[ 79.152982][ T27] audit: type=1800 audit(1581726615.885:26): pid=9730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 80.193624][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 80.193635][ T27] audit: type=1800 audit(1581726616.945:29): pid=9730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 80.220877][ T27] audit: type=1800 audit(1581726616.945:30): pid=9730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.184' (ECDSA) to the list of known hosts. 2020/02/15 00:30:26 parsed 1 programs 2020/02/15 00:30:28 executed programs: 0 syzkaller login: [ 91.885196][ T9903] IPVS: ftp: loaded support on port[0] = 21 [ 91.943147][ T9903] chnl_net:caif_netlink_parms(): no params data found [ 91.982903][ T9903] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.990398][ T9903] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.999004][ T9903] device bridge_slave_0 entered promiscuous mode [ 92.007787][ T9903] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.015119][ T9903] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.023156][ T9903] device bridge_slave_1 entered promiscuous mode [ 92.041001][ T9903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.053965][ T9903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.073865][ T9903] team0: Port device team_slave_0 added [ 92.081512][ T9903] team0: Port device team_slave_1 added [ 92.096170][ T9903] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 92.103449][ T9903] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.130760][ T9903] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 92.143553][ T9903] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 92.150814][ T9903] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.179628][ T9903] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 92.283242][ T9903] device hsr_slave_0 entered promiscuous mode [ 92.351787][ T9903] device hsr_slave_1 entered promiscuous mode [ 92.477346][ T9903] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 92.554035][ T9903] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 92.623577][ T9903] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 92.663478][ T9903] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 92.726571][ T9903] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.733791][ T9903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.741736][ T9903] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.748901][ T9903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.796561][ T9903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.809031][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.819233][ T2736] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.827534][ T2736] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.836131][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 92.849204][ T9903] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.860352][ T2735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.869527][ T2735] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.876972][ T2735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.888493][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.898082][ T2736] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.905191][ T2736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.924085][ T2735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.943222][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.951110][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.960378][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.969142][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.982021][ T9903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.999578][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.008124][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.024923][ T9903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.043237][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.053574][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.076776][ T9903] device veth0_vlan