Re: linux-next boot error: WARNING: suspicious RCU usage in ip6mr_get_table

2020-05-11 Thread Madhuparna Bhowmik
On Tue, May 12, 2020 at 11:28:47AM +1000, Stephen Rothwell wrote:
> Hi all,
> 
> On Fri, 8 May 2020 04:54:02 +0530 Madhuparna Bhowmik 
>  wrote:
> >
> > On Thu, May 07, 2020 at 08:50:55AM -0400, Qian Cai wrote:
> > > 
> > >   
> > > > On May 7, 2020, at 5:32 AM, Dmitry Vyukov  wrote:
> > > > 
> > > > On Thu, May 7, 2020 at 11:26 AM syzbot
> > > >  wrote:  
> > > >> 
> > > >> Hello,
> > > >> 
> > > >> syzbot found the following crash on:
> > > >> 
> > > >> HEAD commit:6b43f715 Add linux-next specific files for 20200507
> > > >> git tree:   linux-next
> > > >> console output: 
> > > >> https://syzkaller.appspot.com/x/log.txt?x=16f6437010
> > > >> kernel config:  
> > > >> https://syzkaller.appspot.com/x/.config?x=ef9b7a80b923f328
> > > >> dashboard link: 
> > > >> https://syzkaller.appspot.com/bug?extid=761cff389b454aa387d2
> > > >> compiler:   gcc (GCC) 9.0.0 20181231 (experimental)
> > > >> 
> > > >> Unfortunately, I don't have any reproducer for this crash yet.
> > > >> 
> > > >> IMPORTANT: if you fix the bug, please add the following tag to the 
> > > >> commit:
> > > >> Reported-by: syzbot+761cff389b454aa38...@syzkaller.appspotmail.com  
> > > > 
> > > > 
> > > > +linux-next for linux-next boot breakage  
> > > 
> > > Amol, Madhuparna, Is either of you still working on this?
> > >   
> > > >> =
> > > >> WARNING: suspicious RCU usage
> > > >> 5.7.0-rc4-next-20200507-syzkaller #0 Not tainted
> > > >> -
> > > >> net/ipv6/ip6mr.c:124 RCU-list traversed in non-reader section!!
> > > >>  
> > I had some doubt in this one, I have already mailed the maintainers,
> > waiting for their reply.
> 
> This is blocking syzbot testing of linux-next ... are we getting
> anywhere?  Will a patch similar to the ipmr.c one help here?
>
Hi Stephen,

There are some discussions going on about the ipmr.c patch, I guess even
ip6mr can be fixed in a similar way. Let me still confirm once.

Thank you,
Mahuparna

> -- 
> Cheers,
> Stephen Rothwell




Re: linux-next boot error: WARNING: suspicious RCU usage in ip6mr_get_table

2020-05-11 Thread Stephen Rothwell
Hi all,

On Fri, 8 May 2020 04:54:02 +0530 Madhuparna Bhowmik 
 wrote:
>
> On Thu, May 07, 2020 at 08:50:55AM -0400, Qian Cai wrote:
> > 
> >   
> > > On May 7, 2020, at 5:32 AM, Dmitry Vyukov  wrote:
> > > 
> > > On Thu, May 7, 2020 at 11:26 AM syzbot
> > >  wrote:  
> > >> 
> > >> Hello,
> > >> 
> > >> syzbot found the following crash on:
> > >> 
> > >> HEAD commit:6b43f715 Add linux-next specific files for 20200507
> > >> git tree:   linux-next
> > >> console output: https://syzkaller.appspot.com/x/log.txt?x=16f6437010
> > >> kernel config:  
> > >> https://syzkaller.appspot.com/x/.config?x=ef9b7a80b923f328
> > >> dashboard link: 
> > >> https://syzkaller.appspot.com/bug?extid=761cff389b454aa387d2
> > >> compiler:   gcc (GCC) 9.0.0 20181231 (experimental)
> > >> 
> > >> Unfortunately, I don't have any reproducer for this crash yet.
> > >> 
> > >> IMPORTANT: if you fix the bug, please add the following tag to the 
> > >> commit:
> > >> Reported-by: syzbot+761cff389b454aa38...@syzkaller.appspotmail.com  
> > > 
> > > 
> > > +linux-next for linux-next boot breakage  
> > 
> > Amol, Madhuparna, Is either of you still working on this?
> >   
> > >> =
> > >> WARNING: suspicious RCU usage
> > >> 5.7.0-rc4-next-20200507-syzkaller #0 Not tainted
> > >> -
> > >> net/ipv6/ip6mr.c:124 RCU-list traversed in non-reader section!!
> > >>  
> I had some doubt in this one, I have already mailed the maintainers,
> waiting for their reply.

