Warning: Permanently added '10.128.10.55' (ECDSA) to the list of known hosts. 2020/12/02 21:17:12 parsed 1 programs 2020/12/02 21:17:12 executed programs: 0 syzkaller login: [ 47.183416][ T8470] IPVS: ftp: loaded support on port[0] = 21 [ 47.326159][ T8470] chnl_net:caif_netlink_parms(): no params data found [ 47.393804][ T8470] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.402352][ T8470] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.412725][ T8470] device bridge_slave_0 entered promiscuous mode [ 47.422454][ T8470] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.429667][ T8470] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.437276][ T8470] device bridge_slave_1 entered promiscuous mode [ 47.457967][ T8470] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 47.469303][ T8470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 47.492984][ T8470] team0: Port device team_slave_0 added [ 47.500846][ T8470] team0: Port device team_slave_1 added [ 47.517609][ T8470] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 47.525858][ T8470] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.552898][ T8470] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 47.566421][ T8470] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 47.574091][ T8470] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.600082][ T8470] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 47.625682][ T8470] device hsr_slave_0 entered promiscuous mode [ 47.632343][ T8470] device hsr_slave_1 entered promiscuous mode [ 47.726197][ T8470] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 47.735831][ T8470] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 47.750766][ T8470] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 47.761895][ T8470] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 47.785257][ T8470] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.792461][ T8470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.800320][ T8470] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.807381][ T8470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.848170][ T8470] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.861248][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.873717][ T8163] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.882939][ T8163] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.892749][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 47.905265][ T8470] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.916915][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.925439][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.932596][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.950559][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.959332][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.966409][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.978794][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.996645][ T8470] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 48.007330][ T8470] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.021815][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.030831][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.039131][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.048013][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.058688][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.073910][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.081898][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.095565][ T8470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.113401][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.132498][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.140707][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.148261][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.160952][ T8470] device veth0_vlan entered promiscuous mode [ 48.174037][ T8470] device veth1_vlan entered promiscuous mode [ 48.194320][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 48.203206][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 48.212272][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.224006][ T8470] device veth0_macvtap entered promiscuous mode [ 48.233531][ T8470] device veth1_macvtap entered promiscuous mode [ 48.250074][ T8470] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.257465][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.270118][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.282539][ T8470] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.291375][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.303760][ T8470] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.313057][ T8470] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.324385][ T8470] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.334057][ T8470] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.399566][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.407518][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.437754][ T27] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.442457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 48.450405][ T27] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.467120][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 48.603064][ T8715] [ 48.605516][ T8715] ============================================ [ 48.606769][ T8719] [ 48.611653][ T8715] WARNING: possible recursive locking detected [ 48.611660][ T8715] 5.10.0-rc6-syzkaller #0 Not tainted [ 48.611662][ T8715] -------------------------------------------- [ 48.611667][ T8715] syz-executor.0/8715 is trying to acquire lock: [ 48.611672][ T8715] ffff888142089b68 (&hugetlbfs_i_mmap_rwsem_key){++++}-{3:3}, at: hugetlb_cow+0x751/0x1bc0 [ 48.611710][ T8715] [ 48.611710][ T8715] but task is already holding lock: [ 48.611714][ T8715] ffff888142089b68 (&hugetlbfs_i_mmap_rwsem_key){++++}-{3:3}, at: hugetlb_fault+0x31e/0x1280 [ 48.611735][ T8715] [ 48.611735][ T8715] other info that might help us debug this: [ 48.611738][ T8715] Possible unsafe locking scenario: [ 48.611738][ T8715] [ 48.611740][ T8715] CPU0 [ 48.611742][ T8715] ---- [ 48.611745][ T8715] lock(&hugetlbfs_i_mmap_rwsem_key); [ 48.611752][ T8715] lock(&hugetlbfs_i_mmap_rwsem_key); [ 48.611760][ T8715] [ 48.611760][ T8715] *** DEADLOCK *** [ 48.611760][ T8715] [ 48.611763][ T8715] May be due to missing lock nesting notation [ 48.611763][ T8715] [ 48.611769][ T8715] 3 locks held by syz-executor.0/8715: [ 48.611772][ T8715] #0: ffff888018f51568 (&mm->mmap_lock#2){++++}-{3:3}, at: do_user_addr_fault+0x2a8/0xa40 [ 48.611800][ T8715] #1: ffff888142089b68 (&hugetlbfs_i_mmap_rwsem_key){++++}-{3:3}, at: hugetlb_fault+0x31e/0x1280 [ 48.611822][ T8715] #2: ffff888014d1a0f8 (&hugetlb_fault_mutex_table[i]){+.+.}-{3:3}, at: hugetlb_fault+0x4a6/0x1280 [ 48.611844][ T8715] [ 48.611844][ T8715] stack backtrace: [ 48.611852][ T8715] CPU: 1 PID: 8715 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 48.611862][ T8715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.614189][ T8719] ============================= [ 48.620304][ T8715] Call Trace: [ 48.620322][ T8715] dump_stack+0x137/0x1be [ 48.620333][ T8715] ? wake_up_klogd+0xb2/0xf0 [ 48.620342][ T8715] __lock_acquire+0x2333/0x5e90 [ 48.620362][ T8715] lock_acquire+0x114/0x5e0 [ 48.633880][ T8719] WARNING: suspicious RCU usage [ 48.638138][ T8715] ? hugetlb_cow+0x751/0x1bc0 [ 48.648773][ T8719] 5.10.0-rc6-syzkaller #0 Not tainted [ 48.655434][ T8715] down_write+0x55/0x130 [ 48.655446][ T8715] ? hugetlb_cow+0x751/0x1bc0 [ 48.655454][ T8715] hugetlb_cow+0x751/0x1bc0 [ 48.655471][ T8715] ? do_raw_spin_lock+0xfe/0x800 [ 48.667176][ T8719] ----------------------------- [ 48.673649][ T8715] hugetlb_fault+0xa4c/0x1280 [ 48.673663][ T8715] handle_mm_fault+0x223c/0x25a0 [ 48.673678][ T8715] ? vmacache_find+0x228/0x5d0 [ 48.673693][ T8715] do_user_addr_fault+0x4ca/0xa40 [ 48.682537][ T8719] kernel/sched/core.c:7270 Illegal context switch in RCU-bh read-side critical section! [ 48.684385][ T8715] exc_page_fault+0xa1/0x1e0 [ 48.687634][ T8719] [ 48.687634][ T8719] other info that might help us debug this: [ 48.687634][ T8719] [ 48.693062][ T8715] ? asm_exc_page_fault+0x8/0x30 [ 48.693069][ T8715] asm_exc_page_fault+0x1e/0x30 [ 48.693077][ T8715] RIP: 0033:0x4451d1 [ 48.693086][ T8715] Code: 2e 0f 1f 84 00 00 00 00 00 48 81 fa 00 04 00 00 77 77 89 d1 c1 e9 05 74 60 ff c9 48 8b 06 4c 8b 46 08 4c 8b 4e 10 4c 8b 56 18 <48> 89 07 4c 89 47 08 4c 89 4f 10 4c 89 57 18 48 8d 76 20 48 8d 7f [ 48.693091][ T8715] RSP: 002b:00007fff5049d418 EFLAGS: 00010203 [ 48.693106][ T8715] RAX: 87d8195ce8261103 RBX: 00000000011a0000 RCX: 000000000000001a [ 48.705029][ T8719] [ 48.705029][ T8719] rcu_scheduler_active = 2, debug_locks = 0 [ 48.710728][ T8715] RDX: 0000000000000372 RSI: 00000000011a0020 RDI: 0000000020000f00 [ 48.710734][ T8715] RBP: 00000000011a0008 R08: 055ee48822f48f6f R09: bf2d7b319aa8d7d2 [ 48.710739][ T8715] R10: 599cd685cefed921 R11: 0000000000000000 R12: fffffffffffffffe [ 48.710744][ T8715] R13: 000000000000bdd8 R14: 00000000000003e8 R15: 000000000119bf2c [ 48.976402][ T8719] 1 lock held by syz-executor.0/8719: [ 48.982168][ T8719] #0: ffff888021e43068 (&mm->mmap_lock#2){++++}-{3:3}, at: do_user_addr_fault+0x2a8/0xa40 [ 48.993680][ T8719] [ 48.993680][ T8719] stack backtrace: [ 48.999657][ T8719] CPU: 0 PID: 8719 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 49.008311][ T8719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.018344][ T8719] Call Trace: [ 49.021615][ T8719] dump_stack+0x137/0x1be [ 49.025937][ T8719] ___might_sleep+0x6e/0x530 [ 49.030510][ T8719] prepare_alloc_pages+0x202/0x6a0 [ 49.035606][ T8719] __alloc_pages_nodemask+0xb6/0x4f0 [ 49.040879][ T8719] pte_alloc_one+0x1b/0x180 [ 49.045357][ T8719] do_read_fault+0x303/0xaa0 [ 49.049935][ T8719] handle_mm_fault+0x183c/0x25a0 [ 49.054858][ T8719] do_user_addr_fault+0x4ca/0xa40 [ 49.059870][ T8719] exc_page_fault+0xa1/0x1e0 [ 49.064446][ T8719] ? asm_exc_page_fault+0x8/0x30 [ 49.069359][ T8719] asm_exc_page_fault+0x1e/0x30 [ 49.074200][ T8719] RIP: 0033:0x45deb9 [ 49.078076][ T8719] Code: Unable to access opcode bytes at RIP 0x45de8f. [ 49.084904][ T8719] RSP: 002b:00007f0e26a63c78 EFLAGS: 00010246 [ 49.090953][ T8719] RAX: 0000000000000000 RBX: 0000000000002080 RCX: 000000000045deb9 [ 49.098896][ T8719] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 49.106860][ T8719] RBP: 000000000119bf70 R08: 0000000000000000 R09: 0000000000000000 [ 49.114818][ T8719] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf2c [ 49.122762][ T8719] R13: 00007fff5049d39f R14: 00007f0e26a649c0 R15: 000000000119bf2c [ 49.219644][ T35] Bluetooth: hci0: command 0x0409 tx timeout [ 51.298794][ T35] Bluetooth: hci0: command 0x041b tx timeout [ 53.388641][ T35] Bluetooth: hci0: command 0x040f tx timeout [ 55.458333][ T4869] Bluetooth: hci0: command 0x0419 tx timeout