Warning: Permanently added '10.128.0.245' (ECDSA) to the list of known hosts. 2020/03/24 03:59:22 fuzzer started 2020/03/24 03:59:23 connecting to host at 10.128.0.26:43977 2020/03/24 03:59:23 checking machine... 2020/03/24 03:59:23 checking revisions... 2020/03/24 03:59:24 testing simple program... syzkaller login: [ 90.225010][ T9386] IPVS: ftp: loaded support on port[0] = 21 2020/03/24 03:59:24 building call list... [ 90.404126][ T199] [ 90.406909][ T199] ============================= [ 90.415086][ T199] WARNING: suspicious RCU usage [ 90.433333][ T199] 5.6.0-rc7-next-20200323-syzkaller #0 Not tainted [ 90.439865][ T199] ----------------------------- [ 90.453363][ T199] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 90.462235][ T199] [ 90.462235][ T199] other info that might help us debug this: [ 90.462235][ T199] [ 90.473028][ T199] [ 90.473028][ T199] rcu_scheduler_active = 2, debug_locks = 1 [ 90.481507][ T199] 3 locks held by kworker/u4:5/199: [ 90.487017][ T199] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 90.497291][ T199] #1: ffffc900017a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 90.507305][ T199] #2: ffffffff8a55ec88 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 90.516594][ T199] [ 90.516594][ T199] stack backtrace: [ 90.522613][ T199] CPU: 0 PID: 199 Comm: kworker/u4:5 Not tainted 5.6.0-rc7-next-20200323-syzkaller #0 [ 90.532152][ T199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.542214][ T199] Workqueue: netns cleanup_net [ 90.546976][ T199] Call Trace: [ 90.550271][ T199] dump_stack+0x188/0x20d [ 90.554603][ T199] ovs_ct_exit+0x3db/0x558 [ 90.559041][ T199] ovs_exit_net+0x1df/0xba0 [ 90.563548][ T199] ? ovs_dp_cmd_del+0x270/0x270 [ 90.568407][ T199] ? __mutex_unlock_slowpath+0xe2/0x660 [ 90.573971][ T199] ? ovs_dp_cmd_del+0x270/0x270 [ 90.578825][ T199] ops_exit_list.isra.0+0xa8/0x150 [ 90.583945][ T199] cleanup_net+0x511/0xa50 [ 90.588372][ T199] ? unregister_pernet_device+0x70/0x70 [ 90.593925][ T199] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 90.599909][ T199] process_one_work+0x94b/0x1690 [ 90.604856][ T199] ? pwq_dec_nr_in_flight+0x310/0x310 [ 90.610227][ T199] ? do_raw_spin_lock+0x129/0x2e0 [ 90.615258][ T199] worker_thread+0x96/0xe20 [ 90.619772][ T199] ? process_one_work+0x1690/0x1690 [ 90.625053][ T199] kthread+0x357/0x430 [ 90.629118][ T199] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 90.634837][ T199] ret_from_fork+0x24/0x30 [ 90.823473][ T199] tipc: TX() has been purged, node left! [ 90.875601][ T199] [ 90.878074][ T199] ============================= [ 90.882916][ T199] WARNING: suspicious RCU usage [ 90.887920][ T199] 5.6.0-rc7-next-20200323-syzkaller #0 Not tainted [ 90.894504][ T199] ----------------------------- [ 90.899418][ T199] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 90.907383][ T199] [ 90.907383][ T199] other info that might help us debug this: [ 90.907383][ T199] [ 90.917782][ T199] [ 90.917782][ T199] rcu_scheduler_active = 2, debug_locks = 1 [ 90.925972][ T199] 4 locks held by kworker/u4:5/199: [ 90.931235][ T199] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 90.941122][ T199] #1: ffffc900017a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 90.950680][ T199] #2: ffffffff8a55ec88 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 90.959772][ T199] #3: ffffffff8a56aa00 (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x88/0x700 [ 90.969232][ T199] [ 90.969232][ T199] stack backtrace: [ 90.975343][ T199] CPU: 1 PID: 199 Comm: kworker/u4:5 Not tainted 5.6.0-rc7-next-20200323-syzkaller #0 [ 90.984883][ T199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.994971][ T199] Workqueue: netns cleanup_net [ 90.999725][ T199] Call Trace: [ 91.003029][ T199] dump_stack+0x188/0x20d [ 91.007369][ T199] ipmr_device_event+0x240/0x2b0 [ 91.012312][ T199] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 91.018384][ T199] notifier_call_chain+0xc0/0x230 [ 91.023415][ T199] call_netdevice_notifiers_info+0xb5/0x130 [ 91.029307][ T199] rollback_registered_many+0x75c/0xe70 [ 91.034851][ T199] ? netif_set_real_num_tx_queues+0x700/0x700 [ 91.040925][ T199] ? lock_downgrade+0x7f0/0x7f0 [ 91.045803][ T199] unregister_netdevice_many.part.0+0x16/0x1e0 [ 91.052041][ T199] unregister_netdevice_many+0x36/0x50 [ 91.057510][ T199] ip6gre_exit_batch_net+0x4e8/0x700 [ 91.062812][ T199] ? ip6gre_tunnel_link+0xf0/0xf0 [ 91.068370][ T199] ? rcu_read_lock_held_common+0x130/0x130 [ 91.074186][ T199] ? ip6gre_tunnel_link+0xf0/0xf0 [ 91.079298][ T199] ops_exit_list.isra.0+0x103/0x150 [ 91.084509][ T199] cleanup_net+0x511/0xa50 [ 91.088928][ T199] ? unregister_pernet_device+0x70/0x70 [ 91.094472][ T199] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 91.100460][ T199] process_one_work+0x94b/0x1690 [ 91.105407][ T199] ? pwq_dec_nr_in_flight+0x310/0x310 [ 91.110778][ T199] ? do_raw_spin_lock+0x129/0x2e0 [ 91.115807][ T199] worker_thread+0x96/0xe20 [ 91.120316][ T199] ? process_one_work+0x1690/0x1690 [ 91.125511][ T199] kthread+0x357/0x430 [ 91.129665][ T199] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 91.135407][ T199] ret_from_fork+0x24/0x30 [ 91.816330][ T9374] can: request_module (can-proto-0) failed. executing program [ 94.191452][ T9374] can: request_module (can-proto-0) failed. [ 94.204410][ T9374] can: request_module (can-proto-0) failed.