Warning: Permanently added '10.128.10.44' (ECDSA) to the list of known hosts. 2020/03/14 02:18:25 fuzzer started 2020/03/14 02:18:27 connecting to host at 10.128.0.26:37319 2020/03/14 02:18:27 checking machine... 2020/03/14 02:18:27 checking revisions... 2020/03/14 02:18:27 testing simple program... syzkaller login: [ 90.007596][ T9391] IPVS: ftp: loaded support on port[0] = 21 2020/03/14 02:18:27 building call list... [ 90.210576][ T127] [ 90.213104][ T127] ============================= [ 90.220468][ T127] WARNING: suspicious RCU usage [ 90.231649][ T127] 5.6.0-rc5-next-20200313-syzkaller #0 Not tainted [ 90.254166][ T127] ----------------------------- [ 90.259570][ T127] net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! [ 90.269968][ T127] [ 90.269968][ T127] other info that might help us debug this: [ 90.269968][ T127] [ 90.280705][ T127] [ 90.280705][ T127] rcu_scheduler_active = 2, debug_locks = 1 [ 90.288822][ T127] 3 locks held by kworker/u4:3/127: [ 90.294539][ T127] #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 90.304877][ T127] #1: ffffc900013a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 90.314927][ T127] #2: ffffffff8a54df08 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 90.324136][ T127] [ 90.324136][ T127] stack backtrace: [ 90.330528][ T127] CPU: 0 PID: 127 Comm: kworker/u4:3 Not tainted 5.6.0-rc5-next-20200313-syzkaller #0 [ 90.340109][ T127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.350180][ T127] Workqueue: netns cleanup_net [ 90.355109][ T127] Call Trace: [ 90.358432][ T127] dump_stack+0x188/0x20d [ 90.362778][ T127] ovs_ct_exit+0x3db/0x558 [ 90.367234][ T127] ovs_exit_net+0x1df/0xba0 [ 90.371751][ T127] ? ovs_dp_cmd_del+0x270/0x270 [ 90.376593][ T127] ? __mutex_unlock_slowpath+0xe2/0x660 [ 90.382136][ T127] ? ovs_dp_cmd_del+0x270/0x270 [ 90.386981][ T127] ops_exit_list.isra.0+0xa8/0x150 [ 90.392098][ T127] cleanup_net+0x511/0xa50 [ 90.396519][ T127] ? unregister_pernet_device+0x70/0x70 [ 90.402058][ T127] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 90.408033][ T127] process_one_work+0x94b/0x1690 [ 90.413047][ T127] ? pwq_dec_nr_in_flight+0x310/0x310 [ 90.418508][ T127] ? do_raw_spin_lock+0x129/0x2e0 [ 90.423546][ T127] worker_thread+0x96/0xe20 [ 90.428047][ T127] ? process_one_work+0x1690/0x1690 [ 90.433230][ T127] kthread+0x357/0x430 [ 90.437748][ T127] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 90.444071][ T127] ret_from_fork+0x24/0x30 [ 90.620169][ T127] tipc: TX() has been purged, node left! [ 90.662170][ T127] [ 90.664607][ T127] ============================= [ 90.669445][ T127] WARNING: suspicious RCU usage [ 90.674885][ T127] 5.6.0-rc5-next-20200313-syzkaller #0 Not tainted [ 90.681826][ T127] ----------------------------- [ 90.686719][ T127] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 90.694966][ T127] [ 90.694966][ T127] other info that might help us debug this: [ 90.694966][ T127] [ 90.705864][ T127] [ 90.705864][ T127] rcu_scheduler_active = 2, debug_locks = 1 [ 90.714452][ T127] 4 locks held by kworker/u4:3/127: [ 90.719729][ T127] #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 [ 90.729948][ T127] #1: ffffc900013a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 [ 90.739771][ T127] #2: ffffffff8a54df08 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 [ 90.749236][ T127] #3: ffffffff8a559c80 (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x88/0x700 [ 90.758847][ T127] [ 90.758847][ T127] stack backtrace: [ 90.765158][ T127] CPU: 1 PID: 127 Comm: kworker/u4:3 Not tainted 5.6.0-rc5-next-20200313-syzkaller #0 [ 90.774718][ T127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.784788][ T127] Workqueue: netns cleanup_net [ 90.789543][ T127] Call Trace: [ 90.792845][ T127] dump_stack+0x188/0x20d [ 90.797175][ T127] ipmr_device_event+0x240/0x2b0 [ 90.802118][ T127] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 90.808014][ T127] notifier_call_chain+0xc0/0x230 [ 90.813044][ T127] call_netdevice_notifiers_info+0xb5/0x130 [ 90.818963][ T127] rollback_registered_many+0x75c/0xe70 [ 90.824530][ T127] ? netif_set_real_num_tx_queues+0x700/0x700 [ 90.830602][ T127] ? lock_downgrade+0x7f0/0x7f0 [ 90.835463][ T127] unregister_netdevice_many.part.0+0x16/0x1e0 [ 90.841621][ T127] unregister_netdevice_many+0x36/0x50 [ 90.847075][ T127] ip6gre_exit_batch_net+0x4e8/0x700 [ 90.852358][ T127] ? ip6gre_tunnel_link+0xf0/0xf0 [ 90.857393][ T127] ? rcu_read_lock_held_common+0x130/0x130 [ 90.863285][ T127] ? ip6gre_tunnel_link+0xf0/0xf0 [ 90.868306][ T127] ops_exit_list.isra.0+0x103/0x150 [ 90.873508][ T127] cleanup_net+0x511/0xa50 [ 90.877925][ T127] ? unregister_pernet_device+0x70/0x70 [ 90.883479][ T127] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 90.889476][ T127] process_one_work+0x94b/0x1690 [ 90.894419][ T127] ? pwq_dec_nr_in_flight+0x310/0x310 [ 90.899791][ T127] ? do_raw_spin_lock+0x129/0x2e0 [ 90.904835][ T127] worker_thread+0x96/0xe20 [ 90.909341][ T127] ? process_one_work+0x1690/0x1690 [ 90.914534][ T127] kthread+0x357/0x430 [ 90.918608][ T127] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 90.924326][ T127] ret_from_fork+0x24/0x30 [ 91.692199][ T9387] can: request_module (can-proto-0) failed. executing program [ 93.859779][ T9387] can: request_module (can-proto-0) failed. [ 93.871993][ T9387] can: request_module (can-proto-0) failed.