[ 41.021555][ T26] audit: type=1800 audit(1571771678.828:25): pid=6800 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 41.048633][ T26] audit: type=1800 audit(1571771678.828:26): pid=6800 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 41.086987][ T26] audit: type=1800 audit(1571771678.828:27): pid=6800 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 41.450337][ T6865] sshd (6865) used greatest stack depth: 10136 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. 2019/10/22 19:14:46 fuzzer started 2019/10/22 19:14:48 dialing manager at 10.128.0.105:33369 2019/10/22 19:14:48 syscalls: 2524 2019/10/22 19:14:48 code coverage: enabled 2019/10/22 19:14:48 comparison tracing: enabled 2019/10/22 19:14:48 extra coverage: extra coverage is not supported by the kernel 2019/10/22 19:14:48 setuid sandbox: enabled 2019/10/22 19:14:48 namespace sandbox: enabled 2019/10/22 19:14:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/22 19:14:48 fault injection: enabled 2019/10/22 19:14:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/22 19:14:48 net packet injection: enabled 2019/10/22 19:14:48 net device setup: enabled 2019/10/22 19:14:48 concurrency sanitizer: enabled syzkaller login: [ 50.675998][ T6962] ================================================================== [ 50.684137][ T6962] BUG: KCSAN: data-race in tcp_add_backlog / tcp_recvmsg [ 50.691127][ T6962] [ 50.693523][ T6962] write to 0xffff888121b59338 of 8 bytes by interrupt on cpu 0: [ 50.701140][ T6962] tcp_add_backlog+0x45a/0xcc0 [ 50.705889][ T6962] tcp_v4_rcv+0x1a60/0x1bb0 [ 50.710371][ T6962] ip_protocol_deliver_rcu+0x4d/0x420 [ 50.715723][ T6962] ip_local_deliver_finish+0x110/0x140 [ 50.721169][ T6962] ip_local_deliver+0x133/0x210 [ 50.726132][ T6962] ip_rcv_finish+0x121/0x160 [ 50.730699][ T6962] ip_rcv+0x18f/0x1a0 [ 50.734661][ T6962] __netif_receive_skb_one_core+0xa7/0xe0 [ 50.740362][ T6962] __netif_receive_skb+0x37/0xf0 [ 50.745276][ T6962] netif_receive_skb_internal+0x59/0x190 [ 50.750885][ T6962] napi_gro_receive+0x28f/0x330 [ 50.755715][ T6962] receive_buf+0x284/0x30b0 [ 50.760193][ T6962] virtnet_poll+0x436/0x7d0 [ 50.764670][ T6962] net_rx_action+0x3ae/0xa90 [ 50.769228][ T6962] [ 50.771537][ T6962] read to 0xffff888121b59338 of 8 bytes by task 6962 on cpu 1: [ 50.779055][ T6962] tcp_recvmsg+0x470/0x1a30 [ 50.783534][ T6962] inet_recvmsg+0xbb/0x250 [ 50.787929][ T6962] sock_recvmsg+0x92/0xb0 [ 50.792246][ T6962] sock_read_iter+0x15f/0x1e0 [ 50.796898][ T6962] new_sync_read+0x389/0x4f0 [ 50.801467][ T6962] __vfs_read+0xb1/0xc0 [ 50.805595][ T6962] vfs_read+0x143/0x2c0 [ 50.809723][ T6962] ksys_read+0xd5/0x1b0 [ 50.813867][ T6962] __x64_sys_read+0x4c/0x60 [ 50.818347][ T6962] do_syscall_64+0xcc/0x370 [ 50.822824][ T6962] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.828694][ T6962] [ 50.831009][ T6962] Reported by Kernel Concurrency Sanitizer on: [ 50.837140][ T6962] CPU: 1 PID: 6962 Comm: syz-fuzzer Not tainted 5.4.0-rc3+ #0 [ 50.844565][ T6962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.854592][ T6962] ================================================================== [ 50.862626][ T6962] Kernel panic - not syncing: panic_on_warn set ... [ 50.869187][ T6962] CPU: 1 PID: 6962 Comm: syz-fuzzer Not tainted 5.4.0-rc3+ #0 [ 50.876623][ T6962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.886653][ T6962] Call Trace: [ 50.889921][ T6962] dump_stack+0xf5/0x159 [ 50.894155][ T6962] panic+0x210/0x640 [ 50.898027][ T6962] ? __x64_sys_read+0x4c/0x60 [ 50.902681][ T6962] ? vprintk_func+0x8d/0x140 [ 50.907249][ T6962] kcsan_report.cold+0xc/0x10 [ 50.911905][ T6962] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 50.917427][ T6962] __tsan_read8+0x2c/0x30 [ 50.921732][ T6962] tcp_recvmsg+0x470/0x1a30 [ 50.926219][ T6962] ? preempt_schedule_common+0x37/0x90 [ 50.931671][ T6962] inet_recvmsg+0xbb/0x250 [ 50.936061][ T6962] ? __tsan_read8+0x2c/0x30 [ 50.940541][ T6962] ? inet_sendpage+0x100/0x100 [ 50.945279][ T6962] sock_recvmsg+0x92/0xb0 [ 50.949586][ T6962] sock_read_iter+0x15f/0x1e0 [ 50.954243][ T6962] new_sync_read+0x389/0x4f0 [ 50.958834][ T6962] __vfs_read+0xb1/0xc0 [ 50.962988][ T6962] vfs_read+0x143/0x2c0 [ 50.967126][ T6962] ksys_read+0xd5/0x1b0 [ 50.971265][ T6962] __x64_sys_read+0x4c/0x60 [ 50.975746][ T6962] do_syscall_64+0xcc/0x370 [ 50.980229][ T6962] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.986094][ T6962] RIP: 0033:0x47c530 [ 50.989967][ T6962] Code: 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 49 c7 c2 00 00 00 00 49 c7 c0 00 00 00 00 49 c7 c1 00 00 00 00 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 51.009561][ T6962] RSP: 002b:000000c4204eb810 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 51.017949][ T6962] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c530 [ 51.025895][ T6962] RDX: 0000000000001000 RSI: 000000c4203f2000 RDI: 0000000000000003 [ 51.033845][ T6962] RBP: 000000c4204eb868 R08: 0000000000000000 R09: 0000000000000000 [ 51.041791][ T6962] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000020 [ 51.049736][ T6962] R13: ffffffffffffffff R14: 0000000000000002 R15: ffffffffffffffff [ 51.059154][ T6962] Kernel Offset: disabled [ 51.063492][ T6962] Rebooting in 86400 seconds..