------------[ cut here ]------------ DEBUG_LOCKS_WARN_ON(!test_bit(class_idx, lock_classes_in_use)) WARNING: CPU: 1 PID: 3072 at kernel/locking/lockdep.c:5023 __lock_acquire+0x2784/0x30a4 Modules linked in: CPU: 1 PID: 3072 Comm: syz-executor.2 Not tainted 6.0.0-rc6-syzkaller-17742-gc194837ebb57 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __lock_acquire+0x2784/0x30a4 lr : __lock_acquire+0x2780/0x30a4 kernel/locking/lockdep.c:5023 sp : ffff800012763720 x29: ffff800012763800 x28: 0000000000000001 x27: ffff0000c3d9cfa8 x26: ffff0000c3d9d9b8 x25: ffff0000c3d9d9d8 x24: ffff0000c3d9d9d8 x23: 00000000000000c0 x22: 0000000000000001 x21: 0000000000000000 x20: ffff0000c3d9cf80 x19: aaaaaa000147a39e x18: 0000000000000260 x17: 0000000000000008 x16: 0000000000000001 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000012 x12: ffff80000d5ef920 x11: ff808000081c1630 x10: 0000000000000000 x9 : 1886b392ec156700 x8 : 1886b392ec156700 x7 : 4e5241575f534b43 x6 : ffff800008195d30 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000100000001 x0 : 0000000000000000 Call trace: __lock_acquire+0x2784/0x30a4 lock_acquire+0x100/0x1f8 kernel/locking/lockdep.c:5666 __mutex_lock_common+0xd4/0xca8 kernel/locking/mutex.c:603 __mutex_lock kernel/locking/mutex.c:747 [inline] mutex_lock_nested+0x38/0x44 kernel/locking/mutex.c:799 tee_netdev_event+0x54/0x1a8 net/netfilter/xt_TEE.c:68 notifier_call_chain kernel/notifier.c:87 [inline] raw_notifier_call_chain+0x7c/0x108 kernel/notifier.c:455 call_netdevice_notifiers_info net/core/dev.c:1945 [inline] call_netdevice_notifiers_extack net/core/dev.c:1983 [inline] call_netdevice_notifiers net/core/dev.c:1997 [inline] netdev_wait_allrefs_any net/core/dev.c:10250 [inline] netdev_run_todo+0x340/0x6f0 net/core/dev.c:10364 rtnl_unlock+0x14/0x20 net/core/rtnetlink.c:147 tun_detach drivers/net/tun.c:704 [inline] tun_chr_close+0xe8/0xfc drivers/net/tun.c:3455 __fput+0x198/0x3dc fs/file_table.c:320 ____fput+0x20/0x30 fs/file_table.c:353 task_work_run+0xc4/0x14c kernel/task_work.c:177 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x26c/0xbe0 kernel/exit.c:795 do_group_exit+0x70/0xe8 kernel/exit.c:925 get_signal+0xb0c/0xb40 kernel/signal.c:2857 do_signal+0x128/0x438 arch/arm64/kernel/signal.c:1071 do_notify_resume+0xc0/0x1f0 arch/arm64/kernel/signal.c:1124 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline] el0_svc+0x9c/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 irq event stamp: 7433533 hardirqs last enabled at (7433533): [] __local_bh_enable_ip+0x13c/0x1a4 kernel/softirq.c:401 hardirqs last disabled at (7433531): [] __local_bh_enable_ip+0xc4/0x1a4 kernel/softirq.c:378 softirqs last enabled at (7433532): [] spin_unlock_bh include/linux/spinlock.h:394 [inline] softirqs last enabled at (7433532): [] rt_flush_dev+0x32c/0x374 net/ipv4/route.c:1557 softirqs last disabled at (7433530): [] spin_lock_bh include/linux/spinlock.h:354 [inline] softirqs last disabled at (7433530): [] rt_flush_dev+0x114/0x374 net/ipv4/route.c:1548 ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3072 at net/ipv6/ip6_fib.c:2068 