[ 40.254276][ T25] audit: type=1800 audit(1572187023.836:25): pid=7032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 40.294319][ T25] audit: type=1800 audit(1572187023.836:26): pid=7032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 40.318750][ T25] audit: type=1800 audit(1572187023.846:27): pid=7032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 40.762109][ T7097] sshd (7097) used greatest stack depth: 10136 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.36' (ECDSA) to the list of known hosts. 2019/10/27 14:37:12 fuzzer started 2019/10/27 14:37:13 dialing manager at 10.128.0.105:33655 2019/10/27 14:37:13 syscalls: 2533 2019/10/27 14:37:13 code coverage: enabled 2019/10/27 14:37:13 comparison tracing: enabled 2019/10/27 14:37:13 extra coverage: extra coverage is not supported by the kernel 2019/10/27 14:37:13 setuid sandbox: enabled 2019/10/27 14:37:13 namespace sandbox: enabled 2019/10/27 14:37:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/27 14:37:13 fault injection: enabled 2019/10/27 14:37:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/27 14:37:13 net packet injection: enabled 2019/10/27 14:37:13 net device setup: enabled 2019/10/27 14:37:13 concurrency sanitizer: enabled syzkaller login: [ 71.018074][ T7200] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/27 14:37:42 adding functions to KCSAN blacklist: 'rcu_gp_fqs_loop' 'shmem_getpage_gfp' 'echo_char' '__add_to_page_cache_locked' 'ext4_da_write_end' 'blk_stat_add' 'generic_fillattr' 'dccp_rcv_close' 'handle_userfault' 'blk_mq_dispatch_rq_list' '__snd_rawmidi_transmit_ack' 'do_exit' 'osq_lock' 'list_lru_count_one' 'pid_update_inode' 'tcp_poll' 'mod_timer' 'vfs_fsync_range' 'tcp_add_backlog' '__delete_from_page_cache' 'fib6_ifup' 'filemap_map_pages' 'do_syslog' '__nf_conntrack_find_get' 'ext4_mark_iloc_dirty' 'kernfs_refresh_inode' 'ext4_ext_insert_extent' 'list_lru_add' 'tick_sched_do_timer' 'tcp_sendmsg_locked' 'snd_seq_check_queue' 'do_wait' 'tick_do_update_jiffies64' 'task_dump_owner' 'tcp_v4_rcv' 'd_delete' 'get_task_cred' 'ext4_free_inode' 'ext4_nonda_switch' 'inet_putpeer' 'queue_access_lock' 'blk_mq_run_hw_queue' '__skb_wait_for_more_packets' 'pvclock_gtod_notify' 'fprop_fraction_percpu' 'get_task_mm' 'balance_dirty_pages' 'shmem_file_read_iter' 'run_timer_softirq' 'n_tty_receive_buf_common' 'atime_needs_update' 'tomoyo_supervisor' '__nf_ct_refresh_acct' 'add_timer' 'common_perm_cond' 'wbt_issue' 'ipip_tunnel_xmit' 'datagram_poll' 'pcpu_alloc' 'blk_mq_sched_dispatch_requests' 'mm_update_next_owner' 'do_readlinkat' 'page_counter_try_charge' '__neigh_event_send' 'do_nanosleep' 'watchdog' '__ext4_new_inode' 'update_defense_level' 'ktime_get_seconds' 'ext4_mb_good_group' 'sk_wait_data' '__dev_queue_xmit' 'pipe_wait' 'vm_area_dup' 'ext4_free_inodes_count' 'icmp_global_allow' 'process_srcu' 'batadv_tt_local_add' 'copy_creds' 'kvm_arch_vcpu_create' 'generic_write_end' 'commit_echoes' 'snapshot_refaults' 'bio_endio' 'p9_poll_workfn' 'copy_process' 'ext4_setattr' 'ktime_get' 'find_next_bit' 'poll_schedule_timeout' 'sit_tunnel_xmit' 'vti_tunnel_xmit' 'xas_clear_mark' 'shmem_add_to_page_cache' 'tomoyo_check_path_acl' 'dd_has_work' 'xas_find_marked' 'futex_wait_queue_me' 'ip_finish_output2' 'generic_permission' 'tick_nohz_idle_stop_tick' 'get_wchan' 'fuse_get_req' '__hrtimer_run_queues' '__skb_try_recv_from_queue' 'blk_mq_get_request' 'virtnet_poll_tx' 'mem_cgroup_select_victim_node' '__acct_update_integrals' 'inet_dgram_connect' 'ep_poll' 'kvm_arch_vcpu_load' 'rcu_gp_fqs_check_wake' 'taskstats_exit' 'audit_log_start' '__skb_recv_udp' 'mem_cgroup_protected' 'find_get_pages_range_tag' '__find_get_block' 