Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started Regular background program processing daemon. [ OK ] Started Daily apt download activities. [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Reached target Timers. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Found device /dev/ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.55' (ECDSA) to the list of known hosts. syzkaller login: [ 69.761204][ T27] audit: type=1400 audit(1596258077.501:8): avc: denied { execmem } for pid=6848 comm="syz-executor385" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 69.785747][ T6849] IPVS: ftp: loaded support on port[0] = 21 [ 69.881768][ T6849] chnl_net:caif_netlink_parms(): no params data found [ 69.936558][ T6849] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.944388][ T6849] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.952401][ T6849] device bridge_slave_0 entered promiscuous mode [ 69.962532][ T6849] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.969949][ T6849] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.979166][ T6849] device bridge_slave_1 entered promiscuous mode [ 70.000166][ T6849] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.011569][ T6849] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.034905][ T6849] team0: Port device team_slave_0 added [ 70.042256][ T6849] team0: Port device team_slave_1 added [ 70.061762][ T6849] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.069101][ T6849] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.098389][ T6849] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.111741][ T6849] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.120156][ T6849] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.147660][ T6849] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.217642][ T6849] device hsr_slave_0 entered promiscuous mode [ 70.263806][ T6849] device hsr_slave_1 entered promiscuous mode [ 70.424455][ T6849] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 70.467391][ T6849] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 70.526472][ T6849] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 70.586145][ T6849] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 70.661626][ T6849] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.668968][ T6849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.677389][ T6849] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.684563][ T6849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.735687][ T6849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.751526][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.762763][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.772420][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.780944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 70.795086][ T6849] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.815290][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.824800][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.831953][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.840082][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.848938][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.856173][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.867539][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.883252][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.892122][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.902753][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.912284][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.925388][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.933692][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.942035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.955886][ T6849] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.972456][ T6849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.984609][ T2497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.993041][ T2497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.014164][ T2497] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.021580][ T2497] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.032644][ T6849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.051434][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.060990][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.082142][ T6849] device veth0_vlan entered promiscuous mode [ 71.089214][ T2602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.099126][ T2602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.112107][ T6849] device veth1_vlan entered promiscuous mode [ 71.120165][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.128992][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.137573][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 71.160076][ T2497] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 71.168475][ T2497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.178756][ T2497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.194629][ T6849] device veth0_macvtap entered promiscuous mode [ 71.205008][ T6849] device veth1_macvtap entered promiscuous mode [ 71.224091][ T6849] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.231818][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 71.241094][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 71.249820][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.258628][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.271389][ T6849] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.279922][ T2602] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.289507][ T2602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 72.590383][ T6849] [ 72.592737][ T6849] ============================================ [ 72.598961][ T6849] WARNING: possible recursive locking detected [ 72.605103][ T6849] 5.8.0-rc7-syzkaller #0 Not tainted [ 72.610380][ T6849] -------------------------------------------- [ 72.616525][ T6849] syz-executor385/6849 is trying to acquire lock: [ 72.622925][ T6849] ffff8880a8dfc898 (_xmit_ETHER#2){+.-.}-{2:2}, at: __dev_queue_xmit+0x215e/0x2d60 [ 72.632221][ T6849] [ 72.632221][ T6849] but task is already holding lock: [ 72.639583][ T6849] ffff88809fb05c98 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x25c/0xc00 [ 72.648631][ T6849] [ 72.648631][ T6849] other info that might help us debug this: [ 72.656692][ T6849] Possible unsafe locking scenario: [ 72.656692][ T6849] [ 72.664140][ T6849] CPU0 [ 72.667413][ T6849] ---- [ 72.670676][ T6849] lock(_xmit_ETHER#2); [ 72.674900][ T6849] lock(_xmit_ETHER#2); [ 72.679111][ T6849] [ 72.679111][ T6849] *** DEADLOCK *** [ 72.679111][ T6849] [ 72.687228][ T6849] May be due to missing lock nesting notation [ 72.687228][ T6849] [ 72.695625][ T6849] 11 locks held by syz-executor385/6849: [ 72.701241][ T6849] #0: ffffffff89bc11c0 (rcu_read_lock){....}-{1:2}, at: rawv6_sendmsg+0x1dda/0x38f0 [ 72.711121][ T6849] #1: ffffffff89bc1160 (rcu_read_lock_bh){....}-{1:2}, at: ip6_finish_output2+0x190/0x17b0 [ 72.721169][ T6849] #2: ffffffff89bc1160 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1da/0x2d60 [ 72.731041][ T6849] #3: ffff8880a0293258 (&sch->seqlock){+...}-{2:2}, at: __dev_queue_xmit+0x1310/0x2d60 [ 72.740822][ T6849] #4: ffff8880a0293148 (dev->qdisc_running_key ?: &qdisc_running_key){+...}-{0:0}, at: neigh_resolve_output+0x3fe/0x6a0 [ 72.753380][ T6849] #5: ffff88809fb05c98 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x25c/0xc00 [ 72.762827][ T6849] #6: ffffffff89bc11c0 (rcu_read_lock){....}-{1:2}, at: icmpv6_send+0x0/0x210 [ 72.771742][ T6849] #7: ffff8880a86a8120 (k-slock-AF_INET6){+...}-{2:2}, at: icmp6_send+0xe82/0x2660 [ 72.781085][ T6849] #8: ffffffff89bc11c0 (rcu_read_lock){....}-{1:2}, at: icmp6_send+0x1453/0x2660 [ 72.790285][ T6849] #9: ffffffff89bc1160 (rcu_read_lock_bh){....}-{1:2}, at: ip6_finish_output2+0x190/0x17b0 [ 72.800427][ T6849] #10: ffffffff89bc1160 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1da/0x2d60 [ 72.810385][ T6849] [ 72.810385][ T6849] stack backtrace: [ 72.816251][ T6849] CPU: 0 PID: 6849 Comm: syz-executor385 Not tainted 5.8.0-rc7-syzkaller #0 [ 72.824889][ T6849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.834917][ T6849] Call Trace: [ 72.838359][ T6849] dump_stack+0x18f/0x20d [ 72.842661][ T6849] __lock_acquire.cold+0x178/0x3f8 [ 72.847748][ T6849] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 72.853710][ T6849] ? skb_crc32c_csum_help+0x70/0x70 [ 72.858877][ T6849] lock_acquire+0x1f1/0xad0 [ 72.863385][ T6849] ? __dev_queue_xmit+0x215e/0x2d60 [ 72.868655][ T6849] ? lock_release+0x8d0/0x8d0 [ 72.873311][ T6849] ? validate_xmit_xfrm+0x2a5/0xfa0 [ 72.878496][ T6849] ? validate_xmit_skb+0x848/0xe60 [ 72.883580][ T6849] _raw_spin_lock+0x2a/0x40 [ 72.888068][ T6849] ? __dev_queue_xmit+0x215e/0x2d60 [ 72.893242][ T6849] __dev_queue_xmit+0x215e/0x2d60 [ 72.898253][ T6849] ? neigh_resolve_output+0x2ec/0x6a0 [ 72.903609][ T6849] ? find_held_lock+0x2d/0x110 [ 72.908359][ T6849] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 