[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.35' (ECDSA) to the list of known hosts. syzkaller login: [ 59.558187][ T6877] IPVS: ftp: loaded support on port[0] = 21 [ 59.660861][ T6877] chnl_net:caif_netlink_parms(): no params data found [ 59.712044][ T6877] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.719349][ T6877] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.728457][ T6877] device bridge_slave_0 entered promiscuous mode [ 59.737290][ T6877] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.744805][ T6877] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.753438][ T6877] device bridge_slave_1 entered promiscuous mode [ 59.774066][ T6877] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.785809][ T6877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.808157][ T6877] team0: Port device team_slave_0 added [ 59.815493][ T6877] team0: Port device team_slave_1 added [ 59.833056][ T6877] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 59.839991][ T6877] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.867229][ T6877] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 59.880531][ T6877] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 59.887934][ T6877] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.914374][ T6877] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 59.941349][ T6877] device hsr_slave_0 entered promiscuous mode [ 59.947966][ T6877] device hsr_slave_1 entered promiscuous mode [ 60.043615][ T6877] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 60.057455][ T6877] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 60.067092][ T6877] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 60.080366][ T6877] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 60.105376][ T6877] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.112516][ T6877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.119999][ T6877] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.127116][ T6877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.170606][ T6877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.186488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.197722][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.206250][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.214645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 60.226941][ T6877] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.237380][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.247069][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.254163][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.272948][ T6562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.282112][ T6562] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.289139][ T6562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.310427][ T6877] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.320988][ T6877] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.335186][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.343931][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.352505][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.363016][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.371153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.378875][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.400648][ T6877] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.408519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.417509][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.442357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.459658][ T6877] device veth0_vlan entered promiscuous mode [ 60.466678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.476910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.484971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.497234][ T6877] device veth1_vlan entered promiscuous mode [ 60.517173][ T6562] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 60.525764][ T6562] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 60.534262][ T6562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.546500][ T6877] device veth0_macvtap entered promiscuous mode [ 60.556627][ T6877] device veth1_macvtap entered promiscuous mode [ 60.574137][ T6877] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 60.582975][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.593144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 60.605377][ T6877] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 