[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
         Starting Load/Save RF Kill Switch Status...
[  OK  ] Started Update UTMP about System Runlevel Changes.
[  OK  ] Started Load/Save RF Kill Switch Status.

Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.0.164' (ECDSA) to the list of known hosts.
2021/01/27 15:18:32 fuzzer started
2021/01/27 15:18:32 connecting to host at 10.128.0.26:45991
2021/01/27 15:18:32 checking machine...
2021/01/27 15:18:32 checking revisions...
2021/01/27 15:18:33 testing simple program...
syzkaller login: [   69.096707][ T8425] IPVS: ftp: loaded support on port[0] = 21
[   69.318071][ T8425] chnl_net:caif_netlink_parms(): no params data found
[   69.371745][ T8425] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.379955][ T8425] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.389712][ T8425] device bridge_slave_0 entered promiscuous mode
[   69.400598][ T8425] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.407882][ T8425] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.416542][ T8425] device bridge_slave_1 entered promiscuous mode
[   69.437358][ T8425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   69.448336][ T8425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   69.471503][ T8425] team0: Port device team_slave_0 added
[   69.478871][ T8425] team0: Port device team_slave_1 added
[   69.496174][ T8425] batman_adv: batadv0: Adding interface: batadv_slave_0
[   69.503327][ T8425] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   69.529760][ T8425] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   69.542668][ T8425] batman_adv: batadv0: Adding interface: batadv_slave_1
[   69.550595][ T8425] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   69.576632][ T8425] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   69.604132][ T8425] device hsr_slave_0 entered promiscuous mode
[   69.610773][ T8425] device hsr_slave_1 entered promiscuous mode
[   69.626531][ T8425] 
[   69.628861][ T8425] ============================================
[   69.635073][ T8425] WARNING: possible recursive locking detected
[   69.641203][ T8425] 5.11.0-rc5-next-20210127-syzkaller #0 Not tainted
[   69.647769][ T8425] --------------------------------------------
[   69.653910][ T8425] syz-executor.0/8425 is trying to acquire lock:
[   69.660282][ T8425] ffff8881446785e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: cfg80211_netdev_notifier_call+0x615/0x1180
[   69.670931][ T8425] 
[   69.670931][ T8425] but task is already holding lock:
[   69.678457][ T8425] ffff8881446785e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: virt_wifi_newlink+0x4cb/0x940
[   69.688030][ T8425] 
[   69.688030][ T8425] other info that might help us debug this:
[   69.696140][ T8425]  Possible unsafe locking scenario:
[   69.696140][ T8425] 
[   69.703755][ T8425]        CPU0
[   69.707071][ T8425]        ----
[   69.710329][ T8425]   lock(&rdev->wiphy.mtx);
[   69.714810][ T8425]   lock(&rdev->wiphy.mtx);
[   69.719432][ T8425] 
[   69.719432][ T8425]  *** DEADLOCK ***
[   69.719432][ T8425] 
[   69.727556][ T8425]  May be due to missing lock nesting notation
[   69.727556][ T8425] 
[   69.735943][ T8425] 2 locks held by syz-executor.0/8425:
