=============================
WARNING: suspicious RCU usage
4.14.307-syzkaller #0 Not tainted
-----------------------------
net/tipc/bearer.c:177 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
2 locks held by syz-executor.0/9823:
 #0:  (cb_lock){++++}, at: [<ffffffff85e3f495>] genl_rcv+0x15/0x40 net/netlink/genetlink.c:635
 #1:  (genl_mutex){+.+.}, at: [<ffffffff85e400f2>] genl_lock net/netlink/genetlink.c:33 [inline]
 #1:  (genl_mutex){+.+.}, at: [<ffffffff85e400f2>] genl_rcv_msg+0x112/0x140 net/netlink/genetlink.c:623

stack backtrace:
CPU: 0 PID: 9823 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x281 lib/dump_stack.c:58
 tipc_bearer_find+0x1ff/0x2f0 net/tipc/bearer.c:177
 tipc_nl_compat_link_set+0x40b/0xb90 net/tipc/netlink_compat.c:807
 __tipc_nl_compat_doit net/tipc/netlink_compat.c:316 [inline]
 tipc_nl_compat_doit+0x192/0x5d0 net/tipc/netlink_compat.c:364
 tipc_nl_compat_handle net/tipc/netlink_compat.c:1215 [inline]
 tipc_nl_compat_recv+0xa0b/0xae0 net/tipc/netlink_compat.c:1297
 genl_family_rcv_msg+0x572/0xb20 net/netlink/genetlink.c:600
 genl_rcv_msg+0xaf/0x140 net/netlink/genetlink.c:625
 netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2461
 genl_rcv+0x24/0x40 net/netlink/genetlink.c:636
 netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline]
 netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1328
 netlink_sendmsg+0x651/0xbc0 net/netlink/af_netlink.c:1900
 sock_sendmsg_nosec net/socket.c:646 [inline]
 sock_sendmsg+0xb5/0x100 net/socket.c:656
 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062
 __sys_sendmsg+0xa3/0x120 net/socket.c:2096
 SYSC_sendmsg net/socket.c:2107 [inline]
 SyS_sendmsg+0x27/0x40 net/socket.c:2103
 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x5e/0xd3
RIP: 0033:0x7f731a47a0f9
RSP: 002b:00007f73189ec168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f731a599f80 RCX: 00007f731a47a0f9
RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003
RBP: 00007f731a4d5ae9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffca594d8df R14: 00007f73189ec300 R15: 0000000000022000
syz-executor.3 (9796) used greatest stack depth: 24192 bytes left
hrtimer: interrupt took 24705 ns
BTRFS: device fsid e417788f-7a09-42b2-9266-8ddc5d5d35d2 devid 1 transid 8 /dev/loop3
BTRFS error (device loop3): unsupported checksum algorithm 1
BTRFS error (device loop3): superblock checksum mismatch
BTRFS error (device loop3): open_ctree failed
netlink: 23 bytes leftover after parsing attributes in process `syz-executor.3'.
IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready
BTRFS: device fsid c9fe44da-de57-406a-8241-57ec7d4412cf devid 1 transid 8 /dev/loop5
BTRFS info (device loop5): unrecognized mount option 'ref_verify'
BTRFS error (device loop5): open_ctree failed
BTRFS error (device loop4): unsupported checksum algorithm 1
BTRFS error (device loop4): superblock checksum mismatch
BTRFS error (device loop4): open_ctree failed
syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET)
F2FS-fs (loop2): Invalid Fs Meta Ino: node(0) meta(2) root(0)
F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock
F2FS-fs (loop2): Found nat_bits in checkpoint
BTRFS: device fsid 24c7a497-3402-47dd-bef8-82358f5f30e0 devid 1 transid 8 /dev/loop3
F2FS-fs (loop2): Mounted with checkpoint version = 48b305e5
BTRFS info (device loop3): disabling free space tree
BTRFS info (device loop3): use zlib compression
BTRFS info (device loop3): setting 16 feature flag
BTRFS info (device loop3): use zstd compression
BTRFS info (device loop3): max_inline at 0
BTRFS info (device loop3): enabling free space tree
BTRFS info (device loop3): enabling inode map caching
BTRFS info (device loop3): using free space tree
BTRFS info (device loop3): has skinny extents
XFS (loop5): Mounting V4 Filesystem
XFS (loop5): Ending clean mount
XFS (loop5): Quotacheck needed: Please wait.
