[ 93.667329][ T27] audit: type=1800 audit(1581144889.459:30): pid=9531 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.51' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 103.683495][ T9683] IPVS: ftp: loaded support on port[0] = 21 [ 103.763857][ C0] [ 103.766279][ C0] ================================ [ 103.771374][ C0] WARNING: inconsistent lock state [ 103.776488][ C0] 5.5.0-syzkaller #0 Not tainted [ 103.781518][ C0] -------------------------------- [ 103.786682][ C0] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 103.793589][ C0] ksoftirqd/0/9 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 103.799826][ C0] ffff88809fa439c8 (&(&local->client_conns_lock)->rlock){+.?.}, at: rxrpc_put_client_conn+0x6ed/0xc90 [ 103.810931][ C0] {SOFTIRQ-ON-W} state was registered at: [ 103.816677][ C0] lock_acquire+0x190/0x410 [ 103.821249][ C0] _raw_spin_lock+0x2f/0x40 [ 103.825874][ C0] rxrpc_connect_call+0x358/0x4e30 [ 103.831060][ C0] rxrpc_new_client_call+0x9c0/0x1ad0 [ 103.836509][ C0] rxrpc_do_sendmsg+0xffa/0x1d5f [ 103.843018][ C0] rxrpc_sendmsg+0x4d6/0x5f0 [ 103.847690][ C0] sock_sendmsg+0xd7/0x130 [ 103.852276][ C0] ____sys_sendmsg+0x358/0x880 [ 103.857326][ C0] ___sys_sendmsg+0x100/0x170 [ 103.862213][ C0] __sys_sendmmsg+0x1bf/0x4d0 [ 103.866960][ C0] __x64_sys_sendmmsg+0x9d/0x100 [ 103.871985][ C0] do_syscall_64+0xfa/0x790 [ 103.876751][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.882847][ C0] irq event stamp: 581202 [ 103.887178][ C0] hardirqs last enabled at (581202): [] _raw_spin_unlock_irqrestore+0x66/0xe0 [ 103.897696][ C0] hardirqs last disabled at (581201): [] _raw_spin_lock_irqsave+0x6f/0xcd [ 103.907804][ C0] softirqs last enabled at (581114): [] __do_softirq+0x6cd/0x98c [ 103.917174][ C0] softirqs last disabled at (581119): [] run_ksoftirqd+0x8e/0x110 [ 103.926523][ C0] [ 103.926523][ C0] other info that might help us debug this: [ 103.935258][ C0] Possible unsafe locking scenario: [ 103.935258][ C0] [ 103.942712][ C0] CPU0 [ 103.945978][ C0] ---- [ 103.949245][ C0] lock(&(&local->client_conns_lock)->rlock); [ 103.955397][ C0] [ 103.958842][ C0] lock(&(&local->client_conns_lock)->rlock); [ 103.965203][ C0] [ 103.965203][ C0] *** DEADLOCK *** [ 103.965203][ C0] [ 103.973335][ C0] 1 lock held by ksoftirqd/0/9: [ 103.978203][ C0] #0: ffffffff89bac140 (rcu_callback){....}, at: rcu_core+0x562/0x1390 [ 103.986533][ C0] [ 103.986533][ C0] stack backtrace: [ 103.992470][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.5.0-syzkaller #0 [ 104.000177][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.010222][ C0] Call Trace: [ 104.013499][ C0] dump_stack+0x197/0x210 [ 104.017950][ C0] print_usage_bug.cold+0x327/0x378 [ 104.023165][ C0] mark_lock+0xbb4/0x1220 [ 104.027491][ C0] ? kfree+0x10a/0x2c0 [ 104.031610][ C0] ? check_usage_backwards+0x330/0x330 [ 104.037121][ C0] ? __nf_hook_entries_free+0x31/0x40 [ 104.042497][ C0] __lock_acquire+0x1e8e/0x4a00 [ 104.047360][ C0] ? find_held_lock+0x35/0x130 [ 104.052123][ C0] ? __kasan_check_read+0x11/0x20 [ 104.057152][ C0] ? mark_lock+0xc2/0x1220 [ 104.061616][ C0] ? mark_held_locks+0xf0/0xf0 [ 104.066395][ C0] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 104.072254][ C0] lock_acquire+0x190/0x410 [ 104.076921][ C0] ? rxrpc_put_client_conn+0x6ed/0xc90 [ 104.082392][ C0] _raw_spin_lock+0x2f/0x40 [ 104.086885][ C0] ? rxrpc_put_client_conn+0x6ed/0xc90 [ 104.092402][ C0] rxrpc_put_client_conn+0x6ed/0xc90 [ 104.097743][ C0] ? rxrpc_rcu_destroy_call+0xbd/0x200 [ 104.103322][ C0] rxrpc_rcu_destroy_call+0xbd/0x200 [ 104.108599][ C0] rcu_core+0x5e1/0x1390 [ 104.112962][ C0] ? __rcu_read_unlock+0x700/0x700 [ 104.118079][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 104.123634][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 104.129630][ C0] rcu_core_si+0x9/0x10 [ 104.133789][ C0] __do_softirq+0x262/0x98c [ 104.138313][ C0] ? takeover_tasklets+0x820/0x820 [ 104.143473][ C0] run_ksoftirqd+0x8e/0x110 [ 104.147994][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 104.152948][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 104.159184][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [