[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 33.926185][ T25] audit: type=1800 audit(1571724503.846:25): pid=7047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 33.946357][ T25] audit: type=1800 audit(1571724503.846:26): pid=7047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 33.968308][ T25] audit: type=1800 audit(1571724503.846:27): pid=7047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.23' (ECDSA) to the list of known hosts. 2019/10/22 06:08:32 fuzzer started 2019/10/22 06:08:34 dialing manager at 10.128.0.105:37053 2019/10/22 06:08:34 syscalls: 2524 2019/10/22 06:08:34 code coverage: enabled 2019/10/22 06:08:34 comparison tracing: enabled 2019/10/22 06:08:34 extra coverage: extra coverage is not supported by the kernel 2019/10/22 06:08:34 setuid sandbox: enabled 2019/10/22 06:08:34 namespace sandbox: enabled 2019/10/22 06:08:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/22 06:08:34 fault injection: enabled 2019/10/22 06:08:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/22 06:08:34 net packet injection: enabled 2019/10/22 06:08:34 net device setup: enabled 2019/10/22 06:08:34 concurrency sanitizer: enabled syzkaller login: [ 45.468757][ C1] ================================================================== [ 45.476986][ C1] BUG: KCSAN: data-race in __nf_conntrack_find_get / __nf_ct_refresh_acct [ 45.485606][ C1] [ 45.487972][ C1] write to 0xffff888124dc4f08 of 4 bytes by task 7196 on cpu 0: [ 45.495683][ C1] __nf_ct_refresh_acct+0xfb/0x1b0 [ 45.500768][ C1] nf_conntrack_tcp_packet+0xd40/0x3390 [ 45.506313][ C1] nf_conntrack_in+0x410/0xa80 [ 45.512368][ C1] ipv4_conntrack_local+0xbe/0x130 [ 45.517457][ C1] nf_hook_slow+0x83/0x160 [ 45.521846][ C1] __ip_local_out+0x1f7/0x2b0 [ 45.526496][ C1] ip_local_out+0x31/0x90 [ 45.530812][ C1] __ip_queue_xmit+0x3a8/0xa40 [ 45.535556][ C1] ip_queue_xmit+0x45/0x60 [ 45.539948][ C1] __tcp_transmit_skb+0xe81/0x1d60 [ 45.545031][ C1] __tcp_send_ack+0x246/0x300 [ 45.549682][ C1] tcp_send_ack+0x34/0x40 [ 45.554076][ C1] tcp_cleanup_rbuf+0x130/0x360 [ 45.558926][ C1] tcp_recvmsg+0x633/0x1a30 [ 45.563401][ C1] [ 45.565710][ C1] read to 0xffff888124dc4f08 of 4 bytes by interrupt on cpu 1: [ 45.573246][ C1] __nf_conntrack_find_get+0x284/0x880 [ 45.578680][ C1] nf_conntrack_in+0x2ef/0xa80 [ 45.583507][ C1] ipv4_conntrack_in+0x27/0x40 [ 45.588257][ C1] nf_hook_slow+0x83/0x160 [ 45.592690][ C1] ip_rcv+0x12f/0x1a0 [ 45.596656][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 45.602361][ C1] __netif_receive_skb+0x37/0xf0 [ 45.607362][ C1] netif_receive_skb_internal+0x59/0x190 [ 45.612968][ C1] napi_gro_receive+0x28f/0x330 [ 45.617804][ C1] receive_buf+0x284/0x30b0 [ 45.622437][ C1] virtnet_poll+0x436/0x7d0 [ 45.627088][ C1] net_rx_action+0x3ae/0xa90 [ 45.631655][ C1] __do_softirq+0x115/0x33f [ 45.636138][ C1] [ 45.638441][ C1] Reported by Kernel Concurrency Sanitizer on: [ 45.645276][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0 [ 45.652628][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.662658][ C1] ================================================================== [ 45.670693][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 45.677398][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0 [ 45.684961][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.694995][ C1] Call Trace: [ 45.698281][ C1] dump_stack+0xf5/0x159 [ 45.702596][ C1] panic+0x210/0x640 [ 45.706469][ C1] ? napi_gro_receive+0x28f/0x330 [ 45.711470][ C1] ? vprintk_func+0x8d/0x140 [ 45.716035][ C1] kcsan_report.cold+0xc/0x10 [ 45.721906][ C1] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 45.727436][ C1] __tsan_read4+0x2c/0x30 [ 45.731754][ C1] __nf_conntrack_find_get+0x284/0x880 [ 45.737188][ C1] ? __tsan_write2+0x32/0x40 [ 45.741753][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 45.747462][ C1] nf_conntrack_in+0x2ef/0xa80 [ 45.752739][ C1] ipv4_conntrack_in+0x27/0x40 [ 45.757495][ C1] nf_hook_slow+0x83/0x160 [ 45.761894][ C1] ? nf_ct_bridge_unregister+0x70/0x70 [ 45.768460][ C1] ip_rcv+0x12f/0x1a0 [ 45.772420][ C1] ? ip_sublist_rcv+0x5e0/0x5e0 [ 45.777248][ C1] ? ip_local_deliver+0x210/0x210 [ 45.782250][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 45.787948][ C1] __netif_receive_skb+0x37/0xf0 [ 45.792865][ C1] netif_receive_skb_internal+0x59/0x190 [ 45.798474][ C1] napi_gro_receive+0x28f/0x330 [ 45.803302][ C1] receive_buf+0x284/0x30b0 [ 45.807787][ C1] ? __tsan_write8+0x32/0x40 [ 45.813589][ C1] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 45.819031][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 45.824899][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 45.830545][ C1] virtnet_poll+0x436/0x7d0 [ 45.835127][ C1] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 45.840988][ C1] net_rx_action+0x3ae/0xa90 [ 45.845713][ C1] __do_softirq+0x115/0x33f [ 45.850229][ C1] ? takeover_tasklets+0x250/0x250 [ 45.855333][ C1] run_ksoftirqd+0x46/0x60 [ 45.859841][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 45.864772][ C1] kthread+0x1d4/0x200 [ 45.868824][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 45.874784][ C1] ? kthread_stop+0x2d0/0x2d0 [ 45.879440][ C1] ret_from_fork+0x1f/0x30 [ 45.885434][ C1] Kernel Offset: disabled [ 45.889842][ C1] Rebooting in 86400 seconds..