[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.35' (ECDSA) to the list of known hosts. 2020/04/18 13:06:29 fuzzer started 2020/04/18 13:06:30 connecting to host at 10.128.0.26:34939 2020/04/18 13:06:30 checking machine... 2020/04/18 13:06:30 checking revisions... 2020/04/18 13:06:30 testing simple program... syzkaller login: [ 57.264494][ T6865] IPVS: ftp: loaded support on port[0] = 21 2020/04/18 13:06:31 building call list... [ 57.488746][ T109] [ 57.491223][ T109] ============================= [ 57.496070][ T109] WARNING: suspicious RCU usage [ 57.509538][ T109] 5.7.0-rc1-next-20200417-syzkaller #0 Not tainted [ 57.523717][ T109] ----------------------------- [ 57.535069][ T109] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 57.554410][ T109] [ 57.554410][ T109] other info that might help us debug this: [ 57.554410][ T109] [ 57.566361][ T109] [ 57.566361][ T109] rcu_scheduler_active = 2, debug_locks = 1 [ 57.575831][ T109] 3 locks held by kworker/u4:3/109: [ 57.594698][ T109] #0: ffff8880a977a138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 57.607759][ T109] #1: ffffc900012a7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 57.618330][ T109] #2: ffffffff8a5a08f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 57.628367][ T109] [ 57.628367][ T109] stack backtrace: [ 57.634328][ T109] CPU: 0 PID: 109 Comm: kworker/u4:3 Not tainted 5.7.0-rc1-next-20200417-syzkaller #0 [ 57.643860][ T109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.653922][ T109] Workqueue: netns cleanup_net [ 57.658676][ T109] Call Trace: [ 57.661967][ T109] dump_stack+0x188/0x20d [ 57.666310][ T109] ovs_ct_exit+0x3db/0x558 [ 57.670734][ T109] ovs_exit_net+0x1df/0xba0 [ 57.675239][ T109] ? synchronize_rcu.part.0+0xda/0xf0 [ 57.680610][ T109] ? synchronize_rcu_expedited+0x620/0x620 [ 57.686424][ T109] ? ovs_dp_cmd_del+0x270/0x270 [ 57.691283][ T109] ? ovs_dp_cmd_del+0x270/0x270 [ 57.696132][ T109] ops_exit_list.isra.0+0xa8/0x150 [ 57.701246][ T109] cleanup_net+0x511/0xa50 [ 57.705669][ T109] ? unregister_pernet_device+0x70/0x70 [ 57.711217][ T109] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 57.717191][ T109] ? _raw_spin_unlock_irq+0x1f/0x80 [ 57.722390][ T109] process_one_work+0x965/0x16a0 [ 57.727340][ T109] ? lock_release+0x800/0x800 [ 57.732015][ T109] ? pwq_dec_nr_in_flight+0x310/0x310 [ 57.737392][ T109] ? rwlock_bug.part.0+0x90/0x90 [ 57.742352][ T109] worker_thread+0x96/0xe20 [ 57.746875][ T109] ? process_one_work+0x16a0/0x16a0 [ 57.752079][ T109] kthread+0x388/0x470 [ 57.756151][ T109] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 57.761868][ T109] ret_from_fork+0x24/0x30 [ 57.947186][ T109] tipc: TX() has been purged, node left! [ 57.989620][ T109] [ 57.992138][ T109] ============================= [ 57.996981][ T109] WARNING: suspicious RCU usage [ 58.003323][ T109] 5.7.0-rc1-next-20200417-syzkaller #0 Not tainted [ 58.010575][ T109] ----------------------------- [ 58.015475][ T109] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 58.024449][ T109] [ 58.024449][ T109] other info that might help us debug this: [ 58.024449][ T109] [ 58.035517][ T109] [ 58.035517][ T109] rcu_scheduler_active = 2, debug_locks = 1 [ 58.044330][ T109] 4 locks held by kworker/u4:3/109: [ 58.051287][ T109] #0: ffff8880a977a138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 58.062321][ T109] #1: ffffc900012a7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 58.073100][ T109] #2: ffffffff8a5a08f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 58.084119][ T109] #3: ffffffff8a5ac868 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 58.094564][ T109] [ 58.094564][ T109] stack backtrace: [ 58.101238][ T109] CPU: 1 PID: 109 Comm: kworker/u4:3 Not tainted 5.7.0-rc1-next-20200417-syzkaller #0 [ 58.110793][ T109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.121060][ T109] Workqueue: netns cleanup_net [ 58.125841][ T109] Call Trace: [ 58.129143][ T109] dump_stack+0x188/0x20d [ 58.133494][ T109] ipmr_device_event+0x240/0x2b0 [ 58.138432][ T109] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 58.144332][ T109] notifier_call_chain+0xc0/0x230 [ 58.149369][ T109] call_netdevice_notifiers_info+0xb5/0x130 [ 58.155264][ T109] rollback_registered_many+0x75c/0xe70 [ 58.160817][ T109] ? netif_set_real_num_tx_queues+0x700/0x700 [ 58.166911][ T109] ? lock_downgrade+0x840/0x840 [ 58.171771][ T109] unregister_netdevice_many.part.0+0x16/0x1e0 [ 58.177926][ T109] unregister_netdevice_many+0x36/0x50 [ 58.183409][ T109] ip6gre_exit_batch_net+0x4e8/0x700 [ 58.188698][ T109] ? ip6gre_tunnel_link+0xf0/0xf0 [ 58.193717][ T109] ? rcu_read_lock_held_common+0x130/0x130 [ 58.199523][ T109] ? ip6gre_tunnel_link+0xf0/0xf0 [ 58.204550][ T109] ops_exit_list.isra.0+0x103/0x150 [ 58.209761][ T109] cleanup_net+0x511/0xa50 [ 58.214179][ T109] ? unregister_pernet_device+0x70/0x70 [ 58.219728][ T109] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 58.225708][ T109] ? _raw_spin_unlock_irq+0x1f/0x80 [ 58.231069][ T109] process_one_work+0x965/0x16a0 [ 58.236120][ T109] ? lock_release+0x800/0x800 [ 58.240805][ T109] ? pwq_dec_nr_in_flight+0x310/0x310 [ 58.246307][ T109] ? rwlock_bug.part.0+0x90/0x90 [ 58.251259][ T109] worker_thread+0x96/0xe20 [ 58.255777][ T109] ? process_one_work+0x16a0/0x16a0 [ 58.260976][ T109] kthread+0x388/0x470 [ 58.265044][ T109] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 58.270763][ T109] ret_from_fork+0x24/0x30 [ 59.224453][ T6853] can: request_module (can-proto-0) failed. executing program [ 61.432886][ T6853] can: request_module (can-proto-0) failed. [ 61.444765][ T6853] can: request_module (can-proto-0) failed.