[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.95' (ECDSA) to the list of known hosts. 2020/07/14 10:49:48 fuzzer started 2020/07/14 10:49:48 dialing manager at 10.128.0.105:41529 2020/07/14 10:49:48 syscalls: 3150 2020/07/14 10:49:48 code coverage: enabled 2020/07/14 10:49:48 comparison tracing: enabled 2020/07/14 10:49:48 extra coverage: enabled 2020/07/14 10:49:48 setuid sandbox: enabled 2020/07/14 10:49:48 namespace sandbox: enabled 2020/07/14 10:49:48 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/14 10:49:48 fault injection: enabled 2020/07/14 10:49:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/14 10:49:48 net packet injection: enabled 2020/07/14 10:49:48 net device setup: enabled 2020/07/14 10:49:48 concurrency sanitizer: enabled 2020/07/14 10:49:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/14 10:49:48 USB emulation: enabled 2020/07/14 10:49:48 suppressing KCSAN reports in functions: 'pcpu_alloc' '__xa_clear_mark' '__ext4_new_inode' syzkaller login: [ 32.488818][ T8631] ================================================================== [ 32.496920][ T8631] BUG: KCSAN: data-race in do_epoll_wait / ep_poll_callback [ 32.504181][ T8631] [ 32.506500][ T8631] write to 0xffff888121b43350 of 8 bytes by interrupt on cpu 0: [ 32.514117][ T8631] ep_poll_callback+0x29c/0x510 [ 32.518951][ T8631] __wake_up_common+0xbc/0x130 [ 32.523694][ T8631] __wake_up_sync_key+0x83/0xc0 [ 32.528526][ T8631] sock_def_readable+0x61/0xe0 [ 32.533274][ T8631] tcp_rcv_established+0x13c0/0x1520 [ 32.538558][ T8631] tcp_v4_do_rcv+0x25e/0x480 [ 32.543139][ T8631] tcp_v4_rcv+0x219b/0x2420 [ 32.547630][ T8631] ip_protocol_deliver_rcu+0x1f9/0x400 [ 32.553430][ T8631] ip_local_deliver+0x1d6/0x2a0 [ 32.559043][ T8631] ip_sublist_rcv+0x4d4/0x5a0 [ 32.563702][ T8631] ip_list_rcv+0x262/0x290 [ 32.568104][ T8631] __netif_receive_skb_list_core+0x34b/0x450 [ 32.574064][ T8631] __netif_receive_skb_list+0x298/0x310 [ 32.579590][ T8631] netif_receive_skb_list_internal+0xda/0x330 [ 32.585634][ T8631] napi_gro_receive+0x329/0x5a0 [ 32.590465][ T8631] receive_buf+0x7a4/0xcf0 [ 32.594863][ T8631] virtnet_poll+0x2fa/0x780 [ 32.599347][ T8631] napi_poll+0x178/0x4a0 [ 32.603570][ T8631] net_rx_action+0x1ba/0x530 [ 32.608148][ T8631] __do_softirq+0x198/0x360 [ 32.612647][ T8631] run_ksoftirqd+0x2f/0x60 [ 32.617751][ T8631] smpboot_thread_fn+0x347/0x530 [ 32.622669][ T8631] kthread+0x20d/0x230 [ 32.626719][ T8631] ret_from_fork+0x1f/0x30 [ 32.631121][ T8631] [ 32.633434][ T8631] read to 0xffff888121b43350 of 8 bytes by task 8631 on cpu 1: [ 32.640977][ T8631] do_epoll_wait+0x2e2/0x870 [ 32.645547][ T8631] __x64_sys_epoll_pwait+0x92/0x150 [ 32.650727][ T8631] do_syscall_64+0x51/0xb0 [ 32.655124][ T8631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 32.660988][ T8631] [ 32.663295][ T8631] Reported by Kernel Concurrency Sanitizer on: [ 32.669432][ T8631] CPU: 1 PID: 8631 Comm: syz-fuzzer Not tainted 5.8.0-rc5-syzkaller #0 [ 32.677651][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.687688][ T8631] ================================================================== [ 32.695728][ T8631] Kernel panic - not syncing: panic_on_warn set ... [ 32.702298][ T8631] CPU: 1 PID: 8631 Comm: syz-fuzzer Not tainted 5.8.0-rc5-syzkaller #0 [ 32.710511][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.720830][ T8631] Call Trace: [ 32.724106][ T8631] dump_stack+0x10f/0x19d [ 32.728417][ T8631] panic+0x207/0x64a [ 32.732310][ T8631] ? vprintk_emit+0x44a/0x4f0 [ 32.736971][ T8631] kcsan_report+0x684/0x690 [ 32.741460][ T8631] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 32.746987][ T8631] ? do_epoll_wait+0x2e2/0x870 [ 32.751735][ T8631] ? __x64_sys_epoll_pwait+0x92/0x150 [ 32.757089][ T8631] ? do_syscall_64+0x51/0xb0 [ 32.761663][ T8631] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 32.767724][ T8631] ? ep_send_events_proc+0x4fd/0x620 [ 32.772998][ T8631] kcsan_setup_watchpoint+0x453/0x4d0 [ 32.778355][ T8631] do_epoll_wait+0x2e2/0x870 [ 32.782948][ T8631] ? debug_smp_processor_id+0x18/0x20 [ 32.788302][ T8631] __x64_sys_epoll_pwait+0x92/0x150 [ 32.793485][ T8631] do_syscall_64+0x51/0xb0 [ 32.797908][ T8631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 32.803781][ T8631] RIP: 0033:0x469240 [ 32.807648][ T8631] Code: Bad RIP value. [ 32.811709][ T8631] RSP: 002b:000000c00008d7f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 32.820101][ T8631] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000469240 [ 32.828054][ T8631] RDX: 0000000000000080 RSI: 000000c00008d840 RDI: 0000000000000003 [ 32.836010][ T8631] RBP: 000000c00008de40 R08: 0000000000000000 R09: 0000000000000000 [ 32.843988][ T8631] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 [ 32.851942][ T8631] R13: 000000c000001b00 R14: 0000000000000002 R15: 0000000000000002 [ 32.860940][ T8631] Kernel Offset: disabled [ 32.865279][ T8631] Rebooting in 86400 seconds..