[ 43.611976][ T25] audit: type=1800 audit(1570202461.783:22): pid=7234 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [ 43.634711][ T25] audit: type=1800 audit(1570202461.783:23): pid=7234 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2475 res=0 [ 43.654591][ T25] audit: type=1800 audit(1570202461.783:24): pid=7234 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.33' (ECDSA) to the list of known hosts. 2019/10/04 15:21:10 fuzzer started 2019/10/04 15:21:12 dialing manager at 10.128.0.105:44881 2019/10/04 15:21:12 syscalls: 2523 2019/10/04 15:21:12 code coverage: enabled 2019/10/04 15:21:12 comparison tracing: enabled 2019/10/04 15:21:12 extra coverage: extra coverage is not supported by the kernel 2019/10/04 15:21:12 setuid sandbox: enabled 2019/10/04 15:21:12 namespace sandbox: enabled 2019/10/04 15:21:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/04 15:21:12 fault injection: enabled 2019/10/04 15:21:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/04 15:21:12 net packet injection: enabled 2019/10/04 15:21:12 net device setup: enabled 2019/10/04 15:21:12 concurrency sanitizer: enabled syzkaller login: [ 54.440366][ C0] ================================================================== [ 54.448552][ C0] BUG: KCSAN: data-race in __zone_watermark_ok / free_one_page [ 54.456069][ C0] [ 54.458401][ C0] write to 0xffff88812fffcf58 of 8 bytes by task 7384 on cpu 1: [ 54.466233][ C0] free_one_page+0x783/0x840 [ 54.470799][ C0] __free_pages_ok+0x370/0x640 [ 54.475541][ C0] free_compound_page+0x3d/0x50 [ 54.480388][ C0] __put_compound_page+0x4e/0x70 [ 54.485301][ C0] __put_page+0x54/0xd0 [ 54.489442][ C0] skb_release_data+0x1ba/0x3a0 [ 54.494267][ C0] skb_release_all+0x44/0x60 [ 54.498831][ C0] __kfree_skb+0x1f/0x30 [ 54.503067][ C0] tcp_recvmsg+0xf59/0x1a30 [ 54.507551][ C0] inet_recvmsg+0xbb/0x250 [ 54.511946][ C0] sock_recvmsg+0x92/0xb0 [ 54.516254][ C0] sock_read_iter+0x15f/0x1e0 [ 54.520926][ C0] new_sync_read+0x389/0x4f0 [ 54.525524][ C0] __vfs_read+0xb1/0xc0 [ 54.529650][ C0] [ 54.531957][ C0] read to 0xffff88812fffcf58 of 8 bytes by interrupt on cpu 0: [ 54.539479][ C0] __zone_watermark_ok+0x106/0x240 [ 54.544586][ C0] get_page_from_freelist+0x629/0x2300 [ 54.550037][ C0] __alloc_pages_nodemask+0x255/0x4d0 [ 54.555392][ C0] alloc_pages_current+0xd1/0x170 [ 54.560394][ C0] skb_page_frag_refill+0x16f/0x260 [ 54.565584][ C0] try_fill_recv+0x51f/0xdc0 [ 54.570154][ C0] virtnet_poll+0x64c/0x7d0 [ 54.574634][ C0] net_rx_action+0x3ae/0xa50 [ 54.579201][ C0] __do_softirq+0x115/0x33f [ 54.583681][ C0] run_ksoftirqd+0x46/0x60 [ 54.588073][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 54.592999][ C0] kthread+0x1d4/0x200 [ 54.597047][ C0] ret_from_fork+0x1f/0x30 [ 54.601532][ C0] [ 54.603835][ C0] Reported by Kernel Concurrency Sanitizer on: [ 54.609979][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.3.0+ #0 [ 54.616894][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.626930][ C0] ================================================================== [ 54.634970][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 54.641545][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.3.0+ #0 [ 54.648460][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.658488][ C0] Call Trace: [ 54.661789][ C0] dump_stack+0xf5/0x159 [ 54.666023][ C0] panic+0x209/0x639 [ 54.669896][ C0] ? vprintk_func+0x8d/0x140 [ 54.674484][ C0] kcsan_report.cold+0x57/0xeb [ 54.679226][ C0] __kcsan_setup_watchpoint+0x342/0x500 [ 54.684749][ C0] __tsan_read8+0x2c/0x30 [ 54.689075][ C0] __zone_watermark_ok+0x106/0x240 [ 54.694187][ C0] get_page_from_freelist+0x629/0x2300 [ 54.699625][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.705856][ C0] ? __tsan_read8+0x2c/0x30 [ 54.710338][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 54.716560][ C0] __alloc_pages_nodemask+0x255/0x4d0 [ 54.721915][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 54.728134][ C0] alloc_pages_current+0xd1/0x170 [ 54.733141][ C0] skb_page_frag_refill+0x16f/0x260 [ 54.738319][ C0] try_fill_recv+0x51f/0xdc0 [ 54.742891][ C0] virtnet_poll+0x64c/0x7d0 [ 54.747376][ C0] net_rx_action+0x3ae/0xa50 [ 54.751951][ C0] __do_softirq+0x115/0x33f [ 54.756438][ C0] ? takeover_tasklets+0x250/0x250 [ 54.761536][ C0] run_ksoftirqd+0x46/0x60 [ 54.765930][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 54.770935][ C0] kthread+0x1d4/0x200 [ 54.774983][ C0] ? constant_test_bit.constprop.0+0x30/0x30 [ 54.780936][ C0] ? kthread_bind+0x50/0x50 [ 54.785420][ C0] ret_from_fork+0x1f/0x30 [ 54.791213][ C0] Kernel Offset: disabled [ 54.795542][ C0] Rebooting in 86400 seconds..