Warning: Permanently added '10.128.1.48' (ECDSA) to the list of known hosts. 2019/10/10 23:02:19 fuzzer started 2019/10/10 23:02:20 dialing manager at 10.128.0.105:37331 2019/10/10 23:02:20 syscalls: 2523 2019/10/10 23:02:20 code coverage: enabled 2019/10/10 23:02:20 comparison tracing: enabled 2019/10/10 23:02:20 extra coverage: extra coverage is not supported by the kernel 2019/10/10 23:02:20 setuid sandbox: enabled 2019/10/10 23:02:20 namespace sandbox: enabled 2019/10/10 23:02:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 23:02:20 fault injection: enabled 2019/10/10 23:02:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 23:02:20 net packet injection: enabled 2019/10/10 23:02:20 net device setup: enabled 2019/10/10 23:02:20 concurrency sanitizer: enabled 23:02:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x80a422, &(0x7f00000001c0)={[{@dax='\\ax'}], [], 0x700}) syzkaller login: [ 57.715589][ T7180] IPVS: ftp: loaded support on port[0] = 21 23:02:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0xfffffdb0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000440)={"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"}) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 57.809813][ T7180] chnl_net:caif_netlink_parms(): no params data found [ 57.881206][ T7180] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.917190][ T7180] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.925898][ T7180] device bridge_slave_0 entered promiscuous mode [ 57.957527][ T7180] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.964840][ T7180] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.973233][ T7180] device bridge_slave_1 entered promiscuous mode [ 58.021884][ T7180] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.048858][ T7180] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.088842][ T7180] team0: Port device team_slave_0 added [ 58.096164][ T7180] team0: Port device team_slave_1 added 23:02:24 executing program 2: socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 58.179459][ T7180] device hsr_slave_0 entered promiscuous mode [ 58.226626][ T7180] device hsr_slave_1 entered promiscuous mode [ 58.274532][ T7183] IPVS: ftp: loaded support on port[0] = 21 [ 58.274546][ T7180] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.274575][ T7180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.295400][ T7180] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.302959][ T7180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.435876][ T7186] IPVS: ftp: loaded support on port[0] = 21 [ 58.450159][ T7180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.473667][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.493932][ T3022] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.513563][ T3022] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.523894][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 58.571116][ T7180] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.610722][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 23:02:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa4c462, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x5) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x9, 0x0, 0x9c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) sendmmsg(r6, &(0x7f0000000c40)=[{{&(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x2, 0x1, {0xa, 0x4e24, 0x5000, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000480)="cb9f6955cdc18cf47023483ee8a073b17ac0ba8b631d24cec8cd5070f528d15774e3a472002a4cbc3d6b14a6f5be8f23c149edeec361c183990d15eaf3e5d47f8960d83540ba952b752fc81ca5e919c9ebd7590857dcc714c9d194f6322ed1c7b0213fad051f653c14efe09bc693cf601fe2a434bd66be7a23f1dfc30fd455b48be2f6c01eda202882b301a214b46a7f1e512197d8c12c176ac54f8f4d6ce57e45bd67cbee17e606e84bc6fcfbf481b6363e3943eca5f4a8f129092e1839e1b572128f519772c215e6acf79b5bff62c6a3ae32596e3a93a9fb1ab2baf29ed5e1d18248f92112094c5a4caf449d9880788ee8fe", 