Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. syzkaller login: [ 43.844819] IPVS: ftp: loaded support on port[0] = 21 [ 43.998394] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.005333] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.012715] device bridge_slave_0 entered promiscuous mode [ 44.030053] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.036431] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.043601] device bridge_slave_1 entered promiscuous mode [ 44.060404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.078535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.128178] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 44.147753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 44.222185] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 44.229744] team0: Port device team_slave_0 added [ 44.245707] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 44.253150] team0: Port device team_slave_1 added [ 44.270282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.292019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.310386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.329403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported [ 44.424513] ip (6001) used greatest stack depth: 16064 bytes left RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 44.469056] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.475462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.482288] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.488655] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 44.975269] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.023835] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 45.073685] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 45.080182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.087236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.137413] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 45.406951] [ 45.408951] ====================================================== [ 45.415778] WARNING: possible circular locking dependency detected [ 45.422080] 4.20.0-rc6-next-20181213+ #170 Not tainted [ 45.427337] ------------------------------------------------------ [ 45.433641] syz-executor777/5930 is trying to acquire lock: [ 45.439339] 0000000079c41b09 (&tbl->lock){+.-.}, at: neigh_change_state+0x1dc/0x7a0 [ 45.447132] [ 45.447132] but task is already holding lock: [ 45.453087] 00000000da2b8ce8 (&n->lock){++--}, at: __neigh_update+0xe6/0x1eb0 [ 45.460353] [ 45.460353] which lock already depends on the new lock. [ 45.460353] [ 45.468655] [ 45.468655] the existing dependency chain (in reverse order) is: [ 45.476482] [ 45.476482] -> #1 (&n->lock){++--}: [ 45.481599] _raw_write_lock+0x2d/0x40 [ 45.485998] neigh_flush_dev+0x34f/0x960 [ 45.490568] neigh_changeaddr+0x31/0x40 [ 45.495054] ndisc_netdev_event+0xe6/0x5b0 [ 45.499798] notifier_call_chain+0x17e/0x380 [ 45.504713] raw_notifier_call_chain+0x2d/0x40 [ 45.509803] call_netdevice_notifiers_info+0x3f/0x90 [ 45.515420] dev_set_mac_address+0x293/0x3b0 [ 45.520339] do_setlink+0x7c7/0x3f30 [ 45.524563] __rtnl_newlink+0xcde/0x19e0 [ 45.529140] rtnl_newlink+0x6b/0xa0 [ 45.533275] rtnetlink_rcv_msg+0x46a/0xc20 [ 45.538020] netlink_rcv_skb+0x172/0x440 [ 45.542591] rtnetlink_rcv+0x1c/0x20 [ 45.546812] netlink_unicast+0x5a5/0x760 [ 45.551381] netlink_sendmsg+0xa18/0xfc0 [ 45.555950] sock_sendmsg+0xd5/0x120 [ 45.560172] ___sys_sendmsg+0x7fd/0x930 [ 45.564654] __sys_sendmsg+0x11d/0x280 [ 45.569047] __x64_sys_sendmsg+0x78/0xb0 [ 45.573616] do_syscall_64+0x1b9/0x820 [ 45.578009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 45.583700] [ 45.583700] -> #0 (&tbl->lock){+.-.}: [ 45.588973] lock_acquire+0x1ed/0x520 [ 45.593278] _raw_write_lock_bh+0x31/0x40 [ 45.597932] neigh_change_state+0x1dc/0x7a0 [ 45.602762] __neigh_update+0x478/0x1eb0 [ 45.607334] neigh_update+0x37/0x50 [ 45.611471] arp_req_set+0x54c/0xaa0 [ 45.615701] arp_ioctl+0x48b/0xae0 [ 45.619748] inet_ioctl+0x237/0x360 [ 45.623885] sock_do_ioctl+0xeb/0x420 [ 45.628194] sock_ioctl+0x313/0x690 [ 45.632331] do_vfs_ioctl+0x1de/0x1790 [ 45.636835] ksys_ioctl+0xa9/0xd0 [ 45.640803] __x64_sys_ioctl+0x73/0xb0 [ 45.645198] do_syscall_64+0x1b9/0x820 [ 45.649595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 45.655287] [ 45.655287] other info that might help us debug this: [ 45.655287] [ 45.663411] Possible unsafe locking scenario: [ 45.663411] [ 45.669453] CPU0 CPU1 [ 45.674104] ---- ---- [ 45.678873] lock(&n->lock); [ 45.682298] lock(&tbl->lock); [ 45.688089] lock(&n->lock); [ 45.693697] lock(&tbl->lock); [ 45.697079] [ 45.697079] *** DEADLOCK *** [ 45.697079] [ 45.703132] 2 locks held by syz-executor777/5930: [ 45.707957] #0: 0000000000080d0b (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 