[ 9.976820][ T2658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9.986477][ T2658] eql: remember to turn off Van-Jacobson compression on your slave devices [ 10.015616][ T9] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 10.017099][ T2567] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 35.503011][ T3072] [ 35.503649][ T3072] ======================================================== [ 35.505211][ T3072] WARNING: possible irq lock inversion dependency detected [ 35.506870][ T3072] 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 Not tainted [ 35.508531][ T3072] -------------------------------------------------------- [ 35.510227][ T3072] syz-executor548/3072 just changed the state of lock: [ 35.511852][ T3072] ffff0000cba2d638 (clock-AF_INET6){+++.}-{2:2}, at: l2tp_tunnel_register+0x354/0x79c [ 35.514097][ T3072] but this lock was taken by another, SOFTIRQ-safe lock in the past: [ 35.515910][ T3072] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} [ 35.515920][ T3072] [ 35.515920][ T3072] [ 35.515920][ T3072] and interrupts could create inverse lock ordering between them. [ 35.515920][ T3072] [ 35.521133][ T3072] [ 35.521133][ T3072] other info that might help us debug this: [ 35.523108][ T3072] Possible interrupt unsafe locking scenario: [ 35.523108][ T3072] [ 35.525165][ T3072] CPU0 CPU1 [ 35.526453][ T3072] ---- ---- [ 35.527852][ T3072] lock(clock-AF_INET6); [ 35.528915][ T3072] local_irq_disable(); [ 35.530552][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 35.532365][ T3072] lock(clock-AF_INET6); [ 35.534045][ T3072] [ 35.534803][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 35.536087][ T3072] [ 35.536087][ T3072] *** DEADLOCK *** [ 35.536087][ T3072] [ 35.538222][ T3072] 1 lock held by syz-executor548/3072: [ 35.539590][ T3072] #0: ffff0000cba22930 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0x184/0x6c4 [ 35.541988][ T3072] [ 35.541988][ T3072] the shortest dependencies between 2nd lock and 1st lock: [ 35.543890][ T3072] -> (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} { [ 35.545307][ T3072] HARDIRQ-ON-W at: [ 35.546264][ T3072] lock_acquire+0x100/0x1f8 [ 35.547739][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 35.549318][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 35.550974][ T3072] __inet6_bind+0x688/0x8ac [ 35.552447][ T3072] inet6_bind+0xf4/0x150 [ 35.553856][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 35.555684][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 35.557163][ T3072] ops_init+0xe4/0x2e4 [ 35.558234][ T3072] register_pernet_operations+0x108/0x264 [ 35.559617][ T3072] register_pernet_device+0x3c/0x94 [ 35.561384][ T3072] rds_tcp_init+0x74/0xe0 [ 35.562800][ T3072] do_one_initcall+0x118/0x22c [ 35.564369][ T3072] do_initcall_level+0xac/0xe4 [ 35.565822][ T3072] do_initcalls+0x58/0xa8 [ 35.567166][ T3072] do_basic_setup+0x20/0x2c [ 35.568569][ T3072] kernel_init_freeable+0xb8/0x148 [ 35.570211][ T3072] kernel_init+0x24/0x290 [ 35.571683][ T3072] ret_from_fork+0x10/0x20 [ 35.573183][ T3072] IN-SOFTIRQ-W at: [ 35.574099][ T3072] lock_acquire+0x100/0x1f8 [ 35.575636][ T3072] _raw_spin_lock+0x54/0x6c [ 35.577147][ T3072] __inet_inherit_port+0x124/0x9ac [ 35.578840][ T3072] tcp_v4_syn_recv_sock+0x790/0x848 [ 35.580482][ T3072] tcp_check_req+0x75c/0x8e4 [ 35.581998][ T3072] tcp_v4_rcv+0xad4/0x11e8 [ 35.583496][ T3072] ip_protocol_deliver_rcu+0x224/0x414 [ 35.585213][ T3072] ip_local_deliver_finish+0x124/0x200 [ 35.586791][ T3072] ip_local_deliver+0xd0/0xf4 [ 35.588179][ T3072] ip_sublist_rcv+0x40c/0x474 [ 35.589647][ T3072] ip_list_rcv+0x184/0x1c8 [ 35.591223][ T3072] __netif_receive_skb_list_core+0x1f8/0x2b0 [ 35.592905][ T3072] __netif_receive_skb_list+0x16c/0x1d0 [ 35.594416][ T3072] netif_receive_skb_list_internal+0x1e8/0x340 [ 35.595881][ T3072] napi_complete_done+0x140/0x354 [ 35.597211][ T3072] gve_napi_poll+0xcc/0x1b4 [ 35.598708][ T3072] __napi_poll+0x5c/0x24c [ 35.600316][ T3072] napi_poll+0x110/0x484 [ 35.601725][ T3072] net_rx_action+0x18c/0x414 [ 35.603266][ T3072] _stext+0x168/0x37c [ 35.604665][ T3072] ____do_softirq+0x14/0x20 [ 35.606255][ T3072] call_on_irq_stack+0x2c/0x54 [ 35.607765][ T3072] do_softirq_own_stack+0x20/0x2c [ 35.609104][ T3072] invoke_softirq+0x70/0xbc [ 35.610377][ T3072] __irq_exit_rcu+0xf0/0x140 [ 35.611677][ T3072] irq_exit_rcu+0x10/0x40 [ 35.613265][ T3072] el1_interrupt+0x38/0x68 [ 35.614710][ T3072] el1h_64_irq_handler+0x18/0x24 [ 35.616257][ T3072] el1h_64_irq+0x64/0x68 [ 35.617668][ T3072] arch_local_irq_enable+0xc/0x18 [ 35.619367][ T3072] default_idle_call+0x48/0xb8 [ 35.620906][ T3072] do_idle+0x110/0x2d4 [ 35.622045][ T3072] cpu_startup_entry+0x24/0x28 [ 35.623269][ T3072] kernel_init+0x0/0x290 [ 35.624429][ T3072] start_kernel+0x0/0x620 [ 35.625672][ T3072] start_kernel+0x450/0x620 [ 35.627027][ T3072] __primary_switched+0xb4/0xbc [ 35.628627][ T3072] INITIAL USE at: [ 35.629502][ T3072] lock_acquire+0x100/0x1f8 [ 35.630762][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 35.632035][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 35.633468][ T3072] __inet6_bind+0x688/0x8ac [ 35.635039][ T3072] inet6_bind+0xf4/0x150 [ 35.636450][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 35.637737][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 35.639169][ T3072] ops_init+0xe4/0x2e4 [ 35.640621][ T3072] register_pernet_operations+0x108/0x264 [ 35.642117][ T3072] register_pernet_device+0x3c/0x94 [ 35.643885][ T3072] rds_tcp_init+0x74/0xe0 [ 35.645405][ T3072] do_one_initcall+0x118/0x22c [ 35.647029][ T3072] do_initcall_level+0xac/0xe4 [ 35.648638][ T3072] do_initcalls+0x58/0xa8 [ 35.650016][ T3072] do_basic_setup+0x20/0x2c [ 35.651456][ T3072] kernel_init_freeable+0xb8/0x148 [ 35.653125][ T3072] kernel_init+0x24/0x290 [ 35.654572][ T3072] ret_from_fork+0x10/0x20 [ 35.655967][ T3072] } [ 35.656590][ T3072] ... key at: [] tcp_init.__key.22+0x0/0x10 [ 35.658524][ T3072] ... acquired at: [ 35.659456][ T3072] _raw_read_lock_bh+0x64/0x7c [ 35.660716][ T3072] sock_i_uid+0x24/0x58 [ 35.661699][ T3072] inet_csk_get_port+0x674/0xaf0 [ 35.662759][ T3072] __inet6_bind+0x688/0x8ac [ 35.663820][ T3072] inet6_bind+0xf4/0x150 [ 35.664761][ T3072] __sys_bind+0x148/0x1b0 [ 35.665827][ T3072] __arm64_sys_bind+0x28/0x3c [ 35.666951][ T3072] el0_svc_common+0x138/0x220 [ 35.668117][ T3072] do_el0_svc+0x48/0x164 [ 35.669184][ T3072] el0_svc+0x58/0x150 [ 35.670215][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.671496][ T3072] el0t_64_sync+0x190/0x194 [ 35.672551][ T3072] [ 35.673081][ T3072] -> (clock-AF_INET6){+++.