overlayfs: fs on './file0' does not support file handles, falling back to index=off. L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. BUG: spinlock recursion on CPU#0, syz-executor.1/9615 lock: 0xffff8880a9fe14b8, .magic: dead4ead, .owner: syz-executor.1/9615, .owner_cpu: 0 CPU: 0 PID: 9615 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 *** Guest State *** Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 debug_spin_lock_before kernel/locking/spinlock_debug.c:84 [inline] do_raw_spin_lock+0x1a2/0x200 kernel/locking/spinlock_debug.c:112 netif_addr_lock_nested include/linux/netdevice.h:3714 [inline] dev_mc_sync+0x10b/0x1c0 net/core/dev_addr_lists.c:765 CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 vlan_dev_set_rx_mode+0x38/0x80 net/8021q/vlan_dev.c:486 __dev_set_rx_mode+0x191/0x2a0 net/core/dev.c:6724 dev_uc_unsync net/core/dev_addr_lists.c:600 [inline] dev_uc_unsync+0x16c/0x1c0 net/core/dev_addr_lists.c:592 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 bond_hw_addr_flush drivers/net/bonding/bond_main.c:559 [inline] bond_enslave+0x1d35/0x4cf0 drivers/net/bonding/bond_main.c:1805 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000002 RIP = 0x0000000000000231 do_set_master+0x19e/0x200 net/core/rtnetlink.c:1961 RFLAGS=0x00003202 DR7 = 0x0000000000000400 rtnl_newlink+0x1356/0x1830 net/core/rtnetlink.c:2759 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 rtnetlink_rcv_msg+0x3be/0xb10 net/core/rtnetlink.c:4322 netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2461 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline] netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1328 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 netlink_sendmsg+0x651/0xbc0 net/netlink/af_netlink.c:1900 GDTR: limit=0x0000ffff, base=0x0000000000000000 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 EFER = 0x0000000000000000 PAT = 0x0007040600070406 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f95f205f0c9 RSP: 002b:00007f95f05d1168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f95f217ef80 RCX: 00007f95f205f0c9 RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 RBP: 00007f95f20baae9 R08: 0000000000000000 R09: 0000000000000000 Interruptibility = 00000001 ActivityState = 00000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff100551bf R14: 00007f95f05d1300 R15: 0000000000022000 *** Host State *** RIP = 0xffffffff8116183e RSP = 0xffff8880512b79b8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f8c7bd69700 GSBase=ffff8880ba500000 TRBase=fffffe000003e000 GDTBase=fffffe000003c000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=00000000ab8f3000 CR4=00000000003426e0 Sysenter RSP=fffffe000003e000 CS:RIP=0010:ffffffff87401780 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 reason=80000021 qualification=0000000000000003 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff9b02a4b406 EPT pointer = 0x00000000aa9fa01e Virtual processor ID = 0x0001