Warning: Permanently added '10.128.0.238' (ECDSA) to the list of known hosts. 2020/03/23 15:43:43 fuzzer started 2020/03/23 15:43:44 connecting to host at 10.128.0.26:45743 2020/03/23 15:43:44 checking machine... 2020/03/23 15:43:44 checking revisions... 2020/03/23 15:43:44 testing simple program... syzkaller login: [ 89.133755][ T9506] IPVS: ftp: loaded support on port[0] = 21 2020/03/23 15:43:45 building call list... [ 89.313825][ T1012] [ 89.316298][ T1012] ============================= [ 89.321140][ T1012] WARNING: suspicious RCU usage [ 89.329977][ T1012] 5.6.0-rc7-next-20200323-syzkaller #0 Not tainted [ 89.337084][ T1012] ----------------------------- [ 89.342219][ T1012] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 89.351900][ T1012] [ 89.351900][ T1012] other info that might help us debug this: [ 89.351900][ T1012] [ 89.391121][ T1012] [ 89.391121][ T1012] rcu_scheduler_active = 2, debug_locks = 1 [ 89.399878][ T1012] 3 locks held by kworker/u4:6/1012: [ 89.405681][ T1012] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 89.416039][ T1012] #1: ffffc900038f7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 89.426093][ T1012] #2: ffffffff8a55ec88 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 89.435325][ T1012] [ 89.435325][ T1012] stack backtrace: [ 89.441293][ T1012] CPU: 0 PID: 1012 Comm: kworker/u4:6 Not tainted 5.6.0-rc7-next-20200323-syzkaller #0 [ 89.451020][ T1012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.461125][ T1012] Workqueue: netns cleanup_net [ 89.465894][ T1012] Call Trace: [ 89.469191][ T1012] dump_stack+0x188/0x20d [ 89.473523][ T1012] ovs_ct_exit+0x3db/0x558 [ 89.477951][ T1012] ovs_exit_net+0x1df/0xba0 [ 89.482563][ T1012] ? ovs_dp_cmd_del+0x270/0x270 [ 89.487402][ T1012] ? __mutex_unlock_slowpath+0xe2/0x660 [ 89.492939][ T1012] ? ovs_dp_cmd_del+0x270/0x270 [ 89.497782][ T1012] ops_exit_list.isra.0+0xa8/0x150 [ 89.502892][ T1012] cleanup_net+0x511/0xa50 [ 89.507314][ T1012] ? unregister_pernet_device+0x70/0x70 [ 89.512864][ T1012] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 89.519039][ T1012] process_one_work+0x94b/0x1690 [ 89.523980][ T1012] ? pwq_dec_nr_in_flight+0x310/0x310 [ 89.529345][ T1012] ? do_raw_spin_lock+0x129/0x2e0 [ 89.534380][ T1012] worker_thread+0x96/0xe20 [ 89.538889][ T1012] ? process_one_work+0x1690/0x1690 [ 89.544104][ T1012] kthread+0x357/0x430 [ 89.548175][ T1012] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 89.553892][ T1012] ret_from_fork+0x24/0x30 [ 89.733358][ T1012] tipc: TX() has been purged, node left! [ 89.775379][ T1012] [ 89.777814][ T1012] ============================= [ 89.782653][ T1012] WARNING: suspicious RCU usage [ 89.788114][ T1012] 5.6.0-rc7-next-20200323-syzkaller #0 Not tainted [ 89.795208][ T1012] ----------------------------- [ 89.800163][ T1012] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 89.808553][ T1012] [ 89.808553][ T1012] other info that might help us debug this: [ 89.808553][ T1012] [ 89.819358][ T1012] [ 89.819358][ T1012] rcu_scheduler_active = 2, debug_locks = 1 [ 89.827892][ T1012] 4 locks held by kworker/u4:6/1012: [ 89.833569][ T1012] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 89.843806][ T1012] #1: ffffc900038f7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 89.853560][ T1012] #2: ffffffff8a55ec88 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 89.862613][ T1012] #3: ffffffff8a56aa00 (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x88/0x700 [ 89.872220][ T1012] [ 89.872220][ T1012] stack backtrace: [ 89.879445][ T1012] CPU: 0 PID: 1012 Comm: kworker/u4:6 Not tainted 5.6.0-rc7-next-20200323-syzkaller #0 [ 89.889080][ T1012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.899151][ T1012] Workqueue: netns cleanup_net [ 89.903908][ T1012] Call Trace: [ 89.907212][ T1012] dump_stack+0x188/0x20d [ 89.911548][ T1012] ipmr_device_event+0x240/0x2b0 [ 89.916506][ T1012] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 89.922412][ T1012] notifier_call_chain+0xc0/0x230 [ 89.927486][ T1012] call_netdevice_notifiers_info+0xb5/0x130 [ 89.933390][ T1012] rollback_registered_many+0x75c/0xe70 [ 89.938943][ T1012] ? netif_set_real_num_tx_queues+0x700/0x700 [ 89.945015][ T1012] ? lock_downgrade+0x7f0/0x7f0 [ 89.949870][ T1012] unregister_netdevice_many.part.0+0x16/0x1e0 [ 89.956044][ T1012] unregister_netdevice_many+0x36/0x50 [ 89.961506][ T1012] ip6gre_exit_batch_net+0x4e8/0x700 [ 89.966795][ T1012] ? ip6gre_tunnel_link+0xf0/0xf0 [ 89.971820][ T1012] ? rcu_read_lock_held_common+0x130/0x130 [ 89.977630][ T1012] ? ip6gre_tunnel_link+0xf0/0xf0 [ 89.982653][ T1012] ops_exit_list.isra.0+0x103/0x150 [ 89.987858][ T1012] cleanup_net+0x511/0xa50 [ 89.992278][ T1012] ? unregister_pernet_device+0x70/0x70 [ 89.997825][ T1012] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 90.003815][ T1012] process_one_work+0x94b/0x1690 [ 90.008760][ T1012] ? pwq_dec_nr_in_flight+0x310/0x310 [ 90.014137][ T1012] ? do_raw_spin_lock+0x129/0x2e0 [ 90.019171][ T1012] worker_thread+0x96/0xe20 [ 90.023686][ T1012] ? process_one_work+0x1690/0x1690 [ 90.029003][ T1012] kthread+0x357/0x430 [ 90.033078][ T1012] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 90.038805][ T1012] ret_from_fork+0x24/0x30 [ 90.818309][ T9488] can: request_module (can-proto-0) failed. executing program [ 92.981889][ T9488] can: request_module (can-proto-0) failed. [ 92.994574][ T9488] can: request_module (can-proto-0) failed.