Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2020/03/27 17:16:06 fuzzer started 2020/03/27 17:16:08 connecting to host at 10.128.0.26:36629 2020/03/27 17:16:08 checking machine... 2020/03/27 17:16:08 checking revisions... 2020/03/27 17:16:08 testing simple program... syzkaller login: [ 60.882083][ T7072] IPVS: ftp: loaded support on port[0] = 21 2020/03/27 17:16:08 building call list... [ 61.053398][ T37] [ 61.056095][ T37] ============================= [ 61.061054][ T37] WARNING: suspicious RCU usage [ 61.072888][ T37] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 61.072899][ T37] ----------------------------- [ 61.072908][ T37] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 61.073097][ T37] [ 61.073097][ T37] other info that might help us debug this: [ 61.073097][ T37] [ 61.152742][ T37] [ 61.152742][ T37] rcu_scheduler_active = 2, debug_locks = 1 [ 61.160908][ T37] 3 locks held by kworker/u4:2/37: [ 61.168402][ T37] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 61.198377][ T37] #1: ffffc90000e97dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 61.208990][ T37] #2: ffffffff8a56cbf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 61.219201][ T37] [ 61.219201][ T37] stack backtrace: [ 61.225440][ T37] CPU: 0 PID: 37 Comm: kworker/u4:2 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 61.235051][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.245253][ T37] Workqueue: netns cleanup_net [ 61.250027][ T37] Call Trace: [ 61.253500][ T37] dump_stack+0x188/0x20d [ 61.257832][ T37] ovs_ct_exit+0x3db/0x558 [ 61.262263][ T37] ovs_exit_net+0x1df/0xba0 [ 61.266872][ T37] ? synchronize_rcu.part.0+0xda/0xf0 [ 61.273302][ T37] ? synchronize_rcu_expedited+0x620/0x620 [ 61.279114][ T37] ? ovs_dp_cmd_del+0x270/0x270 [ 61.284894][ T37] ? ovs_dp_cmd_del+0x270/0x270 [ 61.289768][ T37] ops_exit_list.isra.0+0xa8/0x150 [ 61.295159][ T37] cleanup_net+0x511/0xa50 [ 61.300023][ T37] ? unregister_pernet_device+0x70/0x70 [ 61.305752][ T37] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 61.311750][ T37] ? _raw_spin_unlock_irq+0x1f/0x80 [ 61.316966][ T37] process_one_work+0x965/0x16a0 [ 61.321915][ T37] ? lock_release+0x800/0x800 [ 61.326768][ T37] ? pwq_dec_nr_in_flight+0x310/0x310 [ 61.332180][ T37] ? rwlock_bug.part.0+0x90/0x90 [ 61.337130][ T37] worker_thread+0x96/0xe20 [ 61.343296][ T37] ? process_one_work+0x16a0/0x16a0 [ 61.348521][ T37] kthread+0x388/0x470 [ 61.352596][ T37] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 61.358318][ T37] ret_from_fork+0x24/0x30 [ 61.552678][ T37] tipc: TX() has been purged, node left! [ 61.594879][ T37] [ 61.597327][ T37] ============================= [ 61.602354][ T37] WARNING: suspicious RCU usage [ 61.608731][ T37] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 61.615803][ T37] ----------------------------- [ 61.620887][ T37] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 61.629261][ T37] [ 61.629261][ T37] other info that might help us debug this: [ 61.629261][ T37] [ 61.640212][ T37] [ 61.640212][ T37] rcu_scheduler_active = 2, debug_locks = 1 [ 61.649949][ T37] 4 locks held by kworker/u4:2/37: [ 61.655781][ T37] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 61.667092][ T37] #1: ffffc90000e97dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 61.677819][ T37] #2: ffffffff8a56cbf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 61.687986][ T37] #3: ffffffff8a578ae8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 61.698140][ T37] [ 61.698140][ T37] stack backtrace: [ 61.704590][ T37] CPU: 0 PID: 37 Comm: kworker/u4:2 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 61.714052][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.724117][ T37] Workqueue: netns cleanup_net [ 61.728966][ T37] Call Trace: [ 61.732345][ T37] dump_stack+0x188/0x20d [ 61.736774][ T37] ipmr_device_event+0x240/0x2b0 [ 61.741713][ T37] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 61.747612][ T37] notifier_call_chain+0xc0/0x230 [ 61.752760][ T37] call_netdevice_notifiers_info+0xb5/0x130 [ 61.758942][ T37] rollback_registered_many+0x75c/0xe70 [ 61.764599][ T37] ? netif_set_real_num_tx_queues+0x700/0x700 [ 61.770697][ T37] ? lock_downgrade+0x840/0x840 [ 61.775970][ T37] unregister_netdevice_many.part.0+0x16/0x1e0 [ 61.782129][ T37] unregister_netdevice_many+0x36/0x50 [ 61.787851][ T37] ip6gre_exit_batch_net+0x4e8/0x700 [ 61.793318][ T37] ? ip6gre_tunnel_link+0xf0/0xf0 [ 61.798367][ T37] ? rcu_read_lock_held_common+0x130/0x130 [ 61.804551][ T37] ? ip6gre_tunnel_link+0xf0/0xf0 [ 61.809588][ T37] ops_exit_list.isra.0+0x103/0x150 [ 61.814789][ T37] cleanup_net+0x511/0xa50 [ 61.819556][ T37] ? unregister_pernet_device+0x70/0x70 [ 61.825198][ T37] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 61.831193][ T37] ? _raw_spin_unlock_irq+0x1f/0x80 [ 61.836413][ T37] process_one_work+0x965/0x16a0 [ 61.841365][ T37] ? lock_release+0x800/0x800 [ 61.846046][ T37] ? pwq_dec_nr_in_flight+0x310/0x310 [ 61.851521][ T37] ? rwlock_bug.part.0+0x90/0x90 [ 61.856647][ T37] worker_thread+0x96/0xe20 [ 61.861373][ T37] ? process_one_work+0x16a0/0x16a0 [ 61.866766][ T37] kthread+0x388/0x470 [ 61.870835][ T37] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 61.876557][ T37] ret_from_fork+0x24/0x30 [ 62.766103][ T7049] can: request_module (can-proto-0) failed. executing program [ 64.947870][ T7049] can: request_module (can-proto-0) failed. [ 64.959715][ T7049] can: request_module (can-proto-0) failed.