'ktime_get_real_seconds' 'ext4_has_free_clusters' 'wbt_done' '__alloc_file' 'snd_seq_prioq_cell_out' 'pipe_poll' 'fsnotify' 'timer_clear_idle' 'kauditd_thread' [ 114.817783][ C0] ================================================================== [ 114.825913][ C0] BUG: KCSAN: data-race in ktime_get_with_offset / timekeeping_advance [ 114.834123][ C0] [ 114.836436][ C0] write to 0xffffffff86040b08 of 280 bytes by interrupt on cpu 1: [ 114.844216][ C0] timekeeping_advance+0x893/0xd80 [ 114.849302][ C0] update_wall_time+0x19/0x20 [ 114.853957][ C0] tick_do_update_jiffies64+0x1ae/0x260 [ 114.859477][ C0] tick_sched_do_timer+0xd4/0xe0 [ 114.864393][ C0] tick_sched_timer+0x43/0xe0 [ 114.869053][ C0] __hrtimer_run_queues+0x288/0x600 [ 114.874322][ C0] hrtimer_interrupt+0x22a/0x480 [ 114.879238][ C0] smp_apic_timer_interrupt+0xdc/0x280 [ 114.884693][ C0] apic_timer_interrupt+0xf/0x20 [ 114.889621][ C0] write_comp_data+0x17/0x70 [ 114.894188][ C0] __nf_conntrack_find_get+0x1c1/0x880 [ 114.899623][ C0] nf_conntrack_in+0x2ef/0xa80 [ 114.904374][ C0] ipv4_conntrack_local+0xbe/0x130 [ 114.909473][ C0] nf_hook_slow+0x83/0x160 [ 114.913857][ C0] [ 114.916249][ C0] read to 0xffffffff86040b28 of 8 bytes by interrupt on cpu 0: [ 114.923776][ C0] ktime_get_with_offset+0x136/0x230 [ 114.929039][ C0] netif_receive_skb_internal+0x13e/0x190 [ 114.934744][ C0] napi_gro_receive+0x28f/0x330 [ 114.939574][ C0] receive_buf+0x284/0x30b0 [ 114.944052][ C0] virtnet_poll+0x436/0x7d0 [ 114.948531][ C0] net_rx_action+0x3ae/0xa90 [ 114.953110][ C0] __do_softirq+0x115/0x33f [ 114.957696][ C0] run_ksoftirqd+0x46/0x60 [ 114.962098][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 114.967008][ C0] kthread+0x1d4/0x200 [ 114.971049][ C0] ret_from_fork+0x1f/0x30 [ 114.975438][ C0] [ 114.977745][ C0] Reported by Kernel Concurrency Sanitizer on: [ 114.983893][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-rc3+ #0 [ 114.991155][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.001184][ C0] ================================================================== [ 115.009653][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 115.016215][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-rc3+ #0 [ 115.023468][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.033496][ C0] Call Trace: [ 115.036769][ C0] dump_stack+0xf5/0x159 [ 115.041000][ C0] panic+0x210/0x640 [ 115.044875][ C0] ? smpboot_thread_fn+0x37d/0x4a0 [ 115.049971][ C0] ? vprintk_func+0x8d/0x140 [ 115.054541][ C0] kcsan_report.cold+0xc/0x10 [ 115.059200][ C0] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 115.064728][ C0] __tsan_read8+0x2c/0x30 [ 115.069049][ C0] ktime_get_with_offset+0x136/0x230 [ 115.074329][ C0] netif_receive_skb_internal+0x13e/0x190 [ 115.080212][ C0] napi_gro_receive+0x28f/0x330 [ 115.085044][ C0] receive_buf+0x284/0x30b0 [ 115.089526][ C0] ? __tsan_write8+0x32/0x40 [ 115.094109][ C0] ? virtqueue_get_buf_ctx+0x4fd/0x5c0 [ 115.099553][ C0] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 115.105174][ C0] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 115.110788][ C0] virtnet_poll+0x436/0x7d0 [ 115.115279][ C0] net_rx_action+0x3ae/0xa90 [ 115.119855][ C0] __do_softirq+0x115/0x33f [ 115.124342][ C0] ? takeover_tasklets+0x250/0x250 [ 115.129432][ C0] run_ksoftirqd+0x46/0x60 [ 115.133838][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 115.138755][ C0] kthread+0x1d4/0x200 [ 115.142823][ C0] ? constant_test_bit.constprop.0+0x30/0x30 [ 115.148776][ C0] ? kthread_stop+0x2d0/0x2d0 [ 115.153441][ C0] ret_from_fork+0x1f/0x30 [ 115.159310][ C0] Kernel Offset: disabled [ 115.163663][ C0] Rebooting in 86400 seconds..