This is blocking syzbot testing of linux-next ... are we getting
anywhere?  Will a patch similar to the ipmr.c one help here?

-- 
Cheers,
Stephen Rothwell


pgp9SXvN1VQmV.pgp
Description: OpenPGP digital signature


Re: linux-next boot error: WARNING: suspicious RCU usage in ip6mr_get_table

2020-05-07 Thread Stephen Rothwell
Hi Madhuparna,

On Fri, 8 May 2020 04:54:02 +0530 Madhuparna Bhowmik 
 wrote:
>
> On Thu, May 07, 2020 at 08:50:55AM -0400, Qian Cai wrote:
> > 
> >   
> > > On May 7, 2020, at 5:32 AM, Dmitry Vyukov  wrote:
> > > 
> > > On Thu, May 7, 2020 at 11:26 AM syzbot
> > >  wrote:  
> > >> 
> > >> =
> > >> WARNING: suspicious RCU usage
> > >> 5.7.0-rc4-next-20200507-syzkaller #0 Not tainted
> > >> -
> > >> security/integrity/evm/evm_main.c:231 RCU-list traversed in non-reader 
> > >> section!!
> > >>   
> Here is the patch for this one:
> https://lore.kernel.org/patchwork/patch/1233836/

Thanks, I will apply that one to linux-next today.

-- 
Cheers,
Stephen Rothwell


pgpLMZyD4wSzg.pgp
Description: OpenPGP digital signature


Re: linux-next boot error: WARNING: suspicious RCU usage in ip6mr_get_table

2020-05-07 Thread Madhuparna Bhowmik
On Thu, May 07, 2020 at 08:50:55AM -0400, Qian Cai wrote:
> 
> 
> > On May 7, 2020, at 5:32 AM, Dmitry Vyukov  wrote:
> > 
> > On Thu, May 7, 2020 at 11:26 AM syzbot
> >  wrote:
> >> 
> >> Hello,
> >> 
> >> syzbot found the following crash on:
> >> 
> >> HEAD commit:6b43f715 Add linux-next specific files for 20200507
> >> git tree:   linux-next
> >> console output: https://syzkaller.appspot.com/x/log.txt?x=16f6437010
> >> kernel config:  https://syzkaller.appspot.com/x/.config?x=ef9b7a80b923f328
> >> dashboard link: 
> >> https://syzkaller.appspot.com/bug?extid=761cff389b454aa387d2
> >> compiler:   gcc (GCC) 9.0.0 20181231 (experimental)
> >> 
> >> Unfortunately, I don't have any reproducer for this crash yet.
> >> 
> >> IMPORTANT: if you fix the bug, please add the following tag to the commit:
> >> Reported-by: syzbot+761cff389b454aa38...@syzkaller.appspotmail.com
> > 
> > 
> > +linux-next for linux-next boot breakage
> 
> Amol, Madhuparna, Is either of you still working on this?
> 
> > 
> >> SoftiWARP attached
> >> Driver 'framebuffer' was unable to register with bus_type 'coreboot' 
> >> because the bus was not initialized.
> >> Driver 'memconsole' was unable to register with bus_type 'coreboot' 
> >> because the bus was not initialized.
> >> Driver 'vpd' was unable to register with bus_type 'coreboot' because the 
> >> bus was not initialized.
> >> hid: raw HID events driver (C) Jiri Kosina
> >> usbcore: registered new interface driver usbhid
> >> usbhid: USB HID core driver
> >> ashmem: initialized
> >> usbcore: registered new interface driver snd-usb-audio
> >> drop_monitor: Initializing network drop monitor service
> >> NET: Registered protocol family 26
> >> GACT probability on
> >> Mirror/redirect action on
> >> Simple TC action Loaded
> >> netem: version 1.3
> >> u32 classifier
> >>Performance counters on
> >>input device check on
> >>Actions configured
> >> nf_conntrack_irc: failed to register helpers
> >> nf_conntrack_sane: failed to register helpers
> >> nf_conntrack_sip: failed to register helpers
> >> xt_time: kernel timezone is -
> >> IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP)
> >> IPVS: Connection hash table configured (size=4096, memory=64Kbytes)
> >> IPVS: ipvs loaded.
> >> IPVS: [rr] scheduler registered.
> >> IPVS: [wrr] scheduler registered.
> >> IPVS: [lc] scheduler registered.
> >> IPVS: [wlc] scheduler registered.
> >> IPVS: [fo] scheduler registered.
> >> IPVS: [ovf] scheduler registered.
> >> IPVS: [lblc] scheduler registered.
> >> IPVS: [lblcr] scheduler registered.
> >> IPVS: [dh] scheduler registered.
> >> IPVS: [sh] scheduler registered.
> >> IPVS: [mh] scheduler registered.
> >> IPVS: [sed] scheduler registered.
> >> IPVS: [nq] scheduler registered.
> >> IPVS: ftp: loaded support on port[0] = 21
> >> IPVS: [sip] pe registered.
> >> ipip: IPv4 and MPLS over IPv4 tunneling driver
> >> gre: GRE over IPv4 demultiplexor driver
> >> ip_gre: GRE over IPv4 tunneling driver
> >> IPv4 over IPsec tunneling driver
> >> ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
> >> Initializing XFRM netlink socket
> >> IPsec XFRM device driver
> >> NET: Registered protocol family 10
> >> =
> >> WARNING: suspicious RCU usage
> >> 5.7.0-rc4-next-20200507-syzkaller #0 Not tainted
> >> -
> >> net/ipv6/ip6mr.c:124 RCU-list traversed in non-reader section!!
> >>
I had some doubt in this one, I have already mailed the maintainers,
waiting for their reply.