XFS (loop5): Quotacheck: Done.
audit: type=1804 audit(1678014167.885:2): pid=10056 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/25/file0/bus" dev="loop5" ino=43 res=1
syz-executor.5 (10056) used greatest stack depth: 23720 bytes left
XFS (loop5): Unmounting Filesystem
audit: type=1800 audit(1678014168.595:3): pid=10179 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14006 res=0
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
BTRFS info (device loop2): force clearing of disk cache
BTRFS info (device loop2): disabling free space tree
BTRFS info (device loop2): has skinny extents
BTRFS info (device loop2): clearing free space tree
BTRFS info (device loop2): clearing 1 ro feature flag
BTRFS info (device loop2): clearing 2 ro feature flag
XFS (loop3): Superblock has unknown read-only compatible features (0x8) enabled.
BTRFS info (device loop2): checking UUID tree
XFS (loop3): Attempted to mount read-only compatible filesystem read-write.
XFS (loop3): Filesystem can only be safely mounted read only.
XFS (loop3): SB validate failed with error -22.
XFS (loop5): Mounting V4 Filesystem
XFS (loop5): Ending clean mount
XFS (loop5): Quotacheck needed: Please wait.
XFS (loop5): Quotacheck: Done.
audit: type=1804 audit(1678014169.316:4): pid=10189 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/26/file0/bus" dev="loop5" ino=43 res=1
XFS (loop5): Unmounting Filesystem
UDF-fs: error (device loop3): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0
kvm: emulating exchange as write
UDF-fs: error (device loop3): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0
UDF-fs: error (device loop3): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0
UDF-fs: warning (device loop3): udf_load_vrs: No anchor found
UDF-fs: Scanning with blocksize 512 failed
UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000)
BTRFS error (device loop4): unsupported checksum algorithm 1
audit: type=1800 audit(1678014170.156:5): pid=10297 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=852 res=0
BTRFS error (device loop4): superblock checksum mismatch
audit: type=1804 audit(1678014170.186:6): pid=10297 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir406280261/syzkaller.VEDYoA/35/file0/bus/file0" dev="loop3" ino=852 res=1
audit: type=1804 audit(1678014170.186:7): pid=10297 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir406280261/syzkaller.VEDYoA/35/file0/bus/file0" dev="loop3" ino=852 res=1
BTRFS error (device loop4): open_ctree failed
XFS (loop1): Superblock has unknown read-only compatible features (0x8) enabled.
XFS (loop1): Attempted to mount read-only compatible filesystem read-write.
XFS (loop1): Filesystem can only be safely mounted read only.
XFS (loop1): SB validate failed with error -22.
XFS (loop5): Mounting V4 Filesystem
XFS (loop5): Ending clean mount
XFS (loop5): Quotacheck needed: Please wait.
XFS (loop5): Quotacheck: Done.
XFS (loop5): Unmounting Filesystem
audit: type=1804 audit(1678014170.606:8): pid=10278 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/27/file0/bus" dev="loop5" ino=43 res=1
XFS (loop5): Mounting V4 Filesystem
XFS (loop5): Ending clean mount
XFS (loop5): Quotacheck needed: Please wait.
XFS (loop5): Quotacheck: Done.
audit: type=1804 audit(1678014171.236:9): pid=10383 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir326049385/syzkaller.k63bfd/28/file0/bus" dev="loop5" ino=43 res=1
XFS (loop5): Unmounting Filesystem
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'.
EXT4-fs (loop2): Unsupported blocksize for fs encryption
print_req_error: I/O error, dev loop2, sector 0
Buffer I/O error on dev loop2, logical block 0, async page read
print_req_error: I/O error, dev loop2, sector 6
Buffer I/O error on dev loop2, logical block 3, async page read
audit: type=1804 audit(1678014171.846:10): pid=10531 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir1638079272/syzkaller.hGB6rm/41/bus" dev="sda1" ino=14035 res=1
x_tables: ip_tables: CT target: only valid in raw table, not ��������
audit: type=1804 audit(1678014171.876:11): pid=10531 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir1638079272/syzkaller.hGB6rm/41/bus" dev="sda1" ino=14035 res=1
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
bridge1: port 1(veth0_vlan) entered blocking state
bridge1: port 1(veth0_vlan) entered disabled state