[ 39.916315][ T26] audit: type=1800 audit(1570734710.066:25): pid=6990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 39.965702][ T26] audit: type=1800 audit(1570734710.066:26): pid=6990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 39.986732][ T26] audit: type=1800 audit(1570734710.066:27): pid=6990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 40.288122][ T7055] sshd (7055) used greatest stack depth: 10032 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.216' (ECDSA) to the list of known hosts. 2019/10/10 19:12:00 fuzzer started 2019/10/10 19:12:01 dialing manager at 10.128.0.105:34287 2019/10/10 19:12:01 syscalls: 2523 2019/10/10 19:12:01 code coverage: enabled 2019/10/10 19:12:01 comparison tracing: enabled 2019/10/10 19:12:01 extra coverage: extra coverage is not supported by the kernel 2019/10/10 19:12:01 setuid sandbox: enabled 2019/10/10 19:12:01 namespace sandbox: enabled 2019/10/10 19:12:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 19:12:01 fault injection: enabled 2019/10/10 19:12:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 19:12:01 net packet injection: enabled 2019/10/10 19:12:01 net device setup: enabled 2019/10/10 19:12:01 concurrency sanitizer: enabled syzkaller login: [ 51.673854][ C1] ================================================================== [ 51.681994][ C1] BUG: KCSAN: data-race in free_one_page / prep_compound_page [ 51.689431][ C1] [ 51.691754][ C1] read to 0xffffea00047c8400 of 8 bytes by task 7144 on cpu 0: [ 51.699475][ C1] free_one_page+0x3cb/0x840 [ 51.704043][ C1] __free_pages_ok+0x370/0x640 [ 51.708797][ C1] free_compound_page+0x3d/0x50 [ 51.713623][ C1] __put_compound_page+0x4e/0x70 [ 51.718637][ C1] __put_page+0x54/0xd0 [ 51.722793][ C1] skb_release_data+0x1ba/0x3a0 [ 51.727624][ C1] skb_release_all+0x44/0x60 [ 51.732191][ C1] __kfree_skb+0x1f/0x30 [ 51.736410][ C1] tcp_recvmsg+0xf59/0x1a30 [ 51.740895][ C1] inet_recvmsg+0xbb/0x250 [ 51.745296][ C1] sock_recvmsg+0x92/0xb0 [ 51.749612][ C1] sock_read_iter+0x15f/0x1e0 [ 51.754431][ C1] new_sync_read+0x389/0x4f0 [ 51.759028][ C1] __vfs_read+0xb1/0xc0 [ 51.763168][ C1] [ 51.765480][ C1] write to 0xffffea00047c8400 of 8 bytes by interrupt on cpu 1: [ 51.773202][ C1] prep_compound_page+0x150/0x160 [ 51.778256][ C1] prep_new_page+0xfe/0x200 [ 51.783180][ C1] get_page_from_freelist+0x1e9b/0x2300 [ 51.788713][ C1] __alloc_pages_nodemask+0x255/0x4d0 [ 51.794062][ C1] alloc_pages_current+0xd1/0x170 [ 51.799066][ C1] skb_page_frag_refill+0x16f/0x260 [ 51.804256][ C1] try_fill_recv+0x51f/0xdc0 [ 51.808917][ C1] virtnet_poll+0x64c/0x7d0 [ 51.813399][ C1] net_rx_action+0x3ae/0xa50 [ 51.817979][ C1] __do_softirq+0x115/0x33f [ 51.822462][ C1] run_ksoftirqd+0x46/0x60 [ 51.826899][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 51.831814][ C1] kthread+0x1d4/0x200 [ 51.835855][ C1] ret_from_fork+0x1f/0x30 [ 51.840239][ C1] [ 51.842654][ C1] Reported by Kernel Concurrency Sanitizer on: [ 51.848796][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.3.0+ #0 [ 51.855796][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.865847][ C1] ================================================================== [ 51.873886][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 51.880465][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.3.0+ #0 [ 51.887456][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.897486][ C1] Call Trace: [ 51.900759][ C1] dump_stack+0xf5/0x159 [ 51.905005][ C1] panic+0x209/0x639 [ 51.908880][ C1] ? __do_softirq+0x115/0x33f [ 51.913535][ C1] ? vprintk_func+0x8d/0x140 [ 51.918106][ C1] kcsan_report.cold+0xc/0x1b [ 51.922764][ C1] __kcsan_setup_watchpoint+0x3ee/0x510 [ 51.928292][ C1] prep_compound_page+0x150/0x160 [ 51.933744][ C1] prep_new_page+0xfe/0x200 [ 51.938250][ C1] get_page_from_freelist+0x1e9b/0x2300 [ 51.943790][ C1] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.949425][ C1] __alloc_pages_nodemask+0x255/0x4d0 [ 51.954791][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 51.961014][ C1] alloc_pages_current+0xd1/0x170 [ 51.966021][ C1] skb_page_frag_refill+0x16f/0x260 [ 51.971217][ C1] try_fill_recv+0x51f/0xdc0 [ 51.975802][ C1] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.981423][ C1] virtnet_poll+0x64c/0x7d0 [ 51.986009][ C1] net_rx_action+0x3ae/0xa50 [ 51.990618][ C1] __do_softirq+0x115/0x33f [ 51.995111][ C1] ? takeover_tasklets+0x250/0x250 [ 52.000201][ C1] run_ksoftirqd+0x46/0x60 [ 52.004608][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 52.009524][ C1] kthread+0x1d4/0x200 [ 52.013570][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 52.019527][ C1] ? kthread_bind+0x50/0x50 [ 52.024069][ C1] ret_from_fork+0x1f/0x30 [ 52.029829][ C1] Kernel Offset: disabled [ 52.034162][ C1] Rebooting in 86400 seconds..