Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. 2020/03/26 15:09:30 fuzzer started 2020/03/26 15:09:32 connecting to host at 10.128.0.26:41011 2020/03/26 15:09:32 checking machine... 2020/03/26 15:09:32 checking revisions... 2020/03/26 15:09:32 testing simple program... syzkaller login: [ 64.825399][ T7045] IPVS: ftp: loaded support on port[0] = 21 2020/03/26 15:09:32 building call list... [ 65.044960][ T108] [ 65.047576][ T108] ============================= [ 65.052435][ T108] WARNING: suspicious RCU usage [ 65.083790][ T108] 5.6.0-rc7-next-20200326-syzkaller #0 Not tainted [ 65.090499][ T108] ----------------------------- [ 65.114028][ T108] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 65.122918][ T108] [ 65.122918][ T108] other info that might help us debug this: [ 65.122918][ T108] [ 65.144026][ T108] [ 65.144026][ T108] rcu_scheduler_active = 2, debug_locks = 1 [ 65.163813][ T108] 3 locks held by kworker/u4:3/108: [ 65.169034][ T108] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 65.192195][ T108] #1: ffffc90001257dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 65.203186][ T108] #2: ffffffff8a56cd30 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 65.213468][ T108] [ 65.213468][ T108] stack backtrace: [ 65.220266][ T108] CPU: 1 PID: 108 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200326-syzkaller #0 [ 65.229814][ T108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.239890][ T108] Workqueue: netns cleanup_net [ 65.244648][ T108] Call Trace: [ 65.247952][ T108] dump_stack+0x188/0x20d [ 65.252298][ T108] ovs_ct_exit+0x3db/0x558 [ 65.256732][ T108] ovs_exit_net+0x1df/0xba0 [ 65.261248][ T108] ? synchronize_rcu.part.0+0xda/0xf0 [ 65.266636][ T108] ? synchronize_rcu_expedited+0x620/0x620 [ 65.277842][ T108] ? ovs_dp_cmd_del+0x270/0x270 [ 65.282703][ T108] ? ovs_dp_cmd_del+0x270/0x270 [ 65.287564][ T108] ops_exit_list.isra.0+0xa8/0x150 [ 65.292686][ T108] cleanup_net+0x511/0xa50 [ 65.297111][ T108] ? unregister_pernet_device+0x70/0x70 [ 65.302662][ T108] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 65.308642][ T108] ? _raw_spin_unlock_irq+0x1f/0x80 [ 65.313852][ T108] process_one_work+0x965/0x16a0 [ 65.318799][ T108] ? lock_release+0x800/0x800 [ 65.323477][ T108] ? pwq_dec_nr_in_flight+0x310/0x310 [ 65.328854][ T108] ? rwlock_bug.part.0+0x90/0x90 [ 65.333802][ T108] worker_thread+0x96/0xe20 [ 65.338319][ T108] ? process_one_work+0x16a0/0x16a0 [ 65.343517][ T108] kthread+0x388/0x470 [ 65.347713][ T108] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 65.353447][ T108] ret_from_fork+0x24/0x30 [ 65.553852][ T108] tipc: TX() has been purged, node left! [ 65.596117][ T108] [ 65.598576][ T108] ============================= [ 65.603526][ T108] WARNING: suspicious RCU usage [ 65.610280][ T108] 5.6.0-rc7-next-20200326-syzkaller #0 Not tainted [ 65.617970][ T108] ----------------------------- [ 65.622927][ T108] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 65.632341][ T108] [ 65.632341][ T108] other info that might help us debug this: [ 65.632341][ T108] [ 65.644348][ T108] [ 65.644348][ T108] rcu_scheduler_active = 2, debug_locks = 1 [ 65.652518][ T108] 4 locks held by kworker/u4:3/108: [ 65.659176][ T108] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 65.674391][ T108] #1: ffffc90001257dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 65.685291][ T108] #2: ffffffff8a56cd30 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 65.695548][ T108] #3: ffffffff8a578c28 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 65.706141][ T108] [ 65.706141][ T108] stack backtrace: [ 65.712130][ T108] CPU: 1 PID: 108 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200326-syzkaller #0 [ 65.721779][ T108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.731977][ T108] Workqueue: netns cleanup_net [ 65.736742][ T108] Call Trace: [ 65.740039][ T108] dump_stack+0x188/0x20d [ 65.744379][ T108] ipmr_device_event+0x240/0x2b0 [ 65.749339][ T108] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 65.755256][ T108] notifier_call_chain+0xc0/0x230 [ 65.760308][ T108] call_netdevice_notifiers_info+0xb5/0x130 [ 65.766214][ T108] rollback_registered_many+0x75c/0xe70 [ 65.771771][ T108] ? netif_set_real_num_tx_queues+0x700/0x700 [ 65.777854][ T108] ? lock_downgrade+0x840/0x840 [ 65.782713][ T108] unregister_netdevice_many.part.0+0x16/0x1e0 [ 65.788869][ T108] unregister_netdevice_many+0x36/0x50 [ 65.794329][ T108] ip6gre_exit_batch_net+0x4e8/0x700 [ 65.799636][ T108] ? ip6gre_tunnel_link+0xf0/0xf0 [ 65.804659][ T108] ? rcu_read_lock_held_common+0x130/0x130 [ 65.810475][ T108] ? ip6gre_tunnel_link+0xf0/0xf0 [ 65.815502][ T108] ops_exit_list.isra.0+0x103/0x150 [ 65.820708][ T108] cleanup_net+0x511/0xa50 [ 65.825128][ T108] ? unregister_pernet_device+0x70/0x70 [ 65.830675][ T108] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 65.836659][ T108] ? _raw_spin_unlock_irq+0x1f/0x80 [ 65.841861][ T108] process_one_work+0x965/0x16a0 [ 65.846807][ T108] ? lock_release+0x800/0x800 [ 65.851487][ T108] ? pwq_dec_nr_in_flight+0x310/0x310 [ 65.856861][ T108] ? rwlock_bug.part.0+0x90/0x90 [ 65.861805][ T108] worker_thread+0x96/0xe20 [ 65.866322][ T108] ? process_one_work+0x16a0/0x16a0 [ 65.871519][ T108] kthread+0x388/0x470 [ 65.875589][ T108] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 65.881312][ T108] ret_from_fork+0x24/0x30 [ 66.817302][ T7070] can: request_module (can-proto-0) failed. executing program [ 68.962911][ T7070] can: request_module (can-proto-0) failed. [ 68.976783][ T7070] can: request_module (can-proto-0) failed.