[ 52.897061][ T26] audit: type=1800 audit(1573011024.000:26): pid=7961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 52.923157][ T26] audit: type=1800 audit(1573011024.000:27): pid=7961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 52.965266][ T26] audit: type=1800 audit(1573011024.010:28): pid=7961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.907541][ T26] audit: type=1800 audit(1573011025.040:29): pid=7961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.173' (ECDSA) to the list of known hosts. 2019/11/06 03:30:31 fuzzer started 2019/11/06 03:30:33 dialing manager at 10.128.0.105:39303 2019/11/06 03:30:34 syscalls: 2553 2019/11/06 03:30:34 code coverage: enabled 2019/11/06 03:30:34 comparison tracing: enabled 2019/11/06 03:30:34 extra coverage: extra coverage is not supported by the kernel 2019/11/06 03:30:34 setuid sandbox: enabled 2019/11/06 03:30:34 namespace sandbox: enabled 2019/11/06 03:30:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 03:30:34 fault injection: enabled 2019/11/06 03:30:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 03:30:34 net packet injection: enabled 2019/11/06 03:30:34 net device setup: enabled 2019/11/06 03:30:34 concurrency sanitizer: enabled 2019/11/06 03:30:34 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 64.379077][ T8131] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/06 03:30:41 adding functions to KCSAN blacklist: 'taskstats_exit' '__perf_event_overflow' 'p9_poll_workfn' 'ext4_free_inode' 'vm_area_dup' 'generic_fillattr' 'ktime_get_seconds' 'poll_schedule_timeout' 'run_timer_softirq' 'tcp_add_backlog' 'ext4_has_free_clusters' 'find_get_pages_range_tag' 'task_dump_owner' 'ep_poll' 'blk_mq_get_request' 'tick_nohz_idle_stop_tick' 'tick_do_update_jiffies64' 'wbt_issue' 'xas_clear_mark' 'pipe_poll' 'ktime_get_real_seconds' 'tomoyo_supervisor' 'mod_timer' '__ext4_new_inode' 'tick_sched_do_timer' 'blk_mq_sched_dispatch_requests' '__splice_from_pipe' 'inet_putpeer' '__hrtimer_run_queues' 'do_nanosleep' 'ext4_free_inodes_count' 'sit_tunnel_xmit' 'generic_write_end' 'tick_nohz_next_event' 'page_counter_try_charge' 'blk_mq_dispatch_rq_list' 'lruvec_lru_size' '__snd_rawmidi_transmit_ack' 'generic_permission' 'wbt_done' 'find_next_bit' 'rcu_gp_fqs_check_wake' [ 92.777126][ C1] ================================================================== [ 92.786486][ C1] BUG: KCSAN: data-race in ktime_get_with_offset / timekeeping_advance [ 92.794718][ C1] [ 92.797067][ C1] write to 0xffffffff86041b08 of 280 bytes by interrupt on cpu 0: [ 92.805521][ C1] timekeeping_advance+0x88e/0xd80 [ 92.810919][ C1] update_wall_time+0x19/0x20 [ 92.815600][ C1] tick_do_update_jiffies64+0x1a4/0x250 [ 92.821405][ C1] tick_sched_do_timer+0xd4/0xe0 [ 92.826622][ C1] tick_sched_timer+0x43/0xe0 [ 92.831294][ C1] __hrtimer_run_queues+0x274/0x5f0 [ 92.836479][ C1] hrtimer_interrupt+0x22a/0x480 [ 92.841533][ C1] smp_apic_timer_interrupt+0xdc/0x280 [ 92.847454][ C1] apic_timer_interrupt+0xf/0x20 [ 92.852496][ C1] kcsan_setup_watchpoint+0x205/0x410 [ 92.858245][ C1] __tsan_read8+0x145/0x1f0 [ 92.862959][ C1] ip_output+0x52/0x210 [ 92.867241][ C1] ip_local_out+0x74/0x90 [ 92.871783][ C1] __ip_queue_xmit+0x3a8/0xa40 [ 92.876889][ C1] ip_queue_xmit+0x45/0x60 [ 92.881450][ C1] __tcp_transmit_skb+0xe81/0x1d60 [ 92.886675][ C1] __tcp_send_ack+0x246/0x300 [ 92.891867][ C1] tcp_send_ack+0x34/0x40 [ 92.896284][ C1] tcp_cleanup_rbuf+0x130/0x360 [ 92.901330][ C1] tcp_recvmsg+0x64b/0x1b40 [ 92.906669][ C1] inet_recvmsg+0xbb/0x250 [ 92.911123][ C1] sock_recvmsg+0x92/0xb0 [ 92.915573][ C1] sock_read_iter+0x15f/0x1e0 [ 92.920367][ C1] new_sync_read+0x389/0x4f0 [ 92.925165][ C1] __vfs_read+0xb1/0xc0 [ 92.929474][ C1] vfs_read+0x143/0x2c0 [ 92.933642][ C1] ksys_read+0xd5/0x1b0 [ 92.937796][ C1] __x64_sys_read+0x4c/0x60 [ 92.942301][ C1] do_syscall_64+0xcc/0x370 [ 92.946795][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 92.952792][ C1] [ 92.955170][ C1] read to 0xffffffff86041b20 of 4 bytes by interrupt on cpu 1: [ 92.962875][ C1] ktime_get_with_offset+0x121/0x230 [ 92.968355][ C1] netif_receive_skb_internal+0x13e/0x190 [ 92.974496][ C1] napi_gro_receive+0x28f/0x330 [ 92.981520][ C1] receive_buf+0x284/0x30b0 [ 92.986166][ C1] virtnet_poll+0x436/0x7d0 [ 92.991038][ C1] net_rx_action+0x3ae/0xa90 [ 92.996087][ C1] __do_softirq+0x115/0x33f [ 93.000587][ C1] run_ksoftirqd+0x46/0x60 [ 93.004999][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 93.010935][ C1] kthread+0x1d4/0x200 [ 93.015104][ C1] ret_from_fork+0x1f/0x30 [ 93.019507][ C1] [ 93.022029][ C1] Reported by Kernel Concurrency Sanitizer on: [ 93.028405][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc6+ #0 [ 93.035959][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.047285][ C1] ================================================================== [ 93.056828][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 93.063868][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc6+ #0 [ 93.072760][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.084871][ C1] Call Trace: [ 93.088333][ C1] dump_stack+0xf5/0x159 [ 93.092697][ C1] panic+0x210/0x640 [ 93.096662][ C1] ? vprintk_func+0x8d/0x140 [ 93.101401][ C1] kcsan_report.cold+0xc/0xe [ 93.106089][ C1] kcsan_setup_watchpoint+0x3fe/0x410 [ 93.111468][ C1] __tsan_read4+0x145/0x1f0 [ 93.117634][ C1] ktime_get_with_offset+0x121/0x230 [ 93.123308][ C1] netif_receive_skb_internal+0x13e/0x190 [ 93.129179][ C1] napi_gro_receive+0x28f/0x330 [ 93.134464][ C1] receive_buf+0x284/0x30b0 [ 93.139300][ C1] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 93.145217][ C1] ? virtqueue_get_buf+0x31/0x40 [ 93.150291][ C1] virtnet_poll+0x436/0x7d0 [ 93.155214][ C1] net_rx_action+0x3ae/0xa90 [ 93.159912][ C1] __do_softirq+0x115/0x33f [ 93.164624][ C1] ? takeover_tasklets+0x250/0x250 [ 93.169744][ C1] run_ksoftirqd+0x46/0x60 [ 93.174297][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 93.179507][ C1] kthread+0x1d4/0x200 [ 93.183675][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 93.190134][ C1] ? kthread_stop+0x2d0/0x2d0 [ 93.195027][ C1] ret_from_fork+0x1f/0x30 [ 93.201456][ C1] Kernel Offset: disabled [ 93.205813][ C1] Rebooting in 86400 seconds..