0xf3}, {&(0x7f0000000580)="a18b0c6767dea549ee3cdfb0a845995b952a9401", 0x14}, {&(0x7f00000005c0)="c9a74137b061e4a537db21c7565e1ada8ff1f1bf3fd7d2b9db3c9b4b3609a3f1d21d88f468ea1a3d7d28a8c3d69b12caa5066bff1314ff9c37f72d087af5db38b1fb9fdc7258eee2b919e357785e6c04f44501f90e467330e0dfbcf38e1dd63f4d9776a8cc297d25b6fce4117837f8075b9cdd961f6c75cd94db4b4476b53becca0d9a6336de8304abd3ae57cb88b5139465f8314e47292de1a3113779c21797b848d88c148a4c8677a30ea9875a0f801c3da3ff337ed04d3600cd306bddbfe2564f9a02509f8ad1ac90b2a55c3ef40454", 0xd1}, {&(0x7f00000006c0)="90ce206d5ab7c64567ce13adddab121ea6d68643888a758d72d5955c882c032ed148ee8d80964e7175d0017bacc703ed60248e902fddf08be10caa4d69bd67d7", 0x40}, {&(0x7f0000000700)="c26cfaffc2e6339677e6cb4193586e78f45f0a5855ad91fdb030ac7c54d5032b516ffa04a4fa137a828597d5552c2290cf952b6a5fd480774ba4a4c63f45c826b06fad8906a0b7460c77a5c0c2b49aa99154afa78a44fe13ff10a50b5a4d3f29a77173394f251f2cb6967e5d26840e2fd68f1874595a60a920c14997fb3b6b1f3e99d649de20e82e9e2d5d51cf8a569f05f5f56de2cc6ff4456980f9faccc18f6cecb3b7fe892221a24f7c5d85a4683c370cb124be102fec94370bdb7cf910bd65f2d41265a6ff53a96ed45cb36127a6e19972228b95f61c80925cf1d08671c49e298f72c1536fd189de3f634167153494822987", 0xf4}, {&(0x7f0000000800)="e83b5d6239157cb2bb015345c39c827c67a9b03061160a42e42f5515f61974a126354cc89cc4db52908afeab65a404f12f9631a93a655220b340f2fa066c0bd8b8c470c27786fe71bceb65c0bf6ba4f75140f3e5dc77a1296e5e8b9074e065bb91d5fe6964ff99875385cdeffade93e7f0e51d989a7445687da6d019370feb38e9d1bd027e703b83aa67cdbc20ee4e36985b1b61250953294ed8577d2ec13c8ded22e4", 0xa3}], 0x6, &(0x7f0000000940)=[{0xf0, 0x26c533e5333b4f18, 0x200, "29c52349e64669d1c4303581297c3f2c137df11936d11257f59a744b1cb7a2d26e125a7d156938a02cdeee5b12e70f6705aafb8a548885aaa99b4dac8ed4c96be8055bd2f83c413838f91c63efedc7823e97c038636b95505af3543a853f8bf7658ab50784689106ea20db7781bce81170f1e42aaf3fe71c5b5de7884e03e05fe7429a619519157438d87a994eb7c234d70cad41ae34d7406c7b3c0d53658b74afd8aa8d02ecc9564ca1774f44bbfe5abdc4ed95ecda598a525b14fb3278a140fcbc6e127cb2902645a7709198209199ec6f7771b9eca1d5bd312366ba6f6992"}, {0x108, 0x88, 0x2, "6ec5813d00e2a06bd27ad9be85e184cf78829964c7a4f10cfabf8fdb2e8c3c2dfa12a1bfe6e83a76044cf157baa221ea4f6238c0fa9c53988b21f0c5e986b050fb1e6cdd0039cdaa7e7abcae40827e4cc71cfa4045603790019a90497ef28c760b41f2f855c265b4c7ea3ee4eff937c21b3e063e692408e2fffc6f6f1cb90e6a2241cebd4a67735f9b726c763da46c901f2f21f09044c4d1188a0b48b109a7f0540308e15fd22f6db45f00bfa987358c474b232cf626763e22e2d6315e5eb8e61e2548b0c7c58a2c8a668e55318df3ce1edff9f4eb5f70c706d1c542f04fa4c7fc3b317f403d04d70efe9c7b5ef5cb49989f27c9c9"}], 0x1f8}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000b40)="ace7a742c909db2a2b31e118561b50b7b90053a4c1edc0067522dc5a429441d8654efac2e98a0a5898ce2ca38a934e455dcb296bcf14eaf8bf58815c80de82f3c171f1b20c223933f5c2780d8f1c3689be820a74fe869379883e264321d3cc53142c6e43badab43fde6f9cc04d8e881a75fb67ee8c18ba83ced87e8888fead31a8b6b42a6c4445ba456b7da2f9fc36cd81c7125483b63ef87090b879cedcb0dba51769825aec3216315796efc05c6d1391", 0xb1}], 0x1}}], 0x2, 0x10) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000200100005fffffffffffffff90000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="1d00000000340000"], 0x48}}, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r8, 0x7006) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b89aab49ad30a704aa4f574f493a554bd08b3abf111160c5ee6746a0e9a03b182760e556f17156f9573e220fca116b02eea61fbb4a67b003702e307c1651bbcb8c09d5de2a33ac580443bdc788b1f00f9a3155816be58d23eb1733453372067f9ab361101b5271e4c24642ba2bf25dd22514b92ed55e28140c751b8d4d2a22b00"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@gettfilter={0x24, 