> >> other info that might help us debug this:
> >> 
> >> 
> >> rcu_scheduler_active = 2, debug_locks = 1
> >> 1 lock held by swapper/0/1:
> >> #0: 8a7aae30 (pernet_ops_rwsem){+.+.}-{3:3}, at: 
> >> register_pernet_subsys+0x16/0x40 net/core/net_namespace.c:1257
> >> 
> >> stack backtrace:
> >> CPU: 0 PID: 1 Comm: swapper/0 Not tainted 
> >> 5.7.0-rc4-next-20200507-syzkaller #0
> >> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS 
> >> Google 01/01/2011
> >> Call Trace:
> >> __dump_stack lib/dump_stack.c:77 [inline]
> >> dump_stack+0x18f/0x20d lib/dump_stack.c:118
> >> ip6mr_get_table+0x153/0x180 net/ipv6/ip6mr.c:124
> >> ip6mr_new_table+0x1b/0x70 net/ipv6/ip6mr.c:382
> >> ip6mr_rules_init net/ipv6/ip6mr.c:236 [inline]
> >> ip6mr_net_init+0x133/0x3f0 net/ipv6/ip6mr.c:1310
> >> ops_init+0xaf/0x420 net/core/net_namespace.c:151
> >> __register_pernet_operations net/core/net_namespace.c:1140 [inline]
> >> register_pernet_operations+0x346/0x840 net/core/net_namespace.c:1217
> >> register_pernet_subsys+0x25/0x40 net/core/net_namespace.c:1258
> >> ip6_mr_init+0x49/0x152 net/ipv6/ip6mr.c:1363
> >> inet6_init+0x1d7/0x6dc net/ipv6/af_inet6.c:1037
> >> do_one_initcall+0x10a/0x7d0 init/main.c:1159
> >> do_initcall_level init/main.c:1232 [inline]
> >> do_initcalls init/main.c:1248 [inline]
> >> do_basic_setup init/main.c:1268 [inline]
> >> kernel_init_freeable+0x501/0x5ae init/main.c:1454
> >> kernel_init+0xd/0x1bb 

