[ 36.428554][ T25] audit: type=1800 audit(1571781978.881:21): pid=7208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 36.470993][ T25] audit: type=1800 audit(1571781978.881:22): pid=7208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [ 36.494316][ T25] audit: type=1800 audit(1571781978.881:23): pid=7208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2475 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.4' (ECDSA) to the list of known hosts. 2019/10/22 22:06:27 fuzzer started 2019/10/22 22:06:29 dialing manager at 10.128.0.105:33369 2019/10/22 22:06:29 syscalls: 2524 2019/10/22 22:06:29 code coverage: enabled 2019/10/22 22:06:29 comparison tracing: enabled 2019/10/22 22:06:29 extra coverage: extra coverage is not supported by the kernel 2019/10/22 22:06:29 setuid sandbox: enabled 2019/10/22 22:06:29 namespace sandbox: enabled 2019/10/22 22:06:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/22 22:06:29 fault injection: enabled 2019/10/22 22:06:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/22 22:06:29 net packet injection: enabled 2019/10/22 22:06:29 net device setup: enabled 2019/10/22 22:06:29 concurrency sanitizer: enabled syzkaller login: [ 47.238551][ C1] ================================================================== [ 47.246837][ C1] BUG: KCSAN: data-race in __nf_conntrack_find_get / __nf_ct_refresh_acct [ 47.255307][ C1] [ 47.257624][ C1] write to 0xffff8881225c5808 of 4 bytes by task 7365 on cpu 0: [ 47.265243][ C1] __nf_ct_refresh_acct+0xfb/0x1b0 [ 47.270338][ C1] nf_conntrack_tcp_packet+0xd40/0x3390 [ 47.275868][ C1] nf_conntrack_in+0x410/0xa80 [ 47.280607][ C1] ipv4_conntrack_local+0xbe/0x130 [ 47.285694][ C1] nf_hook_slow+0x83/0x160 [ 47.290103][ C1] __ip_local_out+0x1f7/0x2b0 [ 47.294758][ C1] ip_local_out+0x31/0x90 [ 47.299064][ C1] __ip_queue_xmit+0x3a8/0xa40 [ 47.303819][ C1] ip_queue_xmit+0x45/0x60 [ 47.308220][ C1] __tcp_transmit_skb+0xe81/0x1d60 [ 47.313305][ C1] __tcp_send_ack+0x246/0x300 [ 47.318084][ C1] tcp_send_ack+0x34/0x40 [ 47.322397][ C1] tcp_cleanup_rbuf+0x130/0x360 [ 47.327234][ C1] tcp_recvmsg+0x633/0x1a30 [ 47.331734][ C1] [ 47.334091][ C1] read to 0xffff8881225c5808 of 4 bytes by interrupt on cpu 1: [ 47.341638][ C1] __nf_conntrack_find_get+0x284/0x880 [ 47.347091][ C1] nf_conntrack_in+0x2ef/0xa80 [ 47.351833][ C1] ipv4_conntrack_in+0x27/0x40 [ 47.356571][ C1] nf_hook_slow+0x83/0x160 [ 47.360962][ C1] ip_rcv+0x12f/0x1a0 [ 47.364921][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 47.370612][ C1] __netif_receive_skb+0x37/0xf0 [ 47.375521][ C1] netif_receive_skb_internal+0x59/0x190 [ 47.381143][ C1] napi_gro_receive+0x28f/0x330 [ 47.386083][ C1] receive_buf+0x284/0x30b0 [ 47.390563][ C1] virtnet_poll+0x436/0x7d0 [ 47.395051][ C1] net_rx_action+0x3ae/0xa90 [ 47.399621][ C1] __do_softirq+0x115/0x33f [ 47.404094][ C1] [ 47.406394][ C1] Reported by Kernel Concurrency Sanitizer on: [ 47.412522][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0 [ 47.419860][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.429894][ C1] ================================================================== [ 47.437935][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 47.444500][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0 [ 47.451847][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.461873][ C1] Call Trace: [ 47.465152][ C1] dump_stack+0xf5/0x159 [ 47.469556][ C1] panic+0x210/0x640 [ 47.473432][ C1] ? napi_gro_receive+0x28f/0x330 [ 47.478438][ C1] ? vprintk_func+0x8d/0x140 [ 47.483034][ C1] kcsan_report.cold+0xc/0x10 [ 47.487690][ C1] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 47.493655][ C1] __tsan_read4+0x2c/0x30 [ 47.497967][ C1] __nf_conntrack_find_get+0x284/0x880 [ 47.504444][ C1] ? __tsan_write2+0x32/0x40 [ 47.509018][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 47.514635][ C1] nf_conntrack_in+0x2ef/0xa80 [ 47.519383][ C1] ipv4_conntrack_in+0x27/0x40 [ 47.524125][ C1] nf_hook_slow+0x83/0x160 [ 47.528516][ C1] ? nf_ct_bridge_unregister+0x70/0x70 [ 47.533962][ C1] ip_rcv+0x12f/0x1a0 [ 47.537930][ C1] ? ip_sublist_rcv+0x5e0/0x5e0 [ 47.543365][ C1] ? ip_local_deliver+0x210/0x210 [ 47.548376][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 47.554085][ C1] __netif_receive_skb+0x37/0xf0 [ 47.559015][ C1] netif_receive_skb_internal+0x59/0x190 [ 47.564635][ C1] napi_gro_receive+0x28f/0x330 [ 47.569472][ C1] receive_buf+0x284/0x30b0 [ 47.573964][ C1] ? __tsan_write8+0x32/0x40 [ 47.578537][ C1] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 47.583971][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 47.589606][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 47.595213][ C1] virtnet_poll+0x436/0x7d0 [ 47.599701][ C1] net_rx_action+0x3ae/0xa90 [ 47.604279][ C1] __do_softirq+0x115/0x33f [ 47.608764][ C1] ? takeover_tasklets+0x250/0x250 [ 47.613851][ C1] run_ksoftirqd+0x46/0x60 [ 47.618273][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 47.623187][ C1] kthread+0x1d4/0x200 [ 47.627231][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 47.633185][ C1] ? kthread_stop+0x2d0/0x2d0 [ 47.638193][ C1] ret_from_fork+0x1f/0x30 [ 47.644183][ C1] Kernel Offset: disabled [ 47.648501][ C1] Rebooting in 86400 seconds..