[ 10.311961][ T2658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 10.315615][ T2658] eql: remember to turn off Van-Jacobson compression on your slave devices [ 10.342948][ T996] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 10.348015][ T2567] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.249' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 32.882318][ T3072] [ 32.882996][ T3072] ======================================================== [ 32.884947][ T3072] WARNING: possible irq lock inversion dependency detected [ 32.886830][ T3072] 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 Not tainted [ 32.888679][ T3072] -------------------------------------------------------- [ 32.890617][ T3072] syz-executor160/3072 just changed the state of lock: [ 32.892426][ T3072] ffff0000c798b838 (clock-AF_INET6){+++.}-{2:2}, at: l2tp_tunnel_register+0x354/0x79c [ 32.894985][ T3072] but this lock was taken by another, SOFTIRQ-safe lock in the past: [ 32.897113][ T3072] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} [ 32.897122][ T3072] [ 32.897122][ T3072] [ 32.897122][ T3072] and interrupts could create inverse lock ordering between them. [ 32.897122][ T3072] [ 32.902656][ T3072] [ 32.902656][ T3072] other info that might help us debug this: [ 32.904797][ T3072] Possible interrupt unsafe locking scenario: [ 32.904797][ T3072] [ 32.906992][ T3072] CPU0 CPU1 [ 32.908380][ T3072] ---- ---- [ 32.909766][ T3072] lock(clock-AF_INET6); [ 32.910918][ T3072] local_irq_disable(); [ 32.912716][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 32.914853][ T3072] lock(clock-AF_INET6); [ 32.916661][ T3072] [ 32.917573][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 32.919092][ T3072] [ 32.919092][ T3072] *** DEADLOCK *** [ 32.919092][ T3072] [ 32.921282][ T3072] 1 lock held by syz-executor160/3072: [ 32.922709][ T3072] #0: ffff0000c98cc130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0x184/0x6c4 [ 32.925300][ T3072] [ 32.925300][ T3072] the shortest dependencies between 2nd lock and 1st lock: [ 32.927752][ T3072] -> (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} { [ 32.929439][ T3072] HARDIRQ-ON-W at: [ 32.930490][ T3072] lock_acquire+0x100/0x1f8 [ 32.932180][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 32.933941][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 32.935707][ T3072] __inet6_bind+0x688/0x8ac [ 32.937365][ T3072] inet6_bind+0xf4/0x150 [ 32.938936][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 32.940752][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 32.942503][ T3072] ops_init+0xe4/0x2e4 [ 32.944093][ T3072] register_pernet_operations+0x108/0x264 [ 32.946061][ T3072] register_pernet_device+0x3c/0x94 [ 32.947978][ T3072] rds_tcp_init+0x74/0xe0 [ 32.949590][ T3072] do_one_initcall+0x118/0x22c [ 32.951325][ T3072] do_initcall_level+0xac/0xe4 [ 32.953080][ T3072] do_initcalls+0x58/0xa8 [ 32.954711][ T3072] do_basic_setup+0x20/0x2c [ 32.956587][ T3072] kernel_init_freeable+0xb8/0x148 [ 32.958530][ T3072] kernel_init+0x24/0x290 [ 32.960155][ T3072] ret_from_fork+0x10/0x20 [ 32.961860][ T3072] IN-SOFTIRQ-W at: [ 32.962937][ T3072] lock_acquire+0x100/0x1f8 [ 32.964618][ T3072] _raw_spin_lock+0x54/0x6c [ 32.966373][ T3072] __inet_inherit_port+0x124/0x9ac [ 32.968324][ T3072] tcp_v4_syn_recv_sock+0x790/0x848 [ 32.970199][ T3072] tcp_check_req+0x75c/0x8e4 [ 32.971884][ T3072] tcp_v4_rcv+0xad4/0x11e8 [ 