Re: linux-next boot error: WARNING: suspicious RCU usage in ip6mr_get_table

2020-05-07 Thread Qian Cai



> On May 7, 2020, at 5:32 AM, Dmitry Vyukov  wrote:
> 
> On Thu, May 7, 2020 at 11:26 AM syzbot
>  wrote:
>> 
>> Hello,
>> 
>> syzbot found the following crash on:
>> 
>> HEAD commit:6b43f715 Add linux-next specific files for 20200507
>> git tree:   linux-next
>> console output: https://syzkaller.appspot.com/x/log.txt?x=16f6437010
>> kernel config:  https://syzkaller.appspot.com/x/.config?x=ef9b7a80b923f328
>> dashboard link: https://syzkaller.appspot.com/bug?extid=761cff389b454aa387d2
>> compiler:   gcc (GCC) 9.0.0 20181231 (experimental)
>> 
>> Unfortunately, I don't have any reproducer for this crash yet.
>> 
>> IMPORTANT: if you fix the bug, please add the following tag to the commit:
>> Reported-by: syzbot+761cff389b454aa38...@syzkaller.appspotmail.com
> 
> 
> +linux-next for linux-next boot breakage

Amol, Madhuparna, Is either of you still working on this?

> 
>> SoftiWARP attached
>> Driver 'framebuffer' was unable to register with bus_type 'coreboot' because 
>> the bus was not initialized.
>> Driver 'memconsole' was unable to register with bus_type 'coreboot' because 
>> the bus was not initialized.
>> Driver 'vpd' was unable to register with bus_type 'coreboot' because the bus 
>> was not initialized.
>> hid: raw HID events driver (C) Jiri Kosina
>> usbcore: registered new interface driver usbhid
>> usbhid: USB HID core driver
>> ashmem: initialized
>> usbcore: registered new interface driver snd-usb-audio
>> drop_monitor: Initializing network drop monitor service
>> NET: Registered protocol family 26
>> GACT probability on
>> Mirror/redirect action on
>> Simple TC action Loaded
>> netem: version 1.3
>> u32 classifier
>>Performance counters on
>>input device check on
>>Actions configured
>> nf_conntrack_irc: failed to register helpers
>> nf_conntrack_sane: failed to register helpers
>> nf_conntrack_sip: failed to register helpers
>> xt_time: kernel timezone is -
>> IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP)
>> IPVS: Connection hash table configured (size=4096, memory=64Kbytes)
>> IPVS: ipvs loaded.
>> IPVS: [rr] scheduler registered.
>> IPVS: [wrr] scheduler registered.
>> IPVS: [lc] scheduler registered.
>> IPVS: [wlc] scheduler registered.
>> IPVS: [fo] scheduler registered.
>> IPVS: [ovf] scheduler registered.
>> IPVS: [lblc] scheduler registered.
>> IPVS: [lblcr] scheduler registered.
>> IPVS: [dh] scheduler registered.
>> IPVS: [sh] scheduler registered.
>> IPVS: [mh] scheduler registered.
>> IPVS: [sed] scheduler registered.
>> IPVS: [nq] scheduler registered.
>> IPVS: ftp: loaded support on port[0] = 21
>> IPVS: [sip] pe registered.
>> ipip: IPv4 and MPLS over IPv4 tunneling driver
>> gre: GRE over IPv4 demultiplexor driver
>> ip_gre: GRE over IPv4 tunneling driver
>> IPv4 over IPsec tunneling driver
>> ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
>> Initializing XFRM netlink socket
>> IPsec XFRM device driver
>> NET: Registered protocol family 10
>> =
>> WARNING: suspicious RCU usage
>> 5.7.0-rc4-next-20200507-syzkaller #0 Not tainted
>> -
>> net/ipv6/ip6mr.c:124 RCU-list traversed in non-reader section!!
>> 
>> other info that might help us debug this:
>> 
>> 
>> rcu_scheduler_active = 2, debug_locks = 1
>> 1 lock held by swapper/0/1:
>> #0: 8a7aae30 (pernet_ops_rwsem){+.+.}-{3:3}, at: 
>> register_pernet_subsys+0x16/0x40 net/core/net_namespace.c:1257
>> 
>> stack backtrace:
>> CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.7.0-rc4-next-20200507-syzkaller 
>> #0
>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS 
>> Google 01/01/2011
>> Call Trace:
>> __dump_stack lib/dump_stack.c:77 [inline]
>> dump_stack+0x18f/0x20d lib/dump_stack.c:118
>> ip6mr_get_table+0x153/0x180 net/ipv6/ip6mr.c:124
>> ip6mr_new_table+0x1b/0x70 net/ipv6/ip6mr.c:382
>> ip6mr_rules_init net/ipv6/ip6mr.c:236 [inline]
>> ip6mr_net_init+0x133/0x3f0 net/ipv6/ip6mr.c:1310
>> ops_init+0xaf/0x420 net/core/net_namespace.c:151
>> __register_pernet_operations net/core/net_namespace.c:1140 [inline]
>> register_pernet_operations+0x346/0x840 net/core/net_namespace.c:1217
>> register_pernet_subsys+0x25/0x40 net/core/net_namespace.c:1258
>> ip6_mr_init+0x49/0x152 net/ipv6/ip6mr.c:1363
>> inet6_init+0x1d7/0x6dc net/ipv6/af_inet6.c:1037
>> do_one_initcall+0x10a/0x7d0 init/main.c:1159
>> do_initcall_level init/main.c:1232 [inline]
>> do_initcalls init/main.c:1248 [inline]
>> do_basic_setup init/main.c:1268 [inline]
>> kernel_init_freeable+0x501/0x5ae init/main.c:1454
>> kernel_init+0xd/0x1bb init/main.c:1359
>> ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:351
>> Segment Routing with IPv6
>> mip6: Mobile IPv6
>> sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
>> ip6_gre: GRE over IPv6 tunneling driver
>> NET: Registered protocol family 17
>> NET: Registered protocol family 15
>> Bridge firewalling registered
>> NET: Registered protocol family 9
>> X25: Linux Version 0.2
>> NET: 

