[ 36.094013][ T26] audit: type=1800 audit(1572618449.347:22): pid=7216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [ 36.123403][ T26] audit: type=1800 audit(1572618449.347:23): pid=7216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2475 res=0 [ 36.143298][ T26] audit: type=1800 audit(1572618449.357:24): pid=7216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.31' (ECDSA) to the list of known hosts. 2019/11/01 14:27:39 fuzzer started 2019/11/01 14:27:41 dialing manager at 10.128.0.105:37477 2019/11/01 14:27:41 syscalls: 2540 2019/11/01 14:27:41 code coverage: enabled 2019/11/01 14:27:41 comparison tracing: enabled 2019/11/01 14:27:41 extra coverage: extra coverage is not supported by the kernel 2019/11/01 14:27:41 setuid sandbox: enabled 2019/11/01 14:27:41 namespace sandbox: enabled 2019/11/01 14:27:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/01 14:27:41 fault injection: enabled 2019/11/01 14:27:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/01 14:27:41 net packet injection: enabled 2019/11/01 14:27:41 net device setup: enabled 2019/11/01 14:27:41 concurrency sanitizer: enabled syzkaller login: [ 62.227177][ T7386] KCSAN: could not find function: 'kcm_abort_tx_psock' [ 64.189304][ T7386] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/01 14:28:10 adding functions to KCSAN blacklist: 'mod_timer' 'mm_update_next_owner' 'find_get_pages_range_tag' 'generic_file_read_iter' 'sk_wait_data' 'snapshot_refaults' 'shmem_getpage_gfp' 'tick_do_update_jiffies64' 'run_timer_softirq' 'tick_nohz_idle_stop_tick' '__alloc_file' 'blk_mq_run_hw_queue' 'do_signal_stop' '__filemap_fdatawrite_range' '__nf_conntrack_find_get' '__ext4_new_inode' 'rcu_gp_fqs_check_wake' 'ip6_tnl_start_xmit' 'list_lru_count_one' 'vti_tunnel_xmit' 'pcpu_alloc' 'unix_release_sock' '__delete_from_page_cache' 'handle_userfault' 'pid_update_inode' 'pipe_wait' 'evict' 'ext4_mb_good_group' 'shmem_file_read_iter' 'ext4_has_free_clusters' 'lookup_fast' 'wbt_wait' '__d_lookup_done' 'ext4_mark_iloc_dirty' 'kauditd_thread' 'osq_lock' '__dentry_kill' 'tomoyo_supervisor' 'process_srcu' '__xfrm_policy_check' 'atime_needs_update' '__tcp_select_window' 'ktime_get' '__skb_try_recv_from_queue' 'add_timer_on' 'first_packet_length' '__nf_ct_refresh_acct' 'ip_finish_output2' 'mem_cgroup_protected' 'taskstats_exit' 'pipe_poll' 'ip6_tnl_xmit' 'fasync_remove_entry' 'ext4_mb_find_by_goal' 'blk_mq_dispatch_rq_list' 'sctp_assoc_migrate' 'queue_access_lock' '__add_to_page_cache_locked' '__snd_rawmidi_transmit_ack' '__skb_wait_for_more_packets' 'futex_wait_queue_me' 'kcm_abort_tx_psock' 'icmp_global_allow' 'ext4_da_write_end' 'snd_seq_prioq_cell_out' 'audit_log_start' 'tick_sched_do_timer' 'poll_schedule_timeout' 'do_tee' 'delete_from_page_cache_batch' 'ktime_get_real_seconds' 'generic_permission' 'generic_write_end' 'ext4_free_inodes_count' 'do_syslog' 'n_tty_receive_buf_common' 'kvm_arch_vcpu_load' 'find_next_bit' '__rb_rotate_set_parents' 'mem_cgroup_select_victim_node' '__skb_recv_udp' '__find_get_block' 'tcp_add_backlog' 'del_timer' 'tcp_poll' 'snd_seq_check_queue' 'p9_poll_workfn' 'dput' 'ext4_nonda_switch' 'do_exit' 'blk_mq_get_request' '__mark_inode_dirty' 'ktime_get_seconds' 'wbt_done' 'rcu_gp_fqs_loop' 'ext4_free_inode' 'update_defense_level' 'generic_fillattr' 'bio_endio' 'blk_mq_free_request' 'balance_dirty_pages' 'yama_ptracer_del' 'dd_has_work' 'echo_char' 'batadv_tt_local_add' 'ep_poll' 'add_timer' 'xas_find_marked' 'watchdog' 'page_counter_try_charge' 'shmem_add_to_page_cache' 