./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor150374505 <...> [ 35.239495][ T3209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.272518][ T3209] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 43.232278][ T26] kauditd_printk_skb: 37 callbacks suppressed [ 43.232295][ T26] audit: type=1400 audit(1668740032.401:73): avc: denied { transition } for pid=3419 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 43.261414][ T26] audit: type=1400 audit(1668740032.411:74): avc: denied { write } for pid=3419 comm="sh" path="pipe:[29100]" dev="pipefs" ino=29100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. execve("./syz-executor150374505", ["./syz-executor150374505"], 0x7fff9e2c2810 /* 10 vars */) = 0 brk(NULL) = 0x555556e42000 brk(0x555556e42c40) = 0x555556e42c40 arch_prctl(ARCH_SET_FS, 0x555556e42300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor150374505", 4096) = 27 brk(0x555556e63c40) = 0x555556e63c40 brk(0x555556e64000) = 0x555556e64000 mprotect(0x7f1c89757000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 sendto(4, [{nlmsg_len=32, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x09\x00\x02\x00\x6c\x32\x74\x70\x00\x00\x00\x00"], 32, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 32 recvfrom(4, [{nlmsg_len=276, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=3633}, "\x01\x02\x00\x00\x09\x00\x02\x00\x6c\x32\x74\x70\x00\x00\x00\x00\x06\x00\x01\x00\x30\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x23\x00\x00\x00\xb8\x00\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x00\x00\x00\x00\x08\x00\x02\x00\x0a\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x1a\x00\x00\x00\x14\x00\x03\x00\x08\x00\x01\x00"...], 4096, 0, NULL, NULL) = 276 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3633}, {error=0, msg={nlmsg_len=32, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(4) = 0 sendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x3c\x00\x00\x00\x30\x00\x23\x09\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x05\x00\x07\x00\x00\x00\x00\x00\x08\x00\x09\x00\x00\x00\x00\x00\x06\x00\x02\x00\x01\x00\x00\x00\x08\x00\x0a\x00\x00\x00\x00\x00\x08\x00\x17\x00\xff\xff\xff\xff", iov_len=60}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 60 socket(AF_SMC, SOCK_STREAM, SMCPROTO_SMC) = 4 [ 53.768048][ T26] audit: type=1400 audit(1668740042.941:75): avc: denied { execmem } for pid=3633 comm="syz-executor150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.787886][ T26] audit: type=1400 audit(1668740042.941:76): avc: denied { create } for pid=3633 comm="syz-executor150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.790538][ T3633] [ 53.810185][ T26] audit: type=1400 audit(1668740042.941:77): avc: denied { create } for pid=3630 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 53.812080][ T3633] ===================================================== [ 