[info] Using makefile-style concurrent boot in runlevel 2. [ 42.216261][ T26] audit: type=1800 audit(1575652667.489:21): pid=7457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.245738][ T26] audit: type=1800 audit(1575652667.489:22): pid=7457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.113' (ECDSA) to the list of known hosts. 2019/12/06 17:18:00 fuzzer started 2019/12/06 17:18:01 dialing manager at 10.128.0.105:42203 2019/12/06 17:18:01 syscalls: 2684 2019/12/06 17:18:01 code coverage: enabled 2019/12/06 17:18:01 comparison tracing: enabled 2019/12/06 17:18:01 extra coverage: extra coverage is not supported by the kernel 2019/12/06 17:18:01 setuid sandbox: enabled 2019/12/06 17:18:01 namespace sandbox: enabled 2019/12/06 17:18:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/06 17:18:01 fault injection: enabled 2019/12/06 17:18:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/06 17:18:01 net packet injection: enabled 2019/12/06 17:18:01 net device setup: enabled 2019/12/06 17:18:01 concurrency sanitizer: enabled 2019/12/06 17:18:01 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 61.108084][ T7619] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/06 17:18:07 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 'tcp_add_backlog' 'vm_area_dup' 'tick_sched_do_timer' 'generic_write_end' 'tomoyo_supervisor' '__ext4_new_inode' 'wbt_done' 'generic_fillattr' 'do_syslog' 'ext4_free_inodes_count' 'add_timer' 'blk_mq_dispatch_rq_list' 'ep_poll' 'tick_nohz_idle_stop_tick' 'atime_needs_update' 'do_nanosleep' 'ext4_free_inode' 'xas_find_marked' 'blk_mq_get_request' 'run_timer_softirq' 'find_next_bit' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'ext4_nonda_switch' 'bio_endio' 'lruvec_lru_size' 'poll_schedule_timeout' 'rcu_gp_fqs_loop' 'ext4_mb_good_group' 'ktime_get_real_seconds' 'ext4_has_free_clusters' 'pipe_poll' 'find_get_pages_range_tag' 'blk_mq_free_request' 'has_bh_in_lru' '__mark_inode_dirty' 'pcpu_alloc' 'taskstats_exit' 'mod_timer' '__find_get_block' 'blk_mq_sched_dispatch_requests' 17:19:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000633377fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 17:19:09 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000001f2", @ANYBLOB="850081008ca31d3f003b54"], 0x14}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) [ 123.954745][ T7623] IPVS: ftp: loaded support on port[0] = 21 [ 124.041160][ T7623] chnl_net:caif_netlink_parms(): no params data found [ 124.088817][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.108931][ T7623] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.116612][ T7623] device bridge_slave_0 entered promiscuous mode [ 124.149588][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.156697][ T7623] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.164576][ T7623] device bridge_slave_1 entered promiscuous mode [ 124.199995][ T7623] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 124.210743][ T7623] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 124.230225][ T7623] team0: Port device team_slave_0 added [ 124.238358][ T7623] team0: Port device team_slave_1 added 17:19:09 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, &(0x7f0000000400)={{0x2, @name="2d3456d18f7be323f019a7d7c27d1a9a086ef38f0f57dfd3d87c353cd068c433"}, "36ea3b517b30da56e709782756710b5b9d9fed37c5ff54ca5d78af22ea5faf66", 0x1}) [ 124.249175][ T7626] IPVS: ftp: loaded support on port[0] = 21 [ 124.311288][ T7623] device hsr_slave_0 entered promiscuous mode [ 124.370917][ T7623] device hsr_slave_1 entered promiscuous mode [ 124.447814][ T7628] IPVS: ftp: loaded support on port[0] = 21 17:19:09 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') sendfile(r0, r1, 0x0, 0x100000000) [ 124.510426][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.517510][ T7623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.524860][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.531907][ T7623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.801768][ T7626] chnl_net:caif_netlink_parms(): no params data found [ 124.846687][ T7623] 8021q: adding VLAN 0 to HW filter on device bond0 [ 124.896461][ T7623] 8021q: adding VLAN 0 to HW filter on device team0 [ 124.942547][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.951580][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.019755][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.040348][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 