[ 52.007498][ T26] audit: type=1800 audit(1572912443.310:26): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 52.057939][ T26] audit: type=1800 audit(1572912443.320:27): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 52.078700][ T26] audit: type=1800 audit(1572912443.320:28): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.893430][ T26] audit: type=1800 audit(1572912444.230:29): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.31' (ECDSA) to the list of known hosts. 2019/11/05 00:07:34 fuzzer started 2019/11/05 00:07:36 dialing manager at 10.128.0.105:37793 2019/11/05 00:07:36 syscalls: 2553 2019/11/05 00:07:36 code coverage: enabled 2019/11/05 00:07:36 comparison tracing: enabled 2019/11/05 00:07:36 extra coverage: extra coverage is not supported by the kernel 2019/11/05 00:07:36 setuid sandbox: enabled 2019/11/05 00:07:36 namespace sandbox: enabled 2019/11/05 00:07:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 00:07:36 fault injection: enabled 2019/11/05 00:07:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 00:07:36 net packet injection: enabled 2019/11/05 00:07:36 net device setup: enabled 2019/11/05 00:07:36 concurrency sanitizer: enabled 2019/11/05 00:07:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/05 00:07:36 adding functions to KCSAN blacklist: 'pid_update_inode' '__hrtimer_run_queues' 'tcp_add_backlog' 'run_timer_softirq' 'tomoyo_supervisor' 00:07:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 00:07:39 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x0, 0x2}, 0x0) sigaltstack(&(0x7f0000000000/0x3000)=nil, 0x0) syzkaller login: [ 67.810981][ T8057] IPVS: ftp: loaded support on port[0] = 21 [ 67.892625][ T8059] IPVS: ftp: loaded support on port[0] = 21 [ 67.923070][ T8057] chnl_net:caif_netlink_parms(): no params data found [ 67.983620][ T8057] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.991517][ T8057] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.999501][ T8057] device bridge_slave_0 entered promiscuous mode [ 68.014134][ T8057] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.021625][ T8057] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.029690][ T8057] device bridge_slave_1 entered promiscuous mode 00:07:39 executing program 2: r0 = memfd_create(&(0x7f0000000180)='\xe0|\x1e\x13L\xe1\xe7\\X\x0fBQ\xcf\xfe\xe9n\"\xddm\xba\xce\x88\xdd?wR\x81\xb1f\xcaq\xf4]\xa7\x1dx5\x8fM\xca\x8b\xf3\'\xf4P\x0eO\xb9\x17\x80\xaa\xaa=\x16\xae\xaa\x0f\x92)\x18\xf1\xd6\x02#\xac\xbc\xd9\xea\x14\x92\xf5gD\xd8\xdb9N\xcc\xc1`0\xac\xac\xb7\xfc,7\xa9&K\xe6V\xd9\x9c\xa5\x88\xd7\x8f\xb5', 0x0) write(r0, &(0x7f0000000100)='i', 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000600)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) [ 68.076910][ T8057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.097960][ T8057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.111985][ T8059] chnl_net:caif_netlink_parms(): no params data found [ 68.148157][ T8057] team0: Port device team_slave_0 added [ 68.165452][ T8057] team0: Port device team_slave_1 added [ 68.237003][ T8059] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.244082][ T8059] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.265801][ T8059] device bridge_slave_0 entered promiscuous mode 00:07:39 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng, 0x2, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) [ 68.327242][ T8057] device hsr_slave_0 entered promiscuous mode [ 68.376647][ T8057] device hsr_slave_1 entered promiscuous mode [ 68.416550][ T8059] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.423768][ T8059] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.445635][ T8059] device bridge_slave_1 entered promiscuous mode [ 68.479192][ T8063] IPVS: ftp: loaded support on port[0] = 21 [ 68.499156][ T8059] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.528478][ T8059] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.608912][ T8065] IPVS: ftp: loaded support on port[0] = 21 [ 68.700974][ T8057] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.708142][ T8057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.715466][ T8057] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.722592][ T8057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.806495][ T8059] team0: Port device team_slave_0 added 00:07:40 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) read$usbfs(r0, 0x0, 0x0) [ 68.867223][ T8059] team0: Port device team_slave_1 added [ 69.008475][ T8059] device hsr_slave_0 entered promiscuous mode [ 69.065052][ T8059] device hsr_slave_1 entered promiscuous mode [ 69.104803][ T8059] debugfs: Directory 'hsr0' with parent '/' already present! [ 69.146745][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.166402][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.304413][ T8063] chnl_net:caif_netlink_parms(): no params data found [ 69.369888][ T8057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.413150][ T8092] IPVS: ftp: loaded support on port[0] = 21 [ 69.539791][ T8057] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.609003][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.635397][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.747967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.775361][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.825079][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.832219][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.917447][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.975363][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.015337][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.022413][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.095413][ T8065] chnl_net:caif_netlink_parms(): no params data found [ 70.145427][ T8063] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.152496][ T8063] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.215637][ T8063] device bridge_slave_0 entered promiscuous mode 00:07:41 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) r1 = socket$inet6(0xa, 0x80001, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f00000025c0)={0x90, 0xf2ffffff}, 0x90) [ 70.267648][ T8063] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.299036][ T8063] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.355085][ T8063] device bridge_slave_1 entered promiscuous mode [ 70.498006][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.585289][ T8059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.592472][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.605697][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.614540][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.736399][ T8063] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.757713][ T8065] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.765559][ T8065] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.785682][ T8065] device bridge_slave_0 entered promiscuous mode [ 70.842635][ T8059] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.865701][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.885747][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.945351][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.985590][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.012646][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.065506][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.092881][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.118705][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.145690][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.188919][ T8057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.198311][ T8063] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.211384][ T8065] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.227699][ T8065] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.248333][ T8065] device bridge_slave_1 entered promiscuous mode [ 71.283606][ T8119] IPVS: ftp: loaded support on port[0] = 21 [ 71.290254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.315358][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.347602][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.354769][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.387969][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.427470][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.448401][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.455510][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.487976][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.515873][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.610406][ T8057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.624151][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.637731][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.655517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.671777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.679395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.687610][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.704855][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.713869][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.723089][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.731810][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.740165][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.748488][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.758346][ T8065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.773583][ T8065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.784037][ T8063] team0: Port device team_slave_0 added [ 71.790999][ T8063] team0: Port device team_slave_1 added [ 71.802272][ T8059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.857221][ T8092] chnl_net:caif_netlink_parms(): no params data found [ 71.881058][ T8065] team0: Port device team_slave_0 added [ 71.927339][ T8063] device hsr_slave_0 entered promiscuous mode [ 71.975108][ T8063] device hsr_slave_1 entered promiscuous mode [ 72.024888][ T8063] debugfs: Directory 'hsr0' with parent '/' already present! [ 72.064295][ T8065] team0: Port device team_slave_1 added 00:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 00:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) [ 72.133707][ T8059] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.165556][ T8092] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.172627][ T8092] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.193501][ T8092] device bridge_slave_0 entered promiscuous mode [ 72.207472][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.236529][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 00:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) [ 72.294258][ T8092] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.305561][ T8092] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.345050][ T8092] device bridge_slave_1 entered promiscuous mode [ 72.417245][ T8065] device hsr_slave_0 entered promiscuous mode [ 72.448924][ T8065] device hsr_slave_1 entered promiscuous mode [ 72.515119][ T8065] debugfs: Directory 'hsr0' with parent '/' already present! 00:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) [ 72.700686][ T8092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.762211][ T8119] chnl_net:caif_netlink_parms(): no params data found [ 72.815369][ T8092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.919987][ T8063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.940990][ T8068] ================================================================== [ 72.949180][ T8068] BUG: KCSAN: data-race in generic_permission / kernfs_refresh_inode [ 72.957247][ T8068] [ 72.959608][ T8068] write to 0xffff888125936b68 of 2 bytes by task 8025 on cpu 1: [ 72.967262][ T8068] kernfs_refresh_inode+0x42/0x140 [ 72.972382][ T8068] kernfs_iop_permission+0x66/0xa0 [ 72.977517][ T8068] inode_permission+0x241/0x3c0 [ 72.982465][ T8068] link_path_walk.part.0+0x622/0xa90 [ 72.987761][ T8068] path_lookupat.isra.0+0x77/0x5a0 [ 72.992878][ T8068] filename_lookup+0x145/0x2b0 [ 72.997665][ T8068] user_path_at_empty+0x4c/0x70 [ 73.002640][ T8068] vfs_statx+0xd9/0x190 [ 73.006826][ T8068] __do_sys_newstat+0x51/0xb0 [ 73.011525][ T8068] __x64_sys_newstat+0x3a/0x50 [ 73.016314][ T8068] do_syscall_64+0xcc/0x370 [ 73.020838][ T8068] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.026724][ T8068] [ 73.029063][ T8068] read to 0xffff888125936b68 of 2 bytes by task 8068 on cpu 0: [ 73.036615][ T8068] generic_permission+0x36/0x3d0 [ 73.041567][ T8068] kernfs_iop_permission+0x7d/0xa0 [ 73.046731][ T8068] inode_permission+0x241/0x3c0 [ 73.051611][ T8068] link_path_walk.part.0+0x622/0xa90 [ 73.056921][ T8068] path_lookupat.isra.0+0x77/0x5a0 [ 73.062045][ T8068] filename_lookup+0x145/0x2b0 [ 73.066822][ T8068] user_path_at_empty+0x4c/0x70 [ 73.071691][ T8068] do_readlinkat+0x84/0x220 [ 73.076208][ T8068] __x64_sys_readlink+0x51/0x70 [ 73.080083][ T8063] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.081113][ T8068] do_syscall_64+0xcc/0x370 [ 73.092203][ T8068] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.098116][ T8068] [ 73.100445][ T8068] Reported by Kernel Concurrency Sanitizer on: [ 73.106614][ T8068] CPU: 0 PID: 8068 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 73.113644][ T8068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.123705][ T8068] ================================================================== [ 73.131776][ T8068] Kernel panic - not syncing: panic_on_warn set ... [ 73.138391][ T8068] CPU: 0 PID: 8068 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 73.145415][ T8068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.156714][ T8068] Call Trace: [ 73.160034][ T8068] dump_stack+0xf5/0x159 [ 73.164303][ T8068] panic+0x210/0x640 [ 73.168226][ T8068] ? vprintk_func+0x8d/0x140 [ 73.172835][ T8068] kcsan_report.cold+0xc/0xe [ 73.177444][ T8068] kcsan_setup_watchpoint+0x3fe/0x410 [ 73.182832][ T8068] __tsan_read2+0x145/0x1f0 [ 73.187357][ T8068] generic_permission+0x36/0x3d0 [ 73.190782][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.192321][ T8068] kernfs_iop_permission+0x7d/0xa0 [ 73.204620][ T8068] ? kernfs_iop_getattr+0x90/0x90 [ 73.209669][ T8068] inode_permission+0x241/0x3c0 [ 73.215594][ T8068] link_path_walk.part.0+0x622/0xa90 [ 73.220908][ T8068] ? native_set_pte+0x47/0x70 [ 73.223898][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.225612][ T8068] path_lookupat.isra.0+0x77/0x5a0 [ 73.225644][ T8068] ? __read_once_size.constprop.0+0x12/0x20 [ 73.225672][ T8068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 73.225764][ T8068] filename_lookup+0x145/0x2b0 [ 73.254966][ T8068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 73.261222][ T8068] ? strncpy_from_user+0x219/0x2b0 [ 73.266233][ T8092] team0: Port device team_slave_0 added [ 73.266376][ T8068] ? getname_flags+0x1a4/0x380 [ 73.275849][ T8119] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.276779][ T8068] user_path_at_empty+0x4c/0x70 [ 73.276810][ T8068] do_readlinkat+0x84/0x220 [ 73.283824][ T8119] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.288690][ T8068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 73.288717][ T8068] __x64_sys_readlink+0x51/0x70 [ 73.288743][ T8068] do_syscall_64+0xcc/0x370 [ 73.288770][ T8068] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.288797][ T8068] RIP: 0033:0x7fa76e26a577 [ 73.326210][ T8068] Code: f0 ff ff 77 02 f3 c3 48 8b 15 bd 38 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 38 2b 00 31 d2 48 29 c2 64 [ 73.345915][ T8068] RSP: 002b:00007ffede6bd378 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 73.354349][ T8068] RAX: ffffffffffffffda RBX: 00000000017a5250 RCX: 00007fa76e26a577 [ 73.362331][ T8068] RDX: 0000000000000400 RSI: 00007ffede6bd380 RDI: 00007ffede6bd860 [ 73.370314][ T8068] RBP: 00000000017b26c0 R08: 7665642f7379732f R09: 74656e2f73656369 [ 73.378296][ T8068] R10: 2f336d6973766564 R11: 0000000000000246 R12: 00007ffede6bd860 [ 73.385634][ T8119] device bridge_slave_0 entered promiscuous mode [ 73.386284][ T8068] R13: 0000000000000400 R14: 00000000017a5250 R15: 000000000000000b [ 73.401966][ T8068] Kernel Offset: disabled [ 73.406562][ T8068] Rebooting in 86400 seconds..