8021q: adding VLAN 0 to HW filter on device bond0 ============================================ WARNING: possible recursive locking detected 4.18.0-rc6+ #168 Not tainted -------------------------------------------- syz-executor2/21283 is trying to acquire lock: 000000000ba92f45 (&(&bond->stats_lock)->rlock){+.+.}, at: spin_lock include/linux/spinlock.h:310 [inline] 000000000ba92f45 (&(&bond->stats_lock)->rlock){+.+.}, at: bond_get_stats+0xb4/0x560 drivers/net/bonding/bond_main.c:3426 but task is already holding lock: 000000008811bba0 (&(&bond->stats_lock)->rlock){+.+.}, at: spin_lock include/linux/spinlock.h:310 [inline] 000000008811bba0 (&(&bond->stats_lock)->rlock){+.+.}, at: bond_get_stats+0xb4/0x560 drivers/net/bonding/bond_main.c:3426 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&(&bond->stats_lock)->rlock); lock(&(&bond->stats_lock)->rlock); *** DEADLOCK *** May be due to missing lock nesting notation 3 locks held by syz-executor2/21283: #0: 000000002dd72c5f (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000002dd72c5f (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x412/0xc30 net/core/rtnetlink.c:4662 #1: 000000008811bba0 (&(&bond->stats_lock)->rlock){+.+.}, at: spin_lock include/linux/spinlock.h:310 [inline] #1: 000000008811bba0 (&(&bond->stats_lock)->rlock){+.+.}, at: bond_get_stats+0xb4/0x560 drivers/net/bonding/bond_main.c:3426 #2: 0000000099f4e8cc (rcu_read_lock){....}, at: bond_get_stats+0x0/0x560 include/linux/compiler.h:215 stack backtrace: CPU: 1 PID: 21283 Comm: syz-executor2 Not tainted 4.18.0-rc6+ #168 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113 print_deadlock_bug kernel/locking/lockdep.c:1765 [inline] check_deadlock kernel/locking/lockdep.c:1809 [inline] validate_chain kernel/locking/lockdep.c:2405 [inline] __lock_acquire.cold.64+0x1fb/0x486 kernel/locking/lockdep.c:3435 lock_acquire+0x1e4/0x540 kernel/locking/lockdep.c:3924 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:310 [inline] bond_get_stats+0xb4/0x560 drivers/net/bonding/bond_main.c:3426 dev_get_stats+0x10f/0x470 net/core/dev.c:8316 bond_get_stats+0x232/0x560 drivers/net/bonding/bond_main.c:3432 dev_get_stats+0x10f/0x470 net/core/dev.c:8316 rtnl_fill_stats+0x4d/0xac0 net/core/rtnetlink.c:1169 rtnl_fill_ifinfo+0x1aa6/0x3fb0 net/core/rtnetlink.c:1611 rtmsg_ifinfo_build_skb+0xc8/0x190 net/core/rtnetlink.c:3268 rtmsg_ifinfo_event.part.30+0x45/0xe0 net/core/rtnetlink.c:3300 rtmsg_ifinfo_event net/core/rtnetlink.c:3297 [inline] rtnetlink_event+0x144/0x170 net/core/rtnetlink.c:4716 notifier_call_chain+0x180/0x390 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x3f/0x90 net/core/dev.c:1735 call_netdevice_notifiers net/core/dev.c:1753 [inline] netdev_features_change net/core/dev.c:1321 [inline] netdev_change_features+0xb3/0x110 net/core/dev.c:7759 bond_compute_features.isra.47+0x585/0xa50 drivers/net/bonding/bond_main.c:1120 bond_enslave+0x1b25/0x5da0 drivers/net/bonding/bond_main.c:1755 do_set_master+0x1c9/0x220 net/core/rtnetlink.c:2248 do_setlink+0xba4/0x3e10 net/core/rtnetlink.c:2382 rtnl_setlink+0x2a9/0x400 net/core/rtnetlink.c:2636 rtnetlink_rcv_msg+0x46e/0xc30 net/core/rtnetlink.c:4665 netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2448 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4683 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x5a0/0x760 net/netlink/af_netlink.c:1336 netlink_sendmsg+0xa18/0xfd0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:641 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:651 ___sys_sendmsg+0x7fd/0x930 net/socket.c:2125 __sys_sendmsg+0x11d/0x290 net/socket.c:2163 __do_sys_sendmsg net/socket.c:2172 [inline] __se_sys_sendmsg net/socket.c:2170 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2170 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x456a09 Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ffb7a7d6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007ffb7a7d76d4 RCX: 0000000000456a09 RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000016 RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004d3088 R14: 00000000004c7d66 R15: 0000000000000000 ÿ: Enslaving bond0 as an active interface with an up link audit: type=1326 audit(1532910343.895:437): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21349 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910343.895:436): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21349 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910346.879:438): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21445 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910346.904:439): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21445 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910347.041:440): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21473 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910347.066:441): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21473 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910347.182:442): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21496 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910347.209:443): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21496 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910347.821:444): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21530 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910347.846:445): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21530 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4105c1 code=0x0 kauditd_printk_skb: 5 callbacks suppressed audit: type=1326 audit(1532910348.916:451): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21657 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4105c1 code=0x0 audit: type=1326 audit(1532910349.570:452): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21694 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910349.595:453): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21694 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4105c1 code=0x0 audit: type=1326 audit(1532910349.749:454): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21719 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910349.776:455): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21719 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4105c1 code=0x0 IPVS: set_ctl: invalid protocol: 115 255.255.255.255:20003 IPVS: set_ctl: invalid protocol: 115 255.255.255.255:20003 audit: type=1326 audit(1532910350.445:456): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21762 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910350.469:457): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21762 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4105c1 code=0x0 audit: type=1326 audit(1532910350.698:458): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21804 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0 audit: type=1326 audit(1532910350.720:459): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21804 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4105c1 code=0x0 audit: type=1326 audit(1532910351.555:460): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21875 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456a09 code=0x0