Warning: Permanently added '10.128.10.6' (ECDSA) to the list of known hosts. 2020/04/26 18:04:40 fuzzer started 2020/04/26 18:04:42 connecting to host at 10.128.0.26:41659 2020/04/26 18:04:42 checking machine... 2020/04/26 18:04:42 checking revisions... 2020/04/26 18:04:42 testing simple program... syzkaller login: [ 63.921822][ T6846] IPVS: ftp: loaded support on port[0] = 21 2020/04/26 18:04:42 building call list... [ 64.272254][ T43] tipc: TX() has been purged, node left! [ 64.314395][ T43] [ 64.316882][ T43] ============================= [ 64.323116][ T43] WARNING: suspicious RCU usage [ 64.328036][ T43] 5.7.0-rc2-next-20200424-syzkaller #0 Not tainted [ 64.335923][ T43] ----------------------------- [ 64.340820][ T43] net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! [ 64.349907][ T43] [ 64.349907][ T43] other info that might help us debug this: [ 64.349907][ T43] [ 64.362859][ T43] [ 64.362859][ T43] rcu_scheduler_active = 2, debug_locks = 1 [ 64.370999][ T43] 4 locks held by kworker/u4:2/43: [ 64.377276][ T43] #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 64.388392][ T43] #1: ffffc90000ef7dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 64.399213][ T43] #2: ffffffff8a5a2c30 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 64.409380][ T43] #3: ffffffff8a5aeba8 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 [ 64.428947][ T43] [ 64.428947][ T43] stack backtrace: [ 64.435761][ T43] CPU: 1 PID: 43 Comm: kworker/u4:2 Not tainted 5.7.0-rc2-next-20200424-syzkaller #0 [ 64.445219][ T43] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.455383][ T43] Workqueue: netns cleanup_net [ 64.460142][ T43] Call Trace: [ 64.463430][ T43] dump_stack+0x18f/0x20d [ 64.467765][ T43] ipmr_device_event+0x240/0x2b0 [ 64.472705][ T43] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 64.478709][ T43] notifier_call_chain+0xc0/0x230 [ 64.483742][ T43] call_netdevice_notifiers_info+0xb5/0x130 [ 64.489637][ T43] rollback_registered_many+0x75c/0xe70 [ 64.495189][ T43] ? netif_set_real_num_tx_queues+0x700/0x700 [ 64.501265][ T43] ? lock_downgrade+0x840/0x840 [ 64.506125][ T43] unregister_netdevice_many.part.0+0x16/0x1e0 [ 64.512279][ T43] unregister_netdevice_many+0x36/0x50 [ 64.517734][ T43] ip6gre_exit_batch_net+0x4e8/0x700 [ 64.523040][ T43] ? ip6gre_tunnel_link+0xf0/0xf0 [ 64.528064][ T43] ? rcu_read_lock_held_common+0x130/0x130 [ 64.533871][ T43] ? ip6gre_tunnel_link+0xf0/0xf0 [ 64.538897][ T43] ops_exit_list.isra.0+0x103/0x150 [ 64.544099][ T43] cleanup_net+0x511/0xa50 [ 64.548517][ T43] ? unregister_pernet_device+0x70/0x70 [ 64.554062][ T43] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 64.560038][ T43] ? _raw_spin_unlock_irq+0x1f/0x80 [ 64.565237][ T43] process_one_work+0x965/0x16a0 [ 64.570181][ T43] ? lock_release+0x800/0x800 [ 64.574858][ T43] ? pwq_dec_nr_in_flight+0x310/0x310 [ 64.580230][ T43] ? rwlock_bug.part.0+0x90/0x90 [ 64.585175][ T43] worker_thread+0x96/0xe20 [ 64.589689][ T43] ? process_one_work+0x16a0/0x16a0 [ 64.594884][ T43] kthread+0x38b/0x470 [ 64.598952][ T43] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 64.604683][ T43] ret_from_fork+0x24/0x30 [ 65.782857][ T6826] can: request_module (can-proto-0) failed. executing program [ 67.867980][ T6826] can: request_module (can-proto-0) failed. [ 67.879597][ T6826] can: request_module (can-proto-0) failed.