[  OK  ] Reached target Login Prompts.
[  OK  ] Reached target Multi-User System.
[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.


Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.0.199' (ECDSA) to the list of known hosts.
2020/04/20 23:36:45 fuzzer started
2020/04/20 23:36:47 connecting to host at 10.128.0.26:42693
2020/04/20 23:36:47 checking machine...
2020/04/20 23:36:47 checking revisions...
2020/04/20 23:36:47 testing simple program...
syzkaller login: [   64.488532][ T6849] IPVS: ftp: loaded support on port[0] = 21
2020/04/20 23:36:47 building call list...
[   64.691649][    T7] 
[   64.694086][    T7] =============================
[   64.701195][    T7] WARNING: suspicious RCU usage
[   64.706058][    T7] 5.7.0-rc2-next-20200420-syzkaller #0 Not tainted
[   64.735571][    T7] -----------------------------
[   64.756960][    T7] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!!
[   64.771341][    T7] 
[   64.771341][    T7] other info that might help us debug this:
[   64.771341][    T7] 
[   64.782188][    T7] 
[   64.782188][    T7] rcu_scheduler_active = 2, debug_locks = 1
[   64.790451][    T7] 3 locks held by kworker/u4:0/7:
[   64.795470][    T7]  #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0
[   64.805852][    T7]  #1: ffffc90000cdfdc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0
[   64.816143][    T7]  #2: ffffffff8a5a26f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50
[   64.830225][    T7] 
[   64.830225][    T7] stack backtrace:
[   64.845660][    T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.7.0-rc2-next-20200420-syzkaller #0
[   64.855060][    T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   64.865119][    T7] Workqueue: netns cleanup_net
[   64.869911][    T7] Call Trace:
[   64.873215][    T7]  dump_stack+0x188/0x20d
[   64.877560][    T7]  ovs_ct_exit+0x3db/0x558
[   64.881987][    T7]  ovs_exit_net+0x1df/0xba0
[   64.886485][    T7]  ? synchronize_rcu.part.0+0xda/0xf0
[   64.891855][    T7]  ? synchronize_rcu_expedited+0x620/0x620
[   64.897665][    T7]  ? ovs_dp_cmd_del+0x270/0x270
[   64.902517][    T7]  ? ovs_dp_cmd_del+0x270/0x270
[   64.907364][    T7]  ops_exit_list.isra.0+0xa8/0x150
[   64.912477][    T7]  cleanup_net+0x511/0xa50
[   64.916897][    T7]  ? unregister_pernet_device+0x70/0x70
[   64.922440][    T7]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[   64.928561][    T7]  ? _raw_spin_unlock_irq+0x1f/0x80
[   64.933765][    T7]  process_one_work+0x965/0x16a0
[   64.938723][    T7]  ? lock_release+0x800/0x800
[   64.943401][    T7]  ? pwq_dec_nr_in_flight+0x310/0x310
[   64.948774][    T7]  ? rwlock_bug.part.0+0x90/0x90
[   64.953745][    T7]  worker_thread+0x96/0xe20
[   64.958293][    T7]  ? process_one_work+0x16a0/0x16a0
[   64.963500][    T7]  kthread+0x38b/0x470
[   64.967572][    T7]  ? kthread_mod_delayed_work+0x1a0/0x1a0
[   64.973297][    T7]  ret_from_fork+0x24/0x30
[   65.180157][    T7] tipc: TX() has been purged, node left!
[   65.222487][    T7] 
[   65.224924][    T7] =============================
[   65.229759][    T7] WARNING: suspicious RCU usage
[   65.236280][    T7] 5.7.0-rc2-next-20200420-syzkaller #0 Not tainted
[   65.244527][    T7] -----------------------------
[   65.249457][    T7] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!!
[   65.258537][    T7] 
[   65.258537][    T7] other info that might help us debug this:
[   65.258537][    T7] 
[   65.269682][    T7] 
[   65.269682][    T7] rcu_scheduler_active = 2, debug_locks = 1
[   65.278598][    T7] 4 locks held by kworker/u4:0/7:
[   65.284429][    T7]  #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0
[   65.295478][    T7]  #1: ffffc90000cdfdc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0
[   65.306315][    T7]  #2: ffffffff8a5a26f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50
[   65.316491][    T7]  #3: ffffffff8a5ae668 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700
[   65.326910][    T7] 
[   65.326910][    T7] stack backtrace:
[   65.333589][    T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.7.0-rc2-next-20200420-syzkaller #0
[   65.342951][    T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   65.353002][    T7] Workqueue: netns cleanup_net
[   65.358534][    T7] Call Trace:
[   65.361821][    T7]  dump_stack+0x188/0x20d
[   65.366151][    T7]  ipmr_device_event+0x240/0x2b0
[   65.371090][    T7]  ? __sanitizer_cov_trace_switch+0x45/0x70
[   65.376992][    T7]  notifier_call_chain+0xc0/0x230
[   65.382024][    T7]  call_netdevice_notifiers_info+0xb5/0x130
[   65.387920][    T7]  rollback_registered_many+0x75c/0xe70
[   65.393484][    T7]  ? netif_set_real_num_tx_queues+0x700/0x700
[   65.399556][    T7]  ? lock_downgrade+0x840/0x840
[   65.404430][    T7]  unregister_netdevice_many.part.0+0x16/0x1e0
[   65.410582][    T7]  unregister_netdevice_many+0x36/0x50
[   65.416033][    T7]  ip6gre_exit_batch_net+0x4e8/0x700
[   65.421315][    T7]  ? ip6gre_tunnel_link+0xf0/0xf0
[   65.426332][    T7]  ? rcu_read_lock_held_common+0x130/0x130
[   65.432137][    T7]  ? ip6gre_tunnel_link+0xf0/0xf0
[   65.437158][    T7]  ops_exit_list.isra.0+0x103/0x150
[   65.442358][    T7]  cleanup_net+0x511/0xa50
[   65.446773][    T7]  ? unregister_pernet_device+0x70/0x70
[   65.452323][    T7]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[   65.458296][    T7]  ? _raw_spin_unlock_irq+0x1f/0x80
[   65.463497][    T7]  process_one_work+0x965/0x16a0
[   65.468437][    T7]  ? lock_release+0x800/0x800
[   65.473110][    T7]  ? pwq_dec_nr_in_flight+0x310/0x310
[   65.478479][    T7]  ? rwlock_bug.part.0+0x90/0x90
[   65.483420][    T7]  worker_thread+0x96/0xe20
[   65.487931][    T7]  ? process_one_work+0x16a0/0x16a0
[   65.493125][    T7]  kthread+0x38b/0x470
[   65.497382][    T7]  ? kthread_mod_delayed_work+0x1a0/0x1a0
[   65.503099][    T7]  ret_from_fork+0x24/0x30
[   66.536664][ T6829] can: request_module (can-proto-0) failed.
executing program
[   68.677965][ T6829] can: request_module (can-proto-0) failed.
[   68.689794][ T6829] can: request_module (can-proto-0) failed.