[info] Using makefile-style concurrent boot in runlevel 2. [ 44.398366][ T26] audit: type=1800 audit(1570913048.878:21): pid=7176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 44.446913][ T26] audit: type=1800 audit(1570913048.878:22): pid=7176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.199' (ECDSA) to the list of known hosts. 2019/10/12 20:44:18 fuzzer started 2019/10/12 20:44:19 dialing manager at 10.128.0.105:43913 2019/10/12 20:44:19 syscalls: 2523 2019/10/12 20:44:19 code coverage: enabled 2019/10/12 20:44:19 comparison tracing: enabled 2019/10/12 20:44:19 extra coverage: extra coverage is not supported by the kernel 2019/10/12 20:44:19 setuid sandbox: enabled 2019/10/12 20:44:19 namespace sandbox: enabled 2019/10/12 20:44:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/12 20:44:19 fault injection: enabled 2019/10/12 20:44:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/12 20:44:19 net packet injection: enabled 2019/10/12 20:44:19 net device setup: enabled 2019/10/12 20:44:19 concurrency sanitizer: enabled syzkaller login: [ 55.910679][ C0] ================================================================== [ 55.918958][ C0] BUG: KCSAN: data-race in __zone_watermark_ok / free_one_page [ 55.926567][ C0] [ 55.928877][ C0] write to 0xffff88812fffcf58 of 8 bytes by task 7341 on cpu 1: [ 55.936491][ C0] free_one_page+0x214/0x840 [ 55.941079][ C0] __free_pages_ok+0x370/0x640 [ 55.945819][ C0] free_compound_page+0x3d/0x50 [ 55.950667][ C0] __put_compound_page+0x4e/0x70 [ 55.955579][ C0] __put_page+0x54/0xd0 [ 55.959723][ C0] skb_release_data+0x1ba/0x3a0 [ 55.964545][ C0] skb_release_all+0x44/0x60 [ 55.969107][ C0] __kfree_skb+0x1f/0x30 [ 55.973368][ C0] tcp_recvmsg+0xf59/0x1a30 [ 55.977846][ C0] inet_recvmsg+0xbb/0x250 [ 55.982235][ C0] sock_recvmsg+0x92/0xb0 [ 55.986565][ C0] sock_read_iter+0x15f/0x1e0 [ 55.991304][ C0] new_sync_read+0x389/0x4f0 [ 55.995885][ C0] __vfs_read+0xb1/0xc0 [ 56.000009][ C0] [ 56.002321][ C0] read to 0xffff88812fffcf58 of 8 bytes by interrupt on cpu 0: [ 56.009839][ C0] __zone_watermark_ok+0x106/0x240 [ 56.014925][ C0] get_page_from_freelist+0x629/0x2300 [ 56.020360][ C0] __alloc_pages_nodemask+0x255/0x4d0 [ 56.025715][ C0] page_frag_alloc+0x11e/0x2d0 [ 56.030455][ C0] __napi_alloc_skb+0x172/0x210 [ 56.035406][ C0] page_to_skb+0x8d/0x480 [ 56.039710][ C0] receive_buf+0x17c7/0x30b0 [ 56.044279][ C0] virtnet_poll+0x436/0x7d0 [ 56.048756][ C0] net_rx_action+0x3ae/0xa50 [ 56.053323][ C0] __do_softirq+0x115/0x33f [ 56.057813][ C0] run_ksoftirqd+0x46/0x60 [ 56.062202][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 56.067111][ C0] kthread+0x1d4/0x200 [ 56.071156][ C0] [ 56.073467][ C0] Reported by Kernel Concurrency Sanitizer on: [ 56.079595][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.3.0+ #0 [ 56.086507][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.096544][ C0] ================================================================== [ 56.104578][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 56.111144][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.3.0+ #0 [ 56.118060][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.128089][ C0] Call Trace: [ 56.131368][ C0] dump_stack+0xf5/0x159 [ 56.135600][ C0] panic+0x209/0x639 [ 56.139480][ C0] ? net_rx_action+0x3ae/0xa50 [ 56.144402][ C0] ? vprintk_func+0x8d/0x140 [ 56.148968][ C0] kcsan_report.cold+0xc/0x1b [ 56.153626][ C0] __kcsan_setup_watchpoint+0x3ee/0x510 [ 56.159147][ C0] __tsan_read8+0x2c/0x30 [ 56.163458][ C0] __zone_watermark_ok+0x106/0x240 [ 56.168556][ C0] get_page_from_freelist+0x629/0x2300 [ 56.173994][ C0] ? __kcsan_setup_watchpoint+0x96/0x510 [ 56.179604][ C0] ? __tsan_read8+0x2c/0x30 [ 56.184084][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 56.190320][ C0] ? __kcsan_setup_watchpoint+0x96/0x510 [ 56.195943][ C0] __alloc_pages_nodemask+0x255/0x4d0 [ 56.201295][ C0] page_frag_alloc+0x11e/0x2d0 [ 56.206034][ C0] ? __kcsan_setup_watchpoint+0x96/0x510 [ 56.211644][ C0] __napi_alloc_skb+0x172/0x210 [ 56.216474][ C0] page_to_skb+0x8d/0x480 [ 56.220794][ C0] receive_buf+0x17c7/0x30b0 [ 56.225379][ C0] ? __tsan_write8+0x32/0x40 [ 56.229950][ C0] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 56.235383][ C0] ? __kcsan_setup_watchpoint+0x96/0x510 [ 56.240991][ C0] ? __kcsan_setup_watchpoint+0x96/0x510 [ 56.246698][ C0] virtnet_poll+0x436/0x7d0 [ 56.251182][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 56.257401][ C0] net_rx_action+0x3ae/0xa50 [ 56.261974][ C0] __do_softirq+0x115/0x33f [ 56.266463][ C0] ? takeover_tasklets+0x250/0x250 [ 56.271550][ C0] run_ksoftirqd+0x46/0x60 [ 56.275961][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 56.280874][ C0] kthread+0x1d4/0x200 [ 56.284926][ C0] ? constant_test_bit.constprop.0+0x30/0x30 [ 56.290967][ C0] ? kthread_bind+0x50/0x50 [ 56.295445][ C0] ret_from_fork+0x1f/0x30 [ 56.301502][ C0] Kernel Offset: disabled [ 56.305887][ C0] Rebooting in 86400 seconds..