125.110845][ T7628] chnl_net:caif_netlink_parms(): no params data found [ 125.129866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.149284][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.180224][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.187296][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.220812][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.249689][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.280313][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.287379][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.320353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 17:19:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) ioctl$TCSETSF(0xffffffffffffffff, 0x5457, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5457, 0x0) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 125.350021][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 125.380722][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 125.420433][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 125.449924][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 125.480695][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 125.537238][ T7654] IPVS: ftp: loaded support on port[0] = 21 [ 125.561353][ T7623] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 125.589293][ T7623] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 125.630499][ T7626] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.637566][ T7626] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.660736][ T7626] device bridge_slave_0 entered promiscuous mode [ 125.681550][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 125.700803][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.740813][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.780668][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.800357][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.859357][ T7626] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.866575][ T7626] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.901962][ T7626] device bridge_slave_1 entered promiscuous mode [ 125.937407][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 125.960621][ T7659] IPVS: ftp: loaded support on port[0] = 21 [ 125.979016][ T7626] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 125.988654][ T7628] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.996506][ T7628] bridge0: port 1(bridge_slave_0) entered disabled state 17:19:11 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r4, 0x7000000}) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x3b, 0x0, 0x10, &(0x7f0000ffc000/0x1000)=nil}) dup(0xffffffffffffffff) [ 126.006128][ T7628] device bridge_slave_0 entered promiscuous mode [ 126.014105][ T7628] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.022809][ T7628] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.030795][ T7628] device bridge_slave_1 entered promiscuous mode [ 126.037851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 126.045820][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 126.063001][ T7623] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.074398][ T7626] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.122197][ T7628] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.141989][ T7626] team0: Port device team_slave_0 added [ 126.149642][ T7628] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.182122][ T7626] team0: Port device team_slave_1 added [ 126.234197][ T7673] IPVS: ftp: loaded support on port[0] = 21 [ 126.241270][ T7628] team0: Port device team_slave_0 added [ 126.260718][ T7654] chnl_net:caif_netlink_parms(): no params data found [ 126.273931][ T7628] team0: Port device team_slave_1 added [ 126.311030][ T7626] device hsr_slave_0 entered promiscuous mode [ 126.379187][ T7626] device hsr_slave_1 entered promiscuous mode [ 126.419009][ T7626] debugfs: Directory 'hsr0' with parent '/' already present! [ 126.563206][ C0] hrtimer: interrupt took 27149 ns [ 126.617989][ T7654] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.646591][ T7654] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.730766][ T7654] device bridge_slave_0 entered promiscuous mode [ 126.767366][ T7701] ================================================================== [ 126.775517][ T7701] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 126.783048][ T7701] [ 126.785390][ T7701] read to 0xffff8881288c5828 of 2 bytes by task 7695 on cpu 1: [ 126.792938][ T7701] pid_update_inode+0x25/0x70 [ 126.797623][ T7701] pid_revalidate+0x91/0xd0 [ 126.802127][ T7701] lookup_fast+0x6f2/0x700 [ 126.806552][ T7701] walk_component+0x6d/0xe70 [ 126.811154][ T7701] link_path_walk.part.0+0x5d3/0xa90 [ 126.816443][ T7701] path_openat+0x14f/0x36e0 [ 126.820944][ T7701] do_filp_open+0x11e/0x1b0 [ 126.825465][ T7701] do_sys_open+0x3b3/0x4f0 [ 126.829880][ T7701] __x64_sys_open+0x55/0x70 [ 126.834383][ T7701] do_syscall_64+0xcc/0x370 [ 126.838889][ T7701] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.844766][ T7701] [ 126.847105][ T7701] write to 0xffff8881288c5828 of 2 bytes by task 7701 on cpu 0: [ 126.854735][ T7701] pid_update_inode+0x51/0x70 [ 126.859410][ T7701] pid_revalidate+0x91/0xd0 [ 126.863916][ T7701] lookup_fast+0x6f2/0x700 [ 126.868330][ T7701] walk_component+0x6d/0xe70 [ 126.872931][ T7701] link_path_walk.part.0+0x5d3/0xa90 [ 126.878212][ T7701] path_openat+0x14f/0x36e0 [ 126.882797][ T7701] do_filp_open+0x11e/0x1b0 [ 126.887291][ T7701] do_sys_open+0x3b3/0x4f0 [ 126.891697][ T7701] __x64_sys_open+0x55/0x70 [ 126.896191][ T7701] do_syscall_64+0xcc/0x370 [ 126.900694][ T7701] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.906575][ T7701] [ 126.908893][ T7701] Reported by Kernel Concurrency Sanitizer on: [ 126.915054][ T7701] CPU: 0 PID: 7701 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 126.922235][ T7701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.932285][ T7701] ================================================================== [ 126.940348][ T7701] Kernel panic - not syncing: panic_on_warn set ... [ 126.946922][ T7701] CPU: 0 PID: 7701 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 126.954102][ T7701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.964138][ T7701] Call Trace: [ 126.967421][ T7701] dump_stack+0x11d/0x181 [ 126.971746][ T7701] panic+0x210/0x640 [ 126.975637][ T7701] ? vprintk_func+0x8d/0x140 [ 126.980227][ T7701] kcsan_report.cold+0xc/0xd [ 126.984818][ T7701] kcsan_setup_watchpoint+0x3fe/0x460 [ 126.990199][ T7701] __tsan_unaligned_write2+0xc4/0x100 [ 126.995567][ T7701] pid_update_inode+0x51/0x70 [ 127.000238][ T7701] pid_revalidate+0x91/0xd0 [ 127.004736][ T7701] lookup_fast+0x6f2/0x700 [ 127.009154][ T7701] walk_component+0x6d/0xe70 [ 127.013739][ T7701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 127.019996][ T7701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 127.026234][ T7701] ? security_inode_permission+0xa5/0xc0 [ 127.031858][ T7701] ? inode_permission+0xa0/0x3c0 [ 127.036794][ T7701] link_path_walk.part.0+0x5d3/0xa90 [ 127.042079][ T7701] path_openat+0x14f/0x36e0 [ 127.046581][ T7701] ? __read_once_size.constprop.0+0x12/0x20 [ 127.052641][ T7701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 127.058877][ T7701] ? __virt_addr_valid+0x126/0x190 [ 127.063981][ T7701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 127.070214][ T7701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 127.076445][ T7701] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 127.082446][ T7701] ? __read_once_size+0x41/0xe0 [ 127.088419][ T7701] do_filp_open+0x11e/0x1b0 [ 127.092919][ T7701] ? __alloc_fd+0x2ef/0x3b0 [ 127.097421][ T7701] do_sys_open+0x3b3/0x4f0 [ 127.101837][ T7701] __x64_sys_open+0x55/0x70 [ 127.106335][ T7701] do_syscall_64+0xcc/0x370 [ 127.110834][ T7701] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.116712][ T7701] RIP: 0033:0x7f590ae23120 [ 127.121125][ T7701] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 127.140742][ T7701] RSP: 002b:00007ffea7cf4268 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 127.149271][ T7701] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f590ae23120 [ 127.157236][ T7701] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f590b2f1d00 [ 127.165198][ T7701] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f590b0eb57b [ 127.173165][ T7701] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f590b2f0d00 [ 127.181125][ T7701] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 127.190478][ T7701] Kernel Offset: disabled [ 127.194852][ T7701] Rebooting in 86400 seconds..