[   69.741379][ T8425]  #0: ffffffff8cc71b08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3f9/0xad0
[   69.750761][ T8425]  #1: ffff8881446785e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: virt_wifi_newlink+0x4cb/0x940
[   69.760679][ T8425] 
[   69.760679][ T8425] stack backtrace:
[   69.766563][ T8425] CPU: 1 PID: 8425 Comm: syz-executor.0 Not tainted 5.11.0-rc5-next-20210127-syzkaller #0
[   69.776429][ T8425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   69.786469][ T8425] Call Trace:
[   69.789737][ T8425]  dump_stack+0x107/0x163
[   69.794064][ T8425]  __lock_acquire.cold+0x14c/0x3b4
[   69.799454][ T8425]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[   69.805458][ T8425]  lock_acquire+0x1a8/0x720
[   69.809952][ T8425]  ? cfg80211_netdev_notifier_call+0x615/0x1180
[   69.816200][ T8425]  ? lock_release+0x710/0x710
[   69.820879][ T8425]  ? __lock_acquire+0x16b3/0x54c0
[   69.825904][ T8425]  __mutex_lock+0x134/0x1110
[   69.830495][ T8425]  ? cfg80211_netdev_notifier_call+0x615/0x1180
[   69.836740][ T8425]  ? cfg80211_netdev_notifier_call+0x615/0x1180
[   69.842986][ T8425]  ? mutex_lock_io_nested+0xf60/0xf60
[   69.848347][ T8425]  ? find_held_lock+0x2d/0x110
[   69.853097][ T8425]  ? __debug_object_init+0x409/0xd10
[   69.858368][ T8425]  ? mark_held_locks+0x9f/0xe0
[   69.863162][ T8425]  cfg80211_netdev_notifier_call+0x615/0x1180
[   69.869382][ T8425]  ? cfg80211_register_netdevice+0x2a0/0x2a0
[   69.875379][ T8425]  ? __devinet_sysctl_register+0x1ca/0x280
[   69.881183][ T8425]  ? debug_object_destroy+0x210/0x210
[   69.886562][ T8425]  ? lockdep_init_map_type+0x2c3/0x790
[   69.892010][ T8425]  ? lockdep_init_map_type+0x2c3/0x790
[   69.897451][ T8425]  ? add_grec+0x10e0/0x10e0
[   69.901984][ T8425]  ? __raw_spin_lock_init+0x36/0x110
[   69.907254][ T8425]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   69.913480][ T8425]  ? inetdev_init+0x2bb/0x4f0
[   69.918141][ T8425]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   69.924373][ T8425]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[   69.930671][ T8425]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[   69.936894][ T8425]  ? ipmr_device_event+0x1ab/0x220
[   69.942035][ T8425]  ? __sanitizer_cov_trace_switch+0x63/0xf0
[   69.947914][ T8425]  notifier_call_chain+0xb5/0x200
[   69.952926][ T8425]  call_netdevice_notifiers_info+0xb5/0x130
[   69.958804][ T8425]  register_netdevice+0x1034/0x14a0
[   69.964002][ T8425]  ? netdev_change_features+0xb0/0xb0
[   69.969357][ T8425]  ? kasan_unpoison+0x2c/0x50
[   69.974034][ T8425]  virt_wifi_newlink+0x4d3/0x940
[   69.978955][ T8425]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[   69.985178][ T8425]  ? virt_wifi_rx_handler+0x320/0x320
[   69.990532][ T8425]  __rtnl_newlink+0x108b/0x16e0
[   69.995384][ T8425]  ? rtnl_setlink+0x3b0/0x3b0
[   70.000045][ T8425]  ? unwind_next_frame+0xe3b/0x1f90
[   70.005225][ T8425]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   70.011291][ T8425]  ? __sanitizer_cov_trace_cmp4+0x1c/0x70
[   70.016999][ T8425]  ? is_bpf_text_address+0xcb/0x160
[   70.022199][ T8425]  ? kernel_text_address+0xbd/0xf0
[   70.027298][ T8425]  ? __kernel_text_address+0x9/0x30
[   70.032483][ T8425]  ? unwind_get_return_address+0x51/0x90
[   70.038107][ T8425]  ? create_prof_cpu_mask+0x20/0x20
