021] R13: R14: 00010247d000 R15: 8800f27fe400 [Fri Mar 19 20:03:04 2021] FS: 7fdc26061600() GS:88102564() knlGS: [Fri Mar 19 20:03:04 2021] CS: 0010 DS: ES: CR0: 80050033 [Fri Mar 19 20:03:04 2021] CR2: 55e3a0011290 CR3: 000d93ba4000 CR4: 00160670 [Fri Mar 19 20:03:04 2021] Stack: [Fri Mar 19 20:03:04 2021] 81082929 fffd 81082252 880d93b9fca8 [Fri Mar 19 20:03:04 2021] 811c7bca 8800f27fe400 00010247d000 880e74a88090 [Fri Mar 19 20:03:04 2021] 3a98d7f0 880e0001 880003e8 0017 [Fri Mar 19 20:03:04 2021] Call Trace: [Fri Mar 19 20:03:04 2021] [] ? mm_access+0x79/0xa0 [Fri Mar 19 20:03:04 2021] [] ? mmput+0x12/0x130 [Fri Mar 19 20:03:04 2021] [] ? follow_page_pte+0x1ca/0x3d0 [Fri
[Kernel-packages] [Bug 1921211] Re: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump
** Changed in: linux (Ubuntu) Status: Incomplete => Invalid ** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1921211 Title: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Committed Bug description: [Impact] We have some Ubuntu 16.04 hosts (in Hyper-V) being used for testing some Ubuntu 20.04 container. As part of the testing we were attempting to take a memory dump of a container running SQL Server with Ubuntu 20.04 on the Ubuntu 16.04 host we started seeing kernel panic and core dump. It started happening after a specific Xenial kernel update on the host. 4.4.0-204-generic - Systems that are crashing 4.4.0-201-generic - Systems that are able to capture dump Note from the developer indicates following logging showing up. Now the following is output right after I attempt to start the dump. (gdb, attach ###, generate-core-file /var/opt/mssql/log/rdorr.delme.core) [Fri Mar 19 20:01:38 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:01:41 2021] cni0: port 9(vethdec5d2b7) entered forwarding state [Fri Mar 19 20:02:42 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:03:04 2021] [ cut here ] [Fri Mar 19 20:03:04 2021] kernel BUG at /build/linux-qlAbvR/linux-4.4.0/mm/memory.c:3214! [Fri Mar 19 20:03:04 2021] invalid opcode: [#1] SMP [Fri Mar 19 20:03:04 2021] Modules linked in: veth vxlan ip6_udp_tunnel udp_tunnel xt_statistic xt_nat ipt_REJECT nf_reject_ipv4 xt_tcpudp ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs libcrc32c ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6_tables xt_comment xt_mark xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables br_netfilter bridge stp llc aufs overlay nls_utf8 isofs crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd input_leds serio_raw i2c_piix4 hv_balloon hyperv_fb 8250_fintek joydev mac_hid autofs4 hid_generic hv_utils hid_hyperv ptp hv_netvsc hid hv_storvsc pps_core [Fri Mar 19 20:03:04 2021] hyperv_keyboard scsi_transport_fc psmouse pata_acpi hv_vmbus floppy fjes [Fri Mar 19 20:03:04 2021] CPU: 1 PID: 24869 Comm: gdb Tainted: G W 4.4.0-204-generic #236-Ubuntu [Fri Mar 19 20:03:04 2021] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090007 05/18/2018 [Fri Mar 19 20:03:04 2021] task: 