[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.195' (ECDSA) to the list of known hosts. syzkaller login: [ 58.075018][ T6870] IPVS: ftp: loaded support on port[0] = 21 [ 58.178831][ T6870] chnl_net:caif_netlink_parms(): no params data found [ 58.234073][ T6870] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.242668][ T6870] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.251216][ T6870] device bridge_slave_0 entered promiscuous mode [ 58.260932][ T6870] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.268374][ T6870] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.276472][ T6870] device bridge_slave_1 entered promiscuous mode [ 58.319610][ T6870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.337055][ T6870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.366797][ T6870] team0: Port device team_slave_0 added [ 58.374205][ T6870] team0: Port device team_slave_1 added [ 58.393638][ T6870] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 58.400631][ T6870] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.426562][ T6870] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 58.439059][ T6870] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 58.446086][ T6870] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.472067][ T6870] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 58.501095][ T6870] device hsr_slave_0 entered promiscuous mode [ 58.508363][ T6870] device hsr_slave_1 entered promiscuous mode [ 58.614012][ T6870] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 58.624160][ T6870] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 58.635040][ T6870] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 58.647561][ T6870] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 58.673380][ T6870] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.680573][ T6870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.688550][ T6870] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.695691][ T6870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.744159][ T6870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.758762][ T2825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.769671][ T2825] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.778322][ T2825] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.786552][ T2825] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 58.799252][ T6870] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.811552][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.821027][ T2470] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.828162][ T2470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.845509][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.854181][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.861311][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.888284][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.897055][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.906984][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.916789][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.925330][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.936152][ T6870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.956911][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 58.965589][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 58.978123][ T6870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.997585][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.019064][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.028312][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.036491][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.047464][ T6870] device veth0_vlan entered promiscuous mode [ 59.060856][ T6870] device veth1_vlan entered promiscuous mode [ 59.084444][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 59.092544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 59.101623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.113846][ T6870] device veth0_macvtap entered promiscuous mode [ 59.123842][ T6870] device veth1_macvtap entered promiscuous mode [ 59.142281][ T6870] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.149970][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.161811][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 59.173699][ T6870] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 59.181801][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready executing program [ 59.191209][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.203210][ T6870] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.212536][ T6870] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.221303][ T6870] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.230067][ T6870] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.426817][ T6870] [ 59.429244][ T6870] ============================= [ 59.434101][ T6870] WARNING: suspicious RCU usage [ 59.440080][ T6870] 5.9.0-rc3-syzkaller #0 Not tainted [ 59.446107][ T6870] ----------------------------- [ 59.450955][ T6870] drivers/net/bonding/bond_main.c:395 suspicious rcu_dereference_check() usage! [ 59.461140][ T6870] [ 59.461140][ T6870] other info that might help us debug this: [ 59.461140][ T6870] [ 59.471767][ T6870] [ 59.471767][ T6870] rcu_scheduler_active = 2, debug_locks = 1 [ 59.479938][ T6870] 1 lock held by syz-executor129/6870: [ 59.485759][ T6870] #0: ffff88809dcfda68 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{3:3}, at: xfrm_netlink_rcv+0x5c/0x90 [ 59.496900][ T6870] [ 59.496900][ T6870] stack backtrace: [ 59.502835][ T6870] CPU: 0 PID: 6870 Comm: syz-executor129 Not tainted 5.9.0-rc3-syzkaller #0 [ 59.511481][ T6870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.521528][ T6870] Call Trace: [ 59.524798][ T6870] dump_stack+0x198/0x1fd [ 59.529106][ T6870] bond_ipsec_add_sa+0x1dc/0x240 [ 59.534019][ T6870] xfrm_dev_state_add+0x2da/0x7b0 [ 59.539037][ T6870] xfrm_add_sa+0x2166/0x34f0 [ 59.543623][ T6870] ? xfrm_send_policy_notify+0x17a0/0x17a0 [ 59.549415][ T6870] ? bpf_lsm_capable+0x5/0x10 [ 59.554067][ T6870] ? security_capable+0x8f/0xc0 [ 59.558921][ T6870] ? __nla_parse+0x3d/0x4a [ 59.563314][ T6870] ? xfrm_send_policy_notify+0x17a0/0x17a0 [ 59.569096][ T6870] xfrm_user_rcv_msg+0x41e/0x720 [ 59.574042][ T6870] ? xfrm_do_migrate+0x800/0x800 [ 59.578956][ T6870] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 59.584937][ T6870] ? kfree_skbmem+0xef/0x1b0 [ 59.589503][ T6870] ? lock_is_held_type+0xbb/0xf0 [ 59.594416][ T6870] ? find_held_lock+0x2d/0x110 [ 59.599171][ T6870] ? __mutex_lock+0x626/0x10e0 [ 59.603913][ T6870] netlink_rcv_skb+0x15a/0x430 [ 59.608652][ T6870] ? xfrm_do_migrate+0x800/0x800 [ 59.613570][ T6870] ? netlink_ack+0xa10/0xa10 [ 59.618152][ T6870] xfrm_netlink_rcv+0x6b/0x90 [ 59.622805][ T6870] netlink_unicast+0x533/0x7d0 [ 59.627561][ T6870] ? netlink_attachskb+0x810/0x810 [ 59.632667][ T6870] ? __phys_addr_symbol+0x2c/0x70 [ 59.637681][ T6870] ? __check_object_size+0x171/0x3e4 [ 59.642943][ T6870] netlink_sendmsg+0x856/0xd90 [ 59.647700][ T6870] ? netlink_unicast+0x7d0/0x7d0 [ 59.652618][ T6870] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 59.657878][ T6870] ? netlink_unicast+0x7d0/0x7d0 [ 59.662789][ T6870] sock_sendmsg+0xcf/0x120 [ 59.667197][ T6870] ____sys_sendmsg+0x6e8/0x810 [ 59.671936][ T6870] ? kernel_sendmsg+0x50/0x50 [ 59.676607][ T6870] ? do_recvmmsg+0x6d0/0x6d0 [ 59.681193][ T6870] ? lock_is_held_type+0xbb/0xf0 [ 59.686107][ T6870] ? find_held_lock+0x2d/0x110 [ 59.690991][ T6870] ___sys_sendmsg+0xf3/0x170 [ 59.695639][ T6870] ? sendmsg_copy_msghdr+0x160/0x160 [ 59.700970][ T6870] ? check_preemption_disabled+0x50/0x130 [ 59.706676][ T6870] ? do_huge_pmd_anonymous_page+0x1c22/0x2200 [ 59.712725][ T6870] ? do_huge_pmd_anonymous_page+0x8f2/0x2200 [ 59.718691][ T6870] ? handle_mm_fault+0xb75/0x46d0 [ 59.723709][ T6870] ? lock_is_held_type+0xbb/0xf0 [ 59.728648][ T6870] ? find_held_lock+0x2d/0x110 [ 59.733395][ T6870] ? __fget_light+0x215/0x280 [ 59.738066][ T6870] __sys_sendmsg+0xe5/0x1b0 [ 59.742548][ T6870] ? __sys_sendmsg_sock+0xb0/0xb0 [ 59.747558][ T6870] ? syscall_enter_from_user_mode+0x20/0x290 [ 59.753510][ T6870] ? lockdep_hardirqs_on+0x53/0x100 [ 59.758688][ T6870] do_syscall_64+0x2d/0x70 [ 59.763093][ T6870] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.768959][ T6870] RIP: 0033:0x4439c9 [ 59.772834][ T6870] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 0d fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.792425][ T6870] RSP: 002b:00007ffd0eedd6b8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 59.800824][ T6870] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004439c9 [ 59.808771][ T6870] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 59.816718][ T6870] RBP: 00007ffd0eedd6d0 R08: 00000000bb1414ac R09: 00000000bb1414ac [ 59.824674][ T6870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd0eedd700 [ 59.832620][ T6870] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 59.848471][ T6870] bond0: (slave bond_slave_0): Slave does not support ipsec offload