Warning: Permanently added '10.128.0.214' (ECDSA) to the list of known hosts. 2020/03/24 16:06:08 fuzzer started 2020/03/24 16:06:09 connecting to host at 10.128.0.26:43471 2020/03/24 16:06:09 checking machine... 2020/03/24 16:06:09 checking revisions... 2020/03/24 16:06:09 testing simple program... syzkaller login: [ 99.137078][ T9878] IPVS: ftp: loaded support on port[0] = 21 2020/03/24 16:06:09 building call list... [ 99.339454][ T125] [ 99.341935][ T125] ============================= [ 99.346793][ T125] WARNING: suspicious RCU usage [ 99.364748][ T125] 5.6.0-rc7-next-20200324-syzkaller #0 Not tainted [ 99.377889][ T125] ----------------------------- [ 99.383003][ T125] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 99.396480][ T125] [ 99.396480][ T125] other info that might help us debug this: [ 99.396480][ T125] [ 99.407561][ T125] [ 99.407561][ T125] rcu_scheduler_active = 2, debug_locks = 1 [ 99.415851][ T125] 3 locks held by kworker/u4:4/125: [ 99.421407][ T125] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 99.431354][ T125] #1: ffffc900013a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 99.440995][ T125] #2: ffffffff8a55f388 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 99.450041][ T125] [ 99.450041][ T125] stack backtrace: [ 99.455955][ T125] CPU: 0 PID: 125 Comm: kworker/u4:4 Not tainted 5.6.0-rc7-next-20200324-syzkaller #0 [ 99.465505][ T125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.475690][ T125] Workqueue: netns cleanup_net [ 99.480460][ T125] Call Trace: [ 99.483753][ T125] dump_stack+0x188/0x20d [ 99.488086][ T125] ovs_ct_exit+0x3db/0x558 [ 99.493375][ T125] ovs_exit_net+0x1df/0xba0 [ 99.497879][ T125] ? ovs_dp_cmd_del+0x270/0x270 [ 99.502733][ T125] ? __mutex_unlock_slowpath+0xe2/0x660 [ 99.508306][ T125] ? ovs_dp_cmd_del+0x270/0x270 [ 99.513171][ T125] ops_exit_list.isra.0+0xa8/0x150 [ 99.518299][ T125] cleanup_net+0x511/0xa50 [ 99.522738][ T125] ? unregister_pernet_device+0x70/0x70 [ 99.528308][ T125] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 99.534306][ T125] process_one_work+0x94b/0x1690 [ 99.539384][ T125] ? pwq_dec_nr_in_flight+0x310/0x310 [ 99.544763][ T125] ? do_raw_spin_lock+0x129/0x2e0 [ 99.549802][ T125] worker_thread+0x96/0xe20 [ 99.554324][ T125] ? process_one_work+0x1690/0x1690 [ 99.559523][ T125] kthread+0x357/0x430 [ 99.563597][ T125] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 99.569338][ T125] ret_from_fork+0x24/0x30 [ 99.758970][ T125] tipc: TX() has been purged, node left! [ 99.801097][ T125] [ 99.803647][ T125] ============================= [ 99.809032][ T125] WARNING: suspicious RCU usage [ 99.813956][ T125] 5.6.0-rc7-next-20200324-syzkaller #0 Not tainted [ 99.821046][ T125] ----------------------------- [ 99.825967][ T125] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 99.834305][ T125] [ 99.834305][ T125] other info that might help us debug this: [ 99.834305][ T125] [ 99.845174][ T125] [ 99.845174][ T125] rcu_scheduler_active = 2, debug_locks = 1 [ 99.853813][ T125] 4 locks held by kworker/u4:4/125: [ 99.859718][ T125] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 99.869996][ T125] #1: ffffc900013a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 99.880221][ T125] #2: ffffffff8a55f388 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 99.889730][ T125] #3: ffffffff8a56b100 (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x88/0x700 [ 99.899304][ T125] [ 99.899304][ T125] stack backtrace: [ 99.905273][ T125] CPU: 1 PID: 125 Comm: kworker/u4:4 Not tainted 5.6.0-rc7-next-20200324-syzkaller #0 [ 99.914951][ T125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.925029][ T125] Workqueue: netns cleanup_net [ 99.929872][ T125] Call Trace: [ 99.933170][ T125] dump_stack+0x188/0x20d [ 99.937505][ T125] ipmr_device_event+0x240/0x2b0 [ 99.942453][ T125] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 99.948433][ T125] notifier_call_chain+0xc0/0x230 [ 99.953496][ T125] call_netdevice_notifiers_info+0xb5/0x130 [ 99.959473][ T125] rollback_registered_many+0x75c/0xe70 [ 99.965068][ T125] ? netif_set_real_num_tx_queues+0x700/0x700 [ 99.971159][ T125] ? lock_downgrade+0x7f0/0x7f0 [ 99.976115][ T125] unregister_netdevice_many.part.0+0x16/0x1e0 [ 99.982275][ T125] unregister_netdevice_many+0x36/0x50 [ 99.988452][ T125] ip6gre_exit_batch_net+0x4e8/0x700 [ 99.993768][ T125] ? ip6gre_tunnel_link+0xf0/0xf0 [ 99.998811][ T125] ? rcu_read_lock_held_common+0x130/0x130 [ 100.004630][ T125] ? ip6gre_tunnel_link+0xf0/0xf0 [ 100.009666][ T125] ops_exit_list.isra.0+0x103/0x150 [ 100.014887][ T125] cleanup_net+0x511/0xa50 [ 100.019311][ T125] ? unregister_pernet_device+0x70/0x70 [ 100.024956][ T125] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 100.030944][ T125] process_one_work+0x94b/0x1690 [ 100.035993][ T125] ? pwq_dec_nr_in_flight+0x310/0x310 [ 100.041386][ T125] ? do_raw_spin_lock+0x129/0x2e0 [ 100.046441][ T125] worker_thread+0x96/0xe20 [ 100.050970][ T125] ? process_one_work+0x1690/0x1690 [ 100.056173][ T125] kthread+0x357/0x430 [ 100.060371][ T125] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 100.066218][ T125] ret_from_fork+0x24/0x30 [ 101.022041][ T9866] can: request_module (can-proto-0) failed. executing program [ 103.137646][ T9866] can: request_module (can-proto-0) failed. [ 103.150296][ T9866] can: request_module (can-proto-0) failed.