[ 10.026101][ T2658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 10.035430][ T2658] eql: remember to turn off Van-Jacobson compression on your slave devices [ 10.060502][ T1131] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 10.065439][ T921] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.131' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 27.807055][ T3072] [ 27.807759][ T3072] ======================================================== [ 27.809796][ T3072] WARNING: possible irq lock inversion dependency detected [ 27.811816][ T3072] 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 Not tainted [ 27.813760][ T3072] -------------------------------------------------------- [ 27.815720][ T3072] syz-executor341/3072 just changed the state of lock: [ 27.817592][ T3072] ffff0000cb6d0b38 (clock-AF_INET6){+++.}-{2:2}, at: l2tp_tunnel_register+0x354/0x79c [ 27.820226][ T3072] but this lock was taken by another, SOFTIRQ-safe lock in the past: [ 27.822457][ T3072] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} [ 27.822467][ T3072] [ 27.822467][ T3072] [ 27.822467][ T3072] and interrupts could create inverse lock ordering between them. [ 27.822467][ T3072] [ 27.828263][ T3072] [ 27.828263][ T3072] other info that might help us debug this: [ 27.830505][ T3072] Possible interrupt unsafe locking scenario: [ 27.830505][ T3072] [ 27.832813][ T3072] CPU0 CPU1 [ 27.834282][ T3072] ---- ---- [ 27.835757][ T3072] lock(clock-AF_INET6); [ 27.836936][ T3072] local_irq_disable(); [ 27.838767][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 27.840962][ T3072] lock(clock-AF_INET6); [ 27.842848][ T3072] [ 27.843766][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 27.845292][ T3072] [ 27.845292][ T3072] *** DEADLOCK *** [ 27.845292][ T3072] [ 27.847547][ T3072] 1 lock held by syz-executor341/3072: [ 27.849046][ T3072] #0: ffff0000cb5e5930 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0x184/0x6c4 [ 27.851768][ T3072] [ 27.851768][ T3072] the shortest dependencies between 2nd lock and 1st lock: [ 27.854361][ T3072] -> (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} { [ 27.856125][ T3072] HARDIRQ-ON-W at: [ 27.857258][ T3072] lock_acquire+0x100/0x1f8 [ 27.859028][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 27.860830][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 27.862698][ T3072] __inet6_bind+0x688/0x8ac [ 27.864484][ T3072] inet6_bind+0xf4/0x150 [ 27.866173][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 27.868099][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 27.869883][ T3072] ops_init+0xe4/0x2e4 [ 27.871507][ T3072] register_pernet_operations+0x108/0x264 [ 27.873627][ T3072] register_pernet_device+0x3c/0x94 [ 27.875583][ T3072] rds_tcp_init+0x74/0xe0 [ 27.877310][ T3072] do_one_initcall+0x118/0x22c [ 27.879121][ T3072] do_initcall_level+0xac/0xe4 [ 27.880915][ T3072] do_initcalls+0x58/0xa8 [ 27.882661][ T3072] do_basic_setup+0x20/0x2c [ 27.884406][ T3072] kernel_init_freeable+0xb8/0x148 [ 27.886350][ T3072] kernel_init+0x24/0x290 [ 27.888058][ T3072] ret_from_fork+0x10/0x20 [ 27.889757][ T3072] IN-SOFTIRQ-W at: [ 27.890852][ T3072] lock_acquire+0x100/0x1f8 [ 27.892566][ T3072] _raw_spin_lock+0x54/0x6c [ 27.894318][ T3072] __inet_inherit_port+0x124/0x9ac [ 27.896265][ T3072] tcp_v4_syn_recv_sock+0x790/0x848 [ 27.898216][ T3072] tcp_check_req+0x75c/0x8e4 [ 27.899978][ T3072] tcp_v4_rcv+0xad4/0x11e8 [ 