[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.189' (ECDSA) to the list of known hosts. 2020/04/20 04:54:11 fuzzer started 2020/04/20 04:54:13 connecting to host at 10.128.0.26:41249 2020/04/20 04:54:13 checking machine... 2020/04/20 04:54:13 checking revisions... 2020/04/20 04:54:13 testing simple program... syzkaller login: [ 65.376519][ T6984] IPVS: ftp: loaded support on port[0] = 21 2020/04/20 04:54:13 building call list... [ 65.569960][ T41] [ 65.572435][ T41] ============================= [ 65.577277][ T41] WARNING: suspicious RCU usage [ 65.602185][ T41] 5.7.0-rc2-next-20200420-syzkaller #0 Not tainted [ 65.619049][ T41] ----------------------------- [ 65.629520][ T41] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 65.649910][ T41] [ 65.649910][ T41] other info that might help us debug this: [ 65.649910][ T41] [ 65.677736][ T41] [ 65.677736][ T41] rcu_scheduler_active = 2, debug_locks = 1 [ 65.685839][ T41] 3 locks held by kworker/u4:2/41: [ 65.715280][ T41] #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 65.729488][ T41] #1: ffffc90000ed7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 65.740423][ T41] #2: ffffffff8a5a26f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 65.750144][ T41] [ 65.750144][ T41] stack backtrace: [ 65.757022][ T41] CPU: 1 PID: 41 Comm: kworker/u4:2 Not tainted 5.7.0-rc2-next-20200420-syzkaller #0 [ 65.766566][ T41] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.776802][ T41] Workqueue: netns cleanup_net [ 65.781661][ T41] Call Trace: [ 65.784965][ T41] dump_stack+0x188/0x20d [ 65.789307][ T41] ovs_ct_exit+0x3db/0x558 [ 65.793733][ T41] ovs_exit_net+0x1df/0xba0 [ 65.798248][ T41] ? synchronize_rcu.part.0+0xda/0xf0 [ 65.803655][ T41] ? synchronize_rcu_expedited+0x620/0x620 [ 65.809814][ T41] ? ovs_dp_cmd_del+0x270/0x270 [ 65.814676][ T41] ? ovs_dp_cmd_del+0x270/0x270 [ 65.819540][ T41] ops_exit_list.isra.0+0xa8/0x150 [ 65.824659][ T41] cleanup_net+0x511/0xa50 [ 65.829084][ T41] ? unregister_pernet_device+0x70/0x70 [ 65.834638][ T41] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 65.840627][ T41] ? _raw_spin_unlock_irq+0x1f/0x80 [ 65.845841][ T41] process_one_work+0x965/0x16a0 [ 65.850800][ T41] ? lock_release+0x800/0x800 [ 65.855483][ T41] ? pwq_dec_nr_in_flight+0x310/0x310 [ 65.860863][ T41] ? rwlock_bug.part.0+0x90/0x90 [ 65.865921][ T41] worker_thread+0x96/0xe20 [ 65.870442][ T41] ? process_one_work+0x16a0/0x16a0 [ 65.875663][ T41] kthread+0x38b/0x470 [ 65.879737][ T41] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 65.885464][ T41] ret_from_fork+0x24/0x30 [ 66.067757][ T41] tipc: TX() has been purged, node left! [ 66.110384][ T41] [ 66.112857][ T41] ============================= [ 66.118051][ T41] WARNING: suspicious RCU usage [ 66.123001][ T41] 5.7.0-rc2-next-20200420-syzkaller #0 Not tainted [ 66.130032][ T41] ----------------------------- [ 66.134954][ T41] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 66.143420][ T41] [ 66.143420][ T41] other info that might help us debug this: [ 66.143420][ T41] [ 66.154187][ T41] [ 66.154187][ T41] rcu_scheduler_active = 2, debug_locks = 1 [ 66.162804][ T41] 4 locks held by kworker/u4:2/41: [ 66.168382][ T41] #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 66.180301][ T41] #1: ffffc90000ed7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 66.190876][ T41] #2: ffffffff8a5a26f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 66.201377][ T41] #3: ffffffff8a5ae668 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 66.237696][ T41] [ 66.237696][ T41] stack backtrace: [ 66.237738][ T41] CPU: 1 PID: 41 Comm: kworker/u4:2 Not tainted 5.7.0-rc2-next-20200420-syzkaller #0 [ 66.237746][ T41] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.237762][ T41] Workqueue: netns cleanup_net [ 66.237770][ T41] Call Trace: [ 66.237797][ T41] dump_stack+0x188/0x20d [ 66.237818][ T41] ipmr_device_event+0x240/0x2b0 [ 66.281185][ T41] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 66.287244][ T41] notifier_call_chain+0xc0/0x230 [ 66.292289][ T41] call_netdevice_notifiers_info+0xb5/0x130 [ 66.298199][ T41] rollback_registered_many+0x75c/0xe70 [ 66.303763][ T41] ? netif_set_real_num_tx_queues+0x700/0x700 [ 66.309893][ T41] ? lock_downgrade+0x840/0x840 [ 66.314775][ T41] unregister_netdevice_many.part.0+0x16/0x1e0 [ 66.320960][ T41] unregister_netdevice_many+0x36/0x50 [ 66.326566][ T41] ip6gre_exit_batch_net+0x4e8/0x700 [ 66.331889][ T41] ? ip6gre_tunnel_link+0xf0/0xf0 [ 66.337053][ T41] ? rcu_read_lock_held_common+0x130/0x130 [ 66.342876][ T41] ? ip6gre_tunnel_link+0xf0/0xf0 [ 66.347913][ T41] ops_exit_list.isra.0+0x103/0x150 [ 66.353274][ T41] cleanup_net+0x511/0xa50 [ 66.357702][ T41] ? unregister_pernet_device+0x70/0x70 [ 66.363270][ T41] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 66.369438][ T41] ? _raw_spin_unlock_irq+0x1f/0x80 [ 66.374659][ T41] process_one_work+0x965/0x16a0 [ 66.379625][ T41] ? lock_release+0x800/0x800 [ 66.384348][ T41] ? pwq_dec_nr_in_flight+0x310/0x310 [ 66.389756][ T41] ? rwlock_bug.part.0+0x90/0x90 [ 66.394820][ T41] worker_thread+0x96/0xe20 [ 66.399465][ T41] ? process_one_work+0x16a0/0x16a0 [ 66.404677][ T41] kthread+0x38b/0x470 [ 66.408857][ T41] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 66.415455][ T41] ret_from_fork+0x24/0x30 [ 67.384337][ T6968] can: request_module (can-proto-0) failed. executing program [ 69.454744][ T6968] can: request_module (can-proto-0) failed. [ 69.467052][ T6968] can: request_module (can-proto-0) failed.