Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.149' (ECDSA) to the list of known hosts. 2020/03/27 08:28:53 fuzzer started 2020/03/27 08:28:55 connecting to host at 10.128.0.26:35013 2020/03/27 08:28:55 checking machine... 2020/03/27 08:28:55 checking revisions... 2020/03/27 08:28:55 testing simple program... syzkaller login: [ 60.540529][ T7090] IPVS: ftp: loaded support on port[0] = 21 2020/03/27 08:28:55 building call list... [ 60.782994][ T93] [ 60.785491][ T93] ============================= [ 60.800830][ T93] WARNING: suspicious RCU usage [ 60.810712][ T93] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 60.824537][ T93] ----------------------------- [ 60.829420][ T93] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 60.848833][ T93] [ 60.848833][ T93] other info that might help us debug this: [ 60.848833][ T93] [ 60.860398][ T93] [ 60.860398][ T93] rcu_scheduler_active = 2, debug_locks = 1 [ 60.869364][ T93] 3 locks held by kworker/u4:3/93: [ 60.875255][ T93] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 60.886725][ T93] #1: ffffc90001177dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 60.897904][ T93] #2: ffffffff8a56cbf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 60.931842][ T93] [ 60.931842][ T93] stack backtrace: [ 60.937786][ T93] CPU: 0 PID: 93 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 60.947238][ T93] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.957300][ T93] Workqueue: netns cleanup_net [ 60.962062][ T93] Call Trace: [ 60.965365][ T93] dump_stack+0x188/0x20d [ 60.969708][ T93] ovs_ct_exit+0x3db/0x558 [ 60.974132][ T93] ovs_exit_net+0x1df/0xba0 [ 60.978637][ T93] ? synchronize_rcu.part.0+0xda/0xf0 [ 60.984012][ T93] ? synchronize_rcu_expedited+0x620/0x620 [ 60.989838][ T93] ? ovs_dp_cmd_del+0x270/0x270 [ 60.994722][ T93] ? ovs_dp_cmd_del+0x270/0x270 [ 60.999582][ T93] ops_exit_list.isra.0+0xa8/0x150 [ 61.004710][ T93] cleanup_net+0x511/0xa50 [ 61.009137][ T93] ? unregister_pernet_device+0x70/0x70 [ 61.014695][ T93] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 61.020687][ T93] ? _raw_spin_unlock_irq+0x1f/0x80 [ 61.025931][ T93] process_one_work+0x965/0x16a0 [ 61.030884][ T93] ? lock_release+0x800/0x800 [ 61.035573][ T93] ? pwq_dec_nr_in_flight+0x310/0x310 [ 61.040950][ T93] ? rwlock_bug.part.0+0x90/0x90 [ 61.045884][ T93] ? schedule+0x20b/0x2a0 [ 61.050226][ T93] worker_thread+0x96/0xe20 [ 61.054742][ T93] ? process_one_work+0x16a0/0x16a0 [ 61.059961][ T93] kthread+0x388/0x470 [ 61.064032][ T93] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 61.069760][ T93] ret_from_fork+0x24/0x30 [ 61.291978][ T93] tipc: TX() has been purged, node left! [ 61.344380][ T93] [ 61.346845][ T93] ============================= [ 61.354087][ T93] WARNING: suspicious RCU usage [ 61.358958][ T93] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 61.365907][ T93] ----------------------------- [ 61.370779][ T93] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 61.394839][ T93] [ 61.394839][ T93] other info that might help us debug this: [ 61.394839][ T93] [ 61.411793][ T93] [ 61.411793][ T93] rcu_scheduler_active = 2, debug_locks = 1 [ 61.419911][ T93] 4 locks held by kworker/u4:3/93: [ 61.425581][ T93] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 61.436446][ T93] #1: ffffc90001177dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 61.446742][ T93] #2: ffffffff8a56cbf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 61.457047][ T93] #3: ffffffff8a578ae8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 61.467090][ T93] [ 61.467090][ T93] stack backtrace: [ 61.473468][ T93] CPU: 1 PID: 93 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 61.482931][ T93] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.492997][ T93] Workqueue: netns cleanup_net [ 61.497865][ T93] Call Trace: [ 61.501170][ T93] dump_stack+0x188/0x20d [ 61.505523][ T93] ipmr_device_event+0x240/0x2b0 [ 61.510465][ T93] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 61.516373][ T93] notifier_call_chain+0xc0/0x230 [ 61.521415][ T93] call_netdevice_notifiers_info+0xb5/0x130 [ 61.527316][ T93] rollback_registered_many+0x75c/0xe70 [ 61.532874][ T93] ? netif_set_real_num_tx_queues+0x700/0x700 [ 61.538952][ T93] ? lock_downgrade+0x840/0x840 [ 61.543820][ T93] unregister_netdevice_many.part.0+0x16/0x1e0 [ 61.549984][ T93] unregister_netdevice_many+0x36/0x50 [ 61.555450][ T93] ip6gre_exit_batch_net+0x4e8/0x700 [ 61.560744][ T93] ? ip6gre_tunnel_link+0xf0/0xf0 [ 61.565773][ T93] ? rcu_read_lock_held_common+0x130/0x130 [ 61.571594][ T93] ? ip6gre_tunnel_link+0xf0/0xf0 [ 61.576663][ T93] ops_exit_list.isra.0+0x103/0x150 [ 61.581880][ T93] cleanup_net+0x511/0xa50 [ 61.586308][ T93] ? unregister_pernet_device+0x70/0x70 [ 61.591865][ T93] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 61.597857][ T93] ? _raw_spin_unlock_irq+0x1f/0x80 [ 61.603196][ T93] process_one_work+0x965/0x16a0 [ 61.608263][ T93] ? lock_release+0x800/0x800 [ 61.612951][ T93] ? pwq_dec_nr_in_flight+0x310/0x310 [ 61.618338][ T93] ? rwlock_bug.part.0+0x90/0x90 [ 61.623302][ T93] ? schedule+0x20b/0x2a0 [ 61.627659][ T93] worker_thread+0x96/0xe20 [ 61.632175][ T93] ? process_one_work+0x16a0/0x16a0 [ 61.637373][ T93] kthread+0x388/0x470 [ 61.641445][ T93] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 61.647167][ T93] ret_from_fork+0x24/0x30 [ 62.543534][ T7072] can: request_module (can-proto-0) failed. executing program [ 64.726785][ T7072] can: request_module (can-proto-0) failed. [ 64.739134][ T7072] can: request_module (can-proto-0) failed.