27.901709][ T3072] ip_protocol_deliver_rcu+0x224/0x414 [ 27.903734][ T3072] ip_local_deliver_finish+0x124/0x200 [ 27.905708][ T3072] ip_local_deliver+0xd0/0xf4 [ 27.907510][ T3072] ip_sublist_rcv+0x40c/0x474 [ 27.909314][ T3072] ip_list_rcv+0x184/0x1c8 [ 27.911032][ T3072] __netif_receive_skb_list_core+0x1f8/0x2b0 [ 27.913215][ T3072] __netif_receive_skb_list+0x16c/0x1d0 [ 27.915227][ T3072] netif_receive_skb_list_internal+0x1e8/0x340 [ 27.917451][ T3072] napi_complete_done+0x140/0x354 [ 27.919360][ T3072] gve_napi_poll+0xcc/0x1b4 [ 27.921112][ T3072] __napi_poll+0x5c/0x24c [ 27.922814][ T3072] napi_poll+0x110/0x484 [ 27.924484][ T3072] net_rx_action+0x18c/0x414 [ 27.926299][ T3072] _stext+0x168/0x37c [ 27.927967][ T3072] ____do_softirq+0x14/0x20 [ 27.929717][ T3072] call_on_irq_stack+0x2c/0x54 [ 27.931601][ T3072] do_softirq_own_stack+0x20/0x2c [ 27.933503][ T3072] invoke_softirq+0x70/0xbc [ 27.935272][ T3072] __irq_exit_rcu+0xf0/0x140 [ 27.937052][ T3072] irq_exit_rcu+0x10/0x40 [ 27.938732][ T3072] el1_interrupt+0x38/0x68 [ 27.940465][ T3072] el1h_64_irq_handler+0x18/0x24 [ 27.942334][ T3072] el1h_64_irq+0x64/0x68 [ 27.944052][ T3072] arch_local_irq_enable+0xc/0x18 [ 27.945912][ T3072] default_idle_call+0x48/0xb8 [ 27.947744][ T3072] do_idle+0x110/0x2d4 [ 27.949464][ T3072] cpu_startup_entry+0x24/0x28 [ 27.951316][ T3072] kernel_init+0x0/0x290 [ 27.953008][ T3072] start_kernel+0x0/0x620 [ 27.954691][ T3072] start_kernel+0x450/0x620 [ 27.956447][ T3072] __primary_switched+0xb4/0xbc [ 27.958285][ T3072] INITIAL USE at: [ 27.959377][ T3072] lock_acquire+0x100/0x1f8 [ 27.961116][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 27.962916][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 27.964709][ T3072] __inet6_bind+0x688/0x8ac [ 27.966399][ T3072] inet6_bind+0xf4/0x150 [ 27.968030][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 27.969928][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 27.971695][ T3072] ops_init+0xe4/0x2e4 [ 27.973298][ T3072] register_pernet_operations+0x108/0x264 [ 27.975377][ T3072] register_pernet_device+0x3c/0x94 [ 27.977275][ T3072] rds_tcp_init+0x74/0xe0 [ 27.978942][ T3072] do_one_initcall+0x118/0x22c [ 27.980735][ T3072] do_initcall_level+0xac/0xe4 [ 27.982537][ T3072] do_initcalls+0x58/0xa8 [ 27.984239][ T3072] do_basic_setup+0x20/0x2c [ 27.985974][ T3072] kernel_init_freeable+0xb8/0x148 [ 27.987890][ T3072] kernel_init+0x24/0x290 [ 27.989561][ T3072] ret_from_fork+0x10/0x20 [ 27.991267][ T3072] } [ 27.991964][ T3072] ... key at: [] tcp_init.__key.22+0x0/0x10 [ 27.994197][ T3072] ... acquired at: [ 27.995275][ T3072] _raw_read_lock_bh+0x64/0x7c [ 27.996664][ T3072] sock_i_uid+0x24/0x58 [ 27.997850][ T3072] inet_csk_get_port+0x674/0xaf0 [ 27.999271][ T3072] __inet6_bind+0x688/0x8ac [ 28.000558][ T3072] inet6_bind+0xf4/0x150 [ 28.001771][ T3072] __sys_bind+0x148/0x1b0 [ 28.003000][ T3072] __arm64_sys_bind+0x28/0x3c [ 28.004317][ T3072] el0_svc_common+0x138/0x220 [ 28.005644][ T3072] do_el0_svc+0x48/0x164 [ 28.006857][ T3072] el0_svc+0x58/0x150 [ 28.007978][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.009383][ T3072] el0t_64_sync+0x190/0x194 [ 28.010654][ T3072] [ 28.011278][ T3072] -> (clock-AF_INET6){+++.