53.812089][ T3633] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 53.833003][ T26] audit: type=1400 audit(1668740042.941:78): avc: denied { write } for pid=3630 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 53.839610][ T3633] 6.1.0-rc5-syzkaller-00103-g81ac25651a62 #0 Not tainted [ 53.839623][ T3633] ----------------------------------------------------- [ 53.839630][ T3633] syz-executor150/3633 [HC0[0]:SC0[4]:HE1:SE0] is trying to acquire: [ 53.847304][ T26] audit: type=1400 audit(1668740042.941:79): avc: denied { nlmsg_read } for pid=3630 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 53.867608][ T3633] ffff88807ef15038 (k-clock-AF_INET){+++.}-{2:2}, at: sock_i_uid+0x1f/0xb0 [ 53.867683][ T3633] [ 53.867683][ T3633] and this task is already holding: [ 53.867689][ T3633] ffffc9000191e240 [ 53.874834][ T26] audit: type=1400 audit(1668740042.941:80): avc: denied { read } for pid=3630 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 53.881589][ T3633] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2}, at: inet_csk_get_port+0x66a/0x2640 [ 53.889715][ T26] audit: type=1400 audit(1668740042.941:81): avc: denied { write } for pid=3633 comm="syz-executor150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.910616][ T3633] which would create a new lock dependency: [ 53.910623][ T3633] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} -> (k-clock-AF_INET){+++.}-{2:2} [ 53.919260][ T26] audit: type=1400 audit(1668740042.941:82): avc: denied { read } for pid=3633 comm="syz-executor150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.926547][ T3633] [ 53.926557][ T3633] [ 53.926557][ T3633] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 53.926566][ T3633] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} [ 53.926587][ T3633] [ 53.926587][ T3633] ... which became SOFTIRQ-irq-safe at: [ 53.926594][ T3633] lock_acquire+0x1e3/0x630 [ 53.932143][ T26] audit: type=1400 audit(1668740042.961:83): avc: denied { create } for pid=3633 comm="syz-executor150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 53.950749][ T3633] _raw_spin_lock+0x2e/0x40 [ 53.950787][ T3633] __inet_inherit_port+0x297/0x14e0 [ 53.950822][ T3633] tcp_v4_syn_recv_sock+0xb5b/0x14c0 [ 53.962058][ T26] audit: type=1400 audit(1668740042.961:84): avc: denied { bind } for pid=3633 comm="syz-executor150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 53.982117][ T3633] tcp_check_req+0x632/0x1aa0 [ 53.982147][ T3633] tcp_v4_rcv+0x24b4/0x3980 [ 53.982171][ T3633] ip_protocol_deliver_rcu+0x9f/0x7c0 [ 54.116499][ T3633] ip_local_deliver_finish+0x2ec/0x4c0 [ 54.122054][ T3633] ip_local_deliver+0x1ae/0x200 [ 54.126986][ T3633] ip_sublist_rcv_finish+0x9a/0x2c0 [ 54.132263][ T3633] ip_sublist_rcv+0x533/0x980 [ 54.137105][ T3633] ip_list_rcv+0x31e/0x470 [ 54.141624][ T3633] __netif_receive_skb_list_core+0x548/0x8f0 [ 54.147694][ T3633] netif_receive_skb_list_internal+0x75f/0xd90 [ 54.153941][ T3633] napi_complete_done+0x1f5/0x890 [ 54.159044][ T3633] virtnet_poll+0xd08/0x1300 [ 54.163713][ T3633] __napi_poll+0xb8/0x770 [ 54.168138][ T3633] net_rx_action+0xa00/0xde0 [ 54.172800][ T3633] __do_softirq+0x1fb/0xadc [ 54.177376][ T3633] __irq_exit_rcu+0x123/0x180 [ 54.182150][ T3633] irq_exit_rcu+0x9/0x20 [ 54.186477][ T3633] common_interrupt+0xad/0xd0 [ 54.191230][ T3633] asm_common_interrupt+0x26/0x40 [ 54.196325][ T3633] acpi_idle_do_entry+0x1fd/0x2a0 [ 54.201427][ T3633] acpi_idle_enter+0x368/0x510 [ 54.206271][ T3633] cpuidle_enter_state+0x1af/0xd40 [ 54.211456][ T3633] cpuidle_enter+0x4e/0xa0 [ 54.216041][ T3633] do_idle+0x3f7/0x590 [ 54.220183][ T3633] cpu_startup_entry+0x18/0x20 [ 54.225024][ T3633] rest_init+0x16d/0x270 [ 54.229366][ T3633] arch_call_rest_init+0x13/0x1c [ 54.234376][ T3633] start_kernel+0x477/0x498 [ 54.238952][ T3633] secondary_startup_64_no_verify+0xce/0xdb [ 54.244925][ T3633] [ 54.244925][ T3633] to a SOFTIRQ-irq-unsafe lock: [ 54.252023][ T3633] (k-clock-AF_INET){+++.}-{2:2} [ 54.252043][ T3633] [ 54.252043][ T3633] ... which became SOFTIRQ-irq-unsafe at: [ 54.264836][ T3633] ... [ 54.264841][ T3633] lock_acquire+0x1e3/0x630 [ 54.272078][ T3633] _raw_write_lock+0x2e/0x40 [ 54.276748][ T3633] l2tp_tunnel_register+0x126/0x1210 [ 54.282120][ T3633] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 54.287825][ T3633] genl_family_rcv_msg_doit+0x228/0x320 [ 54.293463][ T3633] genl_rcv_msg+0x445/0x780 [ 54.298043][ T3633] netlink_rcv_skb+0x157/0x430 [ 54.302883][ T3633] genl_rcv+0x28/0x40 [ 54.306940][ T3633] netlink_unicast+0x547/0x7f0 [ 54.311785][ T3633] netlink_sendmsg+0x91b/0xe10 [ 54.316622][ T3633] sock_sendmsg+0xd3/0x120 [ 54.321114][ T3633] ____sys_sendmsg+0x712/0x8c0 [ 54.325950][ T3633] ___sys_sendmsg+0x110/0x1b0 [ 54.330702][ T3633] __sys_sendmsg+0xf7/0x1c0 [ 54.335457][ T3633] do_syscall_64+0x39/0xb0 [ 54.339948][ T3633] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 54.345941][ T3633] [ 54.345941][ T3633] other info that might help us debug this: [ 54.345941][ T3633] [ 54.356150][ T3633] Possible interrupt unsafe locking scenario: [ 54.356150][ T3633] [ 54.364448][ T3633] CPU0 CPU1 [ 54.369792][ T3633] ---- ---- [ 54.376098][ T3633] lock(k-clock-AF_INET); [ 54.380500][ T3633] local_irq_disable(); [ 54.387324][ T3633] lock(&tcp_hashinfo.bhash[i].lock); [ 54.395286][ T3633] lock(k-clock-AF_INET); [ 54.402207][ T3633] [ 54.405642][ T3633] lock(&tcp_hashinfo.bhash[i].lock); [ 54.411258][ T3633] [ 54.411258][ T3633] *** DEADLOCK *** [ 54.411258][ T3633] [ 54.419384][ T3633] 3 locks held by syz-executor150/3633: [ 54.424910][ T3633] #0: ffff8880738c8cb0 (sk_lock-AF_SMC){+.+.