[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.170' (ECDSA) to the list of known hosts. 2020/04/03 06:43:20 fuzzer started 2020/04/03 06:43:22 connecting to host at 10.128.0.26:36007 2020/04/03 06:43:22 checking machine... 2020/04/03 06:43:22 checking revisions... 2020/04/03 06:43:22 testing simple program... syzkaller login: [ 70.760720][ T7067] IPVS: ftp: loaded support on port[0] = 21 2020/04/03 06:43:23 building call list... [ 70.997829][ T136] [ 71.000685][ T136] ============================= [ 71.005532][ T136] WARNING: suspicious RCU usage [ 71.022522][ T136] 5.6.0-next-20200403-syzkaller #0 Not tainted [ 71.055829][ T136] ----------------------------- [ 71.070230][ T136] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 71.083516][ T136] [ 71.083516][ T136] other info that might help us debug this: [ 71.083516][ T136] [ 71.094476][ T136] [ 71.094476][ T136] rcu_scheduler_active = 2, debug_locks = 1 [ 71.103149][ T136] 3 locks held by kworker/u4:3/136: [ 71.108566][ T136] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 71.119035][ T136] #1: ffffc900013f7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 71.129106][ T136] #2: ffffffff8a577330 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 71.138651][ T136] [ 71.138651][ T136] stack backtrace: [ 71.144637][ T136] CPU: 1 PID: 136 Comm: kworker/u4:3 Not tainted 5.6.0-next-20200403-syzkaller #0 [ 71.153829][ T136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.163889][ T136] Workqueue: netns cleanup_net [ 71.168648][ T136] Call Trace: [ 71.172032][ T136] dump_stack+0x188/0x20d [ 71.176377][ T136] ovs_ct_exit+0x3db/0x558 [ 71.180806][ T136] ovs_exit_net+0x1df/0xba0 [ 71.185316][ T136] ? synchronize_rcu.part.0+0xda/0xf0 [ 71.190701][ T136] ? synchronize_rcu_expedited+0x620/0x620 [ 71.196527][ T136] ? ovs_dp_cmd_del+0x270/0x270 [ 71.201735][ T136] ? ovs_dp_cmd_del+0x270/0x270 [ 71.207736][ T136] ops_exit_list.isra.0+0xa8/0x150 [ 71.213129][ T136] cleanup_net+0x511/0xa50 [ 71.217564][ T136] ? unregister_pernet_device+0x70/0x70 [ 71.223132][ T136] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 71.229118][ T136] ? _raw_spin_unlock_irq+0x1f/0x80 [ 71.234326][ T136] process_one_work+0x965/0x16a0 [ 71.239278][ T136] ? lock_release+0x800/0x800 [ 71.243956][ T136] ? pwq_dec_nr_in_flight+0x310/0x310 [ 71.249338][ T136] ? rwlock_bug.part.0+0x90/0x90 [ 71.254285][ T136] worker_thread+0x96/0xe20 [ 71.258805][ T136] ? process_one_work+0x16a0/0x16a0 [ 71.264003][ T136] kthread+0x388/0x470 [ 71.268071][ T136] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 71.273791][ T136] ret_from_fork+0x24/0x30 [ 71.477222][ T136] tipc: TX() has been purged, node left! [ 71.529587][ T136] [ 71.532047][ T136] ============================= [ 71.536892][ T136] WARNING: suspicious RCU usage [ 71.543658][ T136] 5.6.0-next-20200403-syzkaller #0 Not tainted [ 71.551808][ T136] ----------------------------- [ 71.556757][ T136] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 71.566034][ T136] [ 71.566034][ T136] other info that might help us debug this: [ 71.566034][ T136] [ 71.577342][ T136] [ 71.577342][ T136] rcu_scheduler_active = 2, debug_locks = 1 [ 71.585492][ T136] 4 locks held by kworker/u4:3/136: [ 71.592030][ T136] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 71.603309][ T136] #1: ffffc900013f7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 71.615630][ T136] #2: ffffffff8a577330 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 71.626086][ T136] #3: ffffffff8a5832a8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 71.637134][ T136] [ 71.637134][ T136] stack backtrace: [ 71.643115][ T136] CPU: 1 PID: 136 Comm: kworker/u4:3 Not tainted 5.6.0-next-20200403-syzkaller #0 [ 71.652311][ T136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.662396][ T136] Workqueue: netns cleanup_net [ 71.667164][ T136] Call Trace: [ 71.670466][ T136] dump_stack+0x188/0x20d [ 71.674815][ T136] ipmr_device_event+0x240/0x2b0 [ 71.679777][ T136] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 71.685681][ T136] notifier_call_chain+0xc0/0x230 [ 71.690740][ T136] call_netdevice_notifiers_info+0xb5/0x130 [ 71.696654][ T136] rollback_registered_many+0x75c/0xe70 [ 71.702226][ T136] ? netif_set_real_num_tx_queues+0x700/0x700 [ 71.708434][ T136] ? lock_downgrade+0x840/0x840 [ 71.713336][ T136] unregister_netdevice_many.part.0+0x16/0x1e0 [ 71.719505][ T136] unregister_netdevice_many+0x36/0x50 [ 71.724972][ T136] ip6gre_exit_batch_net+0x4e8/0x700 [ 71.730266][ T136] ? ip6gre_tunnel_link+0xf0/0xf0 [ 71.735295][ T136] ? rcu_read_lock_held_common+0x130/0x130 [ 71.741107][ T136] ? ip6gre_tunnel_link+0xf0/0xf0 [ 71.746161][ T136] ops_exit_list.isra.0+0x103/0x150 [ 71.751377][ T136] cleanup_net+0x511/0xa50 [ 71.755890][ T136] ? unregister_pernet_device+0x70/0x70 [ 71.761561][ T136] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 71.767556][ T136] ? _raw_spin_unlock_irq+0x1f/0x80 [ 71.772780][ T136] process_one_work+0x965/0x16a0 [ 71.777750][ T136] ? lock_release+0x800/0x800 [ 71.782437][ T136] ? pwq_dec_nr_in_flight+0x310/0x310 [ 71.787825][ T136] ? rwlock_bug.part.0+0x90/0x90 [ 71.792776][ T136] worker_thread+0x96/0xe20 [ 71.797298][ T136] ? process_one_work+0x16a0/0x16a0 [ 71.802512][ T136] kthread+0x388/0x470 [ 71.806580][ T136] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 71.812303][ T136] ret_from_fork+0x24/0x30 [ 72.890877][ T7048] can: request_module (can-proto-0) failed. executing program [ 75.106420][ T7048] can: request_module (can-proto-0) failed. [ 75.119208][ T7048] can: request_module (can-proto-0) failed.