32.973516][ T3072] ip_protocol_deliver_rcu+0x224/0x414 [ 32.975442][ T3072] ip_local_deliver_finish+0x124/0x200 [ 32.977376][ T3072] ip_local_deliver+0xd0/0xf4 [ 32.979091][ T3072] ip_sublist_rcv+0x40c/0x474 [ 32.980805][ T3072] ip_list_rcv+0x184/0x1c8 [ 32.982456][ T3072] __netif_receive_skb_list_core+0x1f8/0x2b0 [ 32.984569][ T3072] __netif_receive_skb_list+0x16c/0x1d0 [ 32.986538][ T3072] netif_receive_skb_list_internal+0x1e8/0x340 [ 32.988655][ T3072] napi_complete_done+0x140/0x354 [ 32.990445][ T3072] gve_napi_poll+0xcc/0x1b4 [ 32.992148][ T3072] __napi_poll+0x5c/0x24c [ 32.993793][ T3072] napi_poll+0x110/0x484 [ 32.995384][ T3072] net_rx_action+0x18c/0x414 [ 32.997064][ T3072] _stext+0x168/0x37c [ 32.998561][ T3072] ____do_softirq+0x14/0x20 [ 33.000230][ T3072] call_on_irq_stack+0x2c/0x54 [ 33.001959][ T3072] do_softirq_own_stack+0x20/0x2c [ 33.003822][ T3072] invoke_softirq+0x70/0xbc [ 33.005569][ T3072] __irq_exit_rcu+0xf0/0x140 [ 33.007402][ T3072] irq_exit_rcu+0x10/0x40 [ 33.009102][ T3072] el1_interrupt+0x38/0x68 [ 33.010682][ T3072] el1h_64_irq_handler+0x18/0x24 [ 33.012361][ T3072] el1h_64_irq+0x64/0x68 [ 33.014119][ T3072] arch_local_irq_enable+0xc/0x18 [ 33.016042][ T3072] default_idle_call+0x48/0xb8 [ 33.017790][ T3072] do_idle+0x110/0x2d4 [ 33.019354][ T3072] cpu_startup_entry+0x24/0x28 [ 33.021138][ T3072] kernel_init+0x0/0x290 [ 33.022712][ T3072] start_kernel+0x0/0x620 [ 33.024295][ T3072] start_kernel+0x450/0x620 [ 33.025946][ T3072] __primary_switched+0xb4/0xbc [ 33.027885][ T3072] INITIAL USE at: [ 33.028937][ T3072] lock_acquire+0x100/0x1f8 [ 33.030577][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 33.032290][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 33.033986][ T3072] __inet6_bind+0x688/0x8ac [ 33.035664][ T3072] inet6_bind+0xf4/0x150 [ 33.037336][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 33.039134][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 33.040826][ T3072] ops_init+0xe4/0x2e4 [ 33.042367][ T3072] register_pernet_operations+0x108/0x264 [ 33.044350][ T3072] register_pernet_device+0x3c/0x94 [ 33.046181][ T3072] rds_tcp_init+0x74/0xe0 [ 33.047804][ T3072] do_one_initcall+0x118/0x22c [ 33.049510][ T3072] do_initcall_level+0xac/0xe4 [ 33.051208][ T3072] do_initcalls+0x58/0xa8 [ 33.052806][ T3072] do_basic_setup+0x20/0x2c [ 33.054439][ T3072] kernel_init_freeable+0xb8/0x148 [ 33.056306][ T3072] kernel_init+0x24/0x290 [ 33.057946][ T3072] ret_from_fork+0x10/0x20 [ 33.059606][ T3072] } [ 33.060260][ T3072] ... key at: [] tcp_init.__key.22+0x0/0x10 [ 33.062406][ T3072] ... acquired at: [ 33.063413][ T3072] _raw_read_lock_bh+0x64/0x7c [ 33.064729][ T3072] sock_i_uid+0x24/0x58 [ 33.065855][ T3072] inet_csk_get_port+0x674/0xaf0 [ 33.067292][ T3072] __inet6_bind+0x688/0x8ac [ 33.068480][ T3072] inet6_bind+0xf4/0x150 [ 33.069549][ T3072] __sys_bind+0x148/0x1b0 [ 33.070659][ T3072] __arm64_sys_bind+0x28/0x3c [ 33.071929][ T3072] el0_svc_common+0x138/0x220 [ 33.073193][ T3072] do_el0_svc+0x48/0x164 [ 33.074324][ T3072] el0_svc+0x58/0x150 [ 33.075445][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.076795][ T3072] el0t_64_sync+0x190/0x194 [ 33.078014][ T3072] [ 33.078595][ T3072] -> (clock-AF_INET6){+++.