[ 35.947921][ T23] audit: type=1800 audit(1572091758.377:25): pid=7191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.975128][ T23] audit: type=1800 audit(1572091758.377:26): pid=7191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 36.002328][ T23] audit: type=1800 audit(1572091758.377:27): pid=7191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 36.555754][ T7256] sshd (7256) used greatest stack depth: 10136 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.204' (ECDSA) to the list of known hosts. 2019/10/26 12:09:28 fuzzer started 2019/10/26 12:09:29 dialing manager at 10.128.0.105:33655 2019/10/26 12:09:31 syscalls: 2533 2019/10/26 12:09:31 code coverage: enabled 2019/10/26 12:09:31 comparison tracing: enabled 2019/10/26 12:09:31 extra coverage: extra coverage is not supported by the kernel 2019/10/26 12:09:31 setuid sandbox: enabled 2019/10/26 12:09:31 namespace sandbox: enabled 2019/10/26 12:09:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/26 12:09:31 fault injection: enabled 2019/10/26 12:09:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/26 12:09:31 net packet injection: enabled 2019/10/26 12:09:31 net device setup: enabled 2019/10/26 12:09:31 concurrency sanitizer: enabled syzkaller login: [ 54.145028][ T7358] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/26 12:09:38 adding functions to KCSAN blacklist: 'generic_permission' 'rcu_gp_fqs_loop' '__hrtimer_run_queues' 'do_nanosleep' 'tick_do_update_jiffies64' 'update_defense_level' 'ktime_get_seconds' 'ext4_mb_good_group' '__ext4_new_inode' 'ep_poll' 'kvm_arch_vcpu_load' 'vm_area_dup' 'ext4_free_inode' 'ext4_free_inodes_count' 'rcu_gp_fqs_check_wake' 'taskstats_exit' 'get_task_cred' 'mod_timer' 'generic_write_end' 'commit_echoes' 'pid_update_inode' 'tcp_poll' 'find_get_pages_range_tag' 'tcp_add_backlog' 'ktime_get_real_seconds' '__delete_from_page_cache' 'ext4_has_free_clusters' 'poll_schedule_timeout' 'run_timer_softirq' 'find_next_bit' '__nf_conntrack_find_get' 'shmem_file_read_iter' 'add_timer' 'common_perm_cond' 'tomoyo_supervisor' 'pipe_poll' '__nf_ct_refresh_acct' 12:10:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x3, 0x80000000000000d5, [0x0]}, 0x2de) [ 97.767486][ T7362] IPVS: ftp: loaded support on port[0] = 21 12:10:20 executing program 1: umount2(&(0x7f0000000080)='./file0\x00', 0x5) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 97.863837][ T7362] chnl_net:caif_netlink_parms(): no params data found [ 97.907200][ T7362] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.914737][ T7362] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.924154][ T7362] device bridge_slave_0 entered promiscuous mode [ 97.934771][ T7362] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.956444][ T7362] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.976414][ T7362] device bridge_slave_1 entered promiscuous mode [ 98.009110][ T7362] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.020772][ T7362] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.045061][ T7362] team0: Port device team_slave_0 added [ 98.052129][ T7362] team0: Port device team_slave_1 added [ 98.068150][ T7366] IPVS: ftp: loaded support on port[0] = 21 [ 98.119776][ T7362] device hsr_slave_0 entered promiscuous mode 12:10:20 executing program 2: syz_open_dev$audion(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6ee7199f, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_extract_tcp_res(&(0x7f00000004c0), 0x0, 0xffffffff) write$tun(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) syz_emit_ethernet(0x30, &(0x7f0000000100)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [{[], {0x8100, 0x0, 0x1, 0x2}}], {@ipx={0x8137, {0xffff, 0x1e, 0x4, 0x1, {@broadcast, @current}, {@current, @broadcast, 0x100}}}}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x0, 0x1c8, {0x77359400}, {}, {0x3}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "a0f66d1c5d5b9fae"}}, 0xffffff3b}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0}, 0x0) socket(0xa, 0x1, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) ioctl$KDMKTONE(r6, 0x4b30, 0xa52) [ 98.186116][ T7362] device hsr_slave_1 entered promiscuous mode [ 98.379720][ T7362] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.386848][ T7362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.394221][ T7362] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.401389][ T7362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.704294][ T7392] IPVS: ftp: loaded support on port[0] = 21 [ 98.764242][ T7366] chnl_net:caif_netlink_parms(): no params data found [ 98.801674][ T7362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.906708][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.925921][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.957720][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 98.995123][ T7362] 8021q: adding VLAN 0 to HW filter on device team0 [ 99.036180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.044019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:10:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r3, r1) [ 99.110729][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.120059][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.158881][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.166040][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.240764][ T7366] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.257681][ T7366] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.297582][ T7366] device bridge_slave_0 entered promiscuous mode [ 99.330029][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.346418][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.377476][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.384662][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.447038][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 99.466937][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 99.508507][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 99.546672][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.600130][ T7366] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.616067][ T7366] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.655715][ T7366] device bridge_slave_1 entered promiscuous mode [ 99.665592][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 99.674091][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 99.716929][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.746878][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 99.776372][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.807825][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 99.836748][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.874086][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 99.900946][ T7397] IPVS: ftp: loaded support on port[0] = 21 [ 99.975711][ T7366] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.989844][ T7362] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.044245][ T7366] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 12:10:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @dev}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x27) [ 100.151046][ T7366] team0: Port device team_slave_0 added [ 100.184782][ T7366] team0: Port device team_slave_1 added [ 100.224843][ T7392] chnl_net:caif_netlink_parms(): no params data found [ 100.372973][ T7366] device hsr_slave_0 entered promiscuous mode [ 100.446072][ T7366] device hsr_slave_1 entered promiscuous mode [ 100.479873][ T7366] debugfs: Directory 'hsr0' with parent '/' already present! [ 100.618270][ T7392] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.647864][ T7392] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.684910][ T7392] device bridge_slave_0 entered promiscuous mode [ 100.758463][ C0] hrtimer: interrupt took 34552 ns [ 100.828190][ T7392] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.835340][ T7392] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.888161][ T7392] device bridge_slave_1 entered promiscuous mode 12:10:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x3, 0x80000000000000d5, [0x0]}, 0x2de) [ 101.037656][ T7392] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.076510][ T7397] chnl_net:caif_netlink_parms(): no params data found [ 101.119274][ T7437] IPVS: ftp: loaded support on port[0] = 21 [ 101.258067][ T7392] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.299997][ T7424] ================================================================== [ 101.308132][ T7424] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner [ 101.315478][ T7424] [ 101.317801][ T7424] write to 0xffff88812a771a8c of 4 bytes by task 7435 on cpu 1: [ 101.325426][ T7424] task_dump_owner+0x237/0x260 [ 101.330184][ T7424] pid_update_inode+0x3c/0x70 [ 101.334851][ T7424] pid_revalidate+0x91/0xd0 [ 101.339352][ T7424] lookup_fast+0x6f2/0x700 [ 101.343767][ T7424] walk_component+0x6d/0xe80 [ 101.348356][ T7424] link_path_walk.part.0+0x5d3/0xa90 [ 101.353634][ T7424] path_openat+0x14f/0x36e0 [ 101.358127][ T7424] do_filp_open+0x11e/0x1b0 [ 101.362621][ T7424] do_sys_open+0x3b3/0x4f0 [ 101.367030][ T7424] __x64_sys_open+0x55/0x70 [ 101.371529][ T7424] do_syscall_64+0xcc/0x370 [ 101.376023][ T7424] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.381895][ T7424] [ 101.384219][ T7424] write to 0xffff88812a771a8c of 4 bytes by task 7424 on cpu 0: [ 101.391847][ T7424] task_dump_owner+0x237/0x260 [ 101.396603][ T7424] pid_update_inode+0x3c/0x70 [ 101.401272][ T7424] pid_revalidate+0x91/0xd0 [ 101.405770][ T7424] lookup_fast+0x6f2/0x700 [ 101.410182][ T7424] walk_component+0x6d/0xe80 [ 101.414766][ T7424] path_lookupat.isra.0+0x13a/0x5a0 [ 101.419956][ T7424] filename_lookup+0x145/0x2b0 [ 101.424717][ T7424] user_path_at_empty+0x4c/0x70 [ 101.429563][ T7424] vfs_statx+0xd9/0x190 [ 101.433708][ T7424] __do_sys_newstat+0x51/0xb0 [ 101.438376][ T7424] __x64_sys_newstat+0x3a/0x50 [ 101.443138][ T7424] do_syscall_64+0xcc/0x370 [ 101.447632][ T7424] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.453507][ T7424] [ 101.455831][ T7424] Reported by Kernel Concurrency Sanitizer on: [ 101.461981][ T7424] CPU: 0 PID: 7424 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 101.468728][ T7424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.478768][ T7424] ================================================================== [ 101.486825][ T7424] Kernel panic - not syncing: panic_on_warn set ... [ 101.493407][ T7424] CPU: 0 PID: 7424 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 101.500155][ T7424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.510199][ T7424] Call Trace: [ 101.513494][ T7424] dump_stack+0xf5/0x159 [ 101.517734][ T7424] panic+0x210/0x640 [ 101.521623][ T7424] ? vfs_statx+0xd9/0x190 [ 101.525944][ T7424] ? vprintk_func+0x8d/0x140 [ 101.530534][ T7424] kcsan_report.cold+0xc/0x10 [ 101.535219][ T7424] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 101.540753][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.546387][ T7424] __tsan_write4+0x32/0x40 [ 101.550798][ T7424] task_dump_owner+0x237/0x260 [ 101.555561][ T7424] ? __rcu_read_unlock+0x66/0x3c0 [ 101.560587][ T7424] pid_update_inode+0x3c/0x70 [ 101.565260][ T7424] pid_revalidate+0x91/0xd0 [ 101.569783][ T7424] lookup_fast+0x6f2/0x700 [ 101.574204][ T7424] walk_component+0x6d/0xe80 [ 101.578790][ T7424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.585029][ T7424] ? link_path_walk.part.0+0x77f/0xa90 [ 101.590486][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.596115][ T7424] path_lookupat.isra.0+0x13a/0x5a0 [ 101.601309][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.606939][ T7424] filename_lookup+0x145/0x2b0 [ 101.611706][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.617334][ T7424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 101.623574][ T7424] ? strncpy_from_user+0x219/0x2b0 [ 101.628689][ T7424] user_path_at_empty+0x4c/0x70 [ 101.633536][ T7424] vfs_statx+0xd9/0x190 [ 101.637693][ T7424] __do_sys_newstat+0x51/0xb0 [ 101.642364][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.647989][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.653612][ T7424] ? __tsan_read4+0x2c/0x30 [ 101.658110][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.663736][ T7424] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 101.669364][ T7424] ? __tsan_read8+0x2c/0x30 [ 101.673865][ T7424] __x64_sys_newstat+0x3a/0x50 [ 101.678633][ T7424] do_syscall_64+0xcc/0x370 [ 101.683139][ T7424] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.689046][ T7424] RIP: 0033:0x7f6f39e30c65 [ 101.693463][ T7424] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 101.713057][ T7424] RSP: 002b:00007ffe15df5e08 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 101.721464][ T7424] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f6f39e30c65 [ 101.729432][ T7424] RDX: 00007f6f3a2fec60 RSI: 00007f6f3a2fec60 RDI: 0000000002333220 [ 101.737398][ T7424] RBP: 0000000000020062 R08: 00007f6f3a0e65a0 R09: 0000000000000000 [ 101.745362][ T7424] R10: 1999999999999999 R11: 0000000000000246 R12: 0000000002333220 [ 101.753330][ T7424] R13: 00000000023331c0 R14: 0000000000000005 R15: 0000000000000000 [ 101.762788][ T7424] Kernel Offset: disabled [ 101.767166][ T7424] Rebooting in 86400 seconds..