Warning: Permanently added '10.128.0.188' (ECDSA) to the list of known hosts. 2020/03/24 16:06:08 fuzzer started 2020/03/24 16:06:10 connecting to host at 10.128.0.26:36893 2020/03/24 16:06:10 checking machine... 2020/03/24 16:06:10 checking revisions... 2020/03/24 16:06:10 testing simple program... syzkaller login: [ 101.231009][ T9975] IPVS: ftp: loaded support on port[0] = 21 2020/03/24 16:06:10 building call list... [ 101.426655][ T636] [ 101.429128][ T636] ============================= [ 101.434941][ T636] WARNING: suspicious RCU usage [ 101.457837][ T636] 5.6.0-rc7-next-20200324-syzkaller #0 Not tainted [ 101.464620][ T636] ----------------------------- [ 101.469942][ T636] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 101.479571][ T636] [ 101.479571][ T636] other info that might help us debug this: [ 101.479571][ T636] [ 101.490076][ T636] [ 101.490076][ T636] rcu_scheduler_active = 2, debug_locks = 1 [ 101.498642][ T636] 3 locks held by kworker/u4:5/636: [ 101.503881][ T636] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 101.513774][ T636] #1: ffffc90002777dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 101.523304][ T636] #2: ffffffff8a55f388 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 101.532296][ T636] [ 101.532296][ T636] stack backtrace: [ 101.538430][ T636] CPU: 1 PID: 636 Comm: kworker/u4:5 Not tainted 5.6.0-rc7-next-20200324-syzkaller #0 [ 101.548068][ T636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.558157][ T636] Workqueue: netns cleanup_net [ 101.562918][ T636] Call Trace: [ 101.566222][ T636] dump_stack+0x188/0x20d [ 101.570629][ T636] ovs_ct_exit+0x3db/0x558 [ 101.575053][ T636] ovs_exit_net+0x1df/0xba0 [ 101.579560][ T636] ? ovs_dp_cmd_del+0x270/0x270 [ 101.584410][ T636] ? __mutex_unlock_slowpath+0xe2/0x660 [ 101.589962][ T636] ? ovs_dp_cmd_del+0x270/0x270 [ 101.594820][ T636] ops_exit_list.isra.0+0xa8/0x150 [ 101.599937][ T636] cleanup_net+0x511/0xa50 [ 101.604362][ T636] ? unregister_pernet_device+0x70/0x70 [ 101.609928][ T636] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 101.615915][ T636] process_one_work+0x94b/0x1690 [ 101.620890][ T636] ? pwq_dec_nr_in_flight+0x310/0x310 [ 101.626263][ T636] ? do_raw_spin_lock+0x129/0x2e0 [ 101.631449][ T636] worker_thread+0x96/0xe20 [ 101.636161][ T636] ? process_one_work+0x1690/0x1690 [ 101.642952][ T636] kthread+0x357/0x430 [ 101.647036][ T636] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 101.652782][ T636] ret_from_fork+0x24/0x30 [ 101.836311][ T636] tipc: TX() has been purged, node left! [ 101.878732][ T636] [ 101.881229][ T636] ============================= [ 101.886857][ T636] WARNING: suspicious RCU usage [ 101.891985][ T636] 5.6.0-rc7-next-20200324-syzkaller #0 Not tainted [ 101.899032][ T636] ----------------------------- [ 101.903934][ T636] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 101.912980][ T636] [ 101.912980][ T636] other info that might help us debug this: [ 101.912980][ T636] [ 101.924943][ T636] [ 101.924943][ T636] rcu_scheduler_active = 2, debug_locks = 1 [ 101.933664][ T636] 4 locks held by kworker/u4:5/636: [ 101.939323][ T636] #0: ffff88821b78d928 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 101.949827][ T636] #1: ffffc90002777dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 101.976267][ T636] #2: ffffffff8a55f388 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 101.985628][ T636] #3: ffffffff8a56b100 (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x88/0x700 [ 102.006186][ T636] [ 102.006186][ T636] stack backtrace: [ 102.012295][ T636] CPU: 0 PID: 636 Comm: kworker/u4:5 Not tainted 5.6.0-rc7-next-20200324-syzkaller #0 [ 102.021840][ T636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.031921][ T636] Workqueue: netns cleanup_net [ 102.036689][ T636] Call Trace: [ 102.039971][ T636] dump_stack+0x188/0x20d [ 102.044292][ T636] ipmr_device_event+0x240/0x2b0 [ 102.049224][ T636] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 102.055742][ T636] notifier_call_chain+0xc0/0x230 [ 102.060773][ T636] call_netdevice_notifiers_info+0xb5/0x130 [ 102.066674][ T636] rollback_registered_many+0x75c/0xe70 [ 102.072214][ T636] ? netif_set_real_num_tx_queues+0x700/0x700 [ 102.078297][ T636] ? lock_downgrade+0x7f0/0x7f0 [ 102.083334][ T636] unregister_netdevice_many.part.0+0x16/0x1e0 [ 102.089499][ T636] unregister_netdevice_many+0x36/0x50 [ 102.095108][ T636] ip6gre_exit_batch_net+0x4e8/0x700 [ 102.101169][ T636] ? ip6gre_tunnel_link+0xf0/0xf0 [ 102.106295][ T636] ? rcu_read_lock_held_common+0x130/0x130 [ 102.112104][ T636] ? ip6gre_tunnel_link+0xf0/0xf0 [ 102.117132][ T636] ops_exit_list.isra.0+0x103/0x150 [ 102.122333][ T636] cleanup_net+0x511/0xa50 [ 102.126735][ T636] ? unregister_pernet_device+0x70/0x70 [ 102.132264][ T636] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 102.138470][ T636] process_one_work+0x94b/0x1690 [ 102.143488][ T636] ? pwq_dec_nr_in_flight+0x310/0x310 [ 102.148864][ T636] ? do_raw_spin_lock+0x129/0x2e0 [ 102.153920][ T636] worker_thread+0x96/0xe20 [ 102.158434][ T636] ? process_one_work+0x1690/0x1690 [ 102.164243][ T636] kthread+0x357/0x430 [ 102.168319][ T636] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 102.174169][ T636] ret_from_fork+0x24/0x30 [ 103.272309][ T9965] can: request_module (can-proto-0) failed. executing program [ 105.256759][ T9965] can: request_module (can-proto-0) failed. [ 105.269842][ T9965] can: request_module (can-proto-0) failed.