[ 60.348469][ T25] audit: type=1800 audit(1573050825.532:28): pid=7772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 60.996471][ T7839] sshd (7839) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.279501][ T25] audit: type=1800 audit(1573050826.562:29): pid=7772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 61.302087][ T25] audit: type=1800 audit(1573050826.562:30): pid=7772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.44' (ECDSA) to the list of known hosts. 2019/11/06 14:33:56 fuzzer started 2019/11/06 14:33:58 dialing manager at 10.128.0.105:44951 2019/11/06 14:33:58 syscalls: 2553 2019/11/06 14:33:58 code coverage: enabled 2019/11/06 14:33:58 comparison tracing: enabled 2019/11/06 14:33:58 extra coverage: extra coverage is not supported by the kernel 2019/11/06 14:33:58 setuid sandbox: enabled 2019/11/06 14:33:58 namespace sandbox: enabled 2019/11/06 14:33:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 14:33:58 fault injection: enabled 2019/11/06 14:33:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 14:33:58 net packet injection: enabled 2019/11/06 14:33:58 net device setup: enabled 2019/11/06 14:33:58 concurrency sanitizer: enabled 2019/11/06 14:33:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/06 14:33:58 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 'echo_char' 'find_next_bit' 'ep_poll' 14:33:59 executing program 0: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0xfffffffffffffffe, 0x0, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x802, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) 14:34:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_drvinfo={0x3, "fc27dbd7753067f2c479402ddaa7911d48d2421748deccec8378a584bdafe955", "8c8dbcebf69d29412f259f38d75d149fdc7cbd09ee8c3456ffe4aae85efad092", "51d545a487931e12d7f8bdf73f0bdb3a0a6f3f01a4fb4a5415178778bffa1fbd", "e208adad326e137878ce636884abcd305886a8ab284a46c9a01c6533be295df4", "fad7a3d6fca4c6ca230b838c9f44aa3cba07b1c0cff9d1d72484735de4d03294", "270ca83bdd3059e2301450c0"}}) syzkaller login: [ 74.871754][ T7947] IPVS: ftp: loaded support on port[0] = 21 [ 74.985541][ T7947] chnl_net:caif_netlink_parms(): no params data found [ 75.045617][ T7947] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.052713][ T7947] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.060802][ T7947] device bridge_slave_0 entered promiscuous mode [ 75.068852][ T7947] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.073253][ T7950] IPVS: ftp: loaded support on port[0] = 21 [ 75.076536][ T7947] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.090185][ T7947] device bridge_slave_1 entered promiscuous mode [ 75.125387][ T7947] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.139893][ T7947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:34:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='system.posix_acl_access\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000300), 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) [ 75.205536][ T7947] team0: Port device team_slave_0 added [ 75.212141][ T7947] team0: Port device team_slave_1 added [ 75.223343][ T7950] chnl_net:caif_netlink_parms(): no params data found [ 75.297178][ T7947] device hsr_slave_0 entered promiscuous mode [ 75.345981][ T7947] device hsr_slave_1 entered promiscuous mode 14:34:00 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000100), 0x10) [ 75.498400][ T7953] IPVS: ftp: loaded support on port[0] = 21 [ 75.527995][ T7950] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.546259][ T7950] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.573943][ T7950] device bridge_slave_0 entered promiscuous mode [ 75.630162][ T7947] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.637313][ T7947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.644677][ T7947] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.651712][ T7947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.745426][ T7950] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.752502][ T7950] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.786643][ T7950] device bridge_slave_1 entered promiscuous mode [ 75.896090][ T7950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.923911][ T7947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.996995][ T7950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.026871][ T7947] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.033905][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.055861][ T2936] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.085209][ T2936] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.116094][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 76.153671][ T7979] IPVS: ftp: loaded support on port[0] = 21 [ 76.197653][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.215151][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.246077][ T7973] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.253229][ T7973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.286488][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.314994][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.344790][ T7973] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.351914][ T7973] bridge0: port 2(bridge_slave_1) entered forwarding state 14:34:01 executing program 4: fcntl$getflags(0xffffffffffffffff, 0x0) getpgid(0x0) r0 = geteuid() getresgid(&(0x7f0000000880), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="9d0000007d0100000083000500ffffff7faa00000000000000000000000000000000ffffff070000007465000000000000ffffffff305b7070703024402c4073656c696e75060000000000000075707a706f7369785f41636c5f6163636573a6757365725c73797374656d242673656375726974796b657972696e67000009006e6f6465766574683105002665746830", @ANYRES32=0x0, @ANYRES32=r0], 0x98) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r1, r3, 0x0, 0x80001d00c0d0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x1, 0x4, 0xed, 0x5, 0x0, 0x2, 0x2000, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0xffffffffffffff7f, 0x4}, 0x400c, 0x8, 0x7, 0xff9c66e808b43572, 0xb735f8d, 0x80000001, 0x4}, r4, 0xf, r5, 0x2) [ 76.396751][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.425631][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.498016][ T7950] team0: Port device team_slave_0 added [ 76.555052][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.563605][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.624049][ T7947] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 76.674514][ T7947] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 76.747184][ T7950] team0: Port device team_slave_1 added [ 76.759853][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.786135][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.816691][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.846917][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.876656][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.905664][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.935023][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.969079][ T7953] chnl_net:caif_netlink_parms(): no params data found [ 77.048533][ T7983] IPVS: ftp: loaded support on port[0] = 21 [ 77.068651][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.156794][ T7950] device hsr_slave_0 entered promiscuous mode [ 77.184758][ T7950] device hsr_slave_1 entered promiscuous mode 14:34:02 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) [ 77.224511][ T7950] debugfs: Directory 'hsr0' with parent '/' already present! [ 77.232476][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.242596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.270528][ T7947] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.347182][ T7953] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.354267][ T7953] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.371203][ T7953] device bridge_slave_0 entered promiscuous mode [ 77.389930][ T7953] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.401943][ T7953] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.421302][ T7953] device bridge_slave_1 entered promiscuous mode [ 77.533674][ T7979] chnl_net:caif_netlink_parms(): no params data found [ 77.599200][ T7953] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.625905][ T7953] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.683689][ T8009] IPVS: ftp: loaded support on port[0] = 21 [ 77.728537][ T7979] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.774522][ T7979] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.787930][ T7979] device bridge_slave_0 entered promiscuous mode [ 77.880902][ T7979] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.894922][ T7979] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.902823][ T7979] device bridge_slave_1 entered promiscuous mode [ 77.975648][ T7953] team0: Port device team_slave_0 added [ 78.018474][ T25] audit: type=1804 audit(1573050843.302:31): pid=8024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir909071258/syzkaller.GYKBdk/0/file0" dev="sda1" ino=16522 res=1 [ 78.050443][ T7950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.078884][ T7953] team0: Port device team_slave_1 added [ 78.088590][ T7979] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:34:03 executing program 0: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0xfffffffffffffffe, 0x0, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x802, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) [ 78.151447][ T7979] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.178862][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.189452][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.243242][ T7950] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.277849][ T7983] chnl_net:caif_netlink_parms(): no params data found [ 78.336910][ T7953] device hsr_slave_0 entered promiscuous mode [ 78.374694][ T7953] device hsr_slave_1 entered promiscuous mode [ 78.409859][ T7953] debugfs: Directory 'hsr0' with parent '/' already present! [ 78.484126][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.504908][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 14:34:03 executing program 0: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0xfffffffffffffffe, 0x0, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x802, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) [ 78.540969][ T7973] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.548055][ T7973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.588740][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.635160][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.674357][ T7973] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.681510][ T7973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.719262][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.743517][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.777873][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.803209][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:34:04 executing program 0: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0xfffffffffffffffe, 0x0, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x802, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) [ 78.835373][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.895447][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.006795][ T7979] team0: Port device team_slave_0 added [ 79.029131][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.055963][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.095564][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.151320][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.225112][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.233541][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.253423][ T8049] ================================================================== [ 79.261554][ T8049] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 79.269084][ T8049] [ 79.271418][ T8049] write to 0xffff8881240b25a8 of 2 bytes by task 8056 on cpu 0: [ 79.279061][ T8049] pid_update_inode+0x51/0x70 [ 79.283750][ T8049] pid_revalidate+0x91/0xd0 [ 79.288266][ T8049] lookup_fast+0x618/0x700 [ 79.292719][ T8049] path_openat+0x2ac/0x36e0 [ 79.297222][ T8049] do_filp_open+0x11e/0x1b0 [ 79.301728][ T8049] do_sys_open+0x3b3/0x4f0 [ 79.306154][ T8049] __x64_sys_open+0x55/0x70 [ 79.310673][ T8049] do_syscall_64+0xcc/0x370 [ 79.315193][ T8049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 79.321081][ T8049] 14:34:04 executing program 0: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0xfffffffffffffffe, 0x0, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x802, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) [ 79.323417][ T8049] read to 0xffff8881240b25a8 of 2 bytes by task 8049 on cpu 1: [ 79.330968][ T8049] pid_update_inode+0x25/0x70 [ 79.335652][ T8049] pid_revalidate+0x91/0xd0 [ 79.340167][ T8049] lookup_fast+0x618/0x700 [ 79.344587][ T8049] path_openat+0x2ac/0x36e0 [ 79.349088][ T8049] do_filp_open+0x11e/0x1b0 [ 79.353588][ T8049] do_sys_open+0x3b3/0x4f0 [ 79.358006][ T8049] __x64_sys_open+0x55/0x70 [ 79.362520][ T8049] do_syscall_64+0xcc/0x370 [ 79.367028][ T8049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 79.372905][ T8049] [ 79.375222][ T8049] Reported by Kernel Concurrency Sanitizer on: [ 79.381376][ T8049] CPU: 1 PID: 8049 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 79.388139][ T8049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.398195][ T8049] ================================================================== [ 79.406256][ T8049] Kernel panic - not syncing: panic_on_warn set ... [ 79.412848][ T8049] CPU: 1 PID: 8049 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 79.419604][ T8049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.429658][ T8049] Call Trace: [ 79.432971][ T8049] dump_stack+0xf5/0x159 [ 79.437231][ T8049] panic+0x210/0x640 [ 79.441140][ T8049] ? btrfs_log_inode+0x11a7/0x1d30 [ 79.446264][ T8049] ? vprintk_func+0x8d/0x140 [ 79.450865][ T8049] kcsan_report.cold+0xc/0xe [ 79.455475][ T8049] kcsan_setup_watchpoint+0x3fe/0x410 [ 79.460866][ T8049] __tsan_read2+0x145/0x1f0 [ 79.465387][ T8049] pid_update_inode+0x25/0x70 [ 79.470076][ T8049] pid_revalidate+0x91/0xd0 [ 79.474592][ T8049] lookup_fast+0x618/0x700 [ 79.479049][ T8049] path_openat+0x2ac/0x36e0 [ 79.483589][ T8049] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 79.489847][ T8049] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 79.495772][ T8049] ? __read_once_size+0x41/0xe0 [ 79.500631][ T8049] do_filp_open+0x11e/0x1b0 [ 79.505159][ T8049] ? __alloc_fd+0x2ef/0x3b0 [ 79.509681][ T8049] do_sys_open+0x3b3/0x4f0 [ 79.514144][ T8049] __x64_sys_open+0x55/0x70 [ 79.518687][ T8049] do_syscall_64+0xcc/0x370 [ 79.523206][ T8049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 79.529097][ T8049] RIP: 0033:0x7f6585a9e120 [ 79.533523][ T8049] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 79.553158][ T8049] RSP: 002b:00007fff382f3b38 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 79.561584][ T8049] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f6585a9e120 [ 79.569560][ T8049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f6585f6cd00 [ 79.577539][ T8049] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f6585d6657b [ 79.585517][ T8049] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6585f6bd00 [ 79.593497][ T8049] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 79.602921][ T8049] Kernel Offset: disabled [ 79.607288][ T8049] Rebooting in 86400 seconds..