entered promiscuous mode [ 93.083696][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.092777][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.106508][ T9903] device veth1_vlan entered promiscuous mode [ 93.114241][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.123352][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.131086][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 93.154772][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 93.164568][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.173284][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.185065][ T9903] device veth0_macvtap entered promiscuous mode [ 93.196213][ T9903] device veth1_macvtap entered promiscuous mode [ 93.214539][ T9903] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 93.223283][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 93.232052][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.240715][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.250252][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.264306][ T9903] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.272213][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.281011][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/02/15 00:30:33 executed programs: 132 2020/02/15 00:30:38 executed programs: 341 2020/02/15 00:30:43 executed programs: 555 2020/02/15 00:30:48 executed programs: 770 2020/02/15 00:30:53 executed programs: 984 2020/02/15 00:30:58 executed programs: 1203 2020/02/15 00:31:03 executed programs: 1412 2020/02/15 00:31:08 executed programs: 1627 [ 132.492814][ T2730] BUG: sleeping function called from invalid context at net/core/sock.c:2935 [ 132.501875][ T2730] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2730, name: kworker/1:9 [ 132.511497][ T2730] 3 locks held by kworker/1:9/2730: [ 132.516855][ T2730] #0: ffff8880aa426d28 ((wq_completion)events){+.+.}, at: process_one_work+0x8dd/0x17a0 [ 132.526882][ T2730] #1: ffffc900081ffdc0 ((work_completion)(&map->work)){+.+.}, at: process_one_work+0x917/0x17a0 [ 132.537486][ T2730] #2: ffffc900034df860 (&htab->buckets[i].lock){+...}, at: sock_hash_free+0xd9/0x4b0 [ 132.547163][ T2730] Preemption disabled at: [ 132.547187][ T2730] [] sock_hash_free+0xd9/0x4b0 [ 132.558042][ T2730] CPU: 1 PID: 2730 Comm: kworker/1:9 Not tainted 5.6.0-rc1-next-20200214-syzkaller #0 [ 132.567747][ T2730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.577835][ T2730] Workqueue: events bpf_map_free_deferred [ 132.583560][ T2730] Call Trace: [ 132.586870][ T2730] dump_stack+0x197/0x210 [ 132.591224][ T2730] ? sock_hash_free+0xd9/0x4b0 [ 132.596031][ T2730] ___might_sleep.cold+0x1fb/0x23e [ 132.601159][ T2730] __might_sleep+0x95/0x190 [ 132.605694][ T2730] lock_sock_nested+0x39/0x120 [ 132.610472][ T2730] sock_hash_free+0x27c/0x4b0 [ 132.615212][ T2730] bpf_map_free_deferred+0xb3/0x100 [ 132.620425][ T2730] ? bpf_map_charge_move+0x80/0x80 [ 132.625562][ T2730] ? trace_hardirqs_on+0x67/0x240 [ 132.630658][ T2730] process_one_work+0xa05/0x17a0 [ 132.636702][ T2730] ? mark_held_locks+0xf0/0xf0 [ 132.641501][ T2730] ? pwq_dec_nr_in_flight+0x320/0x320 [ 132.646906][ T2730] ? lock_acquire+0x190/0x410 [ 132.651716][ T2730] worker_thread+0x98/0xe40 [ 132.656286][ T2730] kthread+0x361/0x430 [ 132.660375][ T2730] ? process_one_work+0x17a0/0x17a0 [ 132.665565][ T2730] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 132.671297][ T2730] ret_from_fork+0x24/0x30 [ 132.675889][ T2730] [ 132.678219][ T2730] ====================================================== [ 132.685237][ T2730] WARNING: possible circular locking dependency detected [ 132.692427][ T2730] 5.6.0-rc1-next-20200214-syzkaller #0 Tainted: G W [ 132.700313][ T2730] ------------------------------------------------------ [ 132.707318][ T2730] kworker/1:9/2730 is trying to acquire lock: [ 132.713456][ T2730] ffff888094ec4ed0 (sk_lock-AF_INET6){+.+.}, at: sock_hash_free+0x27c/0x4b0 [ 132.722135][ T2730] [ 132.722135][ T2730] but task is already holding lock: [ 132.729939][ T2730] ffffc900034df860 (&htab->buckets[i].lock){+...