Warning: Permanently added '10.128.10.15' (ECDSA) to the list of known hosts.
2019/10/22 15:27:15 fuzzer started
2019/10/22 15:27:17 dialing manager at 10.128.0.105:33369
2019/10/22 15:27:17 syscalls: 2524
2019/10/22 15:27:17 code coverage: enabled
2019/10/22 15:27:17 comparison tracing: enabled
2019/10/22 15:27:17 extra coverage: extra coverage is not supported by the kernel
2019/10/22 15:27:17 setuid sandbox: enabled
2019/10/22 15:27:17 namespace sandbox: enabled
2019/10/22 15:27:17 Android sandbox: /sys/fs/selinux/policy does not exist
2019/10/22 15:27:17 fault injection: enabled
2019/10/22 15:27:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/10/22 15:27:17 net packet injection: enabled
2019/10/22 15:27:17 net device setup: enabled
2019/10/22 15:27:17 concurrency sanitizer: enabled
syzkaller login: [   47.728223][    C1] ==================================================================
[   47.736354][    C1] BUG: KCSAN: data-race in __tcp_select_window / tcp_add_backlog
[   47.744056][    C1] 
[   47.746369][    C1] read to 0xffff8881226552ec of 4 bytes by task 7222 on cpu 0:
[   47.753903][    C1]  __tcp_select_window+0x6b/0x4d0
[   47.758909][    C1]  __tcp_transmit_skb+0x700/0x1d60
[   47.764007][    C1]  __tcp_send_ack+0x246/0x300
[   47.768669][    C1]  tcp_send_ack+0x34/0x40
[   47.772991][    C1]  tcp_cleanup_rbuf+0x130/0x360
[   47.777834][    C1]  tcp_recvmsg+0x633/0x1a30
[   47.782316][    C1]  inet_recvmsg+0xbb/0x250
[   47.786714][    C1]  sock_recvmsg+0x92/0xb0
[   47.791025][    C1]  sock_read_iter+0x15f/0x1e0
[   47.795682][    C1]  new_sync_read+0x389/0x4f0
[   47.800251][    C1]  __vfs_read+0xb1/0xc0
[   47.804387][    C1]  vfs_read+0x143/0x2c0
[   47.808524][    C1]  ksys_read+0xd5/0x1b0
[   47.812667][    C1]  __x64_sys_read+0x4c/0x60
[   47.817147][    C1] 
[   47.819458][    C1] write to 0xffff8881226552ec of 4 bytes by interrupt on cpu 1:
[   47.827068][    C1]  tcp_add_backlog+0x4a0/0xcc0
[   47.831812][    C1]  tcp_v4_rcv+0x1a60/0x1bb0
[   47.836294][    C1]  ip_protocol_deliver_rcu+0x4d/0x420
[   47.841686][    C1]  ip_local_deliver_finish+0x110/0x140
[   47.847123][    C1]  ip_local_deliver+0x133/0x210
[   47.851956][    C1]  ip_rcv_finish+0x121/0x160
[   47.856539][    C1]  ip_rcv+0x18f/0x1a0
[   47.860504][    C1]  __netif_receive_skb_one_core+0xa7/0xe0
[   47.866203][    C1]  __netif_receive_skb+0x37/0xf0
[   47.871120][    C1]  netif_receive_skb_internal+0x59/0x190
[   47.876732][    C1]  napi_gro_receive+0x28f/0x330
[   47.881573][    C1]  receive_buf+0x284/0x30b0
[   47.886067][    C1]  virtnet_poll+0x436/0x7d0
[   47.890540][    C1] 
[   47.892845][    C1] Reported by Kernel Concurrency Sanitizer on:
[   47.898981][    C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0
[   47.906330][    C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   47.916364][    C1] ==================================================================
[   47.924404][    C1] Kernel panic - not syncing: panic_on_warn set ...
[   47.930975][    C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.4.0-rc3+ #0
[   47.938318][    C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   47.948350][    C1] Call Trace:
[   47.951628][    C1]  dump_stack+0xf5/0x159
[   47.955863][    C1]  panic+0x210/0x640
[   47.959746][    C1]  ? __netif_receive_skb+0x37/0xf0
[   47.964852][    C1]  ? vprintk_func+0x8d/0x140
[   47.969441][    C1]  kcsan_report.cold+0xc/0x10
[   47.974101][    C1]  __kcsan_setup_watchpoint+0x32e/0x4a0
[   47.979627][    C1]  __tsan_write4+0x32/0x40
[   47.984036][    C1]  tcp_add_backlog+0x4a0/0xcc0
[   47.988791][    C1]  tcp_v4_rcv+0x1a60/0x1bb0
[   47.993278][    C1]  ? __tsan_read8+0x2c/0x30
[   47.997770][    C1]  ip_protocol_deliver_rcu+0x4d/0x420
[   48.003129][    C1]  ip_local_deliver_finish+0x110/0x140
[   48.008572][    C1]  ip_local_deliver+0x133/0x210
[   48.013419][    C1]  ? ip_protocol_deliver_rcu+0x420/0x420
[   48.019039][    C1]  ip_rcv_finish+0x121/0x160
[   48.023615][    C1]  ip_rcv+0x18f/0x1a0
[   48.027580][    C1]  ? ip_sublist_rcv+0x5e0/0x5e0
[   48.032413][    C1]  ? ip_local_deliver+0x210/0x210
[   48.037422][    C1]  __netif_receive_skb_one_core+0xa7/0xe0
[   48.043129][    C1]  __netif_receive_skb+0x37/0xf0
[   48.048053][    C1]  netif_receive_skb_internal+0x59/0x190
[   48.053670][    C1]  napi_gro_receive+0x28f/0x330
[   48.058505][    C1]  receive_buf+0x284/0x30b0
[   48.062994][    C1]  ? __tsan_write8+0x32/0x40
[   48.067578][    C1]  ? virtqueue_get_buf_ctx+0x4fd/0x5c0
[   48.073017][    C1]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   48.078631][    C1]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   48.084250][    C1]  virtnet_poll+0x436/0x7d0
[   48.088741][    C1]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[   48.094974][    C1]  net_rx_action+0x3ae/0xa90
[   48.099553][    C1]  __do_softirq+0x115/0x33f
[   48.104048][    C1]  ? takeover_tasklets+0x250/0x250
[   48.109143][    C1]  run_ksoftirqd+0x46/0x60
[   48.113543][    C1]  smpboot_thread_fn+0x37d/0x4a0
[   48.118465][    C1]  kthread+0x1d4/0x200
[   48.122517][    C1]  ? constant_test_bit.constprop.0+0x30/0x30
[   48.128486][    C1]  ? kthread_stop+0x2d0/0x2d0
[   48.133147][    C1]  ret_from_fork+0x1f/0x30
[   48.138739][    C1] Kernel Offset: disabled
[   48.143102][    C1] Rebooting in 86400 seconds..