[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 24.633282][ T8603] bash (8603) used greatest stack depth: 9968 bytes left Warning: Permanently added '10.128.0.104' (ECDSA) to the list of known hosts. 2020/07/15 23:55:08 fuzzer started 2020/07/15 23:55:08 dialing manager at 10.128.0.105:45345 2020/07/15 23:55:08 syscalls: 3184 2020/07/15 23:55:08 code coverage: enabled 2020/07/15 23:55:08 comparison tracing: enabled 2020/07/15 23:55:08 extra coverage: enabled 2020/07/15 23:55:08 setuid sandbox: enabled 2020/07/15 23:55:08 namespace sandbox: enabled 2020/07/15 23:55:08 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/15 23:55:08 fault injection: enabled 2020/07/15 23:55:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/15 23:55:08 net packet injection: enabled 2020/07/15 23:55:08 net device setup: enabled 2020/07/15 23:55:08 concurrency sanitizer: enabled 2020/07/15 23:55:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/15 23:55:08 USB emulation: enabled 2020/07/15 23:55:09 suppressing KCSAN reports in functions: 'ext4_free_inode' 'alloc_pid' 'ext4_mb_regular_allocator' 'blk_mq_sched_dispatch_requests' 'blk_mq_dispatch_rq_list' 'find_get_pages_range_tag' '__ext4_new_inode' 'pcpu_alloc' [ 33.993924][ T8631] ================================================================== [ 34.002073][ T8631] BUG: KCSAN: data-race in do_epoll_wait / ep_poll_callback [ 34.009321][ T8631] [ 34.011621][ T8631] write to 0xffff888124eb5f50 of 8 bytes by interrupt on cpu 1: [ 34.019222][ T8631] ep_poll_callback+0x29c/0x510 [ 34.024075][ T8631] __wake_up_common+0xbc/0x130 [ 34.028807][ T8631] __wake_up_sync_key+0x83/0xc0 [ 34.033629][ T8631] sock_def_readable+0x61/0xe0 [ 34.038381][ T8631] tcp_data_queue+0x1b71/0x3160 [ 34.043214][ T8631] tcp_rcv_established+0x667/0x1520 [ 34.048388][ T8631] tcp_v4_do_rcv+0x25e/0x480 [ 34.052943][ T8631] tcp_v4_rcv+0x219b/0x2420 [ 34.057414][ T8631] ip_protocol_deliver_rcu+0x1f9/0x400 [ 34.062836][ T8631] ip_local_deliver+0x1d6/0x2a0 [ 34.067668][ T8631] ip_sublist_rcv+0x4d4/0x5a0 [ 34.072325][ T8631] ip_list_rcv+0x262/0x290 [ 34.076714][ T8631] __netif_receive_skb_list_core+0x34b/0x450 [ 34.082672][ T8631] __netif_receive_skb_list+0x298/0x310 [ 34.088184][ T8631] netif_receive_skb_list_internal+0xda/0x330 [ 34.094220][ T8631] napi_gro_receive+0x329/0x5a0 [ 34.099039][ T8631] receive_buf+0x7a4/0xcf0 [ 34.103437][ T8631] virtnet_poll+0x2fa/0x780 [ 34.107918][ T8631] napi_poll+0x178/0x4a0 [ 34.112152][ T8631] net_rx_action+0x1ba/0x530 [ 34.116748][ T8631] __do_softirq+0x198/0x360 [ 34.121219][ T8631] run_ksoftirqd+0x2f/0x60 [ 34.125606][ T8631] smpboot_thread_fn+0x347/0x530 [ 34.130521][ T8631] kthread+0x20d/0x230 [ 34.134590][ T8631] ret_from_fork+0x1f/0x30 [ 34.139001][ T8631] [ 34.141301][ T8631] read to 0xffff888124eb5f50 of 8 bytes by task 8631 on cpu 0: [ 34.148816][ T8631] do_epoll_wait+0x2e2/0x870 [ 34.153380][ T8631] __x64_sys_epoll_pwait+0x92/0x150 [ 34.158555][ T8631] do_syscall_64+0x51/0xb0 [ 34.162948][ T8631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 34.168806][ T8631] [ 34.171103][ T8631] Reported by Kernel Concurrency Sanitizer on: [ 34.177228][ T8631] CPU: 0 PID: 8631 Comm: syz-fuzzer Not tainted 5.8.0-rc5-syzkaller #0 [ 34.185431][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.195455][ T8631] ================================================================== [ 34.203494][ T8631] Kernel panic - not syncing: panic_on_warn set ... [ 34.210049][ T8631] CPU: 0 PID: 8631 Comm: syz-fuzzer Not tainted 5.8.0-rc5-syzkaller #0 [ 34.218263][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.228290][ T8631] Call Trace: [ 34.231554][ T8631] dump_stack+0x10f/0x19d [ 34.235866][ T8631] panic+0x207/0x64a [ 34.239758][ T8631] ? vprintk_emit+0x44a/0x4f0 [ 34.244415][ T8631] kcsan_report+0x684/0x690 [ 34.248888][ T8631] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 34.254404][ T8631] ? do_epoll_wait+0x2e2/0x870 [ 34.259135][ T8631] ? __x64_sys_epoll_pwait+0x92/0x150 [ 34.264479][ T8631] ? do_syscall_64+0x51/0xb0 [ 34.269043][ T8631] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 34.275100][ T8631] ? ep_send_events_proc+0x4fd/0x620 [ 34.280368][ T8631] kcsan_setup_watchpoint+0x453/0x4d0 [ 34.285714][ T8631] do_epoll_wait+0x2e2/0x870 [ 34.290277][ T8631] ? debug_smp_processor_id+0x18/0x20 [ 34.295632][ T8631] __x64_sys_epoll_pwait+0x92/0x150 [ 34.300808][ T8631] do_syscall_64+0x51/0xb0 [ 34.305203][ T8631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 34.311064][ T8631] RIP: 0033:0x469240 [ 34.314923][ T8631] Code: Bad RIP value. [ 34.318954][ T8631] RSP: 002b:000000c00004f7f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 34.327331][ T8631] RAX: ffffffffffffffda RBX: 0000000000000317 RCX: 0000000000469240 [ 34.335273][ T8631] RDX: 0000000000000080 RSI: 000000c00004f840 RDI: 0000000000000003 [ 34.343215][ T8631] RBP: 000000c00004fe40 R08: 0000000000000000 R09: 0000000000000000 [ 34.351159][ T8631] R10: 0000000000000317 R11: 0000000000000246 R12: 0000000000000003 [ 34.359119][ T8631] R13: 000000c000000900 R14: 0000000000000040 R15: 0000000000000004 [ 34.368188][ T8631] Kernel Offset: disabled [ 34.372502][ T8631] Rebooting in 86400 seconds..