}, at: sock_hash_free+0xd9/0x4b0 [ 132.739261][ T2730] [ 132.739261][ T2730] which lock already depends on the new lock. [ 132.739261][ T2730] [ 132.749674][ T2730] [ 132.749674][ T2730] the existing dependency chain (in reverse order) is: [ 132.758685][ T2730] [ 132.758685][ T2730] -> #1 (&htab->buckets[i].lock){+...}: [ 132.766418][ T2730] _raw_spin_lock_bh+0x33/0x50 [ 132.771713][ T2730] sock_hash_update_common+0x811/0x1030 [ 132.777789][ T2730] sock_hash_update_elem+0x27d/0x2c0 [ 132.783599][ T2730] bpf_map_update_value.isra.0+0x2a6/0x8e0 [ 132.790031][ T2730] __do_sys_bpf+0x3084/0x4130 [ 132.795230][ T2730] __x64_sys_bpf+0x73/0xb0 [ 132.800191][ T2730] do_syscall_64+0xfa/0x790 [ 132.805219][ T2730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.811871][ T2730] [ 132.811871][ T2730] -> #0 (sk_lock-AF_INET6){+.+.}: [ 132.819108][ T2730] __lock_acquire+0x29cd/0x6320 [ 132.824480][ T2730] lock_acquire+0x190/0x410 [ 132.829509][ T2730] lock_sock_nested+0xcb/0x120 [ 132.834811][ T2730] sock_hash_free+0x27c/0x4b0 [ 132.840024][ T2730] bpf_map_free_deferred+0xb3/0x100 [ 132.845743][ T2730] process_one_work+0xa05/0x17a0 [ 132.851203][ T2730] worker_thread+0x98/0xe40 [ 132.856228][ T2730] kthread+0x361/0x430 [ 132.860824][ T2730] ret_from_fork+0x24/0x30 [ 132.865745][ T2730] [ 132.865745][ T2730] other info that might help us debug this: [ 132.865745][ T2730] [ 132.876089][ T2730] Possible unsafe locking scenario: [ 132.876089][ T2730] [ 132.883533][ T2730] CPU0 CPU1 [ 132.888904][ T2730] ---- ---- [ 132.894272][ T2730] lock(&htab->buckets[i].lock); [ 132.899550][ T2730] lock(sk_lock-AF_INET6); [ 132.906558][ T2730] lock(&htab->buckets[i].lock); [ 132.914113][ T2730] lock(sk_lock-AF_INET6); [ 132.918609][ T2730] [ 132.918609][ T2730] *** DEADLOCK *** [ 132.918609][ T2730] [ 132.926761][ T2730] 3 locks held by kworker/1:9/2730: [ 132.931993][ T2730] #0: ffff8880aa426d28 ((wq_completion)events){+.+.}, at: process_one_work+0x8dd/0x17a0 [ 132.941802][ T2730] #1: ffffc900081ffdc0 ((work_completion)(&map->work)){+.+.}, at: process_one_work+0x917/0x17a0 [ 132.952312][ T2730] #2: ffffc900034df860 (&htab->buckets[i].lock){+...}, at: sock_hash_free+0xd9/0x4b0 [ 132.961877][ T2730] [ 132.961877][ T2730] stack backtrace: [ 132.967780][ T2730] CPU: 1 PID: 2730 Comm: kworker/1:9 Tainted: G W 5.6.0-rc1-next-20200214-syzkaller #0 [ 132.978717][ T2730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.988787][ T2730] Workqueue: events bpf_map_free_deferred [ 132.994501][ T2730] Call Trace: [ 132.997796][ T2730] dump_stack+0x197/0x210 [ 133.002218][ T2730] print_circular_bug.isra.0.cold+0x163/0x172 [ 133.008381][ T2730] check_noncircular+0x32e/0x3e0 [ 133.013350][ T2730] ? print_circular_bug.isra.0+0x230/0x230 [ 133.019166][ T2730] ? alloc_list_entry+0xc0/0xc0 [ 133.024014][ T2730] ? mark_lock+0xc2/0x1220 [ 133.028437][ T2730] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 133.034890][ T2730] __lock_acquire+0x29cd/0x6320 [ 133.039770][ T2730] ? mark_held_locks+0xf0/0xf0 [ 133.044884][ T2730] lock_acquire+0x190/0x410 [ 133.049501][ T2730] ? sock_hash_free+0x27c/0x4b0 [ 133.054356][ T2730] lock_sock_nested+0xcb/0x120 [ 133.059126][ T2730] ? sock_hash_free+0x27c/0x4b0 [ 133.063972][ T2730] sock_hash_free+0x27c/0x4b0 [ 133.068669][ T2730] bpf_map_free_deferred+0xb3/0x100 [ 133.073877][ T2730] ? bpf_map_charge_move+0x80/0x80 [ 133.079103][ T2730] ? trace_hardirqs_on+0x67/0x240 [ 133.084136][ T2730] process_one_work+0xa05/0x17a0 [ 133.089118][ T2730] ? mark_held_locks+0xf0/0xf0 [ 133.093876][ T2730] ? pwq_dec_nr_in_flight+0x320/0x320 [ 133.099359][ T2730] ? lock_acquire+0x190/0x410 [ 133.104047][ T2730] worker_thread+0x98/0xe40 [ 133.108567][ T2730] kthread+0x361/0x430 [ 133.112635][ T2730] ? process_one_work+0x17a0/0x17a0 [ 133.117823][ T2730] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 133.123628][ T2730] ret_from_fork+0x24/0x30 2020/02/15 00:31:13 executed programs: 1868 2020/02/15 00:31:18 executed programs: 2158