Warning: Permanently added '10.128.0.227' (ECDSA) to the list of known hosts. executing program [ 118.181356][ T27] audit: type=1400 audit(1581113689.036:42): avc: denied { map } for pid=11193 comm="syz-executor917" path="/root/syz-executor917365270" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 118.199213][T11194] IPVS: ftp: loaded support on port[0] = 21 [ 118.255180][ C0] [ 118.257793][ C0] ================================ [ 118.262968][ C0] WARNING: inconsistent lock state [ 118.268708][ C0] 5.5.0-syzkaller #0 Not tainted [ 118.273814][ C0] -------------------------------- [ 118.279021][ C0] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 118.286067][ C0] ksoftirqd/0/9 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 118.292209][ C0] ffff8880a18839c8 (&(&local->client_conns_lock)->rlock){+.?.}, at: rxrpc_put_client_conn+0x6ed/0xc90 [ 118.303372][ C0] {SOFTIRQ-ON-W} state was registered at: [ 118.309101][ C0] lock_acquire+0x190/0x410 [ 118.313860][ C0] _raw_spin_lock+0x2f/0x40 [ 118.318724][ C0] rxrpc_connect_call+0x358/0x4e30 [ 118.324055][ C0] rxrpc_new_client_call+0x9c0/0x1ad0 [ 118.329684][ C0] rxrpc_do_sendmsg+0xffa/0x1d5f [ 118.334750][ C0] rxrpc_sendmsg+0x4d6/0x5f0 [ 118.339438][ C0] sock_sendmsg+0xd7/0x130 [ 118.343985][ C0] ____sys_sendmsg+0x358/0x880 [ 118.348848][ C0] ___sys_sendmsg+0x100/0x170 [ 118.354173][ C0] __sys_sendmmsg+0x1bf/0x4d0 [ 118.359663][ C0] __x64_sys_sendmmsg+0x9d/0x100 [ 118.364827][ C0] do_syscall_64+0xfa/0x790 [ 118.370288][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.376384][ C0] irq event stamp: 665438 [ 118.380730][ C0] hardirqs last enabled at (665438): [] _raw_spin_unlock_irqrestore+0x66/0xe0 [ 118.391503][ C0] hardirqs last disabled at (665437): [] _raw_spin_lock_irqsave+0x6f/0xcd [ 118.401574][ C0] softirqs last enabled at (664952): [] __do_softirq+0x6cd/0x98c [ 118.411767][ C0] softirqs last disabled at (664957): [] run_ksoftirqd+0x8e/0x110 [ 118.421224][ C0] [ 118.421224][ C0] other info that might help us debug this: [ 118.429585][ C0] Possible unsafe locking scenario: [ 118.429585][ C0] [ 118.437205][ C0] CPU0 [ 118.440887][ C0] ---- [ 118.444162][ C0] lock(&(&local->client_conns_lock)->rlock); [ 118.450444][ C0] [ 118.454124][ C0] lock(&(&local->client_conns_lock)->rlock); [ 118.460464][ C0] [ 118.460464][ C0] *** DEADLOCK *** [ 118.460464][ C0] [ 118.468888][ C0] 1 lock held by ksoftirqd/0/9: [ 118.473719][ C0] #0: ffffffff89bac140 (rcu_callback){....}, at: rcu_core+0x562/0x1390 [ 118.482185][ C0] [ 118.482185][ C0] stack backtrace: [ 118.488085][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.5.0-syzkaller #0 [ 118.495878][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.506045][ C0] Call Trace: [ 118.509329][ C0] dump_stack+0x197/0x210 [ 118.513657][ C0] print_usage_bug.cold+0x327/0x378 [ 118.519324][ C0] mark_lock+0xbb4/0x1220 [ 118.523640][ C0] ? kfree+0x10a/0x2c0 [ 118.527705][ C0] ? check_usage_backwards+0x330/0x330 [ 118.533256][ C0] ? __nf_hook_entries_free+0x31/0x40 [ 118.538639][ C0] __lock_acquire+0x1e8e/0x4a00 [ 118.543487][ C0] ? find_held_lock+0x35/0x130 [ 118.548387][ C0] ? __kasan_check_read+0x11/0x20 [ 118.553527][ C0] ? mark_lock+0xc2/0x1220 [ 118.557955][ C0] ? mark_held_locks+0xf0/0xf0 [ 118.562830][ C0] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 118.568666][ C0] lock_acquire+0x190/0x410 [ 118.573189][ C0] ? rxrpc_put_client_conn+0x6ed/0xc90 [ 118.578660][ C0] _raw_spin_lock+0x2f/0x40 [ 118.583181][ C0] ? rxrpc_put_client_conn+0x6ed/0xc90 [ 118.588767][ C0] rxrpc_put_client_conn+0x6ed/0xc90 [ 118.594065][ C0] ? rxrpc_rcu_destroy_call+0xbd/0x200 [ 118.599596][ C0] rxrpc_rcu_destroy_call+0xbd/0x200 [ 118.604872][ C0] rcu_core+0x5e1/0x1390 [ 118.609127][ C0] ? __rcu_read_unlock+0x700/0x700 [ 118.614228][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 118.619777][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 118.625756][ C0] rcu_core_si+0x9/0x10 [ 118.629920][ C0] __do_softirq+0x262/0x98c [ 118.634491][ C0] ? takeover_tasklets+0x820/0x820 [ 118.640327][ C0] run_ksoftirqd+0x8e/0x110 [ 118.644854][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 118.649822][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 118.656