}-{2:2} { [ 28.012721][ T3072] HARDIRQ-ON-W at: [ 28.013783][ T3072] lock_acquire+0x100/0x1f8 [ 28.015456][ T3072] _raw_write_lock_bh+0x54/0x6c [ 28.017220][ T3072] sk_common_release+0x58/0x1d4 [ 28.019011][ T3072] udp_lib_close+0x20/0x30 [ 28.020653][ T3072] inet_release+0xc8/0xe4 [ 28.022311][ T3072] inet6_release+0x3c/0x58 [ 28.023967][ T3072] sock_close+0x50/0xf0 [ 28.025502][ T3072] __fput+0x198/0x3e4 [ 28.027017][ T3072] ____fput+0x20/0x30 [ 28.028591][ T3072] task_work_run+0x100/0x148 [ 28.030301][ T3072] do_notify_resume+0x174/0x1f0 [ 28.032056][ T3072] el0_svc+0x9c/0x150 [ 28.033614][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.035426][ T3072] el0t_64_sync+0x190/0x194 [ 28.037094][ T3072] HARDIRQ-ON-R at: [ 28.038151][ T3072] lock_acquire+0x100/0x1f8 [ 28.039804][ T3072] _raw_read_lock_bh+0x64/0x7c [ 28.041546][ T3072] sock_i_uid+0x24/0x58 [ 28.043152][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 28.044975][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 28.046735][ T3072] udp_v6_get_port+0x60/0x74 [ 28.048409][ T3072] __inet6_bind+0x688/0x8ac [ 28.050056][ T3072] inet6_bind+0xf4/0x150 [ 28.051615][ T3072] __sys_bind+0x148/0x1b0 [ 28.053234][ T3072] __arm64_sys_bind+0x28/0x3c [ 28.054954][ T3072] el0_svc_common+0x138/0x220 [ 28.056659][ T3072] do_el0_svc+0x48/0x164 [ 28.058285][ T3072] el0_svc+0x58/0x150 [ 28.059782][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.061593][ T3072] el0t_64_sync+0x190/0x194 [ 28.063302][ T3072] SOFTIRQ-ON-W at: [ 28.064346][ T3072] lock_acquire+0x100/0x1f8 [ 28.066053][ T3072] _raw_write_lock+0x54/0x6c [ 28.067765][ T3072] l2tp_tunnel_register+0x354/0x79c [ 28.069635][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 28.071380][ T3072] __sys_connect+0x184/0x190 [ 28.073063][ T3072] __arm64_sys_connect+0x28/0x3c [ 28.074870][ T3072] el0_svc_common+0x138/0x220 [ 28.076587][ T3072] do_el0_svc+0x48/0x164 [ 28.078201][ T3072] el0_svc+0x58/0x150 [ 28.079701][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.081547][ T3072] el0t_64_sync+0x190/0x194 [ 28.083385][ T3072] INITIAL USE at: [ 28.084443][ T3072] lock_acquire+0x100/0x1f8 [ 28.086112][ T3072] _raw_write_lock_bh+0x54/0x6c [ 28.087808][ T3072] sk_common_release+0x58/0x1d4 [ 28.089540][ T3072] udp_lib_close+0x20/0x30 [ 28.091197][ T3072] inet_release+0xc8/0xe4 [ 28.092801][ T3072] inet6_release+0x3c/0x58 [ 28.094399][ T3072] sock_close+0x50/0xf0 [ 28.095926][ T3072] __fput+0x198/0x3e4 [ 28.097413][ T3072] ____fput+0x20/0x30 [ 28.098930][ T3072] task_work_run+0x100/0x148 [ 28.100593][ T3072] do_notify_resume+0x174/0x1f0 [ 28.102311][ T3072] el0_svc+0x9c/0x150 [ 28.103781][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.105556][ T3072] el0t_64_sync+0x190/0x194 [ 28.107209][ T3072] INITIAL READ USE at: [ 28.108338][ T3072] lock_acquire+0x100/0x1f8 [ 28.110110][ T3072] _raw_read_lock_bh+0x64/0x7c [ 28.111925][ T3072] sock_i_uid+0x24/0x58 [ 28.113558][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 28.115475][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 28.117322][ T3072] udp_v6_get_port+0x60/0x74 [ 28.119093][ T3072] __inet6_bind+0x688/0x8ac [ 28.120822][ T3072] inet6_bind+0xf4/0x150 [ 28.122521][ T3072] __sys_bind+0x148/0x1b0 [ 28.124248][ T3072] __arm64_sys_bind+0x28/0x3c [ 28.126054][ T3072] el0_svc_common+0x138/0x220 [ 28.127837][ T3072] do_el0_svc+0x48/0x164 [ 28.129515][ T3072] el0_svc+0x58/0x150 [ 28.131143][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.133054][ T3072] el0t_64_sync+0x190/0x194 [ 28.134808][ T3072] } [ 28.135468][ T3072] ... key at: [] af_callback_keys+0xa0/0x2e0 [ 28.137625][ T3072] ... acquired