[ OK ] Reached target Basic System. Starting System Logging Service... Starting OpenBSD Secure Shell server... Starting getty on tty2-tty6 if dbus and logind are not available... Starting Permit User Sessions... [ OK ] Started Regular background program processing daemon. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.202' (ECDSA) to the list of known hosts. syzkaller login: [ 78.261902][ T35] audit: type=1400 audit(1604629496.368:8): avc: denied { execmem } for pid=8518 comm="syz-executor179" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 78.286425][ T8519] IPVS: ftp: loaded support on port[0] = 21 [ 78.407593][ T8519] chnl_net:caif_netlink_parms(): no params data found [ 78.467062][ T8519] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.475211][ T8519] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.484234][ T8519] device bridge_slave_0 entered promiscuous mode [ 78.495285][ T8519] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.503173][ T8519] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.511669][ T8519] device bridge_slave_1 entered promiscuous mode [ 78.533897][ T8519] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.545000][ T8519] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.570625][ T8519] team0: Port device team_slave_0 added [ 78.579575][ T8519] team0: Port device team_slave_1 added [ 78.599697][ T8519] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.606687][ T8519] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.633699][ T8519] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.646951][ T8519] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.654615][ T8519] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.681326][ T8519] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.711113][ T8519] device hsr_slave_0 entered promiscuous mode [ 78.719689][ T8519] device hsr_slave_1 entered promiscuous mode [ 78.832509][ T8519] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.843766][ T8519] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.862232][ T8519] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.873588][ T8519] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.901978][ T8519] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.909609][ T8519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.917447][ T8519] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.924595][ T8519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.977682][ T8519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.995554][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.007491][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.017128][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.025515][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 79.039708][ T8519] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.053507][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.062523][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.069656][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.091698][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.101282][ T3191] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.108462][ T3191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.129577][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.139413][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.148005][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.164122][ T8519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.176376][ T8519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.187005][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.196141][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.216887][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.224736][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.239626][ T8519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.262636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.288735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.297621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.307164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.318802][ T8519] device veth0_vlan entered promiscuous mode [ 79.331755][ T8519] device veth1_vlan entered promiscuous mode [ 79.354654][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 79.363132][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 79.372646][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.385090][ T8519] device veth0_macvtap entered promiscuous mode [ 79.397402][ T8519] device veth1_macvtap entered promiscuous mode [ 79.419995][ T8519] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 79.427873][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.438107][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.451974][ T8519] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 79.460515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.471674][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.484455][ T8519] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 79.501672][ T8519] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.511290][ T8519] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.521360][ T8519] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.619777][ T8519] [ 79.622332][ T8519] ============================= [ 79.627194][ T8519] WARNING: suspicious RCU usage [ 79.633396][ T8519] 5.10.0-rc2-syzkaller #0 Not tainted [ 79.640492][ T8519] ----------------------------- [ 79.645366][ T8519] drivers/net/bonding/bond_main.c:395 suspicious rcu_dereference_check() usage! [ 79.655891][ T8519] [ 79.655891][ T8519] other info that might help us debug this: [ 79.655891][ T8519] [ 79.666295][ T8519] [ 79.666295][ T8519] rcu_scheduler_active = 2, debug_locks = 1 [ 79.674788][ T8519] 1 lock held by syz-executor179/8519: [ 79.680675][ T8519] #0: ffff888027487aa8 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{3:3}, at: xfrm_netlink_rcv+0x5c/0x90 [ 79.691858][ T8519] [ 79.691858][ T8519] stack backtrace: [ 79.697769][ T8519] CPU: 1 PID: 8519 Comm: syz-executor179 Not tainted 5.10.0-rc2-syzkaller #0 [ 79.706596][ T8519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.716669][ T8519] Call Trace: [ 79.719963][ T8519] dump_stack+0x107/0x163 [ 79.724889][ T8519] bond_ipsec_add_sa+0x1dc/0x240 [ 79.729846][ T8519] xfrm_dev_state_add+0x2da/0x7b0 [ 79.735379][ T8519] xfrm_add_sa+0x2166/0x34f0 [ 79.739961][ T8519] ? xfrm_send_report+0x510/0x510 [ 79.744971][ T8519] ? bpf_lsm_capable+0x5/0x10 [ 79.749644][ T8519] ? security_capable+0x8f/0xc0 [ 79.754484][ T8519] ? __nla_parse+0x3d/0x50 [ 79.758891][ T8519] ? xfrm_send_report+0x510/0x510 [ 79.763949][ T8519] xfrm_user_rcv_msg+0x42f/0x8b0 [ 79.768906][ T8519] ? xfrm_do_migrate+0x800/0x800 [ 79.774096][ T8519] ? __schedule+0x89b/0x2130 [ 79.779385][ T8519] ? __mutex_lock+0xc00/0x10e0 [ 79.784170][ T8519] netlink_rcv_skb+0x153/0x420 [ 79.789027][ T8519] ? xfrm_do_migrate+0x800/0x800 [ 79.793977][ T8519] ? netlink_ack+0xaa0/0xaa0 [ 79.798565][ T8519] xfrm_netlink_rcv+0x6b/0x90 [ 79.804396][ T8519] netlink_unicast+0x533/0x7d0 [ 79.809170][ T8519] ? netlink_attachskb+0x810/0x810 [ 79.814305][ T8519] netlink_sendmsg+0x856/0xd90 [ 79.819069][ T8519] ? netlink_unicast+0x7d0/0x7d0 [ 79.824144][ T8519] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 79.829698][ T8519] ? netlink_unicast+0x7d0/0x7d0 [ 79.834842][ T8519] sock_sendmsg+0xcf/0x120 [ 79.840317][ T8519] ____sys_sendmsg+0x6e8/0x810 [ 79.845099][ T8519] ? kernel_sendmsg+0x50/0x50 [ 79.850168][ T8519] ? do_recvmmsg+0x6c0/0x6c0 [ 79.854963][ T8519] ? find_held_lock+0x2d/0x110 [ 79.859850][ T8519] ___sys_sendmsg+0xf3/0x170 [ 79.864586][ T8519] ? sendmsg_copy_msghdr+0x160/0x160 [ 79.870090][ T8519] ? do_huge_pmd_anonymous_page+0x8e9/0x2050 [ 79.876098][ T8519] ? find_held_lock+0x2d/0x110 [ 79.881288][ T8519] ? __fget_light+0x215/0x280 [ 79.886279][ T8519] __sys_sendmsg+0xe5/0x1b0 [ 79.890922][ T8519] ? __sys_sendmsg_sock+0xb0/0xb0 [ 79.896098][ T8519] ? syscall_enter_from_user_mode+0x1d/0x50 [ 79.903205][ T8519] do_syscall_64+0x2d/0x70 [ 79.907761][ T8519] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 79.913974][ T8519] RIP: 0033:0x443b59 [ 79.918010][ T8519] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 79.938080][ T8519] RSP: 002b:00007ffc50119c88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 79.946635][ T8519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443b59 [ 79.954865][ T8519] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 79.962953][ T8519] RBP: 00007ffc50119ca0 R08: 00000000bb1414ac R09: 00000000bb1414ac [ 79.970934][ T8519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc50119cd0 [ 79.979275][ T8519] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 79.996998][ T8519] bond0: (slave bond_slave_0): Slave does not support ipsec offload