============================= WARNING: suspicious RCU usage 4.14.307-syzkaller #0 Not tainted ----------------------------- net/tipc/bearer.c:177 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor.0/9823: #0: (cb_lock){++++}, at: [] genl_rcv+0x15/0x40 net/netlink/genetlink.c:635 #1: (genl_mutex){+.+.}, at: [] genl_lock net/netlink/genetlink.c:33 [inline] #1: (genl_mutex){+.+.}, at: [] genl_rcv_msg+0x112/0x140 net/netlink/genetlink.c:623 stack backtrace: CPU: 0 PID: 9823 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 tipc_bearer_find+0x1ff/0x2f0 net/tipc/bearer.c:177 tipc_nl_compat_link_set+0x40b/0xb90 net/tipc/netlink_compat.c:807 __tipc_nl_compat_doit net/tipc/netlink_compat.c:316 [inline] tipc_nl_compat_doit+0x192/0x5d0 net/tipc/netlink_compat.c:364 tipc_nl_compat_handle net/tipc/netlink_compat.c:1215 [inline] tipc_nl_compat_recv+0xa0b/0xae0 net/tipc/netlink_compat.c:1297 genl_family_rcv_msg+0x572/0xb20 net/netlink/genetlink.c:600 genl_rcv_msg+0xaf/0x140 net/netlink/genetlink.c:625 netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2461 genl_rcv+0x24/0x40 net/netlink/genetlink.c:636 netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline] netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1328 netlink_sendmsg+0x651/0xbc0 net/netlink/af_netlink.c:1900 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f731a47a0f9 RSP: 002b:00007f73189ec168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f731a599f80 RCX: 00007f731a47a0f9 RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 RBP: 00007f731a4d5ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca594d8df R14: 00007f73189ec300 R15: 0000000000022000 syz-executor.3 (9796) used greatest stack depth: 24192 bytes left hrtimer: interrupt took 24705 ns BTRFS: device fsid e417788f-7a09-42b2-9266-8ddc5d5d35d2 devid 1 transid 8 /dev/loop3 BTRFS error (device loop3): unsupported checksum algorithm 1 BTRFS error (device loop3): superblock checksum mismatch BTRFS error (device loop3): open_ctree failed netlink: 23 bytes leftover after parsing attributes in process `syz-executor.3'. IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready BTRFS: device fsid c9fe44da-de57-406a-8241-57ec7d4412cf devid 1 transid 8 /dev/loop5 BTRFS info (device loop5): unrecognized mount option 'ref_verify' BTRFS error (device loop5): open_ctree failed BTRFS error (device loop4): unsupported checksum algorithm 1 BTRFS error (device loop4): superblock checksum mismatch BTRFS error (device loop4): open_ctree failed syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) F2FS-fs (loop2): Invalid Fs Meta Ino: node(0) meta(2) root(0) F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop2): Found nat_bits in checkpoint BTRFS: device fsid 24c7a497-3402-47dd-bef8-82358f5f30e0 devid 1 transid 8 /dev/loop3 F2FS-fs (loop2): Mounted with checkpoint version = 48b305e5 BTRFS info (device loop3): disabling free space tree BTRFS info (device loop3): use zlib compression BTRFS info (device loop3): setting 16 feature flag BTRFS info (device loop3): use zstd compression BTRFS info (device loop3): max_inline at 0 BTRFS info (device loop3): enabling free space tree BTRFS info (device loop3): enabling inode map caching BTRFS info (device loop3): using free space tree BTRFS info (device loop3): has skinny extents XFS (loop5): Mounting V4 Filesystem XFS (loop5): Ending clean mount XFS (loop5): Quotacheck needed: Please wait. XFS (loop5): Quotacheck: Done. audit: type=1804 audit(1678014167.885:2): pid=10056 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/25/file0/bus" dev="loop5" ino=43 res=1 syz-executor.5 (10056) used greatest stack depth: 23720 bytes left XFS (loop5): Unmounting Filesystem audit: type=1800 audit(1678014168.595:3): pid=10179 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14006 res=0 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. BTRFS info (device loop2): force clearing of disk cache BTRFS info (device loop2): disabling free space tree BTRFS info (device loop2): has skinny extents BTRFS info (device loop2): clearing free space tree BTRFS info (device loop2): clearing 1 ro feature flag BTRFS info (device loop2): clearing 2 ro feature flag XFS (loop3): Superblock has unknown read-only compatible features (0x8) enabled. BTRFS info (device loop2): checking UUID tree XFS (loop3): Attempted to mount read-only compatible filesystem read-write. XFS (loop3): Filesystem can only be safely mounted read only. XFS (loop3): SB validate failed with error -22. XFS (loop5): Mounting V4 Filesystem XFS (loop5): Ending clean mount XFS (loop5): Quotacheck needed: Please wait. XFS (loop5): Quotacheck: Done. audit: type=1804 audit(1678014169.316:4): pid=10189 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/26/file0/bus" dev="loop5" ino=43 res=1 XFS (loop5): Unmounting Filesystem UDF-fs: error (device loop3): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 kvm: emulating exchange as write UDF-fs: error (device loop3): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 UDF-fs: error (device loop3): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 UDF-fs: warning (device loop3): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 512 failed UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) BTRFS error (device loop4): unsupported checksum algorithm 1 audit: type=1800 audit(1678014170.156:5): pid=10297 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=852 res=0 BTRFS error (device loop4): superblock checksum mismatch audit: type=1804 audit(1678014170.186:6): pid=10297 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir406280261/syzkaller.VEDYoA/35/file0/bus/file0" dev="loop3" ino=852 res=1 audit: type=1804 audit(1678014170.186:7): pid=10297 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir406280261/syzkaller.VEDYoA/35/file0/bus/file0" dev="loop3" ino=852 res=1 BTRFS error (device loop4): open_ctree failed XFS (loop1): Superblock has unknown read-only compatible features (0x8) enabled. XFS (loop1): Attempted to mount read-only compatible filesystem read-write. XFS (loop1): Filesystem can only be safely mounted read only. XFS (loop1): SB validate failed with error -22. XFS (loop5): Mounting V4 Filesystem XFS (loop5): Ending clean mount XFS (loop5): Quotacheck needed: Please wait. XFS (loop5): Quotacheck: Done. XFS (loop5): Unmounting Filesystem audit: type=1804 audit(1678014170.606:8): pid=10278 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/27/file0/bus" dev="loop5" ino=43 res=1 XFS (loop5): Mounting V4 Filesystem XFS (loop5): Ending clean mount XFS (loop5): Quotacheck needed: Please wait. XFS (loop5): Quotacheck: Done. audit: type=1804 audit(1678014171.236:9): pid=10383 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/28/file0/bus" dev="loop5" ino=43 res=1 XFS (loop5): Unmounting Filesystem netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. EXT4-fs (loop2): Unsupported blocksize for fs encryption print_req_error: I/O error, dev loop2, sector 0 Buffer I/O error on dev loop2, logical block 0, async page read print_req_error: I/O error, dev loop2, sector 6 Buffer I/O error on dev loop2, logical block 3, async page read audit: type=1804 audit(1678014171.846:10): pid=10531 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir1638079272/syzkaller.hGB6rm/41/bus" dev="sda1" ino=14035 res=1 x_tables: ip_tables: CT target: only valid in raw table, not ÿÿÿÿÿÿÿÿ audit: type=1804 audit(1678014171.876:11): pid=10531 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir1638079272/syzkaller.hGB6rm/41/bus" dev="sda1" ino=14035 res=1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. bridge1: port 1(veth0_vlan) entered blocking state bridge1: port 1(veth0_vlan) entered disabled state