Re: linux-next boot error: WARNING: suspicious RCU usage in ip6mr_get_table

2020-05-07 Thread Dmitry Vyukov
On Thu, May 7, 2020 at 11:26 AM syzbot
 wrote:
>
> Hello,
>
> syzbot found the following crash on:
>
> HEAD commit:6b43f715 Add linux-next specific files for 20200507
> git tree:   linux-next
> console output: https://syzkaller.appspot.com/x/log.txt?x=16f6437010
> kernel config:  https://syzkaller.appspot.com/x/.config?x=ef9b7a80b923f328
> dashboard link: https://syzkaller.appspot.com/bug?extid=761cff389b454aa387d2
> compiler:   gcc (GCC) 9.0.0 20181231 (experimental)
>
> Unfortunately, I don't have any reproducer for this crash yet.
>
> IMPORTANT: if you fix the bug, please add the following tag to the commit:
> Reported-by: syzbot+761cff389b454aa38...@syzkaller.appspotmail.com


+linux-next for linux-next boot breakage

> SoftiWARP attached
> Driver 'framebuffer' was unable to register with bus_type 'coreboot' because 
> the bus was not initialized.
> Driver 'memconsole' was unable to register with bus_type 'coreboot' because 
> the bus was not initialized.
> Driver 'vpd' was unable to register with bus_type 'coreboot' because the bus 
> was not initialized.
> hid: raw HID events driver (C) Jiri Kosina
> usbcore: registered new interface driver usbhid
> usbhid: USB HID core driver
> ashmem: initialized
> usbcore: registered new interface driver snd-usb-audio
> drop_monitor: Initializing network drop monitor service
> NET: Registered protocol family 26
> GACT probability on
> Mirror/redirect action on
> Simple TC action Loaded
> netem: version 1.3
> u32 classifier
> Performance counters on
> input device check on
> Actions configured
> nf_conntrack_irc: failed to register helpers
> nf_conntrack_sane: failed to register helpers
> nf_conntrack_sip: failed to register helpers
> xt_time: kernel timezone is -
> IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP)
> IPVS: Connection hash table configured (size=4096, memory=64Kbytes)
> IPVS: ipvs loaded.
> IPVS: [rr] scheduler registered.
> IPVS: [wrr] scheduler registered.
> IPVS: [lc] scheduler registered.
> IPVS: [wlc] scheduler registered.
> IPVS: [fo] scheduler registered.
> IPVS: [ovf] scheduler registered.
> IPVS: [lblc] scheduler registered.
> IPVS: [lblcr] scheduler registered.
> IPVS: [dh] scheduler registered.
> IPVS: [sh] scheduler registered.
> IPVS: [mh] scheduler registered.
> IPVS: [sed] scheduler registered.
> IPVS: [nq] scheduler registered.
> IPVS: ftp: loaded support on port[0] = 21
> IPVS: [sip] pe registered.
> ipip: IPv4 and MPLS over IPv4 tunneling driver
> gre: GRE over IPv4 demultiplexor driver
> ip_gre: GRE over IPv4 tunneling driver
> IPv4 over IPsec tunneling driver
> ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
> Initializing XFRM netlink socket