72.913632][ T6849] ? mark_held_locks+0x9f/0xe0 [ 72.918374][ T6849] ? read_seqcount_begin+0xdf/0x270 [ 72.923542][ T6849] ? memcpy+0x39/0x60 [ 72.927497][ T6849] neigh_resolve_output+0x3fe/0x6a0 [ 72.933367][ T6849] ip6_finish_output2+0x8b6/0x17b0 [ 72.938449][ T6849] __ip6_finish_output+0x447/0xab0 [ 72.943668][ T6849] ip6_finish_output+0x34/0x1f0 [ 72.948508][ T6849] ip6_output+0x1db/0x520 [ 72.952852][ T6849] ip6_local_out+0xaf/0x1a0 [ 72.957423][ T6849] ip6_send_skb+0xb7/0x340 [ 72.961937][ T6849] ip6_push_pending_frames+0xbd/0xe0 [ 72.967212][ T6849] icmpv6_push_pending_frames+0x294/0x470 [ 72.972911][ T6849] icmp6_send+0x1cec/0x2660 [ 72.977388][ T6849] ? icmpv6_push_pending_frames+0x470/0x470 [ 72.983254][ T6849] ? lockdep_hardirqs_on_prepare+0x538/0x590 [ 72.989207][ T6849] ? lock_acquire+0x1f1/0xad0 [ 72.993904][ T6849] ? inet6_unregister_icmp_sender+0x50/0x50 [ 72.999910][ T6849] ? lockdep_hardirqs_on+0x6a/0xe0 [ 73.005104][ T6849] ? ip6_neigh_lookup+0x31e/0x4d0 [ 73.010383][ T6849] ? __local_bh_enable_ip+0x159/0x250 [ 73.015909][ T6849] ? icmpv6_push_pending_frames+0x470/0x470 [ 73.021774][ T6849] ? icmpv6_send+0xde/0x210 [ 73.026267][ T6849] icmpv6_send+0xde/0x210 [ 73.030834][ T6849] ? __ip6_route_redirect+0xb50/0xb50 [ 73.036211][ T6849] ip6_link_failure+0x26/0x500 [ 73.040987][ T6849] ? __ip6_route_redirect+0xb50/0xb50 [ 73.046361][ T6849] ip_tunnel_xmit+0x15cc/0x2ac3 [ 73.051204][ T6849] ? ip_md_tunnel_xmit+0x15b0/0x15b0 [ 73.056493][ T6849] ? lockdep_hardirqs_on_prepare+0x4df/0x590 [ 73.062465][ T6849] ? skb_push+0x97/0xc0 [ 73.066602][ T6849] ? __gre_xmit+0x535/0x8f0 [ 73.071080][ T6849] erspan_xmit+0x1109/0x2760 [ 73.075684][ T6849] dev_hard_start_xmit+0x193/0x950 [ 73.080780][ T6849] sch_direct_xmit+0x2ea/0xc00 [ 73.085526][ T6849] ? pfifo_fast_enqueue+0xf3/0x5f0 [ 73.090633][ T6849] ? dev_watchdog+0xc80/0xc80 [ 73.095317][ T6849] ? pfifo_fast_dequeue+0x5a1/0xb20 [ 73.100490][ T6849] ? lock_is_held_type+0xb0/0xe0 [ 73.105409][ T6849] __qdisc_run+0x4b9/0x1630 [ 73.109890][ T6849] __dev_queue_xmit+0x1456/0x2d60 [ 73.114904][ T6849] ? neigh_resolve_output+0x2ec/0x6a0 [ 73.120247][ T6849] ? find_held_lock+0x2d/0x110 [ 73.124996][ T6849] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 73.130276][ T6849] ? read_seqcount_begin+0xdf/0x270 [ 73.135472][ T6849] ? memcpy+0x39/0x60 [ 73.139426][ T6849] neigh_resolve_output+0x3fe/0x6a0 [ 73.144613][ T6849] ip6_finish_output2+0x8b6/0x17b0 [ 73.149712][ T6849] __ip6_finish_output+0x447/0xab0 [ 73.154798][ T6849] ip6_finish_output+0x34/0x1f0 [ 73.159631][ T6849] ip6_output+0x1db/0x520 [ 73.163942][ T6849] rawv6_sendmsg+0x2008/0x38f0 [ 73.168766][ T6849] ? rawv6_bind+0x9a0/0x9a0 [ 73.173245][ T6849] ? lock_acquire+0x1f1/0xad0 [ 73.177892][ T6849] ? avc_has_perm_noaudit+0x1c7/0x390 [ 73.183239][ T6849] ? rawv6_recvmsg+0xd50/0xd50 [ 73.187979][ T6849] ? sock_has_perm+0x1ee/0x280 [ 73.192726][ T6849] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 73.198600][ T6849] ? tomoyo_socket_sendmsg_permission+0x12a/0x389 [ 73.204993][ T6849] inet_sendmsg+0x99/0xe0 [ 73.209328][ T6849] ? inet_send_prepare+0x4d0/0x4d0 [ 73.214448][ T6849] sock_sendmsg+0xcf/0x120 [ 73.218846][ T6849] sock_write_iter+0x28c/0x3c0 [ 73.223582][ T6849] ? sock_sendmsg+0x120/0x120 [ 73.228244][ T6849] ? file_has_perm+0x25a/0x340 [ 73.233072][ T6849] new_sync_write+0x422/0x650 [ 73.239489][ T6849] ? new_sync_read+0x6e0/0x6e0 [ 73.244317][ T6849] ? selinux_file_permission+0x92/0x520 [ 73.249855][ T6849] vfs_write+0x59d/0x6b0 [ 73.254084][ T6849] ksys_write+0x1ee/0x250 [ 73.258389][ T6849] ? __ia32_sys_read+0xb0/0xb0 [ 73.263137][ T6849] ? lock_is_held_type+0xb0/0xe0 [ 73.268063][ T6849] ? do_syscall_64+0x1c/0xe0 [ 73.272675][ T6849] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 73.278663][ T6849] do_syscall_64+0x60/0xe0 [ 73.283152][ T6849] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.289100][ T6849] RIP: 0033:0x4496e9 [ 73.293099][ T6849] Code: 4c 02 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 73.312713][ T6849] RSP: 002b:00007ffd84bad2d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 73.321120][ T6849] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004496e9 [ 73.329069][ T6849] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 0000000000000005 [ 73.337018][ T6849] RBP: 00007ffd84bad360 R08: 0000000000000000 R09: 0000000000000000 [ 73.344967][ T6849] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd84bad340 [ 73.352921][ T6849] R13: 0000000000000004 R14: 000000000224e850 R15: 0000000000000003