[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.47' (ECDSA) to the list of known hosts. 2020/03/28 11:04:05 fuzzer started 2020/03/28 11:04:07 connecting to host at 10.128.0.26:38727 2020/03/28 11:04:07 checking machine... 2020/03/28 11:04:07 checking revisions... 2020/03/28 11:04:07 testing simple program... syzkaller login: [ 59.946946][ T7066] IPVS: ftp: loaded support on port[0] = 21 2020/03/28 11:04:07 building call list... [ 60.216564][ T1043] [ 60.219013][ T1043] ============================= [ 60.223935][ T1043] WARNING: suspicious RCU usage [ 60.231060][ T1043] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 60.238707][ T1043] ----------------------------- [ 60.244751][ T1043] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 60.255297][ T1043] [ 60.255297][ T1043] other info that might help us debug this: [ 60.255297][ T1043] [ 60.266426][ T1043] [ 60.266426][ T1043] rcu_scheduler_active = 2, debug_locks = 1 [ 60.274693][ T1043] 3 locks held by kworker/u4:4/1043: [ 60.282578][ T1043] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 60.298509][ T1043] #1: ffffc90003017dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 60.315875][ T1043] #2: ffffffff8a56cbf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 60.345974][ T1043] [ 60.345974][ T1043] stack backtrace: [ 60.351880][ T1043] CPU: 0 PID: 1043 Comm: kworker/u4:4 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 60.361515][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.371598][ T1043] Workqueue: netns cleanup_net [ 60.376362][ T1043] Call Trace: [ 60.379660][ T1043] dump_stack+0x188/0x20d [ 60.384020][ T1043] ovs_ct_exit+0x3db/0x558 [ 60.388445][ T1043] ovs_exit_net+0x1df/0xba0 [ 60.392961][ T1043] ? synchronize_rcu.part.0+0xda/0xf0 [ 60.398340][ T1043] ? synchronize_rcu_expedited+0x620/0x620 [ 60.404161][ T1043] ? ovs_dp_cmd_del+0x270/0x270 [ 60.409030][ T1043] ? ovs_dp_cmd_del+0x270/0x270 [ 60.413889][ T1043] ops_exit_list.isra.0+0xa8/0x150 [ 60.419027][ T1043] cleanup_net+0x511/0xa50 [ 60.423455][ T1043] ? unregister_pernet_device+0x70/0x70 [ 60.429004][ T1043] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 60.434984][ T1043] ? _raw_spin_unlock_irq+0x1f/0x80 [ 60.440189][ T1043] process_one_work+0x965/0x16a0 [ 60.445133][ T1043] ? lock_release+0x800/0x800 [ 60.449809][ T1043] ? pwq_dec_nr_in_flight+0x310/0x310 [ 60.455184][ T1043] ? rwlock_bug.part.0+0x90/0x90 [ 60.460149][ T1043] worker_thread+0x96/0xe20 [ 60.464671][ T1043] ? process_one_work+0x16a0/0x16a0 [ 60.469922][ T1043] kthread+0x388/0x470 [ 60.473990][ T1043] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 60.479713][ T1043] ret_from_fork+0x24/0x30 [ 60.656018][ T1043] tipc: TX() has been purged, node left! [ 60.699364][ T1043] [ 60.701804][ T1043] ============================= [ 60.707139][ T1043] WARNING: suspicious RCU usage [ 60.712080][ T1043] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 60.719147][ T1043] ----------------------------- [ 60.724053][ T1043] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 60.732451][ T1043] [ 60.732451][ T1043] other info that might help us debug this: [ 60.732451][ T1043] [ 60.744579][ T1043] [ 60.744579][ T1043] rcu_scheduler_active = 2, debug_locks = 1 [ 60.753175][ T1043] 4 locks held by kworker/u4:4/1043: [ 60.758940][ T1043] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 60.769939][ T1043] #1: ffffc90003017dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 60.780338][ T1043] #2: ffffffff8a56cbf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 60.790070][ T1043] #3: ffffffff8a578ae8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 60.817829][ T1043] [ 60.817829][ T1043] stack backtrace: [ 60.823744][ T1043] CPU: 0 PID: 1043 Comm: kworker/u4:4 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 60.833350][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.844528][ T1043] Workqueue: netns cleanup_net [ 60.849281][ T1043] Call Trace: [ 60.852560][ T1043] dump_stack+0x188/0x20d [ 60.856892][ T1043] ipmr_device_event+0x240/0x2b0 [ 60.861827][ T1043] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 60.867715][ T1043] notifier_call_chain+0xc0/0x230 [ 60.872739][ T1043] call_netdevice_notifiers_info+0xb5/0x130 [ 60.878618][ T1043] rollback_registered_many+0x75c/0xe70 [ 60.884159][ T1043] ? netif_set_real_num_tx_queues+0x700/0x700 [ 60.890223][ T1043] ? lock_downgrade+0x840/0x840 [ 60.895071][ T1043] unregister_netdevice_many.part.0+0x16/0x1e0 [ 60.901222][ T1043] unregister_netdevice_many+0x36/0x50 [ 60.906680][ T1043] ip6gre_exit_batch_net+0x4e8/0x700 [ 60.911955][ T1043] ? ip6gre_tunnel_link+0xf0/0xf0 [ 60.916978][ T1043] ? rcu_read_lock_held_common+0x130/0x130 [ 60.922785][ T1043] ? ip6gre_tunnel_link+0xf0/0xf0 [ 60.927803][ T1043] ops_exit_list.isra.0+0x103/0x150 [ 60.932998][ T1043] cleanup_net+0x511/0xa50 [ 60.937409][ T1043] ? unregister_pernet_device+0x70/0x70 [ 60.942959][ T1043] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 60.948931][ T1043] ? _raw_spin_unlock_irq+0x1f/0x80 [ 60.954122][ T1043] process_one_work+0x965/0x16a0 [ 60.959109][ T1043] ? lock_release+0x800/0x800 [ 60.963795][ T1043] ? pwq_dec_nr_in_flight+0x310/0x310 [ 60.969178][ T1043] ? rwlock_bug.part.0+0x90/0x90 [ 60.974122][ T1043] worker_thread+0x96/0xe20 [ 60.978619][ T1043] ? process_one_work+0x16a0/0x16a0 [ 60.983909][ T1043] kthread+0x388/0x470 [ 60.987977][ T1043] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 60.993693][ T1043] ret_from_fork+0x24/0x30 [ 62.011856][ T7092] can: request_module (can-proto-0) failed. executing program [ 64.169712][ T7092] can: request_module (can-proto-0) failed. [ 64.181634][ T7092] can: request_module (can-proto-0) failed.