WARNING: suspicious RCU usage in ovs_ct_exit ============================= WARNING: suspicious RCU usage 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted ----------------------------- net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u4:3/129: #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: __write_once_size include/linux/compiler.h:250 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:615 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:642 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 kernel/workqueue.c:2237 #1: ffffc90001367dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 kernel/workqueue.c:2241 #2: ffffffff8a569bb0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 net/core/net_namespace.c:551 stack backtrace: CPU: 0 PID: 129 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: netns cleanup_net Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x188/0x20d lib/dump_stack.c:118 ovs_ct_limit_exit net/openvswitch/conntrack.c:1898 [inline] ovs_ct_exit+0x3db/0x558 net/openvswitch/conntrack.c:2295 ovs_exit_net+0x1df/0xba0 net/openvswitch/datapath.c:2469 ops_exit_list.isra.0+0xa8/0x150 net/core/net_namespace.c:172 cleanup_net+0x511/0xa50 net/core/net_namespace.c:589 process_one_work+0x965/0x16a0 kernel/workqueue.c:2266 worker_thread+0x96/0xe20 kernel/workqueue.c:2412 kthread+0x388/0x470 kernel/kthread.c:268 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 tipc: TX() has been purged, node left! ============================= WARNING: suspicious RCU usage 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted ----------------------------- net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by kworker/u4:3/129: #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: __write_once_size include/linux/compiler.h:250 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:615 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:642 [inline] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 kernel/workqueue.c:2237 #1: ffffc90001367dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 kernel/workqueue.c:2241 #2: ffffffff8a569bb0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 net/core/net_namespace.c:551 #3: ffffffff8a575aa8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 net/ipv6/ip6_gre.c:1602 stack backtrace: CPU: 0 PID: 129 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: netns cleanup_net Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x188/0x20d lib/dump_stack.c:118 ipmr_device_event+0x240/0x2b0 net/ipv4/ipmr.c:1757 notifier_call_chain+0xc0/0x230 kernel/notifier.c:83 call_netdevice_notifiers_info net/core/dev.c:1948 [inline] call_netdevice_notifiers_info+0xb5/0x130 net/core/dev.c:1933 call_netdevice_notifiers_extack net/core/dev.c:1960 [inline] call_netdevice_notifiers net/core/dev.c:1974 [inline] rollback_registered_many+0x75c/0xe70 net/core/dev.c:8810 unregister_netdevice_many.part.0+0x16/0x1e0 net/core/dev.c:9970 unregister_netdevice_many+0x36/0x50 net/core/dev.c:9969 ip6gre_exit_batch_net+0x4e8/0x700 net/ipv6/ip6_gre.c:1605 ops_exit_list.isra.0+0x103/0x150 net/core/net_namespace.c:175 cleanup_net+0x511/0xa50 net/core/net_namespace.c:589 process_one_work+0x965/0x16a0 kernel/workqueue.c:2266 worker_thread+0x96/0xe20 kernel/workqueue.c:2412 kthread+0x388/0x470 kernel/kthread.c:268 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.1' (ECDSA) to the list of known hosts. 2020/03/28 10:55:58 fuzzer started syzkaller login: [ 60.669712][ T7032] as (7032) used greatest stack depth: 23072 bytes left 2020/03/28 10:55:59 connecting to host at 10.128.0.26:40423 2020/03/28 10:55:59 checking machine... 2020/03/28 10:55:59 checking revisions... 2020/03/28 10:55:59 testing simple program... [ 61.436758][ T7041] IPVS: ftp: loaded support on port[0] = 21 2020/03/28 10:56:00 building call list... [ 61.670948][ T129] [ 61.673435][ T129] ============================= [ 61.689720][ T129] WARNING: suspicious RCU usage [ 61.694796][ T129] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 61.719896][ T129] ----------------------------- [ 61.730663][ T129] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 61.740862][ T129] [ 61.740862][ T129] other info that might help us debug this: [ 61.740862][ T129] [ 61.755930][ T129] [ 61.755930][ T129] rcu_scheduler_active = 2, debug_locks = 1 [ 61.764227][ T129] 3 locks held by kworker/u4:3/129: [ 61.769560][ T129] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 61.780916][ T129] #1: ffffc90001367dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 61.791002][ T129] #2: ffffffff8a569bb0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 61.800496][ T129] [ 61.800496][ T129] stack backtrace: [ 61.806486][ T129] CPU: 0 PID: 129 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 61.816035][ T129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.826111][ T129] Workqueue: netns cleanup_net [ 61.830878][ T129] Call Trace: [ 61.834169][ T129] dump_stack+0x188/0x20d [ 61.838501][ T129] ovs_ct_exit+0x3db/0x558 [ 61.842936][ T129] ovs_exit_net+0x1df/0xba0 [ 61.847445][ T129] ? synchronize_rcu.part.0+0xda/0xf0 [ 61.852827][ T129] ? synchronize_rcu_expedited+0x620/0x620 [ 61.858709][ T129] ? ovs_dp_cmd_del+0x270/0x270 [ 61.863695][ T129] ? ovs_dp_cmd_del+0x270/0x270 [ 61.868552][ T129] ops_exit_list.isra.0+0xa8/0x150 [ 61.873672][ T129] cleanup_net+0x511/0xa50 [ 61.878095][ T129] ? unregister_pernet_device+0x70/0x70 [ 61.883645][ T129] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 61.889624][ T129] ? _raw_spin_unlock_irq+0x1f/0x80 [ 61.894841][ T129] process_one_work+0x965/0x16a0 [ 61.899789][ T129] ? lock_release+0x800/0x800 [ 61.904483][ T129] ? pwq_dec_nr_in_flight+0x310/0x310 [ 61.909868][ T129] ? rwlock_bug.part.0+0x90/0x90 [ 61.914822][ T129] worker_thread+0x96/0xe20 [ 61.919349][ T129] ? process_one_work+0x16a0/0x16a0 [ 61.924550][ T129] kthread+0x388/0x470 [ 61.928617][ T129] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 61.934348][ T129] ret_from_fork+0x24/0x30 [ 62.119737][ T129] tipc: TX() has been purged, node left! [ 62.161872][ T129] [ 62.164317][ T129] ============================= [ 62.169188][ T129] WARNING: suspicious RCU usage [ 62.176411][ T129] 5.6.0-rc7-next-20200327-syzkaller #0 Not tainted [ 62.183783][ T129] ----------------------------- [ 62.188738][ T129] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 62.213474][ T129] [ 62.213474][ T129] other info that might help us debug this: [ 62.213474][ T129] [ 62.239721][ T129] [ 62.239721][ T129] rcu_scheduler_active = 2, debug_locks = 1 [ 62.247979][ T129] 4 locks held by kworker/u4:3/129: [ 62.254325][ T129] #0: ffff8880a977e138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 62.265287][ T129] #1: ffffc90001367dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 62.275869][ T129] #2: ffffffff8a569bb0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 62.285857][ T129] #3: ffffffff8a575aa8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 62.296189][ T129] [ 62.296189][ T129] stack backtrace: [ 62.302728][ T129] CPU: 0 PID: 129 Comm: kworker/u4:3 Not tainted 5.6.0-rc7-next-20200327-syzkaller #0 [ 62.312302][ T129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.322366][ T129] Workqueue: netns cleanup_net [ 62.327126][ T129] Call Trace: [ 62.330420][ T129] dump_stack+0x188/0x20d [ 62.334772][ T129] ipmr_device_event+0x240/0x2b0 [ 62.339728][ T129] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 62.345991][ T129] notifier_call_chain+0xc0/0x230 [ 62.351164][ T129] call_netdevice_notifiers_info+0xb5/0x130 [ 62.357185][ T129] rollback_registered_many+0x75c/0xe70 [ 62.363444][ T129] ? netif_set_real_num_tx_queues+0x700/0x700 [ 62.369526][ T129] ? lock_downgrade+0x840/0x840 [ 62.374389][ T129] unregister_netdevice_many.part.0+0x16/0x1e0 [ 62.380552][ T129] unregister_netdevice_many+0x36/0x50 [ 62.386034][ T129] ip6gre_exit_batch_net+0x4e8/0x700 [ 62.391331][ T129] ? ip6gre_tunnel_link+0xf0/0xf0 [ 62.396374][ T129] ? rcu_read_lock_held_common+0x130/0x130 [ 62.402185][ T129] ? ip6gre_tunnel_link+0xf0/0xf0 [ 62.407300][ T129] ops_exit_list.isra.0+0x103/0x150 [ 62.412508][ T129] cleanup_net+0x511/0xa50 [ 62.416929][ T129] ? unregister_pernet_device+0x70/0x70 [ 62.422480][ T129] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 62.428461][ T129] ? _raw_spin_unlock_irq+0x1f/0x80 [ 62.433666][ T129] process_one_work+0x965/0x16a0 [ 62.438614][ T129] ? lock_release+0x800/0x800 [ 62.443299][ T129] ? pwq_dec_nr_in_flight+0x310/0x310 [ 62.448688][ T129] ? rwlock_bug.part.0+0x90/0x90 [ 62.453638][ T129] worker_thread+0x96/0xe20 [ 62.458168][ T129] ? process_one_work+0x16a0/0x16a0 [ 62.463370][ T129] kthread+0x388/0x470 [ 62.467452][ T129] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 62.473172][ T129] ret_from_fork+0x24/0x30 [ 63.417932][ T7024] can: request_module (can-proto-0) failed. executing program [ 65.695504][ T7024] can: request_module (can-proto-0) failed. [ 65.707008][ T7024] can: request_module (can-proto-0) failed.