Warning: Permanently added '10.128.10.36' (ECDSA) to the list of known hosts. 2020/03/25 09:19:44 fuzzer started 2020/03/25 09:19:46 connecting to host at 10.128.0.26:43999 2020/03/25 09:19:46 checking machine... 2020/03/25 09:19:46 checking revisions... 2020/03/25 09:19:46 testing simple program... syzkaller login: [ 93.297383][T10139] IPVS: ftp: loaded support on port[0] = 21 2020/03/25 09:19:46 building call list... [ 93.504408][ T21] [ 93.506880][ T21] ============================= [ 93.514293][ T21] WARNING: suspicious RCU usage [ 93.519171][ T21] 5.6.0-rc7-next-20200325-syzkaller #0 Not tainted [ 93.539229][ T21] ----------------------------- [ 93.547282][ T21] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 93.556839][ T21] [ 93.556839][ T21] other info that might help us debug this: [ 93.556839][ T21] [ 93.567637][ T21] [ 93.567637][ T21] rcu_scheduler_active = 2, debug_locks = 1 [ 93.576330][ T21] 3 locks held by kworker/u4:1/21: [ 93.581682][ T21] #0: ffff8880a977b138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 93.592121][ T21] #1: ffffc90000dd7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 93.612973][ T21] #2: ffffffff8a5715f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 93.643702][ T21] [ 93.643702][ T21] stack backtrace: [ 93.649789][ T21] CPU: 1 PID: 21 Comm: kworker/u4:1 Not tainted 5.6.0-rc7-next-20200325-syzkaller #0 [ 93.659455][ T21] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.669539][ T21] Workqueue: netns cleanup_net [ 93.674306][ T21] Call Trace: [ 93.677606][ T21] dump_stack+0x188/0x20d [ 93.681943][ T21] ovs_ct_exit+0x3db/0x558 [ 93.686372][ T21] ovs_exit_net+0x1df/0xba0 [ 93.690881][ T21] ? synchronize_rcu.part.0+0xda/0xf0 [ 93.696261][ T21] ? synchronize_rcu_expedited+0x620/0x620 [ 93.702078][ T21] ? ovs_dp_cmd_del+0x270/0x270 [ 93.706954][ T21] ? ovs_dp_cmd_del+0x270/0x270 [ 93.711809][ T21] ops_exit_list.isra.0+0xa8/0x150 [ 93.716960][ T21] cleanup_net+0x511/0xa50 [ 93.721626][ T21] ? unregister_pernet_device+0x70/0x70 [ 93.727182][ T21] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 93.733166][ T21] ? _raw_spin_unlock_irq+0x1f/0x80 [ 93.738379][ T21] process_one_work+0x965/0x16a0 [ 93.743333][ T21] ? lock_release+0x800/0x800 [ 93.748118][ T21] ? pwq_dec_nr_in_flight+0x310/0x310 [ 93.753508][ T21] ? rwlock_bug.part.0+0x90/0x90 [ 93.758456][ T21] worker_thread+0x96/0xe20 [ 93.762977][ T21] ? process_one_work+0x16a0/0x16a0 [ 93.768182][ T21] kthread+0x388/0x470 [ 93.772266][ T21] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 93.778002][ T21] ret_from_fork+0x24/0x30 [ 93.943810][ T21] tipc: TX() has been purged, node left! [ 93.987723][ T21] [ 94.013789][ T21] ============================= [ 94.018693][ T21] WARNING: suspicious RCU usage [ 94.023605][ T21] 5.6.0-rc7-next-20200325-syzkaller #0 Not tainted [ 94.030843][ T21] ----------------------------- [ 94.036417][ T21] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 94.044607][ T21] [ 94.044607][ T21] other info that might help us debug this: [ 94.044607][ T21] [ 94.055346][ T21] [ 94.055346][ T21] rcu_scheduler_active = 2, debug_locks = 1 [ 94.063450][ T21] 4 locks held by kworker/u4:1/21: [ 94.069350][ T21] #0: ffff8880a977b138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 94.080082][ T21] #1: ffffc90000dd7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 94.090368][ T21] #2: ffffffff8a5715f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 94.100121][ T21] #3: ffffffff8a57d4e8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 94.110167][ T21] [ 94.110167][ T21] stack backtrace: [ 94.116508][ T21] CPU: 1 PID: 21 Comm: kworker/u4:1 Not tainted 5.6.0-rc7-next-20200325-syzkaller #0 [ 94.125972][ T21] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.136034][ T21] Workqueue: netns cleanup_net [ 94.140880][ T21] Call Trace: [ 94.144176][ T21] dump_stack+0x188/0x20d [ 94.148522][ T21] ipmr_device_event+0x240/0x2b0 [ 94.153464][ T21] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 94.159385][ T21] notifier_call_chain+0xc0/0x230 [ 94.164434][ T21] call_netdevice_notifiers_info+0xb5/0x130 [ 94.170486][ T21] rollback_registered_many+0x75c/0xe70 [ 94.176066][ T21] ? netif_set_real_num_tx_queues+0x700/0x700 [ 94.182151][ T21] ? lock_downgrade+0x840/0x840 [ 94.187025][ T21] unregister_netdevice_many.part.0+0x16/0x1e0 [ 94.193188][ T21] unregister_netdevice_many+0x36/0x50 [ 94.198651][ T21] ip6gre_exit_batch_net+0x4e8/0x700 [ 94.203943][ T21] ? ip6gre_tunnel_link+0xf0/0xf0 [ 94.208995][ T21] ? rcu_read_lock_held_common+0x130/0x130 [ 94.214808][ T21] ? ip6gre_tunnel_link+0xf0/0xf0 [ 94.219835][ T21] ops_exit_list.isra.0+0x103/0x150 [ 94.225042][ T21] cleanup_net+0x511/0xa50 [ 94.229467][ T21] ? unregister_pernet_device+0x70/0x70 [ 94.235017][ T21] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 94.241016][ T21] ? _raw_spin_unlock_irq+0x1f/0x80 [ 94.246219][ T21] process_one_work+0x965/0x16a0 [ 94.251170][ T21] ? lock_release+0x800/0x800 [ 94.255846][ T21] ? pwq_dec_nr_in_flight+0x310/0x310 [ 94.261225][ T21] ? rwlock_bug.part.0+0x90/0x90 [ 94.266193][ T21] worker_thread+0x96/0xe20 [ 94.270708][ T21] ? process_one_work+0x16a0/0x16a0 [ 94.275909][ T21] kthread+0x388/0x470 [ 94.279980][ T21] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 94.285711][ T21] ret_from_fork+0x24/0x30 [ 95.097943][T10144] can: request_module (can-proto-0) failed. executing program [ 97.551478][T10144] can: request_module (can-proto-0) failed. [ 97.564844][T10144] can: request_module (can-proto-0) failed.