[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.52' (ECDSA) to the list of known hosts. 2020/12/28 00:09:56 fuzzer started 2020/12/28 00:09:57 dialing manager at 10.128.0.105:41485 2020/12/28 00:09:57 syscalls: 3466 2020/12/28 00:09:57 code coverage: enabled 2020/12/28 00:09:57 comparison tracing: enabled 2020/12/28 00:09:57 extra coverage: enabled 2020/12/28 00:09:57 setuid sandbox: enabled 2020/12/28 00:09:57 namespace sandbox: enabled 2020/12/28 00:09:57 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/28 00:09:57 fault injection: enabled 2020/12/28 00:09:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/28 00:09:57 net packet injection: enabled 2020/12/28 00:09:57 net device setup: enabled 2020/12/28 00:09:57 concurrency sanitizer: enabled 2020/12/28 00:09:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/28 00:09:57 USB emulation: enabled 2020/12/28 00:09:57 hci packet injection: enabled 2020/12/28 00:09:57 wifi device emulation: enabled 2020/12/28 00:10:02 suppressing KCSAN reports in functions: 'isolate_migratepages_block' 'get_signal' 'tick_nohz_next_event' 'ext4_free_inode' '__blkdev_get' 'do_nanosleep' 'mm_update_next_owner' 'blk_mq_dispatch_rq_list' 'audit_log_start' 'exit_mm' 'shmem_unlink' 'ext4_free_inodes_count' 'ext4_mb_good_group' '__mark_inode_dirty' '__ext4_new_inode' '_prb_read_valid' 'do_select' 'inotify_handle_inode_event' 'ext4_mark_iloc_dirty' 'do_signal_stop' 'del_nbp' 'blk_mq_rq_ctx_init' 'generic_file_buffered_read' '__io_cqring_fill_event' 'expire_timers' 'step_into' '__add_to_page_cache_locked' 'n_tty_receive_buf_common' '__filemap_fdatawrite_range' 'wbt_issue' 'ext4_write_end' 'dd_has_work' 'kauditd_thread' 'wbt_done' 'find_get_pages_range_tag' 'ext4_set_iomap' 'lookup_fast' 'blk_mq_sched_dispatch_requests' 'xas_find_marked' '__delete_from_page_cache' 'shmem_symlink' 'ext4_writepages' 'do_group_exit' '__ext4_update_other_inode_time' 'futex_wait_queue_me' '__hci_req_sync' '__mod_timer' 'ext4_mb_regular_allocator' 'bpf_lru_pop_free' '__fsnotify_parent' 'do_sys_poll' 'btrfs_wait_block_group_cache_progress' 'pfkey_send_acquire' 'ps2_do_sendbyte' 'alloc_pid' 'blk_mq_request_bypass_insert' 'generic_write_end' 'pcpu_alloc' '__find_get_block' 'fsnotify' '__blk_mq_sched_dispatch_requests' syzkaller login: [ 94.532276][ T8441] ================================================================== [ 94.540405][ T8441] BUG: KCSAN: data-race in do_epoll_wait / do_epoll_wait [ 94.547437][ T8441] [ 94.549768][ T8441] write to 0xffff88810b66d598 of 8 bytes by task 8450 on cpu 0: [ 94.557389][ T8441] do_epoll_wait+0x4d3/0xf00 [ 94.561986][ T8441] __se_sys_epoll_pwait+0xfb/0x210 [ 94.567096][ T8441] __x64_sys_epoll_pwait+0x74/0x80 [ 94.572474][ T8441] do_syscall_64+0x39/0x80 [ 94.576895][ T8441] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 94.582792][ T8441] [ 94.585109][ T8441] read to 0xffff88810b66d598 of 8 bytes by task 8441 on cpu 1: [ 94.592646][ T8441] do_epoll_wait+0x292/0xf00 [ 94.597260][ T8441] __se_sys_epoll_pwait+0xfb/0x210 [ 94.602367][ T8441] __x64_sys_epoll_pwait+0x74/0x80 [ 94.607481][ T8441] do_syscall_64+0x39/0x80 [ 94.611916][ T8441] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 94.617812][ T8441] [ 94.620123][ T8441] Reported by Kernel Concurrency Sanitizer on: [ 94.626268][ T8441] CPU: 1 PID: 8441 Comm: syz-fuzzer Not tainted 5.10.0-syzkaller #0 [ 94.634676][ T8441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.644743][ T8441] ================================================================== [ 94.652798][ T8441] Kernel panic - not syncing: panic_on_warn set ... [ 94.659372][ T8441] CPU: 1 PID: 8441 Comm: syz-fuzzer Not tainted 5.10.0-syzkaller #0 [ 94.667342][ T8441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.677480][ T8441] Call Trace: [ 94.680762][ T8441] dump_stack+0x116/0x15d [ 94.685093][ T8441] panic+0x1e7/0x5fa [ 94.688984][ T8441] ? vprintk_emit+0x2e2/0x360 [ 94.693660][ T8441] kcsan_report+0x67b/0x680 [ 94.698174][ T8441] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 94.703733][ T8441] ? do_epoll_wait+0x292/0xf00 [ 94.708673][ T8441] ? __se_sys_epoll_pwait+0xfb/0x210 [ 94.713972][ T8441] ? __x64_sys_epoll_pwait+0x74/0x80 [ 94.719265][ T8441] ? do_syscall_64+0x39/0x80 [ 94.723855][ T8441] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 94.729936][ T8441] kcsan_setup_watchpoint+0x47b/0x4e0 [ 94.735467][ T8441] do_epoll_wait+0x292/0xf00 [ 94.740061][ T8441] ? add_interrupt_randomness+0x270/0x3d0 [ 94.745773][ T8441] ? note_interrupt+0x462/0x5f0 [ 94.750623][ T8441] __se_sys_epoll_pwait+0xfb/0x210 [ 94.755731][ T8441] __x64_sys_epoll_pwait+0x74/0x80 [ 94.760840][ T8441] do_syscall_64+0x39/0x80 [ 94.765267][ T8441] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 94.771165][ T8441] RIP: 0033:0x466780 [ 94.775053][ T8441] Code: 0f 05 89 44 24 20 c3 cc cc cc 8b 7c 24 08 48 8b 74 24 10 8b 54 24 18 44 8b 54 24 1c 49 c7 c0 00 00 00 00 b8 19 01 00 00 0f 05 <89> 44 24 20 c3 cc cc cc cc cc cc cc cc cc cc cc 8b 7c 24 08 48 c7 [ 94.794666][ T8441] RSP: 002b:000000c0002a78b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 94.803270][ T8441] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000466780 [ 94.811243][ T8441] RDX: 0000000000000080 RSI: 000000c0002a7900 RDI: 0000000000000003 [ 94.819218][ T8441] RBP: 000000c0002a7f00 R08: 0000000000000000 R09: 000000c00f6066c0 [ 94.827192][ T8441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000059 [ 94.835177][ T8441] R13: 000000c000298180 R14: 0000000000000007 R15: 000000000000be7f [ 94.843711][ T8441] Kernel Offset: disabled [ 94.848161][ T8441] Rebooting in 86400 seconds..