[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.206' (ECDSA) to the list of known hosts. 2020/07/14 20:29:43 fuzzer started 2020/07/14 20:29:43 dialing manager at 10.128.0.105:43319 2020/07/14 20:29:44 syscalls: 3150 2020/07/14 20:29:44 code coverage: enabled 2020/07/14 20:29:44 comparison tracing: enabled 2020/07/14 20:29:44 extra coverage: enabled 2020/07/14 20:29:44 setuid sandbox: enabled 2020/07/14 20:29:44 namespace sandbox: enabled 2020/07/14 20:29:44 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/14 20:29:44 fault injection: enabled 2020/07/14 20:29:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/14 20:29:44 net packet injection: enabled 2020/07/14 20:29:44 net device setup: enabled 2020/07/14 20:29:44 concurrency sanitizer: enabled 2020/07/14 20:29:44 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/14 20:29:44 USB emulation: enabled 2020/07/14 20:29:45 suppressing KCSAN reports in functions: 'find_get_pages_range_tag' 'ext4_free_inode' '__mpage_writepage' '__xa_clear_mark' 'do_sys_poll' '__ext4_new_inode' 'do_select' 'blk_mq_sched_dispatch_requests' 'ext4_writepages' 'blk_mq_rq_ctx_init' syzkaller login: [ 33.625242][ T8632] ================================================================== [ 33.634075][ T8632] BUG: KCSAN: data-race in do_epoll_wait / ep_poll_callback [ 33.641596][ T8632] [ 33.643899][ T8632] write to 0xffff888121921650 of 8 bytes by interrupt on cpu 1: [ 33.651503][ T8632] ep_poll_callback+0x29c/0x510 [ 33.656329][ T8632] __wake_up_common+0xbc/0x130 [ 33.661059][ T8632] __wake_up_sync_key+0x83/0xc0 [ 33.665883][ T8632] sock_def_readable+0x61/0xe0 [ 33.670614][ T8632] tcp_rcv_established+0x13c0/0x1520 [ 33.675904][ T8632] tcp_v4_do_rcv+0x25e/0x480 [ 33.680461][ T8632] tcp_v4_rcv+0x219b/0x2420 [ 33.684931][ T8632] ip_protocol_deliver_rcu+0x1f9/0x400 [ 33.690356][ T8632] ip_local_deliver+0x1d6/0x2a0 [ 33.695171][ T8632] ip_sublist_rcv+0x4d4/0x5a0 [ 33.699816][ T8632] ip_list_rcv+0x262/0x290 [ 33.704205][ T8632] __netif_receive_skb_list_core+0x34b/0x450 [ 33.710152][ T8632] __netif_receive_skb_list+0x298/0x310 [ 33.715669][ T8632] netif_receive_skb_list_internal+0xda/0x330 [ 33.721709][ T8632] napi_gro_receive+0x329/0x5a0 [ 33.726569][ T8632] receive_buf+0x7a4/0xcf0 [ 33.730954][ T8632] virtnet_poll+0x2fa/0x780 [ 33.735422][ T8632] napi_poll+0x178/0x4a0 [ 33.739630][ T8632] net_rx_action+0x1ba/0x530 [ 33.744186][ T8632] __do_softirq+0x198/0x360 [ 33.748656][ T8632] run_ksoftirqd+0x2f/0x60 [ 33.753040][ T8632] smpboot_thread_fn+0x347/0x530 [ 33.757986][ T8632] kthread+0x20d/0x230 [ 33.762065][ T8632] ret_from_fork+0x1f/0x30 [ 33.766487][ T8632] [ 33.768786][ T8632] read to 0xffff888121921650 of 8 bytes by task 8632 on cpu 0: [ 33.776297][ T8632] do_epoll_wait+0x2e2/0x870 [ 33.780857][ T8632] __x64_sys_epoll_pwait+0x92/0x150 [ 33.786024][ T8632] do_syscall_64+0x51/0xb0 [ 33.790412][ T8632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.796267][ T8632] [ 33.798567][ T8632] Reported by Kernel Concurrency Sanitizer on: [ 33.804692][ T8632] CPU: 0 PID: 8632 Comm: syz-fuzzer Not tainted 5.8.0-rc5-syzkaller #0 [ 33.812892][ T8632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.822916][ T8632] ================================================================== [ 33.830944][ T8632] Kernel panic - not syncing: panic_on_warn set ... [ 33.837499][ T8632] CPU: 0 PID: 8632 Comm: syz-fuzzer Not tainted 5.8.0-rc5-syzkaller #0 [ 33.845816][ T8632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.855852][ T8632] Call Trace: [ 33.859123][ T8632] dump_stack+0x10f/0x19d [ 33.863431][ T8632] panic+0x207/0x64a [ 33.867305][ T8632] ? vprintk_emit+0x44a/0x4f0 [ 33.871984][ T8632] kcsan_report+0x684/0x690 [ 33.876461][ T8632] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 33.881979][ T8632] ? do_epoll_wait+0x2e2/0x870 [ 33.886715][ T8632] ? __x64_sys_epoll_pwait+0x92/0x150 [ 33.892068][ T8632] ? do_syscall_64+0x51/0xb0 [ 33.896640][ T8632] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.902690][ T8632] ? blk_flush_plug_list+0x23c/0x260 [ 33.907946][ T8632] ? tlb_flush_mmu+0x5d3/0x5f0 [ 33.912685][ T8632] kcsan_setup_watchpoint+0x453/0x4d0 [ 33.918029][ T8632] do_epoll_wait+0x2e2/0x870 [ 33.922595][ T8632] ? debug_smp_processor_id+0x18/0x20 [ 33.927939][ T8632] __x64_sys_epoll_pwait+0x92/0x150 [ 33.933107][ T8632] do_syscall_64+0x51/0xb0 [ 33.937498][ T8632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.943360][ T8632] RIP: 0033:0x469240 [ 33.947219][ T8632] Code: Bad RIP value. [ 33.951258][ T8632] RSP: 002b:000000c0000497f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 33.959637][ T8632] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000469240 [ 33.967579][ T8632] RDX: 0000000000000080 RSI: 000000c000049840 RDI: 0000000000000003 [ 33.975529][ T8632] RBP: 000000c000049e40 R08: 0000000000000000 R09: 00007ffeaa0b4080 [ 33.983472][ T8632] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 [ 33.991587][ T8632] R13: 000000c000000f00 R14: 0000000000000002 R15: 0000000000000002 [ 34.000608][ T8632] Kernel Offset: disabled [ 34.004931][ T8632] Rebooting in 86400 seconds..