Warning: Permanently added '10.128.0.207' (ECDSA) to the list of known hosts. syzkaller login: [ 74.201230][ T8464] chnl_net:caif_netlink_parms(): no params data found [ 74.267506][ T8464] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.275901][ T8464] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.284537][ T8464] device bridge_slave_0 entered promiscuous mode [ 74.293863][ T8464] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.301769][ T8464] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.310928][ T8464] device bridge_slave_1 entered promiscuous mode [ 74.340334][ T8464] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.351422][ T8464] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.385257][ T8464] team0: Port device team_slave_0 added [ 74.392637][ T8464] team0: Port device team_slave_1 added [ 74.421825][ T8464] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.430605][ T8464] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.457696][ T8464] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.471747][ T8464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.478816][ T8464] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.505075][ T8464] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.540134][ T8464] device hsr_slave_0 entered promiscuous mode [ 74.547359][ T8464] device hsr_slave_1 entered promiscuous mode [ 74.662799][ T8464] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.674142][ T8464] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.684357][ T8464] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.694388][ T8464] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 74.718174][ T8464] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.725334][ T8464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.733039][ T8464] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.740164][ T8464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.784222][ T8464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.803374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.814067][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.824247][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.832987][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 74.845795][ T8464] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.857417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.866411][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.873607][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.885689][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.894106][ T3171] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.901193][ T3171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.919550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.931334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.939652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.956325][ T8464] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 74.967175][ T8464] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.981702][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.991044][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.999809][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 75.016404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 75.024565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 75.037245][ T8464] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.055552][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.076150][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.084865][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.093095][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.103853][ T8464] device veth0_vlan entered promiscuous mode [ 75.115113][ T8464] device veth1_vlan entered promiscuous mode [ 75.135343][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 75.143705][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 75.152089][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.163044][ T8464] device veth0_macvtap entered promiscuous mode [ 75.172471][ T8464] device veth1_macvtap entered promiscuous mode [ 75.190758][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 75.200277][ T8464] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.210943][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.219898][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.231720][ T8464] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.240971][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.249578][ T3171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.261250][ T8464] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.271256][ T8464] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.280373][ T8464] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 75.292253][ T8464] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.336856][ T8464] [ 75.339198][ T8464] ====================================================== [ 75.346200][ T8464] WARNING: possible circular locking dependency detected [ 75.353244][ T8464] 5.14.0-rc2-syzkaller #0 Not tainted [ 75.358627][ T8464] ------------------------------------------------------ [ 75.365653][ T8464] syz-executor250/8464 is trying to acquire lock: [ 75.372041][ T8464] ffffffff8d0cb568 (rtnl_mutex){+.