[ 51.928670][ T26] audit: type=1800 audit(1573232201.662:26): pid=7939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 51.966555][ T26] audit: type=1800 audit(1573232201.672:27): pid=7939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.987166][ T26] audit: type=1800 audit(1573232201.672:28): pid=7939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 52.661725][ T8003] sshd (8003) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. 2019/11/08 16:56:52 fuzzer started 2019/11/08 16:56:54 dialing manager at 10.128.0.105:41185 2019/11/08 16:56:54 syscalls: 2553 2019/11/08 16:56:54 code coverage: enabled 2019/11/08 16:56:54 comparison tracing: enabled 2019/11/08 16:56:54 extra coverage: extra coverage is not supported by the kernel 2019/11/08 16:56:54 setuid sandbox: enabled 2019/11/08 16:56:54 namespace sandbox: enabled 2019/11/08 16:56:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/08 16:56:54 fault injection: enabled 2019/11/08 16:56:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/08 16:56:54 net packet injection: enabled 2019/11/08 16:56:54 net device setup: enabled 2019/11/08 16:56:54 concurrency sanitizer: enabled 2019/11/08 16:56:54 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 65.547401][ T8106] KCSAN: could not find function: 'may_open' [ 70.833941][ T8106] KCSAN: could not find function: 'calc_wb_limits' [ 73.461615][ T8106] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/08 16:57:10 adding functions to KCSAN blacklist: 'fsnotify' 'hrtimer_wakeup' 'may_open' 'taskstats_exit' 'blk_mq_sched_dispatch_requests' 'queue_access_lock' 'wbc_detach_inode' '__remove_hrtimer' 'snapshot_refaults' 'evict' 'tick_sched_do_timer' 'pipe_wait' 'blk_mq_run_hw_queue' 'generic_fillattr' '__ip6_datagram_connect' 'page_counter_try_charge' 'do_syslog' 'do_nanosleep' 'process_srcu' 'lruvec_lru_size' 'sit_tunnel_xmit' 'atime_needs_update' 'echo_char' 'mm_update_next_owner' 'kcm_rfree' 'kvm_arch_vcpu_load' 'tick_do_update_jiffies64' 'ima_file_free' 'rcu_gp_fqs_check_wake' 'padata_find_next' 'wbt_done' 'dd_has_work' '__d_lookup_done' 'calc_wb_limits' '__ext4_new_inode' 'ktime_get_seconds' 'task_dump_owner' 'do_exit' '__dev_queue_xmit' 'timer_clear_idle' 'ext4_da_write_end' 'snd_seq_check_queue' 'do_dentry_open' 'blk_mq_dispatch_rq_list' 'p9_poll_workfn' 'poll_schedule_timeout' 'mem_cgroup_select_victim_node' 'audit_log_start' 'kauditd_thread' 'd_lru_del' 'run_timer_softirq' 'find_get_pages_range_tag' 'ext4_nonda_switch' 'xas_clear_mark' 'ext4_has_free_clusters' 'enqueue_timer' 'inactive_list_is_low' 'ext4_free_inodes_count' '__hrtimer_run_queues' 'common_perm_cond' 'pid_update_inode' 'n_tty_receive_buf_common' 'blk_mq_get_request' '__perf_event_overflow' 'inet_putpeer' 'wbc_attach_and_unlock_inode' 'find_next_bit' 'pipe_poll' 'add_timer' 'tick_nohz_idle_stop_tick' 'copy_process' 'fanout_demux_rollover' '__alloc_file' 'generic_permission' 'tomoyo_supervisor' 'tcp_add_backlog' 'ep_poll' 'pcpu_alloc' 'vm_area_dup' 'rcu_gp_fqs_loop' 'shmem_file_read_iter' 'add_timer_on' 'snd_seq_prioq_cell_out' 'list_lru_count_one' 'mod_timer' '__tcp_transmit_skb' 'xas_find_marked' '__snd_rawmidi_transmit_ack' 'futex_wait_queue_me' 'shrink_node' 'virtqueue_disable_cb' '__ext4_abort' 'exit_signals' 'inode_sync_complete' 'ktime_get_real_seconds' 'generic_write_end' 'ext4_free_inode' '__inode_add_bytes' 'writeback_sb_inodes' 17:01:01 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0c16366fb1d9ff11530e2b73b7d8b650ca00097dfe5d4965c1d5be2544be60751bb476bf0925f49126b4bd2d435cee299ada54f5dae3000000bc41c76239313090d055640429eb1cfb79ccf75335de6423d3f7bf0d3861e28c29bbb408a9731d70ee06450ef16544adf41bf101ab855011644b829b939ecc848c03a8f157afb71aecd649f902887d25fb834add8acf65"], 0x0, 0x90}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:01:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000000c0)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="dd"], 0x1) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1}}], 0x400000000000170, 0x0, 0x0) [ 312.166597][ T8110] IPVS: ftp: loaded support on port[0] = 21 [ 312.271190][ T8110] chnl_net:caif_netlink_parms(): no params data found [ 312.329982][ T8110] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.337314][ T8110] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.345908][ T8110] device bridge_slave_0 entered promiscuous mode [ 312.355858][ T8110] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.377562][ T8110] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.385984][ T8110] device bridge_slave_1 entered promiscuous mode [ 312.404928][ T8114] IPVS: ftp: loaded support on port[0] = 21 [ 312.417755][ T8110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 312.442498][ T8110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 