[ 10.012000][ T2657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 10.016290][ T2657] eql: remember to turn off Van-Jacobson compression on your slave devices [ 10.044633][ T1018] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 10.047794][ T2567] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.96' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 33.777437][ T3072] [ 33.778157][ T3072] ======================================================== [ 33.780103][ T3072] WARNING: possible irq lock inversion dependency detected [ 33.782043][ T3072] 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 Not tainted [ 33.783917][ T3072] -------------------------------------------------------- [ 33.785818][ T3072] syz-executor139/3072 just changed the state of lock: [ 33.787662][ T3072] ffff0000cb29e538 (clock-AF_INET6){+++.}-{2:2}, at: l2tp_tunnel_register+0x354/0x79c [ 33.790244][ T3072] but this lock was taken by another, SOFTIRQ-safe lock in the past: [ 33.792408][ T3072] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} [ 33.792418][ T3072] [ 33.792418][ T3072] [ 33.792418][ T3072] and interrupts could create inverse lock ordering between them. [ 33.792418][ T3072] [ 33.797844][ T3072] [ 33.797844][ T3072] other info that might help us debug this: [ 33.799961][ T3072] Possible interrupt unsafe locking scenario: [ 33.799961][ T3072] [ 33.802227][ T3072] CPU0 CPU1 [ 33.803630][ T3072] ---- ---- [ 33.805016][ T3072] lock(clock-AF_INET6); [ 33.806141][ T3072] local_irq_disable(); [ 33.807958][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 33.810051][ T3072] lock(clock-AF_INET6); [ 33.811866][ T3072] [ 33.812759][ T3072] lock(&tcp_hashinfo.bhash[i].lock); [ 33.814271][ T3072] [ 33.814271][ T3072] *** DEADLOCK *** [ 33.814271][ T3072] [ 33.816526][ T3072] 1 lock held by syz-executor139/3072: [ 33.817982][ T3072] #0: ffff0000cb26d930 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0x184/0x6c4 [ 33.820626][ T3072] [ 33.820626][ T3072] the shortest dependencies between 2nd lock and 1st lock: [ 33.823254][ T3072] -> (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} { [ 33.824963][ T3072] HARDIRQ-ON-W at: [ 33.825905][ T3072] lock_acquire+0x100/0x1f8 [ 33.827521][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 33.829623][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 33.831438][ T3072] __inet6_bind+0x688/0x8ac [ 33.833135][ T3072] inet6_bind+0xf4/0x150 [ 33.834843][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 33.836718][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 33.838631][ T3072] ops_init+0xe4/0x2e4 [ 33.840217][ T3072] register_pernet_operations+0x108/0x264 [ 33.842380][ T3072] register_pernet_device+0x3c/0x94 [ 33.844412][ T3072] rds_tcp_init+0x74/0xe0 [ 33.846111][ T3072] do_one_initcall+0x118/0x22c [ 33.847853][ T3072] do_initcall_level+0xac/0xe4 [ 33.849603][ T3072] do_initcalls+0x58/0xa8 [ 33.851233][ T3072] do_basic_setup+0x20/0x2c [ 33.852924][ T3072] kernel_init_freeable+0xb8/0x148 [ 33.854889][ T3072] kernel_init+0x24/0x290 [ 33.856519][ T3072] ret_from_fork+0x10/0x20 [ 33.858199][ T3072] IN-SOFTIRQ-W at: [ 33.859268][ T3072] lock_acquire+0x100/0x1f8 [ 33.861119][ T3072] _raw_spin_lock+0x54/0x6c [ 33.862781][ T3072] __inet_inherit_port+0x124/0x9ac [ 33.864704][ T3072] tcp_v4_syn_recv_sock+0x790/0x848 [ 33.866536][ T3072] tcp_check_req+0x75c/0x8e4 [ 33.868260][ T3072] tcp_v4_rcv+0xad4/0x11e8 [ 33.869905][ T3072] ip_protocol_deliver_rcu+0x224/0x414 [ 33.871831][ T3072] ip_local_deliver_finish+0x124/0x200 [ 33.873768][ T3072] ip_local_deliver+0xd0/0xf4 [ 33.875533][ T3072] ip_sublist_rcv+0x40c/0x474 [ 33.877436][ T3072] ip_list_rcv+0x184/0x1c8 [ 33.879080][ T3072] __netif_receive_skb_list_core+0x1f8/0x2b0 [ 33.881136][ T3072] __netif_receive_skb_list+0x16c/0x1d0 [ 33.883078][ T3072] netif_receive_skb_list_internal+0x1e8/0x340 [ 33.885185][ T3072] napi_complete_done+0x140/0x354 [ 33.886827][ T3072] gve_napi_poll+0xcc/0x1b4 [ 33.888365][ T3072] __napi_poll+0x5c/0x24c [ 33.890186][ T3072] napi_poll+0x110/0x484 [ 33.891806][ T3072] net_rx_action+0x18c/0x414 [ 33.893678][ T3072] _stext+0x168/0x37c [ 33.895216][ T3072] ____do_softirq+0x14/0x20 [ 33.896886][ T3072] call_on_irq_stack+0x2c/0x54 [ 33.898618][ T3072] do_softirq_own_stack+0x20/0x2c [ 33.900418][ T3072] invoke_softirq+0x70/0xbc [ 33.902109][ T3072] __irq_exit_rcu+0xf0/0x140 [ 33.903889][ T3072] irq_exit_rcu+0x10/0x40 [ 33.905511][ T3072] el1_interrupt+0x38/0x68 [ 33.907197][ T3072] el1h_64_irq_handler+0x18/0x24 [ 33.908979][ T3072] el1h_64_irq+0x64/0x68 [ 33.910617][ T3072] arch_local_irq_enable+0xc/0x18 [ 33.912423][ T3072] default_idle_call+0x48/0xb8 [ 33.914173][ T3072] do_idle+0x110/0x2d4 [ 33.915976][ T3072] cpu_startup_entry+0x24/0x28 [ 33.917724][ T3072] kernel_init+0x0/0x290 [ 33.919341][ T3072] start_kernel+0x0/0x620 [ 33.920987][ T3072] start_kernel+0x450/0x620 [ 33.922645][ T3072] __primary_switched+0xb4/0xbc [ 33.924749][ T3072] INITIAL USE at: [ 33.925869][ T3072] lock_acquire+0x100/0x1f8 [ 33.927540][ T3072] _raw_spin_lock_bh+0x54/0x6c [ 33.929320][ T3072] inet_csk_get_port+0xe0/0xaf0 [ 33.931059][ T3072] __inet6_bind+0x688/0x8ac [ 33.932674][ T3072] inet6_bind+0xf4/0x150 [ 33.934340][ T3072] rds_tcp_listen_init+0x14c/0x1f0 [ 33.936034][ T3072] rds_tcp_init_net+0xcc/0x1dc [ 33.937584][ T3072] ops_init+0xe4/0x2e4 [ 33.939173][ T3072] register_pernet_operations+0x108/0x264 [ 33.941197][ T3072] register_pernet_device+0x3c/0x94 [ 33.943066][ T3072] rds_tcp_init+0x74/0xe0 [ 33.944813][ T3072] do_one_initcall+0x118/0x22c [ 33.946537][ T3072] do_initcall_level+0xac/0xe4 [ 33.948256][ T3072] do_initcalls+0x58/0xa8 [ 33.949875][ T3072] do_basic_setup+0x20/0x2c [ 33.951545][ T3072] kernel_init_freeable+0xb8/0x148 [ 33.953358][ T3072] kernel_init+0x24/0x290 [ 33.954973][ T3072] ret_from_fork+0x10/0x20 [ 33.956619][ T3072] } [ 33.957315][ T3072] ... key at: [] tcp_init.__key.22+0x0/0x10 [ 33.959451][ T3072] ... acquired at: [ 33.960464][ T3072] _raw_read_lock_bh+0x64/0x7c [ 33.961745][ T3072] sock_i_uid+0x24/0x58 [ 33.962884][ T3072] inet_csk_get_port+0x674/0xaf0 [ 33.964366][ T3072] __inet6_bind+0x688/0x8ac [ 33.965610][ T3072] inet6_bind+0xf4/0x150 [ 33.966749][ T3072] __sys_bind+0x148/0x1b0 [ 33.967928][ T3072] __arm64_sys_bind+0x28/0x3c [ 33.969202][ T3072] el0_svc_common+0x138/0x220 [ 33.970509][ T3072] do_el0_svc+0x48/0x164 [ 33.971672][ T3072] el0_svc+0x58/0x150 [ 33.972782][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 33.974156][ T3072] el0t_64_sync+0x190/0x194 [ 33.975422][ T3072] [ 33.976011][ T3072] -> (clock-AF_INET6){+++.