'vm_area_dup' '__dev_queue_xmit' 'do_dentry_open' '__tcp_transmit_skb' 'do_nanosleep' 'inode_permission' 'timer_clear_idle' '__splice_from_pipe' 'copy_process' 'fsnotify' '__hrtimer_run_queues' 'task_dump_owner' 'xas_clear_mark' 'blk_mq_sched_dispatch_requests' 'exit_signals' [ 179.284879][ C1] ================================================================== [ 179.293048][ C1] BUG: KCSAN: data-race in ktime_get_with_offset / timekeeping_advance [ 179.301271][ C1] [ 179.303613][ C1] write to 0xffffffff86040b08 of 280 bytes by interrupt on cpu 0: [ 179.311412][ C1] timekeeping_advance+0x893/0xd80 [ 179.316515][ C1] update_wall_time+0x19/0x20 [ 179.321244][ C1] tick_do_update_jiffies64+0x1ae/0x260 [ 179.326863][ C1] tick_sched_do_timer+0xd4/0xe0 [ 179.331775][ C1] tick_sched_timer+0x43/0xe0 [ 179.336424][ C1] __hrtimer_run_queues+0x288/0x600 [ 179.341607][ C1] hrtimer_interrupt+0x22a/0x480 [ 179.346520][ C1] smp_apic_timer_interrupt+0xdc/0x280 [ 179.351954][ C1] apic_timer_interrupt+0xf/0x20 [ 179.356856][ C1] [ 179.359174][ C1] read to 0xffffffff86040b18 of 8 bytes by interrupt on cpu 1: [ 179.366711][ C1] ktime_get_with_offset+0xe7/0x230 [ 179.371884][ C1] netif_receive_skb_internal+0x13e/0x190 [ 179.377578][ C1] napi_gro_receive+0x28f/0x330 [ 179.382403][ C1] receive_buf+0x284/0x30b0 [ 179.386902][ C1] virtnet_poll+0x436/0x7d0 [ 179.391420][ C1] net_rx_action+0x3ae/0xa90 [ 179.395986][ C1] __do_softirq+0x115/0x33f [ 179.400497][ C1] run_ksoftirqd+0x46/0x60 [ 179.404888][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 179.409836][ C1] kthread+0x1d4/0x200 [ 179.413878][ C1] ret_from_fork+0x1f/0x30 [ 179.418259][ C1] [ 179.420557][ C1] Reported by Kernel Concurrency Sanitizer on: [ 179.426727][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0 [ 179.434062][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.444087][ C1] ================================================================== [ 179.452166][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 179.458728][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0 [ 179.466063][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.476089][ C1] Call Trace: [ 179.479360][ C1] dump_stack+0xf5/0x159 [ 179.483575][ C1] panic+0x210/0x640 [ 179.487450][ C1] ? smpboot_thread_fn+0x37d/0x4a0 [ 179.492536][ C1] ? vprintk_func+0x8d/0x140 [ 179.497103][ C1] kcsan_report.cold+0xc/0x10 [ 179.501756][ C1] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 179.507278][ C1] __tsan_read8+0x2c/0x30 [ 179.511625][ C1] ktime_get_with_offset+0xe7/0x230 [ 179.516811][ C1] netif_receive_skb_internal+0x13e/0x190 [ 179.522514][ C1] napi_gro_receive+0x28f/0x330 [ 179.527343][ C1] receive_buf+0x284/0x30b0 [ 179.531822][ C1] ? __tsan_write8+0x32/0x40 [ 179.536394][ C1] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 179.541825][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 179.547432][ C1] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 179.553041][ C1] virtnet_poll+0x436/0x7d0 [ 179.557547][ C1] net_rx_action+0x3ae/0xa90 [ 179.562118][ C1] __do_softirq+0x115/0x33f [ 179.566612][ C1] ? takeover_tasklets+0x250/0x250 [ 179.571709][ C1] run_ksoftirqd+0x46/0x60 [ 179.576099][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 179.581013][ C1] kthread+0x1d4/0x200 [ 179.585062][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 179.591015][ C1] ? kthread_stop+0x2d0/0x2d0 [ 179.595665][ C1] ret_from_fork+0x1f/0x30 [ 179.601395][ C1] Kernel Offset: disabled [ 179.605712][ C1] Rebooting in 86400 seconds..