Warning: Permanently added '10.128.0.74' (ED25519) to the list of known hosts. [ 44.448142][ T3966] chnl_net:caif_netlink_parms(): no params data found [ 44.486429][ T3966] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.488231][ T3966] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.491099][ T3966] device bridge_slave_0 entered promiscuous mode [ 44.495107][ T3966] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.496928][ T3966] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.499425][ T3966] device bridge_slave_1 entered promiscuous mode [ 44.514391][ T3966] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.518506][ T3966] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.533973][ T3966] team0: Port device team_slave_0 added [ 44.537445][ T3966] team0: Port device team_slave_1 added [ 44.550578][ T3966] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.552303][ T3966] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.558635][ T3966] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.563253][ T3966] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.565030][ T3966] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.571457][ T3966] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.632596][ T3966] device hsr_slave_0 entered promiscuous mode [ 44.670986][ T3966] device hsr_slave_1 entered promiscuous mode [ 44.783120][ T3966] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 44.823609][ T3966] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 44.872887][ T3966] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 44.924166][ T3966] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 44.989825][ T3966] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.991626][ T3966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.993865][ T3966] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.995584][ T3966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.036980][ T3966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.043990][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.047780][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.052073][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.054828][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 45.061555][ T3966] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.073359][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.075818][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.077610][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.079718][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.082596][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.084539][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.104040][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.106616][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.109174][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.111790][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.114403][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.118834][ T3966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.131521][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.133443][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.140490][ T3966] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.152533][ T3974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.165392][ T3974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.167945][ T3974] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.170335][ T3974] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.177043][ T3966] device veth0_vlan entered promiscuous mode [ 45.184004][ T3966] device veth1_vlan entered promiscuous mode [ 45.197776][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 