60.614196][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 60.626119][ T6877] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.635073][ T6877] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.643940][ T6877] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.652684][ T6877] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.705652][ T6877] [ 60.708212][ T6877] ============================= [ 60.714340][ T6877] WARNING: suspicious RCU usage [ 60.719183][ T6877] 5.9.0-rc3-syzkaller #0 Not tainted [ 60.725358][ T6877] ----------------------------- [ 60.730199][ T6877] drivers/net/bonding/bond_main.c:395 suspicious rcu_dereference_check() usage! [ 60.739918][ T6877] [ 60.739918][ T6877] other info that might help us debug this: [ 60.739918][ T6877] [ 60.750630][ T6877] [ 60.750630][ T6877] rcu_scheduler_active = 2, debug_locks = 1 [ 60.759539][ T6877] 1 lock held by syz-executor943/6877: [ 60.765409][ T6877] #0: ffff888092adba68 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{3:3}, at: xfrm_netlink_rcv+0x5c/0x90 [ 60.776148][ T6877] [ 60.776148][ T6877] stack backtrace: [ 60.782246][ T6877] CPU: 0 PID: 6877 Comm: syz-executor943 Not tainted 5.9.0-rc3-syzkaller #0 [ 60.790905][ T6877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.800938][ T6877] Call Trace: [ 60.804249][ T6877] dump_stack+0x198/0x1fd [ 60.808560][ T6877] bond_ipsec_add_sa+0x1dc/0x240 [ 60.813482][ T6877] xfrm_dev_state_add+0x2da/0x7b0 [ 60.818485][ T6877] xfrm_add_sa+0x2166/0x34f0 [ 60.823085][ T6877] ? xfrm_send_policy_notify+0x17a0/0x17a0 [ 60.828870][ T6877] ? bpf_lsm_capable+0x5/0x10 [ 60.833548][ T6877] ? security_capable+0x8f/0xc0 [ 60.838379][ T6877] ? __nla_parse+0x3d/0x4a [ 60.842775][ T6877] ? xfrm_send_policy_notify+0x17a0/0x17a0 [ 60.848599][ T6877] xfrm_user_rcv_msg+0x41e/0x720 [ 60.853559][ T6877] ? xfrm_do_migrate+0x800/0x800 [ 60.858480][ T6877] ? __schedule+0xed1/0x2280 [ 60.863068][ T6877] ? __mutex_lock+0xc00/0x10e0 [ 60.867812][ T6877] netlink_rcv_skb+0x15a/0x430 [ 60.872557][ T6877] ? xfrm_do_migrate+0x800/0x800 [ 60.877471][ T6877] ? netlink_ack+0xa10/0xa10 [ 60.882176][ T6877] xfrm_netlink_rcv+0x6b/0x90 [ 60.886845][ T6877] netlink_unicast+0x533/0x7d0 [ 60.891595][ T6877] ? netlink_attachskb+0x810/0x810 [ 60.896695][ T6877] ? __phys_addr_symbol+0x2c/0x70 [ 60.901711][ T6877] ? __check_object_size+0x171/0x3e4 [ 60.907249][ T6877] netlink_sendmsg+0x856/0xd90 [ 60.911998][ T6877] ? netlink_unicast+0x7d0/0x7d0 [ 60.916916][ T6877] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 60.922188][ T6877] ? netlink_unicast+0x7d0/0x7d0 [ 60.927111][ T6877] sock_sendmsg+0xcf/0x120 [ 60.931505][ T6877] ____sys_sendmsg+0x6e8/0x810 [ 60.936282][ T6877] ? kernel_sendmsg+0x50/0x50 [ 60.940933][ T6877] ? do_recvmmsg+0x6d0/0x6d0 [ 60.945505][ T6877] ? lock_is_held_type+0xbb/0xf0 [ 60.950417][ T6877] ? find_held_lock+0x2d/0x110 [ 60.955170][ T6877] ___sys_sendmsg+0xf3/0x170 [ 60.959736][ T6877] ? sendmsg_copy_msghdr+0x160/0x160 [ 60.964998][ T6877] ? check_preemption_disabled+0x50/0x130 [ 60.970697][ T6877] ? do_huge_pmd_anonymous_page+0x1c22/0x2200 [ 60.976744][ T6877] ? do_huge_pmd_anonymous_page+0x8f2/0x2200 [ 60.982714][ T6877] ? handle_mm_fault+0xb75/0x46d0 [ 60.987712][ T6877] ? lock_is_held_type+0xbb/0xf0 [ 60.992645][ T6877] ? find_held_lock+0x2d/0x110 [ 60.997384][ T6877] ? __fget_light+0x215/0x280 [ 61.002054][ T6877] __sys_sendmsg+0xe5/0x1b0 [ 61.006547][ T6877] ? __sys_sendmsg_sock+0xb0/0xb0 [ 61.011554][ T6877] ? syscall_enter_from_user_mode+0x20/0x290 [ 61.017537][ T6877] ? lockdep_hardirqs_on+0x53/0x100 [ 61.022727][ T6877] do_syscall_64+0x2d/0x70 [ 61.027131][ T6877] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.033000][ T6877] RIP: 0033:0x4439c9 [ 61.036904][ T6877] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 0d fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.056483][ T6877] RSP: 002b:00007ffe685e5dd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.064870][ T6877] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004439c9 [ 61.072827][ T6877] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 61.080780][ T6877] RBP: 00007ffe685e5df0 R08: 00000000bb1414ac R09: 00000000bb1414ac [ 61.088729][ T6877] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe685e5e20 [ 61.096676][ T6877] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 61.111642][ T6877] bond0: (slave bond_slave_0): Slave does not support ipsec offload