[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.135467][ T26] audit: type=1800 audit(1570201092.359:25): pid=7027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 41.163157][ T26] audit: type=1800 audit(1570201092.369:26): pid=7027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 41.204064][ T26] audit: type=1800 audit(1570201092.369:27): pid=7027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.214' (ECDSA) to the list of known hosts. 2019/10/04 14:58:23 fuzzer started 2019/10/04 14:58:24 dialing manager at 10.128.0.105:44881 2019/10/04 14:58:24 syscalls: 2523 2019/10/04 14:58:24 code coverage: enabled 2019/10/04 14:58:24 comparison tracing: enabled 2019/10/04 14:58:24 extra coverage: extra coverage is not supported by the kernel 2019/10/04 14:58:24 setuid sandbox: enabled 2019/10/04 14:58:24 namespace sandbox: enabled 2019/10/04 14:58:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/04 14:58:24 fault injection: enabled 2019/10/04 14:58:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/04 14:58:24 net packet injection: enabled 2019/10/04 14:58:24 net device setup: enabled 2019/10/04 14:58:24 concurrency sanitizer: enabled syzkaller login: [ 54.343350][ C1] ================================================================== [ 54.351702][ C1] BUG: KCSAN: data-race in __nf_conntrack_find_get / __nf_ct_refresh_acct [ 54.360173][ C1] [ 54.362485][ C1] write to 0xffff888126fc6b08 of 4 bytes by task 7177 on cpu 0: [ 54.370093][ C1] __nf_ct_refresh_acct+0xfb/0x1b0 [ 54.375178][ C1] nf_conntrack_tcp_packet+0xd40/0x3390 [ 54.380699][ C1] nf_conntrack_in+0x410/0xaa0 [ 54.385562][ C1] ipv4_conntrack_local+0xbe/0x130 [ 54.390662][ C1] nf_hook_slow+0x83/0x160 [ 54.395081][ C1] __ip_local_out+0x1f7/0x2b0 [ 54.399734][ C1] ip_local_out+0x31/0x90 [ 54.404039][ C1] __ip_queue_xmit+0x3a8/0xa40 [ 54.408797][ C1] ip_queue_xmit+0x45/0x60 [ 54.413200][ C1] __tcp_transmit_skb+0xdeb/0x1cd0 [ 54.418322][ C1] __tcp_send_ack+0x246/0x300 [ 54.422984][ C1] tcp_send_ack+0x34/0x40 [ 54.427290][ C1] tcp_cleanup_rbuf+0x130/0x360 [ 54.432124][ C1] tcp_recvmsg+0x633/0x1a30 [ 54.436593][ C1] [ 54.438900][ C1] read to 0xffff888126fc6b08 of 4 bytes by interrupt on cpu 1: [ 54.446427][ C1] __nf_conntrack_find_get+0x284/0x870 [ 54.451872][ C1] nf_conntrack_in+0x2ef/0xaa0 [ 54.456606][ C1] ipv4_conntrack_in+0x27/0x40 [ 54.461355][ C1] nf_hook_slow+0x83/0x160 [ 54.465758][ C1] ip_rcv+0x12f/0x1a0 [ 54.469720][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 54.475415][ C1] __netif_receive_skb+0x37/0xf0 [ 54.480328][ C1] netif_receive_skb_internal+0x59/0x190 [ 54.485943][ C1] napi_gro_receive+0x28f/0x330 [ 54.490778][ C1] receive_buf+0x284/0x30b0 [ 54.495255][ C1] virtnet_poll+0x436/0x7d0 [ 54.499732][ C1] net_rx_action+0x3ae/0xa50 [ 54.504299][ C1] __do_softirq+0x115/0x33f [ 54.508775][ C1] [ 54.511079][ C1] Reported by Kernel Concurrency Sanitizer on: [ 54.517253][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.3.0+ #0 [ 54.524251][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.534452][ C1] ================================================================== [ 54.542496][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 54.549057][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.3.0+ #0 [ 54.556049][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.566177][ C1] Call Trace: [ 54.569447][ C1] dump_stack+0xf5/0x159 [ 54.573676][ C1] panic+0x209/0x639 [ 54.577553][ C1] ? vprintk_func+0x8d/0x140 [ 54.582124][ C1] kcsan_report.cold+0x57/0xeb [ 54.586877][ C1] __kcsan_setup_watchpoint+0x342/0x500 [ 54.592407][ C1] __tsan_read4+0x2c/0x30 [ 54.596715][ C1] __nf_conntrack_find_get+0x284/0x870 [ 54.602151][ C1] ? __tsan_write2+0x32/0x40 [ 54.606727][ C1] ? nf_ct_get_tuple+0x325/0x490 [ 54.611647][ C1] nf_conntrack_in+0x2ef/0xaa0 [ 54.616398][ C1] ipv4_conntrack_in+0x27/0x40 [ 54.621406][ C1] nf_hook_slow+0x83/0x160 [ 54.625799][ C1] ? nf_ct_l4proto_find+0xd0/0xd0 [ 54.630803][ C1] ip_rcv+0x12f/0x1a0 [ 54.634762][ C1] ? ip_sublist_rcv+0x5e0/0x5e0 [ 54.639601][ C1] ? ip_local_deliver+0x210/0x210 [ 54.644605][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 54.650303][ C1] __netif_receive_skb+0x37/0xf0 [ 54.655221][ C1] netif_receive_skb_internal+0x59/0x190 [ 54.660831][ C1] napi_gro_receive+0x28f/0x330 [ 54.665668][ C1] receive_buf+0x284/0x30b0 [ 54.670163][ C1] ? __tsan_write8+0x32/0x40 [ 54.674747][ C1] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 54.680192][ C1] ? virtqueue_get_buf+0x31/0x40 [ 54.685120][ C1] virtnet_poll+0x436/0x7d0 [ 54.689631][ C1] net_rx_action+0x3ae/0xa50 [ 54.694211][ C1] __do_softirq+0x115/0x33f [ 54.698698][ C1] ? takeover_tasklets+0x250/0x250 [ 54.703787][ C1] run_ksoftirqd+0x46/0x60 [ 54.708180][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 54.713093][ C1] kthread+0x1d4/0x200 [ 54.717148][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 54.723114][ C1] ? kthread_bind+0x50/0x50 [ 54.727594][ C1] ret_from_fork+0x1f/0x30 [ 54.733453][ C1] Kernel Offset: disabled [ 54.737779][ C1] Rebooting in 86400 seconds..