+.}-{3:3}, at: br_del_bridge+0x14/0x110 [ 75.380554][ T8464] [ 75.380554][ T8464] but task is already holding lock: [ 75.388047][ T8464] ffffffff8d0a9608 (br_ioctl_mutex){+.+.}-{3:3}, at: br_ioctl_call+0x3b/0xa0 [ 75.396901][ T8464] [ 75.396901][ T8464] which lock already depends on the new lock. [ 75.396901][ T8464] [ 75.407316][ T8464] [ 75.407316][ T8464] the existing dependency chain (in reverse order) is: [ 75.416313][ T8464] [ 75.416313][ T8464] -> #1 (br_ioctl_mutex){+.+.}-{3:3}: [ 75.423863][ T8464] __mutex_lock+0x12a/0x10a0 [ 75.429137][ T8464] br_ioctl_call+0x3b/0xa0 [ 75.434062][ T8464] dev_ifsioc+0xc1f/0xf60 [ 75.438897][ T8464] dev_ioctl+0x1b9/0xee0 [ 75.443645][ T8464] sock_do_ioctl+0x18b/0x210 [ 75.448734][ T8464] sock_ioctl+0x2f1/0x640 [ 75.453573][ T8464] __x64_sys_ioctl+0x193/0x200 [ 75.458848][ T8464] do_syscall_64+0x35/0xb0 [ 75.463771][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.470290][ T8464] [ 75.470290][ T8464] -> #0 (rtnl_mutex){+.+.}-{3:3}: [ 75.477475][ T8464] __lock_acquire+0x2a07/0x54a0 [ 75.482833][ T8464] lock_acquire+0x1ab/0x510 [ 75.487848][ T8464] __mutex_lock+0x12a/0x10a0 [ 75.492960][ T8464] br_del_bridge+0x14/0x110 [ 75.497988][ T8464] br_ioctl_stub+0x2f1/0x7f0 [ 75.503084][ T8464] br_ioctl_call+0x5e/0xa0 [ 75.508033][ T8464] sock_ioctl+0x30c/0x640 [ 75.512862][ T8464] __x64_sys_ioctl+0x193/0x200 [ 75.518130][ T8464] do_syscall_64+0x35/0xb0 [ 75.523051][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.529446][ T8464] [ 75.529446][ T8464] other info that might help us debug this: [ 75.529446][ T8464] [ 75.539734][ T8464] Possible unsafe locking scenario: [ 75.539734][ T8464] [ 75.547155][ T8464] CPU0 CPU1 [ 75.552494][ T8464] ---- ---- [ 75.557833][ T8464] lock(br_ioctl_mutex); [ 75.562139][ T8464] lock(rtnl_mutex); [ 75.568613][ T8464] lock(br_ioctl_mutex); [ 75.575433][ T8464] lock(rtnl_mutex); [ 75.579389][ T8464] [ 75.579389][ T8464] *** DEADLOCK *** [ 75.579389][ T8464] [ 75.587626][ T8464] 1 lock held by syz-executor250/8464: [ 75.593241][ T8464] #0: ffffffff8d0a9608 (br_ioctl_mutex){+.+.}-{3:3}, at: br_ioctl_call+0x3b/0xa0 [ 75.602537][ T8464] [ 75.602537][ T8464] stack backtrace: [ 75.608491][ T8464] CPU: 0 PID: 8464 Comm: syz-executor250 Not tainted 5.14.0-rc2-syzkaller #0 [ 75.617334][ T8464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.627379][ T8464] Call Trace: [ 75.630648][ T8464] dump_stack_lvl+0xcd/0x134 [ 75.635310][ T8464] check_noncircular+0x25f/0x2e0 [ 75.640227][ T8464] ? print_circular_bug+0x1e0/0x1e0 [ 75.645407][ T8464] ? __kernel_text_address+0x9/0x30 [ 75.650586][ T8464] ? unwind_get_return_address+0x51/0x90 [ 75.656200][ T8464] ? create_prof_cpu_mask+0x20/0x20 [ 75.661378][ T8464] ? lockdep_lock+0xc6/0x200 [ 75.665950][ T8464] ? call_rcu_zapped+0xb0/0xb0 [ 75.670716][ T8464] __lock_acquire+0x2a07/0x54a0 [ 75.675554][ T8464] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 75.681522][ T8464] ? add_lock_to_list.constprop.0+0x185/0x370 [ 75.687659][ T8464] lock_acquire+0x1ab/0x510 [ 75.692152][ T8464] ? br_del_bridge+0x14/0x110 [ 75.696812][ T8464] ? lock_release+0x720/0x720 [ 75.701476][ T8464] __mutex_lock+0x12a/0x10a0 [ 75.706044][ T8464] ? br_del_bridge+0x14/0x110 [ 75.710713][ T8464] ? br_del_bridge+0x14/0x110 [ 75.715376][ T8464] ? mutex_lock_io_nested+0xf00/0xf00 [ 75.720729][ T8464] br_del_bridge+0x14/0x110 [ 75.725298][ T8464] br_ioctl_stub+0x2f1/0x7f0 [ 75.729869][ T8464] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 75.735764][ T8464] ? br_dev_siocdevprivate+0x15c0/0x15c0 [ 75.741477][ T8464] ? do_vfs_ioctl+0x132/0x15d0 [ 75.746231][ T8464] ? vfs_fileattr_set+0xb50/0xb50 [ 75.751337][ T8464] ? br_dev_siocdevprivate+0x15c0/0x15c0 [ 75.757038][ T8464] br_ioctl_call+0x5e/0xa0 [ 75.761524][ T8464] sock_ioctl+0x30c/0x640 [ 75.765846][ T8464] ? br_ioctl_call+0xa0/0xa0 [ 75.770419][ T8464] ? lock_downgrade+0x6e0/0x6e0 [ 75.775253][ T8464] ? lock_downgrade+0x6e0/0x6e0 [ 75.780122][ T8464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 75.786344][ T8464] ? br_ioctl_call+0xa0/0xa0 [ 75.790917][ T8464] __x64_sys_ioctl+0x193/0x200 [ 75.795768][ T8464] do_syscall_64+0x35/0xb0 [ 75.800183][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.806160][ T8464] RIP: 0033:0x443149 [ 75.810043][ T8464] Code: 28 c3 e8 4a 15 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 75.830672][ T8464] RSP: 002b:00007ffe928ac4c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 75.839243][ T8464] RAX: ffffffffffffffda RBX: 00007ffe928ac4d8 RCX: 0000000000443149 [ 75.847193][ T8464] RDX: 00000000200000c0 RSI: 00000000000089a1 RDI: 0000000000000005 [ 75.855330][ T8464] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 75.863290][ T8464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe928ac4e0 [ 75.871328][ T8464] R13: 00007ffe928ac500 R14: 00000000004b8018 R15: 00000000004004b8 [ 75.884830][ T8464] syz-executor250 (8464) used gr