> IPsec XFRM device driver
> NET: Registered protocol family 10
> =
> WARNING: suspicious RCU usage
> 5.7.0-rc4-next-20200507-syzkaller #0 Not tainted
> -
> net/ipv6/ip6mr.c:124 RCU-list traversed in non-reader section!!
>
> other info that might help us debug this:
>
>
> rcu_scheduler_active = 2, debug_locks = 1
> 1 lock held by swapper/0/1:
>  #0: 8a7aae30 (pernet_ops_rwsem){+.+.}-{3:3}, at: 
> register_pernet_subsys+0x16/0x40 net/core/net_namespace.c:1257
>
> stack backtrace:
> CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.7.0-rc4-next-20200507-syzkaller #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS 
> Google 01/01/2011
> Call Trace:
>  __dump_stack lib/dump_stack.c:77 [inline]
>  dump_stack+0x18f/0x20d lib/dump_stack.c:118
>  ip6mr_get_table+0x153/0x180 net/ipv6/ip6mr.c:124
>  ip6mr_new_table+0x1b/0x70 net/ipv6/ip6mr.c:382
>  ip6mr_rules_init net/ipv6/ip6mr.c:236 [inline]
>  ip6mr_net_init+0x133/0x3f0 net/ipv6/ip6mr.c:1310
>  ops_init+0xaf/0x420 net/core/net_namespace.c:151
>  __register_pernet_operations net/core/net_namespace.c:1140 [inline]
>  register_pernet_operations+0x346/0x840 net/core/net_namespace.c:1217
>  register_pernet_subsys+0x25/0x40 net/core/net_namespace.c:1258
>  ip6_mr_init+0x49/0x152 net/ipv6/ip6mr.c:1363
>  inet6_init+0x1d7/0x6dc net/ipv6/af_inet6.c:1037
>  do_one_initcall+0x10a/0x7d0 init/main.c:1159
>  do_initcall_level init/main.c:1232 [inline]
>  do_initcalls init/main.c:1248 [inline]
>  do_basic_setup init/main.c:1268 [inline]
>  kernel_init_freeable+0x501/0x5ae init/main.c:1454
>  kernel_init+0xd/0x1bb init/main.c:1359
>  ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:351
> Segment Routing with IPv6
> mip6: Mobile IPv6
> sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
> ip6_gre: GRE over IPv6 tunneling driver
> NET: Registered protocol family 17
> NET: Registered protocol family 15
> Bridge firewalling registered
> NET: Registered protocol family 9
> X25: Linux Version 0.2
> NET: Registered protocol family 6
> NET: Registered protocol family 11
> NET: Registered protocol family 3
> can: controller area network core (rev 20170425 abi 9)
> NET: Registered protocol family 29
> can: raw protocol (rev 20170425)
> can: 

linux-next boot error: WARNING: suspicious RCU usage in ip6mr_get_table

2020-05-07 Thread syzbot
Hello,

syzbot found the following crash on:

HEAD commit:6b43f715 Add linux-next specific files for 20200507
git tree:   linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=16f6437010
kernel config:  https://syzkaller.appspot.com/x/.config?x=ef9b7a80b923f328
dashboard link: https://syzkaller.appspot.com/bug?extid=761cff389b454aa387d2
compiler:   gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+761cff389b454aa38...@syzkaller.appspotmail.com

