[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. syzkaller login: [ 59.214486][ T6891] IPVS: ftp: loaded support on port[0] = 21 [ 59.326601][ T6891] chnl_net:caif_netlink_parms(): no params data found [ 59.379550][ T6891] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.388003][ T6891] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.396837][ T6891] device bridge_slave_0 entered promiscuous mode [ 59.406102][ T6891] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.413833][ T6891] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.423197][ T6891] device bridge_slave_1 entered promiscuous mode [ 59.446060][ T6891] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.457173][ T6891] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.481600][ T6891] team0: Port device team_slave_0 added [ 59.489510][ T6891] team0: Port device team_slave_1 added [ 59.508311][ T6891] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 59.515431][ T6891] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.542376][ T6891] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 59.555477][ T6891] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 59.563967][ T6891] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.590994][ T6891] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 59.618968][ T6891] device hsr_slave_0 entered promiscuous mode [ 59.626696][ T6891] device hsr_slave_1 entered promiscuous mode [ 59.731386][ T6891] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 59.747420][ T6891] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 59.756992][ T6891] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 59.770449][ T6891] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 59.798470][ T6891] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.806270][ T6891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.814615][ T6891] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.821801][ T6891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.869255][ T6891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.886416][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.897738][ T2467] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.907218][ T2467] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.915680][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.928493][ T6891] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.942821][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.951418][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.958478][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.981275][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.991766][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.998844][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.007717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.029200][ T6891] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.040699][ T6891] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.053584][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.062294][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.071538][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.081681][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.091842][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.110795][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.118262][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.134534][ T6891] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.154886][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.175947][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.184612][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.193517][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.204227][ T6891] device veth0_vlan entered promiscuous mode [ 60.217589][ T6891] device veth1_vlan entered promiscuous mode [ 60.240827][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 60.249106][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 60.258659][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.272118][ T6891] device veth0_macvtap entered promiscuous mode [ 60.283658][ T6891] device veth1_macvtap entered promiscuous mode [ 60.301923][ T6891] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 60.310662][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.321804][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 60.334433][ T6891] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 60.343008][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.352231][ T2547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.364839][ T6891] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.376409][ T6891] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.387851][ T6891] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 60.400549][ T6891] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.468093][ T6891] [ 60.470878][ T6891] ============================= [ 60.475733][ T6891] WARNING: suspicious RCU usage [ 60.481157][ T6891] 5.9.0-rc6-syzkaller #0 Not tainted [ 60.486602][ T6891] ----------------------------- [ 60.491750][ T6891] drivers/net/bonding/bond_main.c:395 suspicious rcu_dereference_check() usage! [ 60.501318][ T6891] [ 60.501318][ T6891] other info that might help us debug this: [ 60.501318][ T6891] [ 60.512924][ T6891] [ 60.512924][ T6891] rcu_scheduler_active = 2, debug_locks = 1 [ 60.521644][ T6891] 1 lock held by syz-executor948/6891: [ 60.527277][ T6891] #0: ffff88809252ba68 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{3:3}, at: xfrm_netlink_rcv+0x5c/0x90 [ 60.537881][ T6891] [ 60.537881][ T6891] stack backtrace: [ 60.544252][ T6891] CPU: 0 PID: 6891 Comm: syz-executor948 Not tainted 5.9.0-rc6-syzkaller #0 [ 60.553051][ T6891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.563211][ T6891] Call Trace: [ 60.566548][ T6891] dump_stack+0x198/0x1fd [ 60.570919][ T6891] bond_ipsec_add_sa+0x1dc/0x240 [ 60.575859][ T6891] xfrm_dev_state_add+0x2da/0x7b0 [ 60.580992][ T6891] xfrm_add_sa+0x2166/0x34f0 [ 60.585594][ T6891] ? xfrm_send_policy_notify+0x17a0/0x17a0 [ 60.591398][ T6891] ? bpf_lsm_capable+0x5/0x10 [ 60.596078][ T6891] ? security_capable+0x8f/0xc0 [ 60.600923][ T6891] ? __nla_parse+0x3d/0x4a [ 60.605327][ T6891] ? xfrm_send_policy_notify+0x17a0/0x17a0 [ 60.611180][ T6891] xfrm_user_rcv_msg+0x41e/0x720 [ 60.616105][ T6891] ? xfrm_do_migrate+0x800/0x800 [ 60.621064][ T6891] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 60.627633][ T6891] ? kfree_skbmem+0xef/0x1b0 [ 60.632205][ T6891] ? lock_is_held_type+0xbb/0xf0 [ 60.637123][ T6891] ? find_held_lock+0x2d/0x110 [ 60.641887][ T6891] ? __mutex_lock+0x626/0x10e0 [ 60.646635][ T6891] netlink_rcv_skb+0x15a/0x430 [ 60.651385][ T6891] ? xfrm_do_migrate+0x800/0x800 [ 60.656339][ T6891] ? netlink_ack+0xa10/0xa10 [ 60.660921][ T6891] xfrm_netlink_rcv+0x6b/0x90 [ 60.665751][ T6891] netlink_unicast+0x533/0x7d0 [ 60.670509][ T6891] ? netlink_attachskb+0x810/0x810 [ 60.675622][ T6891] ? __phys_addr_symbol+0x2c/0x70 [ 60.680640][ T6891] ? __check_object_size+0x171/0x3e4 [ 60.685910][ T6891] netlink_sendmsg+0x856/0xd90 [ 60.690676][ T6891] ? netlink_unicast+0x7d0/0x7d0 [ 60.695615][ T6891] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 60.700898][ T6891] ? netlink_unicast+0x7d0/0x7d0 [ 60.705838][ T6891] sock_sendmsg+0xcf/0x120 [ 60.710253][ T6891] ____sys_sendmsg+0x6e8/0x810 [ 60.714999][ T6891] ? kernel_sendmsg+0x50/0x50 [ 60.720091][ T6891] ? do_recvmmsg+0x6d0/0x6d0 [ 60.724667][ T6891] ? lock_is_held_type+0xbb/0xf0 [ 60.729587][ T6891] ? find_held_lock+0x2d/0x110 [ 60.734339][ T6891] ___sys_sendmsg+0xf3/0x170 [ 60.738956][ T6891] ? sendmsg_copy_msghdr+0x160/0x160 [ 60.744222][ T6891] ? check_preemption_disabled+0x50/0x130 [ 60.749930][ T6891] ? do_huge_pmd_anonymous_page+0x1c22/0x2200 [ 60.755986][ T6891] ? do_huge_pmd_anonymous_page+0x8f2/0x2200 [ 60.761971][ T6891] ? handle_mm_fault+0xb78/0x4690 [ 60.766978][ T6891] ? lock_is_held_type+0xbb/0xf0 [ 60.771897][ T6891] ? find_held_lock+0x2d/0x110 [ 60.776661][ T6891] ? __fget_light+0x215/0x280 [ 60.781337][ T6891] __sys_sendmsg+0xe5/0x1b0 [ 60.785832][ T6891] ? __sys_sendmsg_sock+0xb0/0xb0 [ 60.790846][ T6891] ? check_preemption_disabled+0x50/0x130 [ 60.796545][ T6891] ? syscall_enter_from_user_mode+0x1d/0x60 [ 60.802447][ T6891] do_syscall_64+0x2d/0x70 [ 60.806859][ T6891] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 60.812749][ T6891] RIP: 0033:0x443b69 [ 60.816627][ T6891] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 60.836301][ T6891] RSP: 002b:00007ffc2da561e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.844783][ T6891] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443b69 [ 60.852736][ T6891] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 60.860686][ T6891] RBP: 00007ffc2da56200 R08: 00000000bb1414ac R09: 00000000bb1414ac [ 60.868641][ T6891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc2da56230 [ 60.876596][ T6891] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 60.891549][ T6891] bond0: (slave bond_slave_0): Slave does not support ipsec offload