880db9229c80 ti: 880d93b9c000 task.ti: 880d93b9c000 [Fri Mar 19 20:03:04 2021] RIP: 0010:[] [] handle_mm_fault+0x13de/0x1b80 [Fri Mar 19 20:03:04 2021] RSP: 0018:880d93b9fc28 EFLAGS: 00010246 [Fri Mar 19 20:03:04 2021] RAX: 0100 RBX: RCX: 0120 [Fri Mar 19 20:03:04 2021] RDX: 880ea635f3e8 RSI: 3000 RDI: [Fri Mar 19 20:03:04 2021] RBP: 880d93b9fce8 R08: 3ff32179a120 R09: 007d [Fri Mar 19 20:03:04 2021] R10: 880003e8 R11: 03e8 R12: 8800ea672708 [Fri Mar 19 20:03:04 2021] R13: R14: 00010247d000 R15: 8800f27fe400 [Fri Mar 19 20:03:04 2021] FS: 7fdc26061600() GS:88102564() knlGS: [Fri Mar 19 20:03:04 2021] CS: 0010 DS: ES: CR0: 80050033 [Fri Mar 19 20:03:04 2021] CR2: 55e3a0011290 CR3: 000d93ba4000 CR4: 00160670 [Fri Mar 19 20:03:04 2021] Stack: [Fri Mar 19 20:03:04 2021] 81082929 fffd 81082252 880d93b9fca8 [Fri Mar 19 20:03:04 2021] 811c7bca 8800f27fe400 00010247d000 880e74a88090 [Fri Mar 19 20:03:04 2021] 3a98d7f0 880e0001 880003e8 0017 [Fri Mar 19 20:03:04 2021] Call Trace: [Fri Mar 19 20:03:04 2021] [] ? mm_access+0x79/0xa0 [Fri Mar 19 20:03:04 2021] [] ? mmput+0x12/0x130 [Fri Mar 19 20:03:04 2021] [] ? follow_page_pte+0x1ca/0x3d0 [Fri Mar 19 20:03:04 2021] [] ? follow_page_mask+0x214/0x3a0 [Fri Mar 19 20:03:04 2021] [] __get_user_pages+0x130/0x680 [Fri Mar 19 20:03:04 2021] [] ? path_openat+0x348/0x1360 [Fri Mar 19 20:03:04 2021] [] get_user_pages+0x34/0x40 [Fri Mar 19 20:03:04 2021] [] __access_remote_vm+0xe4/0x2d0 [Fri Mar 19 20:03:04 2021] [] ? alloc_pages_current+0x8c/0x110 [Fri Mar 19 20:03:04 2021] [] access_remote_vm+0x1f/0x30 [Fri Mar 19 20:03:04 2021] [] mem_rw.isra.16+0xfa/0x190 [Fri Mar 19
[Kernel-packages] [Bug 1921211] Re: Taking a memory dump of user mode process on Xenial hosts causes bugcheck/kernel panic and core dump
** Description changed: [Impact] We have some Ubuntu 16.04 hosts (in Hyper-V) being used for testing some Ubuntu 20.04 container. As part of the testing we were attempting to take a memory dump of a container running SQL Server with Ubuntu 20.04 on the Ubuntu 16.04 host we started seeing kernel panic and core dump. It started happening after a specific Xenial kernel update on the host. 4.4.0-204-generic - Systems that are crashing 4.4.0-201-generic - Systems that are able to capture dump - Note from the developer indicates following logging showing up. Now the following is output right after I attempt to start the dump. (gdb, attach ###, generate-core-file /var/opt/mssql/log/rdorr.delme.core) [Fri Mar 19 20:01:38 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:01:41 2021] cni0: port 9(vethdec5d2b7) entered forwarding state [Fri Mar 19 20:02:42 2021] systemd-journald[581]: Successfully sent stream file descriptor to service manager. [Fri Mar 19 20:03:04 2021] [ cut here ] [Fri Mar 19 20:03:04 2021] kernel BUG at /build/linux-qlAbvR/linux-4.4.0/mm/memory.c:3214! [Fri Mar 19 20:03:04 2021] invalid opcode: [#1] SMP [Fri Mar 19 20:03:04 2021] Modules linked in: veth vxlan ip6_udp_tunnel udp_tunnel