[   70.043297][ T8425]  ? arch_stack_walk+0x93/0xe0
[   70.048050][ T8425]  ? stack_trace_save+0x8c/0xc0
[   70.052895][ T8425]  ? fs_reclaim_release+0x9c/0xe0
[   70.057932][ T8425]  ? kasan_unpoison+0x2c/0x50
[   70.062597][ T8425]  rtnl_newlink+0x64/0xa0
[   70.066914][ T8425]  ? __rtnl_newlink+0x16e0/0x16e0
[   70.071943][ T8425]  rtnetlink_rcv_msg+0x44e/0xad0
[   70.076868][ T8425]  ? rtnetlink_put_metrics+0x510/0x510
[   70.082316][ T8425]  netlink_rcv_skb+0x153/0x420
[   70.087066][ T8425]  ? rtnetlink_put_metrics+0x510/0x510
[   70.092510][ T8425]  ? netlink_ack+0xaa0/0xaa0
[   70.097081][ T8425]  ? netlink_deliver_tap+0x227/0xb70
[   70.102356][ T8425]  ? _copy_from_iter_full+0x2fa/0x1120
[   70.107803][ T8425]  netlink_unicast+0x533/0x7d0
[   70.112552][ T8425]  ? netlink_attachskb+0x870/0x870
[   70.117777][ T8425]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[   70.124016][ T8425]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[   70.130248][ T8425]  ? __phys_addr_symbol+0x2c/0x70
[   70.135262][ T8425]  ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[   70.140969][ T8425]  ? __check_object_size+0x171/0x3f0
[   70.146261][ T8425]  netlink_sendmsg+0x856/0xd90
[   70.151016][ T8425]  ? netlink_unicast+0x7d0/0x7d0
[   70.155940][ T8425]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   70.162168][ T8425]  ? netlink_unicast+0x7d0/0x7d0
[   70.167107][ T8425]  sock_sendmsg+0xcf/0x120
[   70.171510][ T8425]  __sys_sendto+0x21c/0x320
[   70.176009][ T8425]  ? __ia32_sys_getpeername+0xb0/0xb0
[   70.181363][ T8425]  ? _raw_spin_unlock_irqrestore+0x2f/0x50
[   70.187161][ T8425]  ? debug_object_active_state+0x260/0x350
[   70.192955][ T8425]  ? kmem_cache_free+0x643/0x740
[   70.197881][ T8425]  ? blkcg_maybe_throttle_current+0x64d/0xd80
[   70.203936][ T8425]  ? __blkcg_punt_bio_submit+0x1d0/0x1d0
[   70.209558][ T8425]  __x64_sys_sendto+0xdd/0x1b0
[   70.214308][ T8425]  ? lockdep_hardirqs_on+0x79/0x100
[   70.219494][ T8425]  ? syscall_enter_from_user_mode+0x1d/0x50
[   70.225391][ T8425]  do_syscall_64+0x2d/0x70
[   70.229794][ T8425]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   70.235671][ T8425] RIP: 0033:0x417c97
[   70.239554][ T8425] Code: 2c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 81 19 00 00 c3 48 83 ec 08 e8 e7 fa ff ff 48 89 04 24 49 89 ca b8 2c 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 2d fb ff ff 48 89 d0 48 83 c4 08 48 3d 01
[   70.259144][ T8425] RSP: 002b:00007ffd43a145b0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[   70.267541][ T8425] RAX: ffffffffffffffda RBX: 00000000016b4300 RCX: 0000000000417c97
[   70.275496][ T8425] RDX: 000000000000004c RSI: 00000000016b4350 RDI: 0000000000000003
[   70.283451][ T8425] RBP: 0000000000000000 R08: 00007ffd43a145c0 R09: 000000000000000c
[   70.291408][ T8425] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[   70.299369][ T8425] R13: 0000000000000000 R14: 00000000016b4350 R15: 0000000000000003
executing program
[   71.133610][ T2943] Bluetooth: hci0: command 0x0409 tx timeout
[   73.213404][ T2943] Bluetooth: hci0: command 0x041b tx timeout
executing program
[   75.293270][ T2943] Bluetooth: hci0: command 0x040f tx timeout
executing program
[   77.373085][ T2943] Bluetooth: hci0: command 0x0419 tx timeout