[ 43.645680][ T26] audit: type=1800 audit(1570192792.975:21): pid=7061 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.692249][ T26] audit: type=1800 audit(1570192792.975:22): pid=7061 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [ 43.712930][ T26] audit: type=1800 audit(1570192792.975:23): pid=7061 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2475 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.106' (ECDSA) to the list of known hosts. 2019/10/04 12:40:03 fuzzer started 2019/10/04 12:40:04 dialing manager at 10.128.0.105:38119 2019/10/04 12:40:04 syscalls: 2523 2019/10/04 12:40:04 code coverage: enabled 2019/10/04 12:40:04 comparison tracing: enabled 2019/10/04 12:40:04 extra coverage: extra coverage is not supported by the kernel 2019/10/04 12:40:04 setuid sandbox: enabled 2019/10/04 12:40:04 namespace sandbox: enabled 2019/10/04 12:40:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/04 12:40:04 fault injection: enabled 2019/10/04 12:40:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/04 12:40:04 net packet injection: enabled 2019/10/04 12:40:04 net device setup: enabled 2019/10/04 12:40:04 concurrency sanitizer: enabled syzkaller login: [ 56.418508][ C1] ================================================================== [ 56.426835][ C1] BUG: KCSAN: data-race in __tcp_select_window+0x6b/0x4d0 and tcp_add_backlog+0x4a0/0xcc0 [ 56.436707][ C1] [ 56.439027][ C1] read to 0xffff888126bea9ec of 4 bytes by task 7226 on cpu 0: [ 56.446566][ C1] __tcp_select_window+0x6b/0x4d0 [ 56.451660][ C1] __tcp_transmit_skb+0x679/0x1cd0 [ 56.456754][ C1] __tcp_send_ack+0x246/0x300 [ 56.461411][ C1] tcp_send_ack+0x34/0x40 [ 56.465719][ C1] tcp_cleanup_rbuf+0x130/0x360 [ 56.470550][ C1] tcp_recvmsg+0x633/0x1a30 [ 56.475039][ C1] inet_recvmsg+0xbb/0x250 [ 56.479438][ C1] sock_recvmsg+0x92/0xb0 [ 56.483747][ C1] sock_read_iter+0x15f/0x1e0 [ 56.488408][ C1] new_sync_read+0x389/0x4f0 [ 56.492981][ C1] __vfs_read+0xb1/0xc0 [ 56.497120][ C1] vfs_read+0x143/0x2c0 [ 56.501257][ C1] ksys_read+0xd5/0x1b0 [ 56.505500][ C1] __x64_sys_read+0x4c/0x60 [ 56.509975][ C1] [ 56.512287][ C1] write to 0xffff888126bea9ec of 4 bytes by interrupt on cpu 1: [ 56.519915][ C1] tcp_add_backlog+0x4a0/0xcc0 [ 56.524677][ C1] tcp_v4_rcv+0x1aba/0x1bf0 [ 56.529163][ C1] ip_protocol_deliver_rcu+0x51/0x470 [ 56.534515][ C1] ip_local_deliver_finish+0x110/0x140 [ 56.539957][ C1] ip_local_deliver+0x133/0x210 [ 56.544791][ C1] ip_rcv_finish+0x121/0x160 [ 56.549368][ C1] ip_rcv+0x18f/0x1a0 [ 56.553337][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 56.559042][ C1] __netif_receive_skb+0x37/0xf0 [ 56.563960][ C1] netif_receive_skb_internal+0x59/0x190 [ 56.569576][ C1] napi_gro_receive+0x28f/0x330 [ 56.574412][ C1] receive_buf+0x284/0x30b0 [ 56.578905][ C1] virtnet_poll+0x436/0x7d0 [ 56.583398][ C1] [ 56.585705][ C1] Reported by Kernel Concurrency Sanitizer on: [ 56.591845][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.3.0+ #0 [ 56.598862][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.608893][ C1] ================================================================== [ 56.616934][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 56.623501][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.3.0+ #0 [ 56.630499][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.640545][ C1] Call Trace: [ 56.643825][ C1] dump_stack+0xf5/0x159 [ 56.648074][ C1] panic+0x209/0x639 [ 56.652137][ C1] ? vprintk_func+0x8d/0x140 [ 56.656712][ C1] kcsan_report.cold+0x57/0xeb [ 56.661481][ C1] __kcsan_setup_watchpoint+0x342/0x500 [ 56.667009][ C1] __tsan_write4+0x32/0x40 [ 56.671409][ C1] tcp_add_backlog+0x4a0/0xcc0 [ 56.676160][ C1] ? __rcu_read_unlock+0x62/0xe0 [ 56.681087][ C1] tcp_v4_rcv+0x1aba/0x1bf0 [ 56.685576][ C1] ? __tsan_read8+0x2c/0x30 [ 56.690067][ C1] ip_protocol_deliver_rcu+0x51/0x470 [ 56.695429][ C1] ip_local_deliver_finish+0x110/0x140 [ 56.700874][ C1] ip_local_deliver+0x133/0x210 [ 56.705708][ C1] ? ip_protocol_deliver_rcu+0x470/0x470 [ 56.711329][ C1] ip_rcv_finish+0x121/0x160 [ 56.715904][ C1] ip_rcv+0x18f/0x1a0 [ 56.719871][ C1] ? ip_sublist_rcv+0x5e0/0x5e0 [ 56.724703][ C1] ? ip_local_deliver+0x210/0x210 [ 56.729743][ C1] __netif_receive_skb_one_core+0xa7/0xe0 [ 56.735466][ C1] __netif_receive_skb+0x37/0xf0 [ 56.740389][ C1] netif_receive_skb_internal+0x59/0x190 [ 56.746005][ C1] napi_gro_receive+0x28f/0x330 [ 56.750843][ C1] receive_buf+0x284/0x30b0 [ 56.755332][ C1] ? __tsan_write8+0x32/0x40 [ 56.759915][ C1] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 56.765358][ C1] ? virtqueue_get_buf+0x31/0x40 [ 56.770410][ C1] virtnet_poll+0x436/0x7d0 [ 56.774908][ C1] net_rx_action+0x3ae/0xa50 [ 56.779489][ C1] __do_softirq+0x115/0x33f [ 56.783985][ C1] ? takeover_tasklets+0x250/0x250 [ 56.789085][ C1] run_ksoftirqd+0x46/0x60 [ 56.793495][ C1] smpboot_thread_fn+0x37d/0x4a0 [ 56.798419][ C1] kthread+0x1d4/0x200 [ 56.802475][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 56.808436][ C1] ? kthread_bind+0x50/0x50 [ 56.812926][ C1] ret_from_fork+0x1f/0x30 [ 56.818688][ C1] Kernel Offset: disabled [ 56.823105][ C1] Rebooting in 86400 seconds..