xt_statistic xt_nat ipt_REJECT nf_reject_ipv4 xt_tcpudp ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs libcrc32c ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6_tables xt_comment xt_mark xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables br_netfilter bridge stp llc aufs overlay nls_utf8 isofs crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd input_leds serio_raw i2c_piix4 hv_balloon hyperv_fb 8250_fintek joydev mac_hid autofs4 hid_generic hv_utils hid_hyperv ptp hv_netvsc hid hv_storvsc pps_core [Fri Mar 19 20:03:04 2021] hyperv_keyboard scsi_transport_fc psmouse pata_acpi hv_vmbus floppy fjes [Fri Mar 19 20:03:04 2021] CPU: 1 PID: 24869 Comm: gdb Tainted: G W 4.4.0-204-generic #236-Ubuntu [Fri Mar 19 20:03:04 2021] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090007 05/18/2018 [Fri Mar 19 20:03:04 2021] task: 880db9229c80 ti: 880d93b9c000 task.ti: 880d93b9c000 [Fri Mar 19 20:03:04 2021] RIP: 0010:[] [] handle_mm_fault+0x13de/0x1b80 [Fri Mar 19 20:03:04 2021] RSP: 0018:880d93b9fc28 EFLAGS: 00010246 [Fri Mar 19 20:03:04 2021] RAX: 0100 RBX: RCX: 0120 [Fri Mar 19 20:03:04 2021] RDX: 880ea635f3e8 RSI: 3000 RDI: [Fri Mar 19 20:03:04 2021] RBP: 880d93b9fce8 R08: 3ff32179a120 R09: 007d [Fri Mar 19 20:03:04 2021] R10: 880003e8 R11: 03e8 R12: 8800ea672708 [Fri Mar 19 20:03:04 2021] R13: R14: 00010247d000 R15: 8800f27fe400 [Fri Mar 19 20:03:04 2021] FS: 7fdc26061600() GS:88102564() knlGS: [Fri Mar 19 20:03:04 2021] CS: 0010 DS: ES: CR0: 80050033 [Fri Mar 19 20:03:04 2021] CR2: 55e3a0011290 CR3: 000d93ba4000 CR4: 00160670 [Fri Mar 19 20:03:04 2021] Stack: [Fri Mar 19 20:03:04 2021] 81082929 fffd 81082252 880d93b9fca8 [Fri Mar 19 20:03:04 2021] 811c7bca 8800f27fe400 00010247d000 880e74a88090 [Fri Mar 19 20:03:04 2021] 3a98d7f0 880e0001 880003e8 0017 [Fri Mar 19 20:03:04 2021] Call Trace: [Fri Mar 19 20:03:04 2021] [] ? mm_access+0x79/0xa0 [Fri Mar 19 20:03:04 2021] [] ? mmput+0x12/0x130 [Fri Mar 19 20:03:04 2021] [] ? follow_page_pte+0x1ca/0x3d0 [Fri Mar 19 20:03:04 2021] [] ? follow_page_mask+0x214/0x3a0 [Fri Mar 19 20:03:04 2021] [] __get_user_pages+0x130/0x680 [Fri Mar 19 20:03:04 2021] [] ? path_openat+0x348/0x1360 [Fri Mar 19 20:03:04 2021] [] get_user_pages+0x34/0x40 [Fri Mar 19 20:03:04 2021] [] __access_remote_vm+0xe4/0x2d0 [Fri Mar 19 20:03:04 2021] [] ? alloc_pages_current+0x8c/0x110 [Fri Mar 19 20:03:04 2021] [] access_remote_vm+0x1f/0x30 [Fri Mar 19 20:03:04 2021] [] mem_rw.isra.16+0xfa/0x190 [Fri Mar 19 20:03:04 2021] [] mem_read+0x18/0x20 [Fri Mar 19 20:03:04 2021] [] __vfs_read+0x1b/0x40 [Fri Mar 19 20:03:04 2021] [] vfs_read+0x86/0x130 [Fri Mar 19 20:03:04 2021] [] SyS_pread64+0x95/0xb0 [Fri Mar 19 20:03:04 2021] [] entry_SYSCALL_64_fastpath+0x22/0xd0 [Fri Mar 19 20:03:04 2021] Code: d4 ee ff ff 48 8b 7d 98 89 45 88 e8 2d c7 fd ff 8b 45 88 89 c3 e9 be ee ff ff 48 8b bd 70 ff ff ff e8 c7 cf 69 00 e9 ad ee ff ff <0f> 0b 4c 89 e7 4c 89 9d 70 ff ff ff e8 f1 c9 00 00 85 c0 4c 8b [Fri Mar 19 20:03:04