0x2a, 0xffffff1f, 0x0, 0x0, {0x0, r7}}, 0x24}}, 0x0) recvfrom(r1, &(0x7f0000000100)=""/15, 0xf, 0x2b7182eb7cc3c03a, &(0x7f0000000140)=@xdp={0x2c, 0x3, r7, 0xb}, 0x80) [ 58.620306][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.627447][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.671799][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.687093][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.694344][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.702454][ T7168] ================================================================== [ 58.710581][ T7168] BUG: KCSAN: data-race in ext4_es_lookup_extent / ext4_es_lookup_extent [ 58.718973][ T7168] [ 58.721300][ T7168] read to 0xffff888218530c28 of 8 bytes by task 7048 on cpu 0: [ 58.728843][ T7168] ext4_es_lookup_extent+0x3ba/0x510 [ 58.734118][ T7168] ext4_da_get_block_prep+0x159/0xa60 [ 58.739483][ T7168] ext4_block_write_begin+0x33e/0xb90 [ 58.744848][ T7168] ext4_da_write_begin+0x1da/0x7e0 [ 58.749949][ T7168] generic_perform_write+0x136/0x320 [ 58.755222][ T7168] __generic_file_write_iter+0x251/0x380 [ 58.760849][ T7168] ext4_file_write_iter+0x1fc/0xa40 [ 58.766045][ T7168] new_sync_write+0x388/0x4a0 [ 58.770744][ T7168] __vfs_write+0xb1/0xc0 [ 58.774979][ T7168] vfs_write+0x18a/0x390 [ 58.779220][ T7168] ksys_write+0xd5/0x1b0 [ 58.783454][ T7168] __x64_sys_write+0x4c/0x60 [ 58.788045][ T7168] do_syscall_64+0xcf/0x2f0 [ 58.792549][ T7168] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 58.798425][ T7168] [ 58.800751][ T7168] write to 0xffff888218530c28 of 8 bytes by task 7168 on cpu 1: [ 58.808380][ T7168] ext4_es_lookup_extent+0x3d3/0x510 [ 58.813696][ T7168] ext4_map_blocks+0xc2/0xf70 [ 58.818383][ T7168] ext4_mpage_readpages+0x92b/0x1270 [ 58.823670][ T7168] ext4_readpages+0x92/0xc0 [ 58.828151][ T7168] read_pages+0xa2/0x2d0 [ 58.832370][ T7168] __do_page_cache_readahead+0x353/0x390 [ 58.837986][ T7168] ondemand_readahead+0x35d/0x710 [ 58.842984][ T7168] page_cache_async_readahead+0x22c/0x250 [ 58.848685][ T7168] generic_file_read_iter+0xffc/0x1440 [ 58.854121][ T7168] ext4_file_read_iter+0xfa/0x240 [ 58.859119][ T7168] new_sync_read+0x389/0x4f0 [ 58.863689][ T7168] __vfs_read+0xb1/0xc0 [ 58.867820][ T7168] integrity_kernel_read+0xa1/0xe0 [ 58.872896][ T7168] [ 58.875252][ T7168] Reported by Kernel Concurrency Sanitizer on: [ 58.881382][ T7168] CPU: 1 PID: 7168 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 58.888467][ T7168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.898495][ T7168] ================================================================== [ 58.906529][ T7168] Kernel panic - not syncing: panic_on_warn set ... [ 58.913091][ T7168] CPU: 1 PID: 7168 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 58.920169][ T7168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.930250][ T7168] Call Trace: [ 58.933688][ T7168] dump_stack+0xf5/0x159 [ 58.937922][ T7168] panic+0x209/0x639 [ 58.941803][ T7168] ? generic_file_read_iter+0xffc/0x1440 [ 58.947475][ T7168] ? vprintk_func+0x8d/0x140 [ 58.952132][ T7168] kcsan_report.cold+0xc/0x1b [ 58.956787][ T7168] __kcsan_setup_watchpoint+0x3ee/0x510 [ 58.962345][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 58.967967][ T7168] __tsan_write8+0x32/0x40 [ 58.972361][ T7168] ext4_es_lookup_extent+0x3d3/0x510 [ 58.977639][ T7168] ext4_map_blocks+0xc2/0xf70 [ 58.982297][ T7168] ext4_mpage_readpages+0x92b/0x1270 [ 58.987566][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 58.993173][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 58.998799][ T7168] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 59.004686][ T7168] ? ext4_invalidatepage+0x1e0/0x1e0 [ 59.009965][ T7168] ext4_readpages+0x92/0xc0 [ 59.014456][ T7168] ? ext4_invalidatepage+0x1e0/0x1e0 [ 59.019719][ T7168] read_pages+0xa2/0x2d0 [ 59.023944][ T7168] __do_page_cache_readahead+0x353/0x390 [ 59.029575][ T7168] ondemand_readahead+0x35d/0x710 [ 59.034585][ T7168] page_cache_async_readahead+0x22c/0x250 [ 59.040286][ T7168] generic_file_read_iter+0xffc/0x1440 [ 59.045730][ T7168] ext4_file_read_iter+0xfa/0x240 [ 59.050735][ T7168] new_sync_read+0x389/0x4f0 [ 59.055307][ T7168] __vfs_read+0xb1/0xc0 [ 59.059448][ T7168] integrity_kernel_read+0xa1/0xe0 [ 59.064540][ T7168] ima_calc_file_hash_tfm+0x1b5/0x260 [ 59.069893][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.075615][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.081287][ T7168] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 59.087217][ T7168] ? widen_string+0x4a/0x1a0 [ 59.091824][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.097441][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.103051][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.108806][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.114420][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.120079][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.125794][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.131412][ T7168] ? __tsan_read4+0x2c/0x30 [ 59.135900][ T7168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.142119][ T7168] ? refcount_sub_and_test_checked+0xc8/0x190 [ 59.148162][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.153769][ T7168] ? __tsan_read4+0x2c/0x30 [ 59.158254][ T7168] ima_calc_file_hash+0x158/0xf10 [ 59.163262][ T7168] ? __tsan_write8+0x32/0x40 [ 59.167846][ T7168] ? ext4_xattr_get+0x10b/0x5c0 [ 59.172695][ T7168] ? __rcu_read_unlock+0x62/0xe0 [ 59.177610][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.183222][ T7168] ima_collect_measurement+0x384/0x3b0 [ 59.188663][ T7168] process_measurement+0x980/0xff0 [ 59.193759][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.199377][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.204997][ T7168] ? __tsan_read4+0x2c/0x30 [ 59.209480][ T7168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.215709][ T7168] ? refcount_sub_and_test_checked+0xc8/0x190 [ 59.221762][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.227372][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.232984][ T7168] ima_file_check+0x7e/0xb0 [ 59.237468][ T7168] path_openat+0xfb1/0x3530 [ 59.241958][ T7168] ? __tsan_write4+0x32/0x40 [ 59.246527][ T7168] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.252155][ T7168] do_filp_open+0x11e/0x1b0 [ 59.256641][ T7168] ? _raw_spin_unlock+0x4b/0x60 [ 59.261480][ T7168] ? __alloc_fd+0x316/0x4c0 [ 59.265974][ T7168] ? get_unused_fd_flags+0x93/0xc0 [ 59.271066][ T7168] do_sys_open+0x3b3/0x4f0 [ 59.275464][ T7168] __x64_sys_openat+0x62/0x80 [ 59.280121][ T7168] do_syscall_64+0xcf/0x2f0 [ 59.284615][ T7168] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.290504][ T7168] RIP: 0033:0x47c5aa [ 59.294388][ T7168] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 59.313986][ T7168] RSP: 002b:000000c4203db850 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 59.322379][ T7168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 59.330334][ T7168] RDX: 0000000000080002 RSI: 000000c420023760 RDI: ffffffffffffff9c [ 59.338295][ T7168] RBP: 000000c4203db8d0 R08: 0000000000000000 R09: 0000000000000000 [ 59.346246][ T7168] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 59.354192][ T7168] R13: 00000000000000bc R14: 00000000000000bb R15: 0000000000000100 [ 59.363523][ T7168] Kernel Offset: disabled [ 59.367845][ T7168] Rebooting in 86400 seconds..