}-{2:2} { [ 35.674354][ T3072] HARDIRQ-ON-W at: [ 35.675350][ T3072] lock_acquire+0x100/0x1f8 [ 35.676736][ T3072] _raw_write_lock_bh+0x54/0x6c [ 35.678243][ T3072] sk_common_release+0x58/0x1d4 [ 35.679816][ T3072] udp_lib_close+0x20/0x30 [ 35.681255][ T3072] inet_release+0xc8/0xe4 [ 35.682616][ T3072] inet6_release+0x3c/0x58 [ 35.683950][ T3072] sock_close+0x50/0xf0 [ 35.685270][ T3072] __fput+0x198/0x3e4 [ 35.686630][ T3072] ____fput+0x20/0x30 [ 35.687891][ T3072] task_work_run+0x100/0x148 [ 35.689402][ T3072] do_notify_resume+0x174/0x1f0 [ 35.691080][ T3072] el0_svc+0x9c/0x150 [ 35.692442][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.694084][ T3072] el0t_64_sync+0x190/0x194 [ 35.695516][ T3072] HARDIRQ-ON-R at: [ 35.696522][ T3072] lock_acquire+0x100/0x1f8 [ 35.697825][ T3072] _raw_read_lock_bh+0x64/0x7c [ 35.699209][ T3072] sock_i_uid+0x24/0x58 [ 35.700607][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 35.702327][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 35.703897][ T3072] udp_v6_get_port+0x60/0x74 [ 35.705430][ T3072] __inet6_bind+0x688/0x8ac [ 35.706828][ T3072] inet6_bind+0xf4/0x150 [ 35.708206][ T3072] __sys_bind+0x148/0x1b0 [ 35.709566][ T3072] __arm64_sys_bind+0x28/0x3c [ 35.711096][ T3072] el0_svc_common+0x138/0x220 [ 35.712506][ T3072] do_el0_svc+0x48/0x164 [ 35.713557][ T3072] el0_svc+0x58/0x150 [ 35.714571][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.715770][ T3072] el0t_64_sync+0x190/0x194 [ 35.716895][ T3072] SOFTIRQ-ON-W at: [ 35.717718][ T3072] lock_acquire+0x100/0x1f8 [ 35.719125][ T3072] _raw_write_lock+0x54/0x6c [ 35.720574][ T3072] l2tp_tunnel_register+0x354/0x79c [ 35.722277][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 35.723695][ T3072] __sys_connect+0x184/0x190 [ 35.724931][ T3072] __arm64_sys_connect+0x28/0x3c [ 35.726286][ T3072] el0_svc_common+0x138/0x220 [ 35.727681][ T3072] do_el0_svc+0x48/0x164 [ 35.728992][ T3072] el0_svc+0x58/0x150 [ 35.730256][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.732022][ T3072] el0t_64_sync+0x190/0x194 [ 35.733447][ T3072] INITIAL USE at: [ 35.734210][ T3072] lock_acquire+0x100/0x1f8 [ 35.735623][ T3072] _raw_write_lock_bh+0x54/0x6c [ 35.737358][ T3072] sk_common_release+0x58/0x1d4 [ 35.738969][ T3072] udp_lib_close+0x20/0x30 [ 35.740316][ T3072] inet_release+0xc8/0xe4 [ 35.741832][ T3072] inet6_release+0x3c/0x58 [ 35.743374][ T3072] sock_close+0x50/0xf0 [ 35.744978][ T3072] __fput+0x198/0x3e4 [ 35.746507][ T3072] ____fput+0x20/0x30 [ 35.747579][ T3072] task_work_run+0x100/0x148 [ 35.748730][ T3072] do_notify_resume+0x174/0x1f0 [ 35.750116][ T3072] el0_svc+0x9c/0x150 [ 35.751483][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.753022][ T3072] el0t_64_sync+0x190/0x194 [ 35.754467][ T3072] INITIAL READ USE at: [ 35.755536][ T3072] lock_acquire+0x100/0x1f8 [ 35.757195][ T3072] _raw_read_lock_bh+0x64/0x7c [ 35.758701][ T3072] sock_i_uid+0x24/0x58 [ 35.760250][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 35.761896][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 35.763567][ T3072] udp_v6_get_port+0x60/0x74 [ 35.765223][ T3072] __inet6_bind+0x688/0x8ac [ 35.766806][ T3072] inet6_bind+0xf4/0x150 [ 35.768271][ T3072] __sys_bind+0x148/0x1b0 [ 35.769727][ T3072] __arm64_sys_bind+0x28/0x3c [ 35.771233][ T3072] el0_svc_common+0x138/0x220 [ 35.772799][ T3072] do_el0_svc+0x48/0x164 [ 35.774352][ T3072] el0_svc+0x58/0x150 [ 35.775618][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.777588][ T3072] el0t_64_sync+0x190/0x194 [ 35.779144][ T3072] } [ 35.779764][ T3072] ... key at: [] af_callback_keys+0xa0/0x2e0 [ 35.781723][ T3072] ... acquired at: [ 35.782604][ T3072] mark_lock+0x154/0x1b4 [ 35.783589][ T3072] __lock_acquire+0x618/0x3084 [ 35.784696][ T3072] lock_acquire+0x100/0x1f8 [ 35.785660][ T3072] _raw_write_lock+0x54/0x6c [ 35.786589][ T3072] l2tp_tunnel_register+0x354/0x79c [ 35.787784][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 35.788731][ T3072] __sys_connect+0x184/0x190 [ 35.789702][ T3072] __arm64_sys_connect+0x28/0x3c [ 35.790723][ T3072] el0_svc_common+0x138/0x220 [ 35.791804][ T3072] do_el0_svc+0x48/0x164 [ 35.792824][ T3072] el0_svc+0x58/0x150 [ 35.793848][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.795129][ T3072] el0t_64_sync+0x190/0x194 [ 35.796202][ T3072] [ 35.796758][ T3072] [ 35.796758][ T3072] stack backtrace: [ 35.798077][ T3072] CPU: 0 PID: 3072 Comm: syz-executor548 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 35.799971][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 35.801962][ T3072] Call trace: [ 35.802763][ T3072] dump_backtrace+0x1c4/0x1f0 [ 35.803807][ T3072] show_stack+0x2c/0x54 [ 35.804758][ T3072] dump_stack_lvl+0x104/0x16c [ 35.805877][ T3072] dump_stack+0x1c/0x58 [ 35.806896][ T3072] print_irq_inversion_bug+0x2f8/0x300 [ 35.808270][ T3072] mark_lock_irq+0x3ec/0x4b4 [ 35.809299][ T3072] mark_lock+0x154/0x1b4 [ 35.810344][ T3072] __lock_acquire+0x618/0x3084 [ 35.811436][ T3072] lock_acquire+0x100/0x1f8 [ 35.812650][ T3072] _raw_write_lock+0x54/0x6c [ 35.813758][ T3072] l2tp_tunnel_register+0x354/0x79c [ 35.814752][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 35.815689][ T3072] __sys_connect+0x184/0x190 [ 35.816694][ T3072] __arm64_sys_connect+0x28/0x3c [ 35.817852][ T3072] el0_svc_common+0x138/0x220 [ 35.819017][ T3072] do_el0_svc+0x48/0x164 [ 35.819985][ T3072] el0_svc+0x58/0x150 [ 35.820940][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.822222][ T3072] el0t_64_sync+0x190/0x194 [ 35.823537][ T3072] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 35.825253][ T3072] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3072, name: syz-executor548 [ 35.826861][ T3072] preempt_count: 1, expected: 0 [ 35.827851][ T3072] RCU nest depth: 0, expected: 0 [ 35.829012][ T3072] INFO: lockdep is turned off. [ 35.830118][ T3072] Preemption disabled at: [ 35.830123][ T3072] [] l2tp_tunnel_register+0x354/0x79c [ 35.832705][ T3072] CPU: 0 PID: 3072 Comm: syz-executor548 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 35.834856][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 35.836703][ T3072] Call trace: [ 35.837365][ T3072] dump_backtrace+0x1c4/0x1f0 [ 35.838268][ T3072] show_stack+0x2c/0x54 [ 35.839228][ T3072] dump_stack_lvl+0x104/0x16c [ 35.840239][ T3072] dump_stack+0x1c/0x58 [ 35.841144][ T3072] __might_resched+0x208/0x218 [ 35.842155][ T3072] __might_sleep+0x48/0x78 [ 35.843154][ T3072] cpus_read_lock+0x28/0x1e0 [ 35.844321][ T3072] static_key_slow_inc+0x1c/0x38 [ 35.845484][ T3072] udpv6_encap_enable+0x1c/0x28 [ 35.846629][ T3072] setup_udp_tunnel_sock+0xec/0x124 [ 35.848034][ T3072] l2tp_tunnel_register+0x68c/0x79c [ 35.849065][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 35.849992][ T3072] __sys_connect+0x184/0x190 [ 35.850875][ T3072] __arm64_sys_connect+0x28/0x3c [ 35.851920][ T3072] el0_svc_common+0x138/0x220 [ 35.852972][ T3072] do_el0_svc+0x48/0x164 [ 35.853968][ T3072] el0_svc+0x58/0x150 [ 35.854879][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 35.855918][ T3072] el0t_64_sync+0x190/0x194