[ 42.477550][ T25] audit: type=1800 audit(1571560824.792:21): pid=6962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.509679][ T25] audit: type=1800 audit(1571560824.792:22): pid=6962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [ 42.530107][ T25] audit: type=1800 audit(1571560824.792:23): pid=6962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2475 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2019/10/20 08:40:35 fuzzer started 2019/10/20 08:40:37 dialing manager at 10.128.0.105:43535 2019/10/20 08:40:37 syscalls: 2524 2019/10/20 08:40:37 code coverage: enabled 2019/10/20 08:40:37 comparison tracing: enabled 2019/10/20 08:40:37 extra coverage: extra coverage is not supported by the kernel 2019/10/20 08:40:37 setuid sandbox: enabled 2019/10/20 08:40:37 namespace sandbox: enabled 2019/10/20 08:40:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/20 08:40:37 fault injection: enabled 2019/10/20 08:40:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/20 08:40:37 net packet injection: enabled 2019/10/20 08:40:37 net device setup: enabled 2019/10/20 08:40:37 concurrency sanitizer: enabled syzkaller login: [ 55.671407][ T7110] ================================================================== [ 55.679741][ T7110] BUG: KCSAN: data-race in tcp_poll / tcp_recvmsg [ 55.686398][ T7110] [ 55.688723][ T7110] write to 0xffff88812211b77c of 4 bytes by task 7115 on cpu 0: [ 55.696354][ T7110] tcp_recvmsg+0xd86/0x1a30 [ 55.700852][ T7110] inet_recvmsg+0xbb/0x250 [ 55.705260][ T7110] sock_recvmsg+0x92/0xb0 [ 55.709583][ T7110] sock_read_iter+0x15f/0x1e0 [ 55.714261][ T7110] new_sync_read+0x389/0x4f0 [ 55.718852][ T7110] __vfs_read+0xb1/0xc0 [ 55.723019][ T7110] vfs_read+0x143/0x2c0 [ 55.727687][ T7110] ksys_read+0xd5/0x1b0 [ 55.731846][ T7110] __x64_sys_read+0x4c/0x60 [ 55.736497][ T7110] do_syscall_64+0xcc/0x370 [ 55.740986][ T7110] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.746850][ T7110] [ 55.749163][ T7110] read to 0xffff88812211b77c of 4 bytes by task 7110 on cpu 1: [ 55.756947][ T7110] tcp_poll+0x1cc/0x6b0 [ 55.761094][ T7110] sock_poll+0xed/0x250 [ 55.765464][ T7110] ep_item_poll.isra.0+0x90/0x190 [ 55.770577][ T7110] ep_send_events_proc+0x113/0x590 [ 55.775693][ T7110] ep_scan_ready_list.constprop.0+0x189/0x500 [ 55.781749][ T7110] ep_poll+0xe3/0x900 [ 55.785712][ T7110] do_epoll_wait+0x162/0x180 [ 55.790307][ T7110] __x64_sys_epoll_pwait+0xcd/0x180 [ 55.795587][ T7110] do_syscall_64+0xcc/0x370 [ 55.800077][ T7110] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.806032][ T7110] [ 55.808340][ T7110] Reported by Kernel Concurrency Sanitizer on: [ 55.814475][ T7110] CPU: 1 PID: 7110 Comm: syz-fuzzer Not tainted 5.4.0-rc3+ #0 [ 55.822004][ T7110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.832096][ T7110] ================================================================== [ 55.840158][ T7110] Kernel panic - not syncing: panic_on_warn set ... [ 55.846731][ T7110] CPU: 1 PID: 7110 Comm: syz-fuzzer Not tainted 5.4.0-rc3+ #0 [ 55.854164][ T7110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.864217][ T7110] Call Trace: [ 55.867932][ T7110] dump_stack+0xf5/0x159 [ 55.872168][ T7110] panic+0x210/0x640 [ 55.876053][ T7110] ? do_syscall_64+0xcc/0x370 [ 55.880722][ T7110] ? vprintk_func+0x8d/0x140 [ 55.885297][ T7110] kcsan_report.cold+0xc/0x10 [ 55.889959][ T7110] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 55.895507][ T7110] __tsan_read4+0x2c/0x30 [ 55.899837][ T7110] tcp_poll+0x1cc/0x6b0 [ 55.904682][ T7110] ? tcp_alloc_md5sig_pool+0x320/0x320 [ 55.910973][ T7110] sock_poll+0xed/0x250 [ 55.915297][ T7110] ? sock_read_iter+0x1e0/0x1e0 [ 55.920153][ T7110] ep_item_poll.isra.0+0x90/0x190 [ 55.925170][ T7110] ep_send_events_proc+0x113/0x590 [ 55.930266][ T7110] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 55.935896][ T7110] ep_scan_ready_list.constprop.0+0x189/0x500 [ 55.941986][ T7110] ? ep_loop_check_proc+0x2f0/0x2f0 [ 55.947174][ T7110] ep_poll+0xe3/0x900 [ 55.951170][ T7110] ? __fget+0xb8/0x1d0 [ 55.955223][ T7110] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 55.960926][ T7110] ? __fget_light+0xaf/0x190 [ 55.965522][ T7110] do_epoll_wait+0x162/0x180 [ 55.970107][ T7110] __x64_sys_epoll_pwait+0xcd/0x180 [ 55.975296][ T7110] do_syscall_64+0xcc/0x370 [ 55.979802][ T7110] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.985675][ T7110] RIP: 0033:0x45b300 [ 55.989556][ T7110] Code: 0f 05 89 44 24 20 c3 cc cc cc 8b 7c 24 08 48 8b 74 24 10 8b 54 24 18 44 8b 54 24 1c 49 c7 c0 00 00 00 00 b8 19 01 00 00 0f 05 <89> 44 24 20 c3 cc cc cc cc cc cc cc cc cc cc cc 8b 7c 24 08 48 c7 [ 56.009579][ T7110] RSP: 002b:000000c42004f8d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 56.017992][ T7110] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045b300 [ 56.025960][ T7110] RDX: 0000000000000080 RSI: 000000c42004f918 RDI: 0000000000000004 [ 56.033935][ T7110] RBP: 000000c42004ff18 R08: 0000000000000000 R09: 00000000000027c2 [ 56.041893][ T7110] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000042f0a0 [ 56.049847][ T7110] R13: 00000000000000f1 R14: 0000000000000011 R15: 0000000000000000 [ 56.059223][ T7110] Kernel Offset: disabled [ 56.063566][ T7110] Rebooting in 86400 seconds..