[ 9.921219][ T2659] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9.928019][ T2659] eql: remember to turn off Van-Jacobson compression on your slave devices [ 9.953702][ T402] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 9.955375][ T922] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.15.203' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 27.718947][ T3073] [ 27.719554][ T3073] ======================================================== [ 27.721300][ T3073] WARNING: possible irq lock inversion dependency detected [ 27.723119][ T3073] 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 Not tainted [ 27.724927][ T3073] -------------------------------------------------------- [ 27.726782][ T3073] syz-executor189/3073 just changed the state of lock: [ 27.728543][ T3073] ffff0000cb786538 (clock-AF_INET6){+++.}-{2:2}, at: l2tp_tunnel_register+0x354/0x79c [ 27.731024][ T3073] but this lock was taken by another, SOFTIRQ-safe lock in the past: [ 27.733126][ T3073] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} [ 27.733136][ T3073] [ 27.733136][ T3073] [ 27.733136][ T3073] and interrupts could create inverse lock ordering between them. [ 27.733136][ T3073] [ 27.738363][ T3073] [ 27.738363][ T3073] other info that might help us debug this: [ 27.740463][ T3073] Possible interrupt unsafe locking scenario: [ 27.740463][ T3073] [ 27.742601][ T3073] CPU0 CPU1 [ 27.743988][ T3073] ---- ---- [ 27.745367][ T3073] lock(clock-AF_INET6); [ 27.746475][ T3073] local_irq_disable(); [ 27.748220][ T3073] lock(&tcp_hashinfo.bhash[i].lock); [ 27.750280][ T3073] lock(clock-AF_INET6); [ 27.752069][ T3073] [ 27.752948][ T3073] lock(&tcp_hashinfo.bhash[i].lock); [ 27.754370][ T3073] [ 27.754370][ T3073] *** DEADLOCK *** [ 27.754370][ T3073] [ 27.756480][ T3073] 1 lock held by syz-executor189/3073: [ 27.757886][ T3073] #0: ffff0000cb67d930 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0x184/0x6c4 [ 27.760422][ T3073] [ 27.760422][ T3073] the shortest dependencies between 2nd lock and 1st lock: [ 27.762850][ T3073] -> (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} { [ 27.764520][ T3073] HARDIRQ-ON-W at: [ 27.765680][ T3073] lock_acquire+0x100/0x1f8 [ 27.767390][ T3073] _raw_spin_lock_bh+0x54/0x6c [ 27.769083][ T3073] inet_csk_get_port+0xe0/0xaf0 [ 27.770813][ T3073] __inet6_bind+0x688/0x8ac [ 27.772454][ T3073] inet6_bind+0xf4/0x150 [ 27.774047][ T3073] rds_tcp_listen_init+0x14c/0x1f0 [ 27.775894][ T3073] rds_tcp_init_net+0xcc/0x1dc [ 27.777590][ T3073] ops_init+0xe4/0x2e4 [ 27.779115][ T3073] register_pernet_operations+0x108/0x264 [ 27.781058][ T3073] register_pernet_device+0x3c/0x94 [ 27.782918][ T3073] rds_tcp_init+0x74/0xe0 [ 27.784501][ T3073] do_one_initcall+0x118/0x22c [ 27.786194][ T3073] do_initcall_level+0xac/0xe4 [ 27.787898][ T3073] do_initcalls+0x58/0xa8 [ 27.789479][ T3073] do_basic_setup+0x20/0x2c [ 27.791155][ T3073] kernel_init_freeable+0xb8/0x148 [ 27.792941][ T3073] kernel_init+0x24/0x290 [ 27.794557][ T3073] ret_from_fork+0x10/0x20 [ 27.796167][ T3073] IN-SOFTIRQ-W at: [ 27.797205][ T3073] lock_acquire+0x100/0x1f8 [ 27.798825][ T3073] _raw_spin_lock+0x54/0x6c [ 27.800454][ T3073] __inet_inherit_port+0x124/0x9ac [ 27.802270][ T3073] tcp_v4_syn_recv_sock+0x790/0x848 [ 27.804110][ T3073] tcp_check_req+0x75c/0x8e4 [ 27.805767][ T3073] tcp_v4_rcv+0xad4/0x11e8 [ 27.807377][ T3073] ip_protocol_deliver_rcu+0x224/0x414 [ 27.809250][ T3073] ip_local_deliver_finish+0x124/0x200 [ 27.811272][ T3073] ip_local_deliver+0xd0/0xf4 [ 27.812938][ T3073] ip_sublist_rcv+0x40c/0x474 [ 27.814614][ T3073] ip_list_rcv+0x184/0x1c8 [ 27.816229][ T3073] __netif_receive_skb_list_core+0x1f8/0x2b0 [ 27.818258][ T3073] __netif_receive_skb_list+0x16c/0x1d0 [ 27.820164][ T3073] netif_receive_skb_list_internal+0x1e8/0x340 [ 27.822240][ T3073] napi_complete_done+0x140/0x354 [ 27.824013][ T3073] gve_napi_poll+0xcc/0x1b4 [ 27.825639][ T3073] __napi_poll+0x5c/0x24c [ 27.827220][ T3073] napi_poll+0x110/0x484 [ 27.828826][ T3073] net_rx_action+0x18c/0x414 [ 27.830483][ T3073] _stext+0x168/0x37c [ 27.831954][ T3073] ____do_softirq+0x14/0x20 [ 27.833580][ T3073] call_on_irq_stack+0x2c/0x54 [ 27.835281][ T3073] do_softirq_own_stack+0x20/0x2c [ 27.837063][ T3073] invoke_softirq+0x70/0xbc [ 27.838692][ T3073] __irq_exit_rcu+0xf0/0x140 [ 27.840415][ T3073] irq_exit_rcu+0x10/0x40 [ 27.842083][ T3073] el1_interrupt+0x38/0x68 [ 27.843716][ T3073] el1h_64_irq_handler+0x18/0x24 [ 27.845587][ T3073] el1h_64_irq+0x64/0x68 [ 27.847156][ T3073] arch_local_irq_enable+0xc/0x18 [ 27.848915][ T3073] default_idle_call+0x48/0xb8 [ 27.850610][ T3073] do_idle+0x110/0x2d4 [ 27.852183][ T3073] cpu_startup_entry+0x24/0x28 [ 27.853976][ T3073] kernel_init+0x0/0x290 [ 27.855601][ T3073] start_kernel+0x0/0x620 [ 27.857192][ T3073] start_kernel+0x450/0x620 [ 27.858812][ T3073] __primary_switched+0xb4/0xbc [ 27.860524][ T3073] INITIAL USE at: [ 27.861533][ T3073] lock_acquire+0x100/0x1f8 [ 27.863143][ T3073] _raw_spin_lock_bh+0x54/0x6c [ 27.864835][ T3073] inet_csk_get_port+0xe0/0xaf0 [ 27.866531][ T3073] __inet6_bind+0x688/0x8ac [ 27.868130][ T3073] inet6_bind+0xf4/0x150 [ 27.869632][ T3073] rds_tcp_listen_init+0x14c/0x1f0 [ 27.871396][ T3073] rds_tcp_init_net+0xcc/0x1dc [ 27.873106][ T3073] ops_init+0xe4/0x2e4 [ 27.874598][ T3073] register_pernet_operations+0x108/0x264 [ 27.876531][ T3073] register_pernet_device+0x3c/0x94 [ 27.878315][ T3073] rds_tcp_init+0x74/0xe0 [ 27.879871][ T3073] do_one_initcall+0x118/0x22c [ 27.881549][ T3073] do_initcall_level+0xac/0xe4 [ 27.883231][ T3073] do_initcalls+0x58/0xa8 [ 27.884779][ T3073] do_basic_setup+0x20/0x2c [ 27.886401][ T3073] kernel_init_freeable+0xb8/0x148 [ 27.888174][ T3073] kernel_init+0x24/0x290 [ 27.889737][ T3073] ret_from_fork+0x10/0x20 [ 27.891315][ T3073] } [ 27.891979][ T3073] ... key at: [] tcp_init.__key.22+0x0/0x10 [ 27.894058][ T3073] ... acquired at: [ 27.895052][ T3073] _raw_read_lock_bh+0x64/0x7c [ 27.896318][ T3073] sock_i_uid+0x24/0x58 [ 27.897428][ T3073] inet_csk_get_port+0x674/0xaf0 [ 27.898754][ T3073] __inet6_bind+0x688/0x8ac [ 27.899955][ T3073] inet6_bind+0xf4/0x150 [ 27.901080][ T3073] __sys_bind+0x148/0x1b0 [ 27.902242][ T3073] __arm64_sys_bind+0x28/0x3c [ 27.903491][ T3073] el0_svc_common+0x138/0x220 [ 27.904737][ T3073] do_el0_svc+0x48/0x164 [ 27.905898][ T3073] el0_svc+0x58/0x150 [ 27.906962][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 27.908292][ T3073] el0t_64_sync+0x190/0x194 [ 27.909446][ T3073] [ 27.910033][ T3073] -> (clock-AF_INET6){+++.