}-{2:2} { [ 33.079969][ T3072] HARDIRQ-ON-W at: [ 33.081010][ T3072] lock_acquire+0x100/0x1f8 [ 33.082665][ T3072] _raw_write_lock_bh+0x54/0x6c [ 33.084360][ T3072] sk_common_release+0x58/0x1d4 [ 33.086028][ T3072] udp_lib_close+0x20/0x30 [ 33.087655][ T3072] inet_release+0xc8/0xe4 [ 33.089204][ T3072] inet6_release+0x3c/0x58 [ 33.090769][ T3072] sock_close+0x50/0xf0 [ 33.092302][ T3072] __fput+0x198/0x3e4 [ 33.093793][ T3072] ____fput+0x20/0x30 [ 33.095239][ T3072] task_work_run+0x100/0x148 [ 33.096872][ T3072] do_notify_resume+0x174/0x1f0 [ 33.098571][ T3072] el0_svc+0x9c/0x150 [ 33.100069][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.101821][ T3072] el0t_64_sync+0x190/0x194 [ 33.103449][ T3072] HARDIRQ-ON-R at: [ 33.104487][ T3072] lock_acquire+0x100/0x1f8 [ 33.106154][ T3072] _raw_read_lock_bh+0x64/0x7c [ 33.107881][ T3072] sock_i_uid+0x24/0x58 [ 33.109436][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 33.111197][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 33.112958][ T3072] udp_v6_get_port+0x60/0x74 [ 33.114612][ T3072] __inet6_bind+0x688/0x8ac [ 33.116255][ T3072] inet6_bind+0xf4/0x150 [ 33.118009][ T3072] __sys_bind+0x148/0x1b0 [ 33.119604][ T3072] __arm64_sys_bind+0x28/0x3c [ 33.121379][ T3072] el0_svc_common+0x138/0x220 [ 33.122966][ T3072] do_el0_svc+0x48/0x164 [ 33.124465][ T3072] el0_svc+0x58/0x150 [ 33.125967][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.127740][ T3072] el0t_64_sync+0x190/0x194 [ 33.129412][ T3072] SOFTIRQ-ON-W at: [ 33.130430][ T3072] lock_acquire+0x100/0x1f8 [ 33.132026][ T3072] _raw_write_lock+0x54/0x6c [ 33.133707][ T3072] l2tp_tunnel_register+0x354/0x79c [ 33.135524][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 33.137286][ T3072] __sys_connect+0x184/0x190 [ 33.138916][ T3072] __arm64_sys_connect+0x28/0x3c [ 33.140635][ T3072] el0_svc_common+0x138/0x220 [ 33.142339][ T3072] do_el0_svc+0x48/0x164 [ 33.143877][ T3072] el0_svc+0x58/0x150 [ 33.145349][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.147141][ T3072] el0t_64_sync+0x190/0x194 [ 33.148791][ T3072] INITIAL USE at: [ 33.149814][ T3072] lock_acquire+0x100/0x1f8 [ 33.151421][ T3072] _raw_write_lock_bh+0x54/0x6c [ 33.153172][ T3072] sk_common_release+0x58/0x1d4 [ 33.154921][ T3072] udp_lib_close+0x20/0x30 [ 33.156517][ T3072] inet_release+0xc8/0xe4 [ 33.158086][ T3072] inet6_release+0x3c/0x58 [ 33.159700][ T3072] sock_close+0x50/0xf0 [ 33.161256][ T3072] __fput+0x198/0x3e4 [ 33.162741][ T3072] ____fput+0x20/0x30 [ 33.164189][ T3072] task_work_run+0x100/0x148 [ 33.165788][ T3072] do_notify_resume+0x174/0x1f0 [ 33.167491][ T3072] el0_svc+0x9c/0x150 [ 33.169133][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.171087][ T3072] el0t_64_sync+0x190/0x194 [ 33.172854][ T3072] INITIAL READ USE at: [ 33.174115][ T3072] lock_acquire+0x100/0x1f8 [ 33.176008][ T3072] _raw_read_lock_bh+0x64/0x7c [ 33.177995][ T3072] sock_i_uid+0x24/0x58 [ 33.179792][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 33.181799][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 33.183660][ T3072] udp_v6_get_port+0x60/0x74 [ 33.185462][ T3072] __inet6_bind+0x688/0x8ac [ 33.187194][ T3072] inet6_bind+0xf4/0x150 [ 33.188855][ T3072] __sys_bind+0x148/0x1b0 [ 33.190532][ T3072] __arm64_sys_bind+0x28/0x3c [ 33.192457][ T3072] el0_svc_common+0x138/0x220 [ 33.194276][ T3072] do_el0_svc+0x48/0x164 [ 33.195901][ T3072] el0_svc+0x58/0x150 [ 33.197479][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.199313][ T3072] el0t_64_sync+0x190/0x194 [ 33.201009][ T3072] } [ 33.201655][ T3072] ... key at: [] af_callback_keys+0xa0/0x2e0 [ 33.203803][ T3072] ... acquired