45.715226] #1: 00000000da2b8ce8 (&n->lock){++--}, at: __neigh_update+0xe6/0x1eb0 [ 45.722923] [ 45.722923] stack backtrace: [ 45.727410] CPU: 1 PID: 5930 Comm: syz-executor777 Not tainted 4.20.0-rc6-next-20181213+ #170 [ 45.736052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.745389] Call Trace: [ 45.747968] dump_stack+0x244/0x39d [ 45.751587] ? dump_stack_print_info.cold.1+0x20/0x20 [ 45.756863] ? vprintk_func+0x85/0x181 [ 45.760749] print_circular_bug.isra.35.cold.56+0x1bd/0x27d [ 45.766446] ? save_trace+0xe0/0x290 [ 45.770147] __lock_acquire+0x3399/0x4c20 [ 45.774284] ? mark_held_locks+0x130/0x130 [ 45.778517] ? kasan_check_write+0x14/0x20 [ 45.782740] ? graph_lock+0x9c/0x270 [ 45.786444] ? mark_held_locks+0x130/0x130 [ 45.790668] ? mark_held_locks+0xc7/0x130 [ 45.794805] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 45.799378] ? trace_hardirqs_on+0xbd/0x310 [ 45.803688] ? _raw_write_unlock_bh+0x30/0x40 [ 45.808173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 45.813699] ? ___neigh_create+0x1704/0x2630 [ 45.818094] ? ___neigh_create+0x1704/0x2630 [ 45.822502] lock_acquire+0x1ed/0x520 [ 45.826290] ? neigh_change_state+0x1dc/0x7a0 [ 45.830776] ? lock_release+0xa00/0xa00 [ 45.834742] _raw_write_lock_bh+0x31/0x40 [ 45.838877] ? neigh_change_state+0x1dc/0x7a0 [ 45.843359] neigh_change_state+0x1dc/0x7a0 [ 45.847675] ? neigh_parms_alloc+0x6d0/0x6d0 [ 45.852073] ? mark_held_locks+0xc7/0x130 [ 45.856211] ? kasan_check_write+0x14/0x20 [ 45.860431] ? do_raw_write_lock+0x14f/0x310 [ 45.864828] ? do_raw_read_unlock+0x70/0x70 [ 45.869135] ? neigh_lookup+0x586/0x7c0 [ 45.873100] ? trace_hardirqs_off_caller+0x310/0x310 [ 45.878190] __neigh_update+0x478/0x1eb0 [ 45.882240] ? __local_bh_enable_ip+0x160/0x260 [ 45.886899] ? arp_hash+0x40/0xa0 [ 45.890341] ? __neigh_notify+0x160/0x160 [ 45.894495] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 45.900020] ? find_held_lock+0x36/0x1c0 [ 45.904069] neigh_update+0x37/0x50 [ 45.907683] arp_req_set+0x54c/0xaa0 [ 45.911498] ? arp_req_delete+0x870/0x870 [ 45.915644] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 45.920389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 45.925919] arp_ioctl+0x48b/0xae0 [ 45.929450] ? arp_constructor+0xd80/0xd80 [ 45.933686] inet_ioctl+0x237/0x360 [ 45.937300] ? lock_acquire+0x1ed/0x520 [ 45.941258] ? inet_stream_connect+0xa0/0xa0 [ 45.945765] ? mark_held_locks+0x130/0x130 [ 45.950080] ? mark_held_locks+0x130/0x130 [ 45.954306] ? rwlock_bug.part.2+0x90/0x90 [ 45.958529] ? debug_mutex_init+0x2d/0x60 [ 45.962669] sock_do_ioctl+0xeb/0x420 [ 45.966471] ? compat_ifr_data_ioctl+0x170/0x170 [ 45.971216] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 45.976049] ? find_held_lock+0x36/0x1c0 [ 45.980197] ? graph_lock+0x270/0x270 [ 45.983990] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 45.989168] sock_ioctl+0x313/0x690 [ 45.992782] ? dlci_ioctl_set+0x40/0x40 [ 45.996740] ? find_held_lock+0x36/0x1c0 [ 46.000790] ? __do_page_fault+0x62e/0xd70 [ 46.005013] ? dlci_ioctl_set+0x40/0x40 [ 46.008976] do_vfs_ioctl+0x1de/0x1790 [ 46.012851] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 46.018125] ? ioctl_preallocate+0x300/0x300 [ 46.022528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 46.028055] ? __fget_light+0x2e9/0x430 [ 46.032018] ? fget_raw+0x20/0x20 [ 46.035473] ? kasan_check_write+0x14/0x20 [ 46.039696] ? up_read+0x225/0x2c0 [ 46.043228] ? do_syscall_64+0x9a/0x820 [ 46.047189] ? do_syscall_64+0x9a/0x820 [ 46.051151] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 46.055719] ? security_file_ioctl+0x94/0xc0 [ 46.060113] ksys_ioctl+0xa9/0xd0 [ 46.063557] __x64_sys_ioctl+0x73/0xb0 [ 46.067943] do_syscall_64+0x1b9/0x820 [ 46.071838] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 46.077194] ? syscall_return_slowpath+0x5e0/0x5e0 [ 46.082202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 46.087039] ? trace_hardirqs_on_caller+0x310/0x310 [ 46.092041] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 46.097137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 46.102669] ? prepare_exit_to_usermode+0x291/0x3b0 [ 46.107768] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 46.112719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.117898] RIP: 0033:0x441089 [ 46.121079] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 46.139966] RSP: 002b:00007ffe046dc0e8 EFLAGS: 00000213 ORIG_RAX: 0000000000000010 [ 46.147662] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000441089 [ 46.154920] RDX: 0000000020000000 RSI: 0000000000008955 RDI: 0000000000000003 [ 46.162175] RBP: 00000000006cc018 R08: 0000000000000100 R09: 0000000000000100 [ 46.169432] R10: 0000000000000020 R11: 0000000000000213 R12: 0000000000401ff0 [ 46.176701] R13: 0000000000402080 R14: 0000000000000000 R15: 0000000000000000