[  OK  ] Reached target Login Prompts.
[  OK  ] Reached target Multi-User System.
[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.


Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts.
executing program
syzkaller login: [   33.754567] device bond0 entered promiscuous mode
[   33.767488] 8021q: adding VLAN 0 to HW filter on device macvlan0
[   33.800445] BUG: spinlock recursion on CPU#0, syz-executor176/6332
[   33.806945]  lock: 0xffff8880a1608468, .magic: dead4ead, .owner: syz-executor176/6332, .owner_cpu: 0
[   33.816225] CPU: 0 PID: 6332 Comm: syz-executor176 Not tainted 4.14.175-syzkaller #0
[   33.824161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   33.833552] Call Trace:
[   33.836126]  dump_stack+0x13e/0x194
[   33.839755]  do_raw_spin_lock+0x1cd/0x230
[   33.843995]  dev_uc_sync+0x10b/0x1c0
[   33.847687]  macvlan_set_mac_lists+0x55/0x110
[   33.852161]  ? macvlan_compute_filter+0x2c0/0x2c0
[   33.856999]  __dev_set_rx_mode+0x191/0x2a0
[   33.861213]  dev_uc_unsync+0x16c/0x1c0
[   33.865103]  bond_hw_addr_flush+0x5c/0xe0
[   33.869229]  ? bond_set_dev_addr.isra.0+0xb0/0xb0
[   33.874051]  bond_enslave+0x1e53/0x49e0
[   33.878030]  ? bond_update_slave_arr+0x6c0/0x6c0
[   33.883722]  ? rtmsg_ifinfo_event.part.0+0x9a/0xc0
[   33.888636]  ? rtmsg_ifinfo+0x64/0x80
[   33.892420]  ? __dev_notify_flags+0x110/0x210
[   33.896892]  ? dev_change_name+0x990/0x990
[   33.901117]  ? linkwatch_fire_event+0x3a/0x1a0
[   33.905688]  ? bond_update_slave_arr+0x6c0/0x6c0
[   33.910421]  do_set_master+0x19e/0x200
[   33.914290]  rtnl_newlink+0x1319/0x1720
[   33.918257]  ? trace_hardirqs_on+0x10/0x10
[   33.922531]  ? rtnl_link_unregister+0x1f0/0x1f0
[   33.927198]  ? lock_acquire+0x170/0x3f0
[   33.931163]  ? lock_acquire+0x170/0x3f0
[   33.935117]  ? rtnetlink_rcv_msg+0x31d/0xb10
[   33.939510]  ? __lock_is_held+0xad/0x140
[   33.943563]  ? lock_downgrade+0x6e0/0x6e0
[   33.947688]  ? rtnl_link_unregister+0x1f0/0x1f0
[   33.952337]  rtnetlink_rcv_msg+0x3be/0xb10
[   33.956550]  ? rtnl_bridge_getlink+0x7a0/0x7a0
[   33.961114]  ? save_trace+0x290/0x290
[   33.964943]  ? save_trace+0x290/0x290
[   33.968730]  netlink_rcv_skb+0x127/0x370
[   33.972797]  ? rtnl_bridge_getlink+0x7a0/0x7a0
[   33.977358]  ? netlink_ack+0x980/0x980
[   33.981226]  netlink_unicast+0x437/0x620
[   33.985278]  ? netlink_attachskb+0x600/0x600
[   33.989667]  netlink_sendmsg+0x733/0xbe0
[   33.993707]  ? netlink_unicast+0x620/0x620
[   33.997952]  ? SYSC_sendto+0x2b0/0x2b0
[   34.001825]  ? security_socket_sendmsg+0x83/0xb0
[   34.006573]  ? netlink_unicast+0x620/0x620
[   34.010799]  sock_sendmsg+0xc5/0x100
[   34.014492]  ___sys_sendmsg+0x70a/0x840
[   34.018442]  ? copy_msghdr_from_user+0x380/0x380
[   34.023179]  ? trace_hardirqs_on+0x10/0x10
[   34.027398]  ? save_trace+0x290/0x290
[   34.031176]  ? trace_hardirqs_on+0x10/0x10
[   34.035389]  ? find_held_lock+0x2d/0x110
[   34.039442]  ? __might_fault+0x104/0x1b0
[   34.043486]  ? lock_acquire+0x170/0x3f0
[   34.047437]  ? lock_downgrade+0x6e0/0x6e0
[   34.051567]  ? __might_fault+0x177/0x1b0
[   34.055608]  ? _copy_to_user+0x82/0xd0
[   34.059474]  ? __fget_light+0x16a/0x1f0
[   34.063548]  ? sockfd_lookup_light+0xb2/0x160
[   34.068037]  __sys_sendmsg+0xa3/0x120
[   34.071849]  ? SyS_shutdown+0x160/0x160
[   34.075806]  ? move_addr_to_kernel+0x60/0x60
[   34.080195]  SyS_sendmsg+0x27/0x40
[   34.083748]  ? __sys_sendmsg+0x120/0x120
[   34.087821]  do_syscall_64+0x1d5/0x640
[   34.091700]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   34.096881] RIP: 0033:0x440729
[   34.100062] RSP: 002b:00007ffd5bd21658 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   34.107747] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440729
[   34.114999] RDX: 0000000000000800 RSI: 0000000020000080 RDI: 0000000000000004
[   34.122262] RBP: 00000000006ca018 R08: 0000000000000004 R09: 00000000004002c8
[   34.129523] R10: 000000000000000a R11: 0000000000000246 R12: 0000000000401fb0
[   34.136772] R13: 0000000000402040 R14: 0000000000000000 R15: 0000000000000000