Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.184' (ECDSA) to the list of known hosts. 2020/03/31 11:22:18 fuzzer started 2020/03/31 11:22:20 connecting to host at 10.128.0.26:38077 2020/03/31 11:22:20 checking machine... 2020/03/31 11:22:20 checking revisions... 2020/03/31 11:22:20 testing simple program... syzkaller login: [ 64.826042][ T7079] IPVS: ftp: loaded support on port[0] = 21 2020/03/31 11:22:21 building call list... [ 65.030917][ T7014] [ 65.051452][ T7014] ============================= [ 65.056338][ T7014] WARNING: suspicious RCU usage [ 65.070427][ T7014] 5.6.0-next-20200331-syzkaller #0 Not tainted [ 65.076612][ T7014] ----------------------------- [ 65.094786][ T7014] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 65.119504][ T7014] [ 65.119504][ T7014] other info that might help us debug this: [ 65.119504][ T7014] [ 65.130472][ T7014] [ 65.130472][ T7014] rcu_scheduler_active = 2, debug_locks = 1 [ 65.138654][ T7014] 3 locks held by kworker/u4:5/7014: [ 65.152328][ T7014] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 65.163178][ T7014] #1: ffffc90001747dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 65.173618][ T7014] #2: ffffffff8a56f7f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 65.184540][ T7014] [ 65.184540][ T7014] stack backtrace: [ 65.190903][ T7014] CPU: 0 PID: 7014 Comm: kworker/u4:5 Not tainted 5.6.0-next-20200331-syzkaller #0 [ 65.200189][ T7014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.210254][ T7014] Workqueue: netns cleanup_net [ 65.215012][ T7014] Call Trace: [ 65.218302][ T7014] dump_stack+0x188/0x20d [ 65.222642][ T7014] ovs_ct_exit+0x3db/0x558 [ 65.227079][ T7014] ovs_exit_net+0x1df/0xba0 [ 65.231594][ T7014] ? synchronize_rcu.part.0+0xda/0xf0 [ 65.238185][ T7014] ? synchronize_rcu_expedited+0x620/0x620 [ 65.244009][ T7014] ? ovs_dp_cmd_del+0x270/0x270 [ 65.248886][ T7014] ? ovs_dp_cmd_del+0x270/0x270 [ 65.253745][ T7014] ops_exit_list.isra.0+0xa8/0x150 [ 65.258861][ T7014] cleanup_net+0x511/0xa50 [ 65.263290][ T7014] ? unregister_pernet_device+0x70/0x70 [ 65.268844][ T7014] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 65.274826][ T7014] ? _raw_spin_unlock_irq+0x1f/0x80 [ 65.280035][ T7014] process_one_work+0x965/0x16a0 [ 65.284979][ T7014] ? lock_release+0x800/0x800 [ 65.289654][ T7014] ? pwq_dec_nr_in_flight+0x310/0x310 [ 65.295122][ T7014] ? rwlock_bug.part.0+0x90/0x90 [ 65.300072][ T7014] worker_thread+0x96/0xe20 [ 65.304764][ T7014] ? process_one_work+0x16a0/0x16a0 [ 65.309980][ T7014] kthread+0x388/0x470 [ 65.314062][ T7014] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 65.319787][ T7014] ret_from_fork+0x24/0x30 [ 65.520204][ T7014] tipc: TX() has been purged, node left! [ 65.583525][ T7014] [ 65.586016][ T7014] ============================= [ 65.592638][ T7014] WARNING: suspicious RCU usage [ 65.597621][ T7014] 5.6.0-next-20200331-syzkaller #0 Not tainted [ 65.605538][ T7014] ----------------------------- [ 65.611861][ T7014] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 65.619756][ T7014] [ 65.619756][ T7014] other info that might help us debug this: [ 65.619756][ T7014] [ 65.631753][ T7014] [ 65.631753][ T7014] rcu_scheduler_active = 2, debug_locks = 1 [ 65.641906][ T7014] 4 locks held by kworker/u4:5/7014: [ 65.647293][ T7014] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 65.659131][ T7014] #1: ffffc90001747dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 65.670501][ T7014] #2: ffffffff8a56f7f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 65.679893][ T7014] #3: ffffffff8a57b768 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 65.691212][ T7014] [ 65.691212][ T7014] stack backtrace: [ 65.697209][ T7014] CPU: 0 PID: 7014 Comm: kworker/u4:5 Not tainted 5.6.0-next-20200331-syzkaller #0 [ 65.706599][ T7014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.717018][ T7014] Workqueue: netns cleanup_net [ 65.721791][ T7014] Call Trace: [ 65.725122][ T7014] dump_stack+0x188/0x20d [ 65.729467][ T7014] ipmr_device_event+0x240/0x2b0 [ 65.734421][ T7014] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 65.740336][ T7014] notifier_call_chain+0xc0/0x230 [ 65.745372][ T7014] call_netdevice_notifiers_info+0xb5/0x130 [ 65.751290][ T7014] rollback_registered_many+0x75c/0xe70 [ 65.756841][ T7014] ? netif_set_real_num_tx_queues+0x700/0x700 [ 65.762927][ T7014] ? lock_downgrade+0x840/0x840 [ 65.767786][ T7014] unregister_netdevice_many.part.0+0x16/0x1e0 [ 65.773947][ T7014] unregister_netdevice_many+0x36/0x50 [ 65.779578][ T7014] ip6gre_exit_batch_net+0x4e8/0x700 [ 65.784879][ T7014] ? ip6gre_tunnel_link+0xf0/0xf0 [ 65.789902][ T7014] ? rcu_read_lock_held_common+0x130/0x130 [ 65.795710][ T7014] ? ip6gre_tunnel_link+0xf0/0xf0 [ 65.800741][ T7014] ops_exit_list.isra.0+0x103/0x150 [ 65.805945][ T7014] cleanup_net+0x511/0xa50 [ 65.810366][ T7014] ? unregister_pernet_device+0x70/0x70 [ 65.815913][ T7014] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 65.821899][ T7014] ? _raw_spin_unlock_irq+0x1f/0x80 [ 65.827100][ T7014] process_one_work+0x965/0x16a0 [ 65.832047][ T7014] ? lock_release+0x800/0x800 [ 65.836751][ T7014] ? pwq_dec_nr_in_flight+0x310/0x310 [ 65.842277][ T7014] ? rwlock_bug.part.0+0x90/0x90 [ 65.847243][ T7014] worker_thread+0x96/0xe20 [ 65.851771][ T7014] ? process_one_work+0x16a0/0x16a0 [ 65.856984][ T7014] kthread+0x388/0x470 [ 65.861058][ T7014] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 65.866798][ T7014] ret_from_fork+0x24/0x30 [ 66.673731][ T7065] can: request_module (can-proto-0) failed. executing program [ 69.036597][ T7065] can: request_module (can-proto-0) failed. [ 69.048907][ T7065] can: request_module (can-proto-0) failed.