at: [ 28.138626][ T3072] mark_lock+0x154/0x1b4 [ 28.139844][ T3072] __lock_acquire+0x618/0x3084 [ 28.141167][ T3072] lock_acquire+0x100/0x1f8 [ 28.142438][ T3072] _raw_write_lock+0x54/0x6c [ 28.143690][ T3072] l2tp_tunnel_register+0x354/0x79c [ 28.145127][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 28.146465][ T3072] __sys_connect+0x184/0x190 [ 28.147774][ T3072] __arm64_sys_connect+0x28/0x3c [ 28.149150][ T3072] el0_svc_common+0x138/0x220 [ 28.150463][ T3072] do_el0_svc+0x48/0x164 [ 28.151648][ T3072] el0_svc+0x58/0x150 [ 28.152745][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.154140][ T3072] el0t_64_sync+0x190/0x194 [ 28.155411][ T3072] [ 28.156016][ T3072] [ 28.156016][ T3072] stack backtrace: [ 28.157569][ T3072] CPU: 0 PID: 3072 Comm: syz-executor341 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 28.160384][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 28.163065][ T3072] Call trace: [ 28.163942][ T3072] dump_backtrace+0x1c4/0x1f0 [ 28.165191][ T3072] show_stack+0x2c/0x54 [ 28.166288][ T3072] dump_stack_lvl+0x104/0x16c [ 28.167557][ T3072] dump_stack+0x1c/0x58 [ 28.168676][ T3072] print_irq_inversion_bug+0x2f8/0x300 [ 28.170139][ T3072] mark_lock_irq+0x3ec/0x4b4 [ 28.171348][ T3072] mark_lock+0x154/0x1b4 [ 28.172484][ T3072] __lock_acquire+0x618/0x3084 [ 28.173748][ T3072] lock_acquire+0x100/0x1f8 [ 28.174967][ T3072] _raw_write_lock+0x54/0x6c [ 28.176187][ T3072] l2tp_tunnel_register+0x354/0x79c [ 28.177584][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 28.178921][ T3072] __sys_connect+0x184/0x190 [ 28.180187][ T3072] __arm64_sys_connect+0x28/0x3c [ 28.181521][ T3072] el0_svc_common+0x138/0x220 [ 28.182982][ T3072] do_el0_svc+0x48/0x164 [ 28.184153][ T3072] el0_svc+0x58/0x150 [ 28.185207][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.186570][ T3072] el0t_64_sync+0x190/0x194 [ 28.187925][ T3072] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 28.190420][ T3072] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3072, name: syz-executor341 [ 28.192949][ T3072] preempt_count: 1, expected: 0 [ 28.194226][ T3072] RCU nest depth: 0, expected: 0 [ 28.195534][ T3072] INFO: lockdep is turned off. [ 28.196732][ T3072] Preemption disabled at: [ 28.196737][ T3072] [] l2tp_tunnel_register+0x354/0x79c [ 28.199676][ T3072] CPU: 0 PID: 3072 Comm: syz-executor341 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 28.202364][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 28.205022][ T3072] Call trace: [ 28.205821][ T3072] dump_backtrace+0x1c4/0x1f0 [ 28.207043][ T3072] show_stack+0x2c/0x54 [ 28.208155][ T3072] dump_stack_lvl+0x104/0x16c [ 28.209405][ T3072] dump_stack+0x1c/0x58 [ 28.210488][ T3072] __might_resched+0x208/0x218 [ 28.211763][ T3072] __might_sleep+0x48/0x78 [ 28.212938][ T3072] cpus_read_lock+0x28/0x1e0 [ 28.214109][ T3072] static_key_slow_inc+0x1c/0x38 [ 28.215384][ T3072] udpv6_encap_enable+0x1c/0x28 [ 28.216680][ T3072] setup_udp_tunnel_sock+0xec/0x124 [ 28.218036][ T3072] l2tp_tunnel_register+0x68c/0x79c [ 28.219551][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 28.220827][ T3072] __sys_connect+0x184/0x190 [ 28.222035][ T3072] __arm64_sys_connect+0x28/0x3c [ 28.223350][ T3072] el0_svc_common+0x138/0x220 [ 28.224605][ T3072] do_el0_svc+0x48/0x164 [ 28.225718][ T3072] el0_svc+0x58/0x150 [ 28.226758][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.228090][ T3072] el0t_64_sync+0x190/0x194