45.200111][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 45.202980][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.207269][ T3966] device veth0_macvtap entered promiscuous mode [ 45.213199][ T3966] device veth1_macvtap entered promiscuous mode [ 45.226335][ T3966] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 45.228235][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.232775][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 45.238465][ T3966] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 45.240461][ T3974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.247663][ T3966] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.249825][ T3966] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.252789][ T3966] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.254904][ T3966] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 45.362363][ C1] [ 45.363026][ C1] ====================================================== [ 45.364733][ C1] WARNING: possible circular locking dependency detected [ 45.366556][ C1] 5.15.142-syzkaller #0 Not tainted [ 45.367832][ C1] ------------------------------------------------------ [ 45.369526][ C1] ksoftirqd/1/20 is trying to acquire lock: [ 45.370860][ C1] ffff0000ca30d088 (&priv->active_session_list_lock){+.-.}-{2:2}, at: j1939_session_activate+0x60/0x388 [ 45.373627][ C1] [ 45.373627][ C1] but task is already holding lock: [ 45.375575][ C1] ffff0000caa825d0 (&jsk->sk_session_queue_lock){+.-.}-{2:2}, at: j1939_sk_queue_activate_next+0x60/0x3b4 [ 45.378540][ C1] [ 45.378540][ C1] which lock already depends on the new lock. [ 45.378540][ C1] [ 45.381045][ C1] [ 45.381045][ C1] the existing dependency chain (in reverse order) is: [ 45.383215][ C1] [ 45.383215][ C1] -> #2 (&jsk->sk_session_queue_lock){+.-.}-{2:2}: [ 45.385354][ C1] _raw_spin_lock_bh+0x124/0x1c4 [ 45.386635][ C1] j1939_sk_queue_drop_all+0x4c/0x200 [ 45.388136][ C1] j1939_sk_netdev_event_netdown+0xe0/0x144 [ 45.389728][ C1] j1939_netdev_notify+0xf0/0x144 [ 45.391061][ C1] raw_notifier_call_chain+0xd4/0x164 [ 45.392515][ C1] __dev_notify_flags+0x2ac/0x534 [ 45.393946][ C1] dev_change_flags+0xc8/0x154 [ 45.395248][ C1] do_setlink+0xaa4/0x3164 [ 45.396547][ C1] rtnl_newlink+0x12fc/0x1af4 [ 45.397849][ C1] rtnetlink_rcv_msg+0xa74/0xdac [ 45.399172][ C1] netlink_rcv_skb+0x20c/0x3b8 [ 45.400471][ C1] rtnetlink_rcv+0x28/0x38 [ 45.401675][ C1] netlink_unicast+0x664/0x938 [ 45.402921][ C1] netlink_sendmsg+0x844/0xb38 [ 45.404140][ C1] ____sys_sendmsg+0x584/0x870 [ 45.405442][ C1] ___sys_sendmsg+0x214/0x294 [ 45.406739][ C1] __arm64_sys_sendmsg+0x1ac/0x25c [ 45.408101][ C1] invoke_syscall+0x98/0x2b8 [ 45.409366][ C1] el0_svc_common+0x138/0x258 [ 45.410696][ C1] do_el0_svc+0x58/0x14c [ 45.411915][ C1] el0_svc+0x7c/0x1f0 [ 45.412989][ C1] el0t_64_sync_handler+0x84/0xe4 [ 45.414279][ C1] el0t_64_sync+0x1a0/0x1a4 [ 45.415607][ C1] [ 45.415607][ C1] -> #1 (&priv->j1939_socks_lock){+.-.}-{2:2}: [ 45.417788][ C1] _raw_spin_lock_bh+0x124/0x1c4 [ 45.419152][ C1] j1939_sk_errqueue+0x90/0x144 [ 45.420484][ C1] j1939_session_put+0xf8/0x4f0 [ 45.421802][ C1] j1939_cancel_active_session+0x2ec/0x414 [ 45.423399][ C1] j1939_netdev_notify+0xe8/0x144 [ 45.424728][ C1] raw_notifier_call_chain+0xd4/0x164 [ 45.426142][ C1] __dev_notify_flags+0x2ac/0x534 [ 45.427610][ C1] dev_change_flags+0xc8/0x154 [ 45.428873][ C1] do_setlink+0xaa4/0x3164 [ 45.430156][ C1] rtnl_newlink+0x12fc/0x1af4 [ 45.431497][ C1] rtnetlink_rcv_msg+0xa74/0xdac [ 45.432861][ C1] netlink_rcv_skb+0x20c/0x3b8 [ 45.434225][ C1] rtnetlink_rcv+0x28/0x38 [ 45.435423][ C1] netlink_unicast+0x664/0x938 [ 45.436709][ C1] netlink_sendmsg+0x844/0xb38 [ 45.437952][ C1] ____sys_sendmsg+0x584/0x870 [ 45.439149][ C1] ___sys_sendmsg+0x214/0x294 [ 45.440477][ C1] __arm64_sys_sendmsg+0x1ac/0x25c [ 45.441831][ C1] invoke_syscall+0x98/0x2b8 [ 45.443190][ C1] el0_svc_common+0x138/0x258 [ 45.444495][ C1] do_el0_svc+0x58/0x14c [ 45.445676][ C1] el0_svc+0x7c/0x1f0 [ 45.446916][ C1] el0t_64_sync_handler+0x84/0xe4 [ 45.448334][ C1] el0t_64_sync+0x1a0/0x1a4 [ 45.449591][ C1] [ 45.449591][ C1] -> #0 (&priv->active_session_list_lock){+.