}-{2:2} { [ 27.911369][ T3073] HARDIRQ-ON-W at: [ 27.912373][ T3073] lock_acquire+0x100/0x1f8 [ 27.913963][ T3073] _raw_write_lock_bh+0x54/0x6c [ 27.915670][ T3073] sk_common_release+0x58/0x1d4 [ 27.917358][ T3073] udp_lib_close+0x20/0x30 [ 27.918929][ T3073] inet_release+0xc8/0xe4 [ 27.920462][ T3073] inet6_release+0x3c/0x58 [ 27.922028][ T3073] sock_close+0x50/0xf0 [ 27.923499][ T3073] __fput+0x198/0x3e4 [ 27.924950][ T3073] ____fput+0x20/0x30 [ 27.926385][ T3073] task_work_run+0x100/0x148 [ 27.927987][ T3073] do_notify_resume+0x174/0x1f0 [ 27.929658][ T3073] el0_svc+0x9c/0x150 [ 27.931111][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 27.932791][ T3073] el0t_64_sync+0x190/0x194 [ 27.934365][ T3073] HARDIRQ-ON-R at: [ 27.935382][ T3073] lock_acquire+0x100/0x1f8 [ 27.936979][ T3073] _raw_read_lock_bh+0x64/0x7c [ 27.938623][ T3073] sock_i_uid+0x24/0x58 [ 27.940120][ T3073] udp_lib_lport_inuse+0x44/0x268 [ 27.941870][ T3073] udp_lib_get_port+0x2bc/0x8f8 [ 27.943561][ T3073] udp_v6_get_port+0x60/0x74 [ 27.945226][ T3073] __inet6_bind+0x688/0x8ac [ 27.946802][ T3073] inet6_bind+0xf4/0x150 [ 27.948308][ T3073] __sys_bind+0x148/0x1b0 [ 27.949895][ T3073] __arm64_sys_bind+0x28/0x3c [ 27.951515][ T3073] el0_svc_common+0x138/0x220 [ 27.953183][ T3073] do_el0_svc+0x48/0x164 [ 27.954753][ T3073] el0_svc+0x58/0x150 [ 27.956198][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 27.957907][ T3073] el0t_64_sync+0x190/0x194 [ 27.959514][ T3073] SOFTIRQ-ON-W at: [ 27.960537][ T3073] lock_acquire+0x100/0x1f8 [ 27.962121][ T3073] _raw_write_lock+0x54/0x6c [ 27.963751][ T3073] l2tp_tunnel_register+0x354/0x79c [ 27.965525][ T3073] pppol2tp_connect+0x3e8/0x6c4 [ 27.967237][ T3073] __sys_connect+0x184/0x190 [ 27.968825][ T3073] __arm64_sys_connect+0x28/0x3c [ 27.970541][ T3073] el0_svc_common+0x138/0x220 [ 27.972176][ T3073] do_el0_svc+0x48/0x164 [ 27.973803][ T3073] el0_svc+0x58/0x150 [ 27.975288][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 27.977058][ T3073] el0t_64_sync+0x190/0x194 [ 27.978686][ T3073] INITIAL USE at: [ 27.979637][ T3073] lock_acquire+0x100/0x1f8 [ 27.981209][ T3073] _raw_write_lock_bh+0x54/0x6c [ 27.982869][ T3073] sk_common_release+0x58/0x1d4 [ 27.984585][ T3073] udp_lib_close+0x20/0x30 [ 27.986152][ T3073] inet_release+0xc8/0xe4 [ 27.987670][ T3073] inet6_release+0x3c/0x58 [ 27.989218][ T3073] sock_close+0x50/0xf0 [ 27.990664][ T3073] __fput+0x198/0x3e4 [ 27.992087][ T3073] ____fput+0x20/0x30 [ 27.993538][ T3073] task_work_run+0x100/0x148 [ 27.995148][ T3073] do_notify_resume+0x174/0x1f0 [ 27.996796][ T3073] el0_svc+0x9c/0x150 [ 27.998230][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 27.999931][ T3073] el0t_64_sync+0x190/0x194 [ 28.001541][ T3073] INITIAL READ USE at: [ 28.002732][ T3073] lock_acquire+0x100/0x1f8 [ 28.004513][ T3073] _raw_read_lock_bh+0x64/0x7c [ 28.006247][ T3073] sock_i_uid+0x24/0x58 [ 28.007733][ T3073] udp_lib_lport_inuse+0x44/0x268 [ 28.009544][ T3073] udp_lib_get_port+0x2bc/0x8f8 [ 28.011453][ T3073] udp_v6_get_port+0x60/0x74 [ 28.013291][ T3073] __inet6_bind+0x688/0x8ac [ 28.014980][ T3073] inet6_bind+0xf4/0x150 [ 28.016558][ T3073] __sys_bind+0x148/0x1b0 [ 28.018212][ T3073] __arm64_sys_bind+0x28/0x3c [ 28.019967][ T3073] el0_svc_common+0x138/0x220 [ 28.021977][ T3073] do_el0_svc+0x48/0x164 [ 28.023684][ T3073] el0_svc+0x58/0x150 [ 28.025216][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 28.027010][ T3073] el0t_64_sync+0x190/0x194 [ 28.028699][ T3073] } [ 28.029342][ T3073] ... key at: [] af_callback_keys+0xa0/0x2e0 [ 28.031544][ T3073] ... acquired at: [ 28.032509][ T3073] mark_lock+0x154/0x1b4 [ 28.033614][ T3073] __lock_acquire+0x618/0x3084 [ 28.034881][ T3073] lock_acquire+0x100/0x1f8 [ 28.036070][ T3073] _raw_write_lock+0x54/0x6c [ 28.037326][ T3073] l2tp_tunnel_register+0x354/0x79c [ 28.038734][ T3073] pppol2tp_connect+0x3e8/0x6c4 [ 28.040095][ T3073] __sys_connect+0x184/0x190 [ 28.041479][ T3073] __arm64_sys_connect+0x28/0x3c [ 28.042801][ T3073] el0_svc_common+0x138/0x220 [ 28.044052][ T3073] do_el0_svc+0x48/0x164 [ 28.045148][ T3073] el0_svc+0x58/0x150 [ 28.046249][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 28.047713][ T3073] el0t_64_sync+0x190/0x194 [ 28.048980][ T3073] [ 28.049599][ T3073] [ 28.049599][ T3073] stack backtrace: [ 28.051117][ T3073] CPU: 1 PID: 3073 Comm: syz-executor189 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 28.053811][ T3073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 28.056630][ T3073] Call trace: [ 28.057516][ T3073] dump_backtrace+0x1c4/0x1f0 [ 28.058795][ T3073] show_stack+0x2c/0x54 [ 28.059872][ T3073] dump_stack_lvl+0x104/0x16c [ 28.061179][ T3073] dump_stack+0x1c/0x58 [ 28.062190][ T3073] print_irq_inversion_bug+0x2f8/0x300 [ 28.063759][ T3073] mark_lock_irq+0x3ec/0x4b4 [ 28.065114][ T3073] mark_lock+0x154/0x1b4 [ 28.066441][ T3073] __lock_acquire+0x618/0x3084 [ 28.067773][ T3073] lock_acquire+0x100/0x1f8 [ 28.068986][ T3073] _raw_write_lock+0x54/0x6c [ 28.070163][ T3073] l2tp_tunnel_register+0x354/0x79c [ 28.071489][ T3073] pppol2tp_connect+0x3e8/0x6c4 [ 28.072762][ T3073] __sys_connect+0x184/0x190 [ 28.074096][ T3073] __arm64_sys_connect+0x28/0x3c [ 28.075470][ T3073] el0_svc_common+0x138/0x220 [ 28.076721][ T3073] do_el0_svc+0x48/0x164 [ 28.077819][ T3073] el0_svc+0x58/0x150 [ 28.078839][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 28.080134][ T3073] el0t_64_sync+0x190/0x194 [ 28.081342][ T3073] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 28.083947][ T3073] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3073, name: syz-executor189 [ 28.086339][ T3073] preempt_count: 1, expected: 0 [ 28.087594][ T3073] RCU nest depth: 0, expected: 0 [ 28.088799][ T3073] INFO: lockdep is turned off. [ 28.089976][ T3073] Preemption disabled at: [ 28.089981][ T3073] [] l2tp_tunnel_register+0x354/0x79c [ 28.092879][ T3073] CPU: 1 PID: 3073 Comm: syz-executor189 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 28.095673][ T3073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 28.098171][ T3073] Call trace: [ 28.098974][ T3073] dump_backtrace+0x1c4/0x1f0 [ 28.100280][ T3073] show_stack+0x2c/0x54 [ 28.101359][ T3073] dump_stack_lvl+0x104/0x16c [ 28.102549][ T3073] dump_stack+0x1c/0x58 [ 28.103652][ T3073] __might_resched+0x208/0x218 [ 28.104886][ T3073] __might_sleep+0x48/0x78 [ 28.106019][ T3073] cpus_read_lock+0x28/0x1e0 [ 28.107196][ T3073] static_key_slow_inc+0x1c/0x38 [ 28.108469][ T3073] udpv6_encap_enable+0x1c/0x28 [ 28.109782][ T3073] setup_udp_tunnel_sock+0xec/0x124 [ 28.111109][ T3073] l2tp_tunnel_register+0x68c/0x79c [ 28.112458][ T3073] pppol2tp_connect+0x3e8/0x6c4 [ 28.113724][ T3073] __sys_connect+0x184/0x190 [ 28.114900][ T3073] __arm64_sys_connect+0x28/0x3c [ 28.116195][ T3073] el0_svc_common+0x138/0x220 [ 28.117417][ T3073] do_el0_svc+0x48/0x164 [ 28.118547][ T3073] el0_svc+0x58/0x