}-{2:2} { [ 33.977387][ T3072] HARDIRQ-ON-W at: [ 33.978427][ T3072] lock_acquire+0x100/0x1f8 [ 33.980050][ T3072] _raw_write_lock_bh+0x54/0x6c [ 33.981786][ T3072] sk_common_release+0x58/0x1d4 [ 33.983591][ T3072] udp_lib_close+0x20/0x30 [ 33.985248][ T3072] inet_release+0xc8/0xe4 [ 33.986843][ T3072] inet6_release+0x3c/0x58 [ 33.988486][ T3072] sock_close+0x50/0xf0 [ 33.990200][ T3072] __fput+0x198/0x3e4 [ 33.991678][ T3072] ____fput+0x20/0x30 [ 33.993165][ T3072] task_work_run+0x100/0x148 [ 33.995076][ T3072] do_notify_resume+0x174/0x1f0 [ 33.996825][ T3072] el0_svc+0x9c/0x150 [ 33.998336][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.000199][ T3072] el0t_64_sync+0x190/0x194 [ 34.001704][ T3072] HARDIRQ-ON-R at: [ 34.002652][ T3072] lock_acquire+0x100/0x1f8 [ 34.004131][ T3072] _raw_read_lock_bh+0x64/0x7c [ 34.005809][ T3072] sock_i_uid+0x24/0x58 [ 34.007372][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 34.009164][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 34.010869][ T3072] udp_v6_get_port+0x60/0x74 [ 34.012516][ T3072] __inet6_bind+0x688/0x8ac [ 34.014155][ T3072] inet6_bind+0xf4/0x150 [ 34.015736][ T3072] __sys_bind+0x148/0x1b0 [ 34.017315][ T3072] __arm64_sys_bind+0x28/0x3c [ 34.019003][ T3072] el0_svc_common+0x138/0x220 [ 34.020737][ T3072] do_el0_svc+0x48/0x164 [ 34.022320][ T3072] el0_svc+0x58/0x150 [ 34.023987][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.025781][ T3072] el0t_64_sync+0x190/0x194 [ 34.027415][ T3072] SOFTIRQ-ON-W at: [ 34.028459][ T3072] lock_acquire+0x100/0x1f8 [ 34.030091][ T3072] _raw_write_lock+0x54/0x6c [ 34.031844][ T3072] l2tp_tunnel_register+0x354/0x79c [ 34.033650][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 34.035445][ T3072] __sys_connect+0x184/0x190 [ 34.037119][ T3072] __arm64_sys_connect+0x28/0x3c [ 34.038952][ T3072] el0_svc_common+0x138/0x220 [ 34.040634][ T3072] do_el0_svc+0x48/0x164 [ 34.042205][ T3072] el0_svc+0x58/0x150 [ 34.043841][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.045628][ T3072] el0t_64_sync+0x190/0x194 [ 34.047322][ T3072] INITIAL USE at: [ 34.048345][ T3072] lock_acquire+0x100/0x1f8 [ 34.049982][ T3072] _raw_write_lock_bh+0x54/0x6c [ 34.051681][ T3072] sk_common_release+0x58/0x1d4 [ 34.053379][ T3072] udp_lib_close+0x20/0x30 [ 34.055006][ T3072] inet_release+0xc8/0xe4 [ 34.056650][ T3072] inet6_release+0x3c/0x58 [ 34.058291][ T3072] sock_close+0x50/0xf0 [ 34.059878][ T3072] __fput+0x198/0x3e4 [ 34.061375][ T3072] ____fput+0x20/0x30 [ 34.062868][ T3072] task_work_run+0x100/0x148 [ 34.064495][ T3072] do_notify_resume+0x174/0x1f0 [ 34.066181][ T3072] el0_svc+0x9c/0x150 [ 34.067660][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.069439][ T3072] el0t_64_sync+0x190/0x194 [ 34.071011][ T3072] INITIAL READ USE at: [ 34.072164][ T3072] lock_acquire+0x100/0x1f8 [ 34.073886][ T3072] _raw_read_lock_bh+0x64/0x7c [ 34.075655][ T3072] sock_i_uid+0x24/0x58 [ 34.077304][ T3072] udp_lib_lport_inuse+0x44/0x268 [ 34.079133][ T3072] udp_lib_get_port+0x2bc/0x8f8 [ 34.080917][ T3072] udp_v6_get_port+0x60/0x74 [ 34.082720][ T3072] __inet6_bind+0x688/0x8ac [ 34.084480][ T3072] inet6_bind+0xf4/0x150 [ 34.086173][ T3072] __sys_bind+0x148/0x1b0 [ 34.087845][ T3072] __arm64_sys_bind+0x28/0x3c [ 34.089642][ T3072] el0_svc_common+0x138/0x220 [ 34.091443][ T3072] do_el0_svc+0x48/0x164 [ 34.092923][ T3072] el0_svc+0x58/0x150 [ 34.094356][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.096262][ T3072] el0t_64_sync+0x190/0x194 [ 34.098058][ T3072] } [ 34.098698][ T3072] ... key at: [] af_callback_keys+0xa0/0x2e0 [ 34.100890][ T3072] ... acquired at: [ 34.101918][ T3072] mark_lock+0x154/0x1b4 [ 34.103056][ T3072] __lock_acquire+0x618/0x3084 [ 34.104408][ T3072] lock_acquire+0x100/0x1f8 [ 34.105648][ T3072] _raw_write_lock+0x54/0x6c [ 34.106931][ T3072] l2tp_tunnel_register+0x354/0x79c [ 34.108407][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 34.109890][ T3072] __sys_connect+0x184/0x190 [ 34.111154][ T3072] __arm64_sys_connect+0x28/0x3c [ 34.112521][ T3072] el0_svc_common+0x138/0x220 [ 34.113918][ T3072] do_el0_svc+0x48/0x164 [ 34.115076][ T3072] el0_svc+0x58/0x150 [ 34.116183][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.117535][ T3072] el0t_64_sync+0x190/0x194 [ 34.118797][ T3072] [ 34.119437][ T3072] [ 34.119437][ T3072] stack backtrace: [ 34.121035][ T3072] CPU: 0 PID: 3072 Comm: syz-executor139 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 34.123824][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 34.126573][ T3072] Call trace: [ 34.127349][ T3072] dump_backtrace+0x1c4/0x1f0 [ 34.128551][ T3072] show_stack+0x2c/0x54 [ 34.129826][ T3072] dump_stack_lvl+0x104/0x16c [ 34.131086][ T3072] dump_stack+0x1c/0x58 [ 34.132201][ T3072] print_irq_inversion_bug+0x2f8/0x300 [ 34.133804][ T3072] mark_lock_irq+0x3ec/0x4b4 [ 34.134988][ T3072] mark_lock+0x154/0x1b4 [ 34.136098][ T3072] __lock_acquire+0x618/0x3084 [ 34.137323][ T3072] lock_acquire+0x100/0x1f8 [ 34.138642][ T3072] _raw_write_lock+0x54/0x6c [ 34.139889][ T3072] l2tp_tunnel_register+0x354/0x79c [ 34.141304][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 34.142584][ T3072] __sys_connect+0x184/0x190 [ 34.143847][ T3072] __arm64_sys_connect+0x28/0x3c [ 34.145270][ T3072] el0_svc_common+0x138/0x220 [ 34.146645][ T3072] do_el0_svc+0x48/0x164 [ 34.147779][ T3072] el0_svc+0x58/0x150 [ 34.148829][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.150171][ T3072] el0t_64_sync+0x190/0x194 [ 34.151535][ T3072] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 34.154099][ T3072] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3072, name: syz-executor139 [ 34.156570][ T3072] preempt_count: 1, expected: 0 [ 34.157617][ T3072] RCU nest depth: 0, expected: 0 [ 34.158682][ T3072] INFO: lockdep is turned off. [ 34.159818][ T3072] Preemption disabled at: [ 34.159823][ T3072] [] l2tp_tunnel_register+0x354/0x79c [ 34.162649][ T3072] CPU: 0 PID: 3072 Comm: syz-executor139 Not tainted 6.1.0-rc6-syzkaller-32653-g65762d97e6fa #0 [ 34.165241][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 34.167784][ T3072] Call trace: [ 34.168609][ T3072] dump_backtrace+0x1c4/0x1f0 [ 34.169813][ T3072] show_stack+0x2c/0x54 [ 34.170958][ T3072] dump_stack_lvl+0x104/0x16c [ 34.172201][ T3072] dump_stack+0x1c/0x58 [ 34.173264][ T3072] __might_resched+0x208/0x218 [ 34.174461][ T3072] __might_sleep+0x48/0x78 [ 34.175622][ T3072] cpus_read_lock+0x28/0x1e0 [ 34.176851][ T3072] static_key_slow_inc+0x1c/0x38 [ 34.178105][ T3072] udpv6_encap_enable+0x1c/0x28 [ 34.179339][ T3072] setup_udp_tunnel_sock+0xec/0x124 [ 34.180850][ T3072] l2tp_tunnel_register+0x68c/0x79c [ 34.182183][ T3072] pppol2tp_connect+0x3e8/0x6c4 [ 34.183508][ T3072] __sys_connect+0x184/0x190 [ 34.184760][ T3072] __arm64_sys_connect+0x28/0x3c [ 34.186147][ T3072] el0_svc_common+0x138/0x220 [ 34.187357][ T3072] do_el0_svc+0x48/0x164 [ 34.188424][ T3072] el0_svc+0x58/0x150 [ 34.189428][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 34.190682][ T3072] el0t_64_sync+0x190/0x194