-.}-{2:2}: [ 45.451905][ C1] __lock_acquire+0x32d4/0x7638 [ 45.453280][ C1] lock_acquire+0x240/0x77c [ 45.454665][ C1] _raw_spin_lock_bh+0x124/0x1c4 [ 45.456030][ C1] j1939_session_activate+0x60/0x388 [ 45.457468][ C1] j1939_sk_queue_activate_next+0x230/0x3b4 [ 45.459156][ C1] j1939_xtp_rx_eoma+0x2c0/0x4c0 [ 45.460487][ C1] j1939_tp_recv+0x714/0xe14 [ 45.461806][ C1] j1939_can_recv+0x568/0x8b4 [ 45.463186][ C1] can_rcv_filter+0x308/0x714 [ 45.464523][ C1] can_receive+0x344/0x4a0 [ 45.465772][ C1] can_rcv+0x118/0x274 [ 45.466909][ C1] __netif_receive_skb+0x18c/0x400 [ 45.468326][ C1] process_backlog+0x3ec/0x7e0 [ 45.469585][ C1] __napi_poll+0xb4/0x624 [ 45.470838][ C1] net_rx_action+0x500/0xc10 [ 45.472129][ C1] __do_softirq+0x344/0xdb0 [ 45.473444][ C1] run_ksoftirqd+0x68/0x258 [ 45.474663][ C1] smpboot_thread_fn+0x4b0/0x920 [ 45.476121][ C1] kthread+0x37c/0x45c [ 45.477300][ C1] ret_from_fork+0x10/0x20 [ 45.478471][ C1] [ 45.478471][ C1] other info that might help us debug this: [ 45.478471][ C1] [ 45.481034][ C1] Chain exists of: [ 45.481034][ C1] &priv->active_session_list_lock --> &priv->j1939_socks_lock --> &jsk->sk_session_queue_lock [ 45.481034][ C1] [ 45.485122][ C1] Possible unsafe locking scenario: [ 45.485122][ C1] [ 45.487007][ C1] CPU0 CPU1 [ 45.488281][ C1] ---- ---- [ 45.489651][ C1] lock(&jsk->sk_session_queue_lock); [ 45.491006][ C1] lock(&priv->j1939_socks_lock); [ 45.492897][ C1] lock(&jsk->sk_session_queue_lock); [ 45.494901][ C1] lock(&priv->active_session_list_lock); [ 45.496267][ C1] [ 45.496267][ C1] *** DEADLOCK *** [ 45.496267][ C1] [ 45.498375][ C1] 3 locks held by ksoftirqd/1/20: [ 45.499645][ C1] #0: ffff800014af1560 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x18/0x54 [ 45.501953][ C1] #1: ffff800014af1560 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c [ 45.504384][ C1] #2: ffff0000caa825d0 (&jsk->sk_session_queue_lock){+.-.}-{2:2}, at: j1939_sk_queue_activate_next+0x60/0x3b4 [ 45.507433][ C1] [ 45.507433][ C1] stack backtrace: [ 45.508873][ C1] CPU: 1 PID: 20 Comm: ksoftirqd/1 Not tainted 5.15.142-syzkaller #0 [ 45.510864][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 45.513423][ C1] Call trace: [ 45.514230][ C1] dump_backtrace+0x0/0x530 [ 45.515406][ C1] show_stack+0x2c/0x3c [ 45.516466][ C1] dump_stack_lvl+0x108/0x170 [ 45.517660][ C1] dump_stack+0x1c/0x58 [ 45.518725][ C1] print_circular_bug+0x150/0x1b8 [ 45.519993][ C1] check_noncircular+0x2cc/0x378 [ 45.521222][ C1] __lock_acquire+0x32d4/0x7638 [ 45.522482][ C1] lock_acquire+0x240/0x77c [ 45.523579][ C1] _raw_spin_lock_bh+0x124/0x1c4 [ 45.524819][ C1] j1939_session_activate+0x60/0x388 [ 45.526205][ C1] j1939_sk_queue_activate_next+0x230/0x3b4 [ 45.527691][ C1] j1939_xtp_rx_eoma+0x2c0/0x4c0 [ 45.529041][ C1] j1939_tp_recv+0x714/0xe14 [ 45.530108][ C1] j1939_can_recv+0x568/0x8b4 [ 45.531314][ C1] can_rcv_filter+0x308/0x714 [ 45.532503][ C1] can_receive+0x344/0x4a0 [ 45.533608][ C1] can_rcv+0x118/0x274 [ 45.534609][ C1] __netif_receive_skb+0x18c/0x400 [ 45.535944][ C1] process_backlog+0x3ec/0x7e0 [ 45.537041][ C1] __napi_poll+0xb4/0x624 [ 45.538041][ C1] net_rx_action+0x500/0xc10 [ 45.539211][ C1] __do_softirq+0x344/0xdb0 [ 45.540340][ C1] run_ksoftirqd+0x68/0x258 [ 45.541515][ C1] smpboot_thread_fn+0x4b0/0x920 [ 45.542771][ C1] kthread+0x37c/0x45c [ 45.543787][ C1] ret_from_fork+0x10/0x20