at: [ 33.204788][ T3072] mark_lock+0x154/0x1b4 [ 33.205974][ T3072] __lock_acquire+0x618/0x3084 [ 33.207259][ T3072] lock_acquire+0x100/0x1f8 [ 33.208508][ T3072] _raw_write_lock+0x54/0x6c [ 33.209756][ T3072] l2tp_tunnel_register+0x354/0x79c [ 33.211198][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 33.212527][ T3072] __sys_connect+0x184/0x190 [ 33.213797][ T3072] __arm64_sys_connect+0x28/0x3c [ 33.215123][ T3072] el0_svc_common+0x138/0x220 [ 33.216416][ T3072] do_el0_svc+0x48/0x164 [ 33.217583][ T3072] el0_svc+0x58/0x150 [ 33.218744][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.220193][ T3072] el0t_64_sync+0x190/0x194 [ 33.221331][ T3072] [ 33.221867][ T3072] [ 33.221867][ T3072] stack backtrace: [ 33.223281][ T3072] CPU: 0 PID: 3072 Comm: syz-executor160 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 33.226119][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 33.228788][ T3072] Call trace: [ 33.229646][ T3072] dump_backtrace+0x1c4/0x1f0 [ 33.230913][ T3072] show_stack+0x2c/0x54 [ 33.232030][ T3072] dump_stack_lvl+0x104/0x16c [ 33.233267][ T3072] dump_stack+0x1c/0x58 [ 33.234349][ T3072] print_irq_inversion_bug+0x2f8/0x300 [ 33.235809][ T3072] mark_lock_irq+0x3ec/0x4b4 [ 33.237000][ T3072] mark_lock+0x154/0x1b4 [ 33.238095][ T3072] __lock_acquire+0x618/0x3084 [ 33.239348][ T3072] lock_acquire+0x100/0x1f8 [ 33.240534][ T3072] _raw_write_lock+0x54/0x6c [ 33.241732][ T3072] l2tp_tunnel_register+0x354/0x79c [ 33.243106][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 33.244358][ T3072] __sys_connect+0x184/0x190 [ 33.245573][ T3072] __arm64_sys_connect+0x28/0x3c [ 33.246875][ T3072] el0_svc_common+0x138/0x220 [ 33.248098][ T3072] do_el0_svc+0x48/0x164 [ 33.249212][ T3072] el0_svc+0x58/0x150 [ 33.250255][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.251583][ T3072] el0t_64_sync+0x190/0x194 [ 33.252907][ T3072] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 33.255492][ T3072] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3072, name: syz-executor160 [ 33.257983][ T3072] preempt_count: 1, expected: 0 [ 33.259164][ T3072] RCU nest depth: 0, expected: 0 [ 33.260453][ T3072] INFO: lockdep is turned off. [ 33.261627][ T3072] Preemption disabled at: [ 33.261632][ T3072] [] l2tp_tunnel_register+0x354/0x79c [ 33.264577][ T3072] CPU: 0 PID: 3072 Comm: syz-executor160 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 33.267185][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 33.269803][ T3072] Call trace: [ 33.270680][ T3072] dump_backtrace+0x1c4/0x1f0 [ 33.271888][ T3072] show_stack+0x2c/0x54 [ 33.272962][ T3072] dump_stack_lvl+0x104/0x16c [ 33.274196][ T3072] dump_stack+0x1c/0x58 [ 33.275242][ T3072] __might_resched+0x208/0x218 [ 33.276431][ T3072] __might_sleep+0x48/0x78 [ 33.277574][ T3072] cpus_read_lock+0x28/0x1e0 [ 33.278730][ T3072] static_key_slow_inc+0x1c/0x38 [ 33.279990][ T3072] udpv6_encap_enable+0x1c/0x28 [ 33.281250][ T3072] setup_udp_tunnel_sock+0xec/0x124 [ 33.282550][ T3072] l2tp_tunnel_register+0x68c/0x79c [ 33.283914][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 33.285171][ T3072] __sys_connect+0x184/0x190 [ 33.286427][ T3072] __arm64_sys_connect+0x28/0x3c [ 33.288589][ T3072] el0_svc_common+0x138/0x220 [ 33.289792][ T3072] do_el0_svc+0x48/0x164 [ 33.290883][ T3072] el0_svc+0x58/0x150 [ 33.291882][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.293198][ T3072] el0t_64_sync+0x190/0x194