17:01:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0xd0b83ed4b0aa8341, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 312.483354][ T8110] team0: Port device team_slave_0 added [ 312.506291][ T8110] team0: Port device team_slave_1 added [ 312.661931][ T8110] device hsr_slave_0 entered promiscuous mode 17:01:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x1018007, 0x0) [ 312.739547][ T8110] device hsr_slave_1 entered promiscuous mode [ 312.808793][ T8114] chnl_net:caif_netlink_parms(): no params data found [ 312.810900][ T8118] IPVS: ftp: loaded support on port[0] = 21 [ 312.909957][ T8114] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.917073][ T8114] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.949358][ T8114] device bridge_slave_0 entered promiscuous mode [ 312.969153][ T8114] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.976231][ T8114] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.029404][ T8114] device bridge_slave_1 entered promiscuous mode [ 313.120053][ T8114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.139971][ T8114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.195112][ T8110] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.202222][ T8110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.209670][ T8110] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.216743][ T8110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.219364][ T8140] IPVS: ftp: loaded support on port[0] = 21 17:01:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/fib_trie\x00J\xaa\x88\b\n\bG\x9a!>F') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 313.326443][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.398818][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.449757][ T8114] team0: Port device team_slave_0 added [ 313.469210][ T8114] team0: Port device team_slave_1 added [ 313.620950][ T8114] device hsr_slave_0 entered promiscuous mode [ 313.668886][ T8114] device hsr_slave_1 entered promiscuous mode [ 313.708670][ T8114] debugfs: Directory 'hsr0' with parent '/' already present! [ 313.862465][ T8110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.870673][ T8147] IPVS: ftp: loaded support on port[0] = 21 [ 313.901062][ T8118] chnl_net:caif_netlink_parms(): no params data found [ 314.023818][ T8110] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.074368][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.099366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.193626][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.229455][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.281007][ T8168] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.288999][ T8168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.369186][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.420832][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.469197][ T8168] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.476298][ T8168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.549319][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 314.609760][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 314.661883][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 314.701824][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 17:01:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="ff5b7113b6012f66b000000000e00200ffffffff816f"], 0x16) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 314.788086][ T8140] chnl_net:caif_netlink_parms(): no params data found [ 314.806725][ T8118] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.828633][ T8118] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.868749][ T8118] device bridge_slave_0 entered promiscuous mode [ 314.921363][ T8110] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.941030][ T8110] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 315.021128][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.043513][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.069529][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.109653][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.129469][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.177911][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 315.220320][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.276791][ T8118] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.290908][ T8118] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.338282][ T8118] device bridge_slave_1 entered promiscuous mode [ 315.407285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.466609][ T8110] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 315.504587][ T8114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.523674][ T8176] IPVS: ftp: loaded support on port[0] = 21 [ 315.540064][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 315.547823][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 315.625004][ T8114] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.661977][ T8140] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.672820][ T8140] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.687543][ T8140] device bridge_slave_0 entered promiscuous mode [ 315.732851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.741352][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.761315][ T8118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.807032][ T8140] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.831383][ T8140] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.843771][ T8140] device bridge_slave_1 entered promiscuous mode [ 315.893155][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.919901][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.951381][ T8124] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.958504][ T8124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.999714][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.015615][ T8165] ================================================================== [ 316.023756][ T8165] BUG: KCSAN: data-race in __change_pid / __task_pid_nr_ns [ 316.030951][ T8165] [ 316.033291][ T8165] write to 0xffff8880af792540 of 8 bytes by task 8157 on cpu 1: [ 316.040931][ T8165] __change_pid+0x10d/0x1e0 [ 316.045558][ T8165] detach_pid+0x29/0x40 [ 316.049726][ T8165] release_task+0x760/0xc60 [ 316.054242][ T8165] wait_consider_task+0x190e/0x1a10 [ 316.059444][ T8165] do_wait+0x1c9/0x4c0 [ 316.063567][ T8165] kernel_wait4+0x156/0x240 [ 316.068080][ T8165] __do_sys_wait4+0xea/0x100 [ 316.072668][ T8165] __x64_sys_wait4+0x5e/0x80 [ 316.077276][ T8165] do_syscall_64+0xcc/0x370 [ 316.081783][ T8165] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.088100][ T8165] [ 316.090441][ T8165] read to 0xffff8880af792540 of 8 bytes by task 8165 on cpu 0: [ 316.097989][ T8165] __task_pid_nr_ns+0x57/0x1e0 [ 316.102767][ T8165] proc_pid_status+0x5f7/0x1000 [ 316.107629][ T8165] proc_single_show+0x89/0xe0 [ 316.112309][ T8165] seq_read+0x350/0x960 [ 316.116472][ T8165] __vfs_read+0x67/0xc0 [ 316.120638][ T8165] vfs_read+0x143/0x2c0 [ 316.124798][ T8165] ksys_read+0xd5/0x1b0 [ 316.128976][ T8165] __x64_sys_read+0x4c/0x60 [ 316.133485][ T8165] do_syscall_64+0xcc/0x370 [ 316.138014][ T8165] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.143913][ T8165] [ 316.146248][ T8165] Reported by Kernel Concurrency Sanitizer on: [ 316.152415][ T8165] CPU: 0 PID: 8165 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 316.159177][ T8165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.169235][ T8165] ================================================================== [ 316.177447][ T8165] Kernel panic - not syncing: panic_on_warn set ... [ 316.184106][ T8165] CPU: 0 PID: 8165 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 316.190903][ T8165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.201287][ T8165] Call Trace: [ 316.204703][ T8165] dump_stack+0xf5/0x159 [ 316.209004][ T8165] panic+0x210/0x640 [ 316.212893][ T8165] ? vprintk_func+0x8d/0x140 [ 316.217629][ T8165] kcsan_report.cold+0xc/0xe [ 316.222231][ T8165] kcsan_setup_watchpoint+0x3fe/0x410 [ 316.227598][ T8165] __tsan_read8+0x145/0x1f0 [ 316.232149][ T8165] __task_pid_nr_ns+0x57/0x1e0 [ 316.236906][ T8165] proc_pid_status+0x5f7/0x1000 [ 316.241750][ T8165] proc_single_show+0x89/0xe0 [ 316.246425][ T8165] seq_read+0x350/0x960 [ 316.250575][ T8165] ? security_file_permission+0x88/0x280 [ 316.256192][ T8165] __vfs_read+0x67/0xc0 [ 316.260334][ T8165] ? seq_hlist_start_head_rcu+0x60/0x60 [ 316.265877][ T8165] vfs_read+0x143/0x2c0 [ 316.270019][ T8165] ksys_read+0xd5/0x1b0 [ 316.274160][ T8165] __x64_sys_read+0x4c/0x60 [ 316.278652][ T8165] do_syscall_64+0xcc/0x370 [ 316.283143][ T8165] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.289031][ T8165] RIP: 0033:0x7f6a388d7310 [ 316.293437][ T8165] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 316.313038][ T8165] RSP: 002b:00007fff035b36b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 316.321459][ T8165] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f6a388d7310 [ 316.329455][ T8165] RDX: 0000000000000fff RSI: 00007f6a38da4d00 RDI: 0000000000000006 [ 316.337639][ T8165] RBP: 0000000000000fff R08: 0000000000000000 R09: 00007f6a38b9f57b [ 316.345615][ T8165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a38da4d00 [ 316.353573][ T8165] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 316.363023][ T8165] Kernel Offset: disabled [ 316.367361][ T8165] Rebooting in 86400 seconds..