[ 51.558064][ T26] audit: type=1800 audit(1573196635.462:27): pid=7840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.623022][ T26] audit: type=1800 audit(1573196635.472:28): pid=7840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.155443][ T26] audit: type=1800 audit(1573196636.112:29): pid=7840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.175634][ T26] audit: type=1800 audit(1573196636.112:30): pid=7840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.8' (ECDSA) to the list of known hosts. 2019/11/08 07:04:05 fuzzer started 2019/11/08 07:04:06 dialing manager at 10.128.0.105:41185 2019/11/08 07:04:06 syscalls: 2553 2019/11/08 07:04:06 code coverage: enabled 2019/11/08 07:04:06 comparison tracing: enabled 2019/11/08 07:04:06 extra coverage: extra coverage is not supported by the kernel 2019/11/08 07:04:06 setuid sandbox: enabled 2019/11/08 07:04:06 namespace sandbox: enabled 2019/11/08 07:04:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/08 07:04:06 fault injection: enabled 2019/11/08 07:04:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/08 07:04:06 net packet injection: enabled 2019/11/08 07:04:06 net device setup: enabled 2019/11/08 07:04:06 concurrency sanitizer: enabled 2019/11/08 07:04:06 devlink PCI setup: PCI device 0000:00:10.0 is not available 07:04:08 executing program 0: r0 = socket$inet(0x2, 0x20008000000003, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$tun(r1, &(0x7f0000000180)={@void, @val={0x2}, @llc={@llc={0x0, 0x0, "fd"}}}, 0xd) 07:04:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x4, 0x6d, 0x3, 0x8, 0x0}, 0x17) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) syzkaller login: [ 64.219222][ T8007] IPVS: ftp: loaded support on port[0] = 21 [ 64.324449][ T8007] chnl_net:caif_netlink_parms(): no params data found [ 64.385838][ T8007] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.406567][ T8007] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.414721][ T8007] device bridge_slave_0 entered promiscuous mode [ 64.423216][ T8007] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.427487][ T8010] IPVS: ftp: loaded support on port[0] = 21 [ 64.430299][ T8007] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.445141][ T8007] device bridge_slave_1 entered promiscuous mode [ 64.468254][ T8007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.481065][ T8007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.518661][ T8007] team0: Port device team_slave_0 added [ 64.525365][ T8007] team0: Port device team_slave_1 added 07:04:08 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffdc8, 0x40, 0x0, 0xfffffd87) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r3, &(0x7f0000000040), 0x10) setsockopt(r3, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r3) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2200, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480), 0xffffff6c) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) [ 64.625550][ T8007] device hsr_slave_0 entered promiscuous mode [ 64.663191][ T8007] device hsr_slave_1 entered promiscuous mode [ 64.798085][ T8010] chnl_net:caif_netlink_parms(): no params data found [ 64.863929][ T8013] IPVS: ftp: loaded support on port[0] = 21 [ 64.889260][ T8007] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.896370][ T8007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.903813][ T8007] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.910851][ T8007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.990123][ T8010] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.998263][ T8010] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.011345][ T8010] device bridge_slave_0 entered promiscuous mode 07:04:09 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7be, 0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='status\x00') ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, 0x0) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0xd001, 0x4, 0x0, 0x3, 0x8, 0x0, 0x6}) pipe(&(0x7f0000000180)) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) pipe(&(0x7f0000000280)) syz_open_dev$vcsn(0x0, 0x0, 0xc000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000000)='net/netstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000200)='net/netstat\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') [ 65.045554][ T8010] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.082269][ T8010] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.093221][ T8010] device bridge_slave_1 entered promiscuous mode [ 65.134868][ T8007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.225420][ T8010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.303173][ T8007] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.311351][ T8010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.342300][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.362615][ T2686] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.392794][ T2686] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.422899][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 65.494445][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.512998][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.521739][ T3502] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.528838][ T3502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.572864][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.604316][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.624558][ T3502] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.631621][ T3502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.672839][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.719693][ T8039] IPVS: ftp: loaded support on port[0] = 21 [ 65.735519][ T8013] chnl_net:caif_netlink_parms(): no params data found [ 65.766963][ T8010] team0: Port device team_slave_0 added [ 65.774438][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.785044][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.833370][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.864685][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.893122][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.924842][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.953022][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.993241][ T8010] team0: Port device team_slave_1 added 07:04:10 executing program 4: creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000072c000/0x1000)=nil) r0 = creat(&(0x7f0000001600)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 66.005136][ T8007] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.026993][ T8007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.074179][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.105412][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.144687][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.235409][ T8013] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.272267][ T8013] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.280140][ T8013] device bridge_slave_0 entered promiscuous mode [ 66.367077][ T8010] device hsr_slave_0 entered promiscuous mode [ 66.444501][ T8010] device hsr_slave_1 entered promiscuous mode [ 66.464474][ T8010] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.481946][ T8007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.514409][ T8013] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.521489][ T8013] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.582395][ T8013] device bridge_slave_1 entered promiscuous mode [ 66.619914][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 07:04:10 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x760030) [ 66.637538][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.696785][ T8045] IPVS: ftp: loaded support on port[0] = 21 [ 66.709112][ T8013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.753100][ T8013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.883015][ T8013] team0: Port device team_slave_0 added [ 66.943168][ T7977] ================================================================== [ 66.946981][ T8013] team0: Port device team_slave_1 added [ 66.951329][ T7977] BUG: KCSAN: data-race in generic_permission / kernfs_refresh_inode [ 66.964863][ T7977] [ 66.967218][ T7977] write to 0xffff88812a7beb68 of 2 bytes by task 7976 on cpu 0: [ 66.974851][ T7977] kernfs_refresh_inode+0x42/0x140 [ 66.979974][ T7977] kernfs_iop_permission+0x66/0xa0 [ 66.985102][ T7977] inode_permission+0x241/0x3c0 [ 66.989964][ T7977] link_path_walk.part.0+0x622/0xa90 [ 66.995255][ T7977] path_lookupat.isra.0+0x77/0x5a0 [ 67.000374][ T7977] filename_lookup+0x145/0x2b0 [ 67.005162][ T7977] user_path_at_empty+0x4c/0x70 [ 67.010021][ T7977] vfs_statx+0xd9/0x190 [ 67.014180][ T7977] __do_sys_newstat+0x51/0xb0 [ 67.018860][ T7977] __x64_sys_newstat+0x3a/0x50 [ 67.023631][ T7977] do_syscall_64+0xcc/0x370 [ 67.028141][ T7977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.034035][ T7977] [ 67.036370][ T7977] read to 0xffff88812a7beb68 of 2 bytes by task 7977 on cpu 1: [ 67.043937][ T7977] generic_permission+0x36/0x3d0 [ 67.048882][ T7977] kernfs_iop_permission+0x7d/0xa0 [ 67.054001][ T7977] inode_permission+0x241/0x3c0 [ 67.058878][ T7977] link_path_walk.part.0+0x622/0xa90 [ 67.064175][ T7977] path_lookupat.isra.0+0x77/0x5a0 [ 67.069292][ T7977] filename_lookup+0x145/0x2b0 [ 67.074064][ T7977] user_path_at_empty+0x4c/0x70 [ 67.078940][ T7977] do_readlinkat+0x84/0x220 [ 67.083450][ T7977] __x64_sys_readlink+0x51/0x70 [ 67.088475][ T7977] do_syscall_64+0xcc/0x370 [ 67.092983][ T7977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.098865][ T7977] [ 67.101187][ T7977] Reported by Kernel Concurrency Sanitizer on: [ 67.107347][ T7977] CPU: 1 PID: 7977 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 67.114380][ T7977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.124440][ T7977] ================================================================== [ 67.132508][ T7977] Kernel panic - not syncing: panic_on_warn set ... [ 67.139207][ T7977] CPU: 1 PID: 7977 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 67.146231][ T7977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.156278][ T7977] Call Trace: [ 67.159586][ T7977] dump_stack+0xf5/0x159 [ 67.163841][ T7977] panic+0x210/0x640 [ 67.167755][ T7977] ? vprintk_func+0x8d/0x140 [ 67.172356][ T7977] kcsan_report.cold+0xc/0xe [ 67.176958][ T7977] kcsan_setup_watchpoint+0x3fe/0x410 [ 67.182358][ T7977] __tsan_read2+0x145/0x1f0 [ 67.186885][ T7977] generic_permission+0x36/0x3d0 [ 67.191841][ T7977] kernfs_iop_permission+0x7d/0xa0 [ 67.196963][ T7977] ? kernfs_iop_getattr+0x90/0x90 [ 67.202032][ T7977] inode_permission+0x241/0x3c0 [ 67.207008][ T7977] link_path_walk.part.0+0x622/0xa90 [ 67.212306][ T7977] ? native_set_pte+0x47/0x70 [ 67.217086][ T7977] path_lookupat.isra.0+0x77/0x5a0 [ 67.222211][ T7977] ? __read_once_size.constprop.0+0x12/0x20 [ 67.228119][ T7977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 67.234374][ T7977] filename_lookup+0x145/0x2b0 [ 67.239172][ T7977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 67.245419][ T7977] ? strncpy_from_user+0x219/0x2b0 [ 67.250560][ T7977] ? getname_flags+0x1a4/0x380 [ 67.255356][ T7977] user_path_at_empty+0x4c/0x70 [ 67.260216][ T7977] do_readlinkat+0x84/0x220 [ 67.264735][ T7977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 67.270994][ T7977] __x64_sys_readlink+0x51/0x70 [ 67.275866][ T7977] do_syscall_64+0xcc/0x370 [ 67.280395][ T7977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.286284][ T7977] RIP: 0033:0x7fba7924c577 [ 67.290717][ T7977] Code: f0 ff ff 77 02 f3 c3 48 8b 15 bd 38 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 38 2b 00 31 d2 48 29 c2 64 [ 67.310325][ T7977] RSP: 002b:00007ffe20889968 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 67.318756][ T7977] RAX: ffffffffffffffda RBX: 0000000002182250 RCX: 00007fba7924c577 [ 67.326864][ T7977] RDX: 0000000000000400 RSI: 00007ffe20889970 RDI: 00007ffe20889e50 [ 67.334840][ T7977] RBP: 0000000002193000 R08: 7665642f7379732f R09: 74656e2f73656369 [ 67.342835][ T7977] R10: 2f316d6973766564 R11: 0000000000000246 R12: 00007ffe20889e50 [ 67.350814][ T7977] R13: 0000000000000400 R14: 0000000002182250 R15: 000000000000000b [ 67.360043][ T7977] Kernel Offset: disabled [ 67.364378][ T7977] Rebooting in 86400 seconds..