[ 36.828088][ T26] audit: type=1800 audit(1571754726.826:23): pid=7198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2475 res=0 [ 36.850757][ T26] audit: type=1800 audit(1571754726.826:24): pid=7198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.372447][ T26] audit: type=1800 audit(1571754727.416:25): pid=7198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.138' (ECDSA) to the list of known hosts. 2019/10/22 14:32:18 fuzzer started 2019/10/22 14:32:20 dialing manager at 10.128.0.105:33369 2019/10/22 14:32:20 syscalls: 2524 2019/10/22 14:32:20 code coverage: enabled 2019/10/22 14:32:20 comparison tracing: enabled 2019/10/22 14:32:20 extra coverage: extra coverage is not supported by the kernel 2019/10/22 14:32:20 setuid sandbox: enabled 2019/10/22 14:32:20 namespace sandbox: enabled 2019/10/22 14:32:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/22 14:32:20 fault injection: enabled 2019/10/22 14:32:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/22 14:32:20 net packet injection: enabled 2019/10/22 14:32:20 net device setup: enabled 2019/10/22 14:32:20 concurrency sanitizer: enabled syzkaller login: [ 50.504145][ C0] ================================================================== [ 50.512283][ C0] BUG: KCSAN: data-race in tcp_add_backlog / tcp_grow_window.isra.0 [ 50.520238][ C0] [ 50.522565][ C0] read to 0xffff888122eb09ec of 4 bytes by task 7351 on cpu 1: [ 50.530365][ C0] tcp_grow_window.isra.0+0x6b/0x480 [ 50.535633][ C0] tcp_event_data_recv+0x68f/0x990 [ 50.540822][ C0] tcp_rcv_established+0xbfe/0xf50 [ 50.545919][ C0] tcp_v4_do_rcv+0x381/0x4e0 [ 50.550497][ C0] __release_sock+0x135/0x1e0 [ 50.555156][ C0] release_sock+0x61/0x160 [ 50.559556][ C0] tcp_recvmsg+0x63b/0x1a30 [ 50.564139][ C0] inet_recvmsg+0xbb/0x250 [ 50.568538][ C0] sock_recvmsg+0x92/0xb0 [ 50.572857][ C0] sock_read_iter+0x15f/0x1e0 [ 50.577526][ C0] new_sync_read+0x389/0x4f0 [ 50.582102][ C0] __vfs_read+0xb1/0xc0 [ 50.586239][ C0] vfs_read+0x143/0x2c0 [ 50.590375][ C0] ksys_read+0xd5/0x1b0 [ 50.594503][ C0] [ 50.596821][ C0] write to 0xffff888122eb09ec of 4 bytes by interrupt on cpu 0: [ 50.604449][ C0] tcp_add_backlog+0x4a0/0xcc0 [ 50.609208][ C0] tcp_v4_rcv+0x1a60/0x1bb0 [ 50.613730][ C0] ip_protocol_deliver_rcu+0x4d/0x420 [ 50.619084][ C0] ip_local_deliver_finish+0x110/0x140 [ 50.624539][ C0] ip_local_deliver+0x133/0x210 [ 50.629381][ C0] ip_rcv_finish+0x121/0x160 [ 50.633972][ C0] ip_rcv+0x18f/0x1a0 [ 50.637946][ C0] __netif_receive_skb_one_core+0xa7/0xe0 [ 50.643834][ C0] __netif_receive_skb+0x37/0xf0 [ 50.648762][ C0] netif_receive_skb_internal+0x59/0x190 [ 50.654378][ C0] napi_gro_receive+0x28f/0x330 [ 50.659212][ C0] receive_buf+0x284/0x30b0 [ 50.663708][ C0] virtnet_poll+0x436/0x7d0 [ 50.668220][ C0] [ 50.670526][ C0] Reported by Kernel Concurrency Sanitizer on: [ 50.676664][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-rc3+ #0 [ 50.683925][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.693971][ C0] ================================================================== [ 50.702013][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 50.708596][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-rc3+ #0 [ 50.716216][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.726268][ C0] Call Trace: [ 50.729558][ C0] dump_stack+0xf5/0x159 [ 50.733794][ C0] panic+0x210/0x640 [ 50.737682][ C0] ? __netif_receive_skb+0x37/0xf0 [ 50.742779][ C0] ? vprintk_func+0x8d/0x140 [ 50.747374][ C0] kcsan_report.cold+0xc/0x10 [ 50.752038][ C0] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 50.757570][ C0] __tsan_write4+0x32/0x40 [ 50.761973][ C0] tcp_add_backlog+0x4a0/0xcc0 [ 50.766735][ C0] tcp_v4_rcv+0x1a60/0x1bb0 [ 50.771244][ C0] ? __tsan_read8+0x2c/0x30 [ 50.775745][ C0] ip_protocol_deliver_rcu+0x4d/0x420 [ 50.781105][ C0] ip_local_deliver_finish+0x110/0x140 [ 50.786645][ C0] ip_local_deliver+0x133/0x210 [ 50.791480][ C0] ? ip_protocol_deliver_rcu+0x420/0x420 [ 50.797105][ C0] ip_rcv_finish+0x121/0x160 [ 50.801679][ C0] ip_rcv+0x18f/0x1a0 [ 50.805648][ C0] ? ip_sublist_rcv+0x5e0/0x5e0 [ 50.810484][ C0] ? ip_local_deliver+0x210/0x210 [ 50.815522][ C0] __netif_receive_skb_one_core+0xa7/0xe0 [ 50.821243][ C0] __netif_receive_skb+0x37/0xf0 [ 50.826170][ C0] netif_receive_skb_internal+0x59/0x190 [ 50.831878][ C0] napi_gro_receive+0x28f/0x330 [ 50.836717][ C0] receive_buf+0x284/0x30b0 [ 50.841209][ C0] ? __tsan_write8+0x32/0x40 [ 50.845802][ C0] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 50.851244][ C0] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 50.856869][ C0] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 50.862491][ C0] virtnet_poll+0x436/0x7d0 [ 50.866992][ C0] net_rx_action+0x3ae/0xa90 [ 50.871574][ C0] __do_softirq+0x115/0x33f [ 50.876072][ C0] ? takeover_tasklets+0x250/0x250 [ 50.881178][ C0] run_ksoftirqd+0x46/0x60 [ 50.885582][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 50.890516][ C0] kthread+0x1d4/0x200 [ 50.894582][ C0] ? constant_test_bit.constprop.0+0x30/0x30 [ 50.900545][ C0] ? kthread_stop+0x2d0/0x2d0 [ 50.905206][ C0] ret_from_fork+0x1f/0x30 [ 50.910953][ C0] Kernel Offset: disabled [ 50.915294][ C0] Rebooting in 86400 seconds..