SoftiWARP attached
Driver 'framebuffer' was unable to register with bus_type 'coreboot' because 
the bus was not initialized.
Driver 'memconsole' was unable to register with bus_type 'coreboot' because the 
bus was not initialized.
Driver 'vpd' was unable to register with bus_type 'coreboot' because the bus 
was not initialized.
hid: raw HID events driver (C) Jiri Kosina
usbcore: registered new interface driver usbhid
usbhid: USB HID core driver
ashmem: initialized
usbcore: registered new interface driver snd-usb-audio
drop_monitor: Initializing network drop monitor service
NET: Registered protocol family 26
GACT probability on
Mirror/redirect action on
Simple TC action Loaded
netem: version 1.3
u32 classifier
Performance counters on
input device check on
Actions configured
nf_conntrack_irc: failed to register helpers
nf_conntrack_sane: failed to register helpers
nf_conntrack_sip: failed to register helpers
xt_time: kernel timezone is -
IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP)
IPVS: Connection hash table configured (size=4096, memory=64Kbytes)
IPVS: ipvs loaded.
IPVS: [rr] scheduler registered.
IPVS: [wrr] scheduler registered.
IPVS: [lc] scheduler registered.
IPVS: [wlc] scheduler registered.
IPVS: [fo] scheduler registered.
IPVS: [ovf] scheduler registered.
IPVS: [lblc] scheduler registered.
IPVS: [lblcr] scheduler registered.
IPVS: [dh] scheduler registered.
IPVS: [sh] scheduler registered.
IPVS: [mh] scheduler registered.
IPVS: [sed] scheduler registered.
IPVS: [nq] scheduler registered.
IPVS: ftp: loaded support on port[0] = 21
IPVS: [sip] pe registered.
ipip: IPv4 and MPLS over IPv4 tunneling driver
gre: GRE over IPv4 demultiplexor driver
ip_gre: GRE over IPv4 tunneling driver
IPv4 over IPsec tunneling driver
ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
Initializing XFRM netlink socket
IPsec XFRM device driver
NET: Registered protocol family 10
=
WARNING: suspicious RCU usage
5.7.0-rc4-next-20200507-syzkaller #0 Not tainted
-
net/ipv6/ip6mr.c:124 RCU-list traversed in non-reader section!!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
1 lock held by swapper/0/1:
 #0: 8a7aae30 (pernet_ops_rwsem){+.+.}-{3:3}, at: 
register_pernet_subsys+0x16/0x40 net/core/net_namespace.c:1257

stack backtrace:
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.7.0-rc4-next-20200507-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 
01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x18f/0x20d lib/dump_stack.c:118
 ip6mr_get_table+0x153/0x180 net/ipv6/ip6mr.c:124
 ip6mr_new_table+0x1b/0x70 net/ipv6/ip6mr.c:382
 ip6mr_rules_init net/ipv6/ip6mr.c:236 [inline]
 ip6mr_net_init+0x133/0x3f0 net/ipv6/ip6mr.c:1310
 ops_init+0xaf/0x420 net/core/net_namespace.c:151
 __register_pernet_operations net/core/net_namespace.c:1140 [inline]
 register_pernet_operations+0x346/0x840 net/core/net_namespace.c:1217
 register_pernet_subsys+0x25/0x40 net/core/net_namespace.c:1258
 ip6_mr_init+0x49/0x152 net/ipv6/ip6mr.c:1363
 inet6_init+0x1d7/0x6dc net/ipv6/af_inet6.c:1037
 do_one_initcall+0x10a/0x7d0 init/main.c:1159
 do_initcall_level init/main.c:1232 [inline]
 do_initcalls init/main.c:1248 [inline]
 do_basic_setup init/main.c:1268 [inline]
 kernel_init_freeable+0x501/0x5ae init/main.c:1454
 kernel_init+0xd/0x1bb init/main.c:1359
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:351
Segment Routing with IPv6
mip6: Mobile IPv6
sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
ip6_gre: GRE over IPv6 tunneling driver
NET: Registered protocol family 17
NET: Registered protocol family 15
Bridge firewalling registered
NET: Registered protocol family 9
X25: Linux Version 0.2
NET: Registered protocol family 6
NET: Registered protocol family 11
NET: Registered protocol family 3
can: controller area network core (rev 20170425 abi 9)
NET: Registered protocol family 29
can: raw protocol (rev 20170425)
can: broadcast manager protocol (rev 20170425 t)
can: netlink gateway (rev 20190810) max_hops=1
can: SAE J1939
Bluetooth: RFCOMM TTY layer initialized
Bluetooth: RFCOMM socket layer initialized
Bluetooth: RFCOMM ver 1.11
Bluetooth: BNEP (Ethernet Emulation) ver 1.3
Bluetooth: BNEP filters: protocol multicast
Bluetooth: BNEP socket