Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.45' (ECDSA) to the list of known hosts. 2020/04/01 01:14:12 fuzzer started 2020/04/01 01:14:14 connecting to host at 10.128.0.26:38035 2020/04/01 01:14:14 checking machine... 2020/04/01 01:14:14 checking revisions... 2020/04/01 01:14:14 testing simple program... syzkaller login: [ 62.889181][ T7050] IPVS: ftp: loaded support on port[0] = 21 2020/04/01 01:14:14 building call list... [ 63.122044][ T56] [ 63.124574][ T56] ============================= [ 63.129592][ T56] WARNING: suspicious RCU usage [ 63.151516][ T56] 5.6.0-next-20200331-syzkaller #0 Not tainted [ 63.157702][ T56] ----------------------------- [ 63.164474][ T56] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 63.174339][ T56] [ 63.174339][ T56] other info that might help us debug this: [ 63.174339][ T56] [ 63.185698][ T56] [ 63.185698][ T56] rcu_scheduler_active = 2, debug_locks = 1 [ 63.194714][ T56] 3 locks held by kworker/u4:2/56: [ 63.199826][ T56] #0: ffff8880a977f138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 63.211626][ T56] #1: ffffc90000f37dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 63.222518][ T56] #2: ffffffff8a56f7f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 63.232741][ T56] [ 63.232741][ T56] stack backtrace: [ 63.238653][ T56] CPU: 0 PID: 56 Comm: kworker/u4:2 Not tainted 5.6.0-next-20200331-syzkaller #0 [ 63.247757][ T56] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.257833][ T56] Workqueue: netns cleanup_net [ 63.262595][ T56] Call Trace: [ 63.265902][ T56] dump_stack+0x188/0x20d [ 63.270249][ T56] ovs_ct_exit+0x3db/0x558 [ 63.274685][ T56] ovs_exit_net+0x1df/0xba0 [ 63.279328][ T56] ? synchronize_rcu.part.0+0xda/0xf0 [ 63.284708][ T56] ? synchronize_rcu_expedited+0x620/0x620 [ 63.290532][ T56] ? ovs_dp_cmd_del+0x270/0x270 [ 63.295398][ T56] ? ovs_dp_cmd_del+0x270/0x270 [ 63.300262][ T56] ops_exit_list.isra.0+0xa8/0x150 [ 63.305389][ T56] cleanup_net+0x511/0xa50 [ 63.309817][ T56] ? unregister_pernet_device+0x70/0x70 [ 63.315371][ T56] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 63.321335][ T56] ? _raw_spin_unlock_irq+0x1f/0x80 [ 63.326531][ T56] process_one_work+0x965/0x16a0 [ 63.331474][ T56] ? lock_release+0x800/0x800 [ 63.336152][ T56] ? pwq_dec_nr_in_flight+0x310/0x310 [ 63.341532][ T56] ? rwlock_bug.part.0+0x90/0x90 [ 63.346466][ T56] worker_thread+0x96/0xe20 [ 63.350971][ T56] ? process_one_work+0x16a0/0x16a0 [ 63.356173][ T56] kthread+0x388/0x470 [ 63.360236][ T56] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 63.365957][ T56] ret_from_fork+0x24/0x30 [ 63.561532][ T56] tipc: TX() has been purged, node left! [ 63.603937][ T56] [ 63.606475][ T56] ============================= [ 63.613101][ T56] WARNING: suspicious RCU usage [ 63.618044][ T56] 5.6.0-next-20200331-syzkaller #0 Not tainted [ 63.625869][ T56] ----------------------------- [ 63.630891][ T56] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 63.640504][ T56] [ 63.640504][ T56] other info that might help us debug this: [ 63.640504][ T56] [ 63.651993][ T56] [ 63.651993][ T56] rcu_scheduler_active = 2, debug_locks = 1 [ 63.660140][ T56] 4 locks held by kworker/u4:2/56: [ 63.666852][ T56] #0: ffff8880a977f138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 63.678704][ T56] #1: ffffc90000f37dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 63.689793][ T56] #2: ffffffff8a56f7f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 63.713406][ T56] #3: ffffffff8a57b768 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 63.741402][ T56] [ 63.741402][ T56] stack backtrace: [ 63.747330][ T56] CPU: 1 PID: 56 Comm: kworker/u4:2 Not tainted 5.6.0-next-20200331-syzkaller #0 [ 63.756457][ T56] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.766521][ T56] Workqueue: netns cleanup_net [ 63.771261][ T56] Call Trace: [ 63.774542][ T56] dump_stack+0x188/0x20d [ 63.778860][ T56] ipmr_device_event+0x240/0x2b0 [ 63.783860][ T56] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 63.789741][ T56] notifier_call_chain+0xc0/0x230 [ 63.794771][ T56] call_netdevice_notifiers_info+0xb5/0x130 [ 63.800643][ T56] rollback_registered_many+0x75c/0xe70 [ 63.806197][ T56] ? netif_set_real_num_tx_queues+0x700/0x700 [ 63.812257][ T56] ? lock_downgrade+0x840/0x840 [ 63.817099][ T56] unregister_netdevice_many.part.0+0x16/0x1e0 [ 63.823269][ T56] unregister_netdevice_many+0x36/0x50 [ 63.828714][ T56] ip6gre_exit_batch_net+0x4e8/0x700 [ 63.833988][ T56] ? ip6gre_tunnel_link+0xf0/0xf0 [ 63.839004][ T56] ? rcu_read_lock_held_common+0x130/0x130 [ 63.844793][ T56] ? ip6gre_tunnel_link+0xf0/0xf0 [ 63.849812][ T56] ops_exit_list.isra.0+0x103/0x150 [ 63.855015][ T56] cleanup_net+0x511/0xa50 [ 63.859438][ T56] ? unregister_pernet_device+0x70/0x70 [ 63.864997][ T56] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 63.870981][ T56] ? _raw_spin_unlock_irq+0x1f/0x80 [ 63.879233][ T56] process_one_work+0x965/0x16a0 [ 63.884190][ T56] ? lock_release+0x800/0x800 [ 63.888876][ T56] ? pwq_dec_nr_in_flight+0x310/0x310 [ 63.894257][ T56] ? rwlock_bug.part.0+0x90/0x90 [ 63.899207][ T56] worker_thread+0x96/0xe20 [ 63.903725][ T56] ? process_one_work+0x16a0/0x16a0 [ 63.908924][ T56] kthread+0x388/0x470 [ 63.912999][ T56] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 63.918724][ T56] ret_from_fork+0x24/0x30 [ 64.890338][ T7031] can: request_module (can-proto-0) failed. executing program [ 67.051530][ T7031] can: request_module (can-proto-0) failed. [ 67.064665][ T7031] can: request_module (can-proto-0) failed.