}-{0:0}, at: smc_bind+0x112/0x390 [ 54.433866][ T3633] #1: ffff88807ef14db0 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: __inet_bind+0x8c3/0xc90 [ 54.443343][ T3633] #2: ffffc9000191e240 (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2}, at: inet_csk_get_port+0x66a/0x2640 [ 54.454289][ T3633] [ 54.454289][ T3633] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 54.464678][ T3633] -> (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} { [ 54.471015][ T3633] HARDIRQ-ON-W at: [ 54.474979][ T3633] lock_acquire+0x1e3/0x630 [ 54.481128][ T3633] _raw_spin_lock_bh+0x33/0x40 [ 54.487536][ T3633] inet_csk_get_port+0x66a/0x2640 [ 54.494201][ T3633] __inet6_bind+0x625/0x1b20 [ 54.500457][ T3633] inet6_bind+0x177/0x220 [ 54.506467][ T3633] rds_tcp_listen_init+0x2a9/0x4e0 [ 54.513241][ T3633] rds_tcp_init_net+0x21d/0x4f0 [ 54.520453][ T3633] ops_init+0xb9/0x680 [ 54.526168][ T3633] register_pernet_operations+0x35a/0x850 [ 54.533724][ T3633] register_pernet_device+0x2a/0x80 [ 54.540571][ T3633] rds_tcp_init+0x65/0xd3 [ 54.546549][ T3633] do_one_initcall+0x141/0x780 [ 54.552957][ T3633] kernel_init_freeable+0x6ff/0x788 [ 54.559796][ T3633] kernel_init+0x1e/0x1d0 [ 54.565775][ T3633] ret_from_fork+0x1f/0x30 [ 54.571846][ T3633] IN-SOFTIRQ-W at: [ 54.575813][ T3633] lock_acquire+0x1e3/0x630 [ 54.581959][ T3633] _raw_spin_lock+0x2e/0x40 [ 54.588118][ T3633] __inet_inherit_port+0x297/0x14e0 [ 54.594972][ T3633] tcp_v4_syn_recv_sock+0xb5b/0x14c0 [ 54.601913][ T3633] tcp_check_req+0x632/0x1aa0 [ 54.608323][ T3633] tcp_v4_rcv+0x24b4/0x3980 [ 54.614466][ T3633] ip_protocol_deliver_rcu+0x9f/0x7c0 [ 54.621479][ T3633] ip_local_deliver_finish+0x2ec/0x4c0 [ 54.628577][ T3633] ip_local_deliver+0x1ae/0x200 [ 54.635077][ T3633] ip_sublist_rcv_finish+0x9a/0x2c0 [ 54.641917][ T3633] ip_sublist_rcv+0x533/0x980 [ 54.648234][ T3633] ip_list_rcv+0x31e/0x470 [ 54.654289][ T3633] __netif_receive_skb_list_core+0x548/0x8f0 [ 54.661912][ T3633] netif_receive_skb_list_internal+0x75f/0xd90 [ 54.669706][ T3633] napi_complete_done+0x1f5/0x890 [ 54.676542][ T3633] virtnet_poll+0xd08/0x1300 [ 54.682770][ T3633] __napi_poll+0xb8/0x770 [ 54.688735][ T3633] net_rx_action+0xa00/0xde0 [ 54.694965][ T3633] __do_softirq+0x1fb/0xadc [ 54.701108][ T3633] __irq_exit_rcu+0x123/0x180 [ 54.707448][ T3633] irq_exit_rcu+0x9/0x20 [ 54.713350][ T3633] common_interrupt+0xad/0xd0 [ 54.719683][ T3633] asm_common_interrupt+0x26/0x40 [ 54.726344][ T3633] acpi_idle_do_entry+0x1fd/0x2a0 [ 54.733009][ T3633] acpi_idle_enter+0x368/0x510 [ 54.739500][ T3633] cpuidle_enter_state+0x1af/0xd40 [ 54.746250][ T3633] cpuidle_enter+0x4e/0xa0 [ 54.752303][ T3633] do_idle+0x3f7/0x590 [ 54.758010][ T3633] cpu_startup_entry+0x18/0x20 [ 54.764496][ T3633] rest_init+0x16d/0x270 [ 54.770378][ T3633] arch_call_rest_init+0x13/0x1c [ 54.776980][ T3633] start_kernel+0x477/0x498 [ 54.783121][ T3633] secondary_startup_64_no_verify+0xce/0xdb [ 54.790656][ T3633] INITIAL USE at: [ 54.794534][ T3633] lock_acquire+0x1e3/0x630 [ 54.800607][ T3633] _raw_spin_lock_bh+0x33/0x40 [ 54.806956][ T3633] inet_csk_get_port+0x66a/0x2640 [ 54.813549][ T3633] __inet6_bind+0x625/0x1b20 [ 54.819698][ T3633] inet6_bind+0x177/0x220 [ 54.825585][ T3633] rds_tcp_listen_init+0x2a9/0x4e0 [ 54.832254][ T3633] rds_tcp_init_net+0x21d/0x4f0 [ 54.838660][ T3633] ops_init+0xb9/0x680 [ 54.844283][ T3633] register_pernet_operations+0x35a/0x850 [ 54.851551][ T3633] register_pernet_device+0x2a/0x80 [ 54.858307][ T3633] rds_tcp_init+0x65/0xd3 [ 54.864192][ T3633] do_one_initcall+0x141/0x780 [ 54.870510][ T3633] kernel_init_freeable+0x6ff/0x788 [ 54.877259][ T3633] kernel_init+0x1e/0x1d0 [ 54.883147][ T3633] ret_from_fork+0x1f/0x30 [ 54.889121][ T3633] } [ 54.891604][ T3633] ... key at: [] __key.1+0x0/0x40 [ 54.898700][ T3633] [ 54.898700][ T3633] the dependencies between the lock to be acquired [ 54.898706][ T3633] and SOFTIRQ-irq-unsafe lock: [ 54.912242][ T3633] -> (k-clock-AF_INET){+++.}-{2:2} { [ 54.917537][ T3633] HARDIRQ-ON-W at: [ 54.921500][ T3633] lock_acquire+0x1e3/0x630 [ 54.927647][ T3633] _raw_write_lock+0x2e/0x40 [ 54.933885][ T3633] l2tp_tunnel_register+0x126/0x1210 [ 54.940815][ T3633] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 54.948086][ T3633] genl_family_rcv_msg_doit+0x228/0x320 [ 54.955273][ T3633] genl_rcv_msg+0x445/0x780 [ 54.961419][ T3633] netlink_rcv_skb+0x157/0x430 [ 54.967822][ T3633] genl_rcv+0x28/0x40 [ 54.973444][ T3633] netlink_unicast+0x547/0x7f0 [ 54.979847][ T3633] netlink_sendmsg+0x91b/0xe10 [ 54.986251][ T3633] sock_sendmsg+0xd3/0x120 [ 54.992308][ T3633] ____sys_sendmsg+0x712/0x8c0 [ 54.998708][ T3633] ___sys_sendmsg+0x110/0x1b0 [ 55.005033][ T3633] __sys_sendmsg+0xf7/0x1c0 [ 55.011201][ T3633] do_syscall_64+0x39/0xb0 [ 55.017253][ T3633] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.024790][ T3633] HARDIRQ-ON-R at: [ 55.028752][ T3633] lock_acquire+0x1e3/0x630 [ 55.034897][ T3633] _raw_read_lock_bh+0x3f/0x70 [ 55.041304][ T3633] sock_i_uid+0x1f/0xb0 [ 55.047107][ T3633] udp_lib_lport_inuse+0x32/0x490 [ 55.053775][ T3633] udp_lib_get_port+0x835/0x18c0 [ 55.060357][ T3633] __inet_bind+0x831/0xc90 [ 55.066414][ T3633] inet_bind+0x177/0x220 [ 55.072314][ T3633] udp_sock_create4+0x1d1/0x490 [ 55.078808][ T3633] rxe_setup_udp_tunnel.constprop.0+0xfc/0x220 [ 55.086606][ T3633] rxe_net_init+0x1f/0xd0 [ 55.092578][ T3633] rxe_module_init+0x10/0x49 [ 55.098805][ T3633] do_one_initcall+0x141/0x780 [ 55.105210][ T3633] kernel_init_freeable+0x6ff/0x788 [ 55.112047][ T3633] kernel_init+0x1e/0x1d0 [ 55.118019][ T3633] ret_from_fork+0x1f/0x30 [ 55.124082][ T3633] SOFTIRQ-ON-W at: [ 55.128049][ T3633] lock_acquire+0x1e3/0x630 [ 55.134196][ T3633] _raw_write_lock+0x2e/0x40 [ 55.140428][ T3633] l2tp_tunnel_register+0x126/0x1210 [ 55.147456][ T3633] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 55.154729][ T3633] genl_family_rcv_msg_doit+0x228/0x320 [ 55.161917][ T3633] genl_rcv_msg+0x445/0x780 [ 55.168061][ T3633] netlink_rcv_skb+0x157/0x430 [ 55.174463][ T3633] genl_rcv+0x28/0x40 [ 55.180103][ T3633] netlink_unicast+0x547/0x7f0 [ 55.186505][ T3633] netlink_sendmsg+0x91b/0xe10 [ 55.192915][ T3633] sock_sendmsg+0xd3/0x120 [ 55.198971][ T3633] ____sys_sendmsg+0x712/0x8c0 [ 55.205375][ T3633] ___sys_sendmsg+0x110/0x1b0 [ 55.211696][ T3633] __sys_sendmsg+0xf7/0x1c0 [ 55.217842][ T3633] do_syscall_64+0x39/0xb0 [ 55.223894][ T3633] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.231432][ T3633] INITIAL USE at: [ 55.235308][ T3633] lock_acquire+0x1e3/0x630 [ 55.241370][ T3633] _raw_write_lock+0x2e/0x40 [ 55.247514][ T3633] l2tp_tunnel_register+0x126/0x1210 [ 55.254378][ T3633] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 55.261575][ T3633] genl_family_rcv_msg_doit+0x228/0x320 [ 55.268680][ T3633] genl_rcv_msg+0x445/0x780 [ 55.274737][ T3633] netlink_rcv_skb+0x157/0x430 [ 55.281054][ T3633] genl_rcv+0x28/0x40 [ 55.286596][ T3633] netlink_unicast+0x547/0x7f0 [ 55.292912][ T3633] netlink_sendmsg+0x91b/0xe10 [ 55.299243][ T3633] sock_sendmsg+0xd3/0x120 [ 55.305209][ T3633] ____sys_sendmsg+0x712/0x8c0 [ 55.311525][ T3633] ___sys_sendmsg+0x110/0x1b0 [ 55.317752][ T3633] __sys_sendmsg+0xf7/0x1c0 [ 55.323809][ T3633] do_syscall_64+0x39/0xb0 [ 55.329775][ T3633] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.337232][ T3633] INITIAL READ USE at: [ 55.341544][ T3633] lock_acquire+0x1e3/0x630 [ 55.348046][ T3633] _raw_read_lock_bh+0x3f/0x70 [ 55.354801][ T3633] sock_i_uid+0x1f/0xb0 [ 55.360944][ T3633] udp_lib_lport_inuse+0x32/0x490 [ 55.367960][ T3633] udp_lib_get_port+0x835/0x18c0 [ 55.374910][ T3633] __inet_bind+0x831/0xc90 [ 55.381315][ T3633] inet_bind+0x177/0x220 [ 55.387543][ T3633] udp_sock_create4+0x1d1/0x490 [ 55.394470][ T3633] rxe_setup_udp_tunnel.constprop.0+0xfc/0x220 [ 55.402635][ T3633] rxe_net_init+0x1f/0xd0 [ 55.408957][ T3633] rxe_module_init+0x10/0x49 [ 55.415532][ T3633] do_one_initcall+0x141/0x780 [ 55.422284][ T3633] kernel_init_freeable+0x6ff/0x788 [ 55.429470][ T3633] kernel_init+0x1e/0x1d0 [ 55.435804][ T3633] ret_from_fork+0x1f/0x30 [ 55.442220][ T3633] } [ 55.444706][ T3633] ... key at: [] af_kern_callback_keys+0x20/0x300 [ 55.453207][ T3633] ... acquired at: [ 55.457005][ T3633] lock_acquire+0x1e3/0x630 [ 55.461765][ T3633] _raw_read_lock_bh+0x3f/0x70 [ 55.466727][ T3633] sock_i_uid+0x1f/0xb0 [ 55.471087][ T3633] inet_bhash2_addr_any_conflict+0x2d/0x460 [ 55.477153][ T3633] inet_csk_get_port+0x1cb2/0x2640 [ 55.482435][ T3633] __inet_bind+0x831/0xc90 [ 55.487019][ T3633] inet_bind+0x177/0x220 [ 55.491605][ T3633] smc_bind+0x2e6/0x390 [ 55.495932][ T3633] __sys_bind+0x1ed/0x260 [ 55.500423][ T3633] __x64_sys_bind+0x73/0xb0 [ 55.505097][ T3633] do_syscall_64+0x39/0xb0 [ 55.509674][ T3633] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.515734][ T3633] [ 55.518040][ T3633] [ 55.518040][ T3633] stack backtrace: [ 55.523908][ T3633] CPU: 1 PID: 3633 Comm: syz-executor150 Not tainted 6.1.0-rc5-syzkaller-00103-g81ac25651a62 #0 [ 55.534450][ T3633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 55.544580][ T3633] Call Trace: [ 55.547847][ T3633] [ 55.550764][ T3633] dump_stack_lvl+0xd1/0x138 [ 55.555353][ T3633] check_irq_usage.cold+0x4e4/0x761 [ 55.560548][ T3633] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 55.567654][ T3633] ? check_path.constprop.0+0x24/0x50 [ 55.573023][ T3633] ? register_lock_class+0xbe/0x1120 [ 55.578304][ T3633] ? _raw_spin_unlock_irqrestore+0x54/0x70 [ 55.584105][ T3633] ? __stack_depot_save+0x264/0x560 [ 55.589394][ T3633] __lock_acquire+0x2a5b/0x56d0 [ 55.594241][ T3633] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 55.600220][ T3633] ? lock_chain_count+0x20/0x20 [ 55.605078][ T3633] ? find_held_lock+0x2d/0x110 [ 55.609851][ T3633] lock_acquire+0x1e3/0x630 [ 55.614346][ T3633] ? sock_i_uid+0x1f/0xb0 [ 55.618665][ T3633] ? rwlock_bug.part.0+0x90/0x90 [ 55.623598][ T3633] ? lock_release+0x810/0x810 [ 55.628267][ T3633] _raw_read_lock_bh+0x3f/0x70 [ 55.633026][ T3633] ? sock_i_uid+0x1f/0xb0 [ 55.637352][ T3633] sock_i_uid+0x1f/0xb0 [ 55.641500][ T3633] inet_bhash2_addr_any_conflict+0x2d/0x460 [ 55.647382][ T3633] inet_csk_get_port+0x1cb2/0x2640 [ 55.652481][ T3633] ? __inet_bind+0x8c3/0xc90 [ 55.657065][ T3633] ? inet_csk_update_fastreuse+0xb30/0xb30 [ 55.662860][ T3633] ? mark_held_locks+0x9f/0xe0 [ 55.667617][ T3633] ? __local_bh_enable_ip+0xa4/0x130 [ 55.672897][ T3633] __inet_bind+0x831/0xc90 [ 55.677307][ T3633] inet_bind+0x177/0x220 [ 55.681539][ T3633] ? __inet_bind+0xc90/0xc90 [ 55.686124][ T3633] ? __local_bh_enable_ip+0xa4/0x130 [ 55.691425][ T3633] smc_bind+0x2e6/0x390 [ 55.695575][ T3633] __sys_bind+0x1ed/0x260 [ 55.699894][ T3633] ? __ia32_sys_socketpair+0x100/0x100 [ 55.705346][ T3633] ? _raw_spin_unlock_irq+0x23/0x50 [ 55.710537][ T3633] ? lockdep_hardirqs_on+0x7d/0x100 [ 55.715724][ T3633] ? _raw_spin_unlock_irq+0x2e/0x50 [ 55.720914][ T3633] __x64_sys_bind+0x73/0xb0 [ 55.725406][ T3633] do_syscall_64+0x39/0xb0 [ 55.729809][ T3633] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.735699][ T3633] RIP: 0033:0x7f1c896eac09 [ 55.740117][ T3633] Code: 28 c3 e8 5a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 55.759729][ T3633] RSP: 002b:00007ffce03f39f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 55.768130][ T3633] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1c896eac09 bind(4, {sa_family=AF_INET, sin_port=htons(20004), sin_addr=inet_addr("224.0.0.1")}, 16) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 55.776088]