fib6_walk_continue+0x278/0x2b0 net/ipv6/ip6_fib.c:2068 Modules linked in: CPU: 0 PID: 3072 Comm: syz-executor.2 Tainted: G W 6.0.0-rc6-syzkaller-17742-gc194837ebb57 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : fib6_walk_continue+0x278/0x2b0 net/ipv6/ip6_fib.c:2068 lr : fib6_walk_continue+0x278/0x2b0 net/ipv6/ip6_fib.c:2068 sp : ffff800012763790 x29: ffff800012763790 x28: 0000000000000000 x27: ffff00010372e800 x26: ffff0000fefdbf90 x25: ffff00010372e818 x24: ffff0000fefdbf90 x23: ffff0000fefdbfa0 x22: ffff0000fefdb500 x21: ffff80000b768bd4 x20: 0000000000000000 x19: ffff8000127637f8 x18: 00000000000002fe x17: ffff80000bffd6bc x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000015 x12: ffff80000d821f30 x11: ff8080000b77c8c0 x10: 0000000000000000 x9 : ffff80000b77c8c0 x8 : ffff0000c3d9cf80 x7 : 0000000000000000 x6 : ffff80000b77b11c x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : ffff0000c3d9cf80 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: fib6_walk_continue+0x278/0x2b0 net/ipv6/ip6_fib.c:2068 fib6_walk net/ipv6/ip6_fib.c:2161 [inline] fib6_clean_tree net/ipv6/ip6_fib.c:2241 [inline] __fib6_clean_all+0x16c/0x2c4 net/ipv6/ip6_fib.c:2257 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2268 rt6_sync_down_dev net/ipv6/route.c:4894 [inline] rt6_disable_ip+0x80/0xc8 net/ipv6/route.c:4899 addrconf_ifdown+0x90/0xc30 net/ipv6/addrconf.c:3750 addrconf_notify+0x218/0x848 notifier_call_chain kernel/notifier.c:87 [inline] raw_notifier_call_chain+0x7c/0x108 kernel/notifier.c:455 call_netdevice_notifiers_info net/core/dev.c:1945 [inline] call_netdevice_notifiers_extack net/core/dev.c:1983 [inline] call_netdevice_notifiers net/core/dev.c:1997 [inline] netdev_wait_allrefs_any net/core/dev.c:10250 [inline] netdev_run_todo+0x340/0x6f0 net/core/dev.c:10364 rtnl_unlock+0x14/0x20 net/core/rtnetlink.c:147 tun_detach drivers/net/tun.c:704 [inline] tun_chr_close+0xe8/0xfc drivers/net/tun.c:3455 __fput+0x198/0x3dc fs/file_table.c:320 ____fput+0x20/0x30 fs/file_table.c:353 task_work_run+0xc4/0x14c kernel/task_work.c:177 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x26c/0xbe0 kernel/exit.c:795 do_group_exit+0x70/0xe8 kernel/exit.c:925 get_signal+0xb0c/0xb40 kernel/signal.c:2857 do_signal+0x128/0x438 arch/arm64/kernel/signal.c:1071 do_notify_resume+0xc0/0x1f0 arch/arm64/kernel/signal.c:1124 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline] el0_svc+0x9c/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 irq event stamp: 7433533 hardirqs last enabled at (7433533): [] __local_bh_enable_ip+0x13c/0x1a4 kernel/softirq.c:401 hardirqs last disabled at (7433531): [] __local_bh_enable_ip+0xc4/0x1a4 kernel/softirq.c:378 softirqs last enabled at (7433532): [] spin_unlock_bh include/linux/spinlock.h:394 [inline] softirqs last enabled at (7433532): [] rt_flush_dev+0x32c/0x374 net/ipv4/route.c:1557 softirqs last disabled at (7433530): [] spin_lock_bh include/linux/spinlock.h:354 [inline] softirqs last disabled at (7433530): [] rt_flush_dev+0x114/0x374 net/ipv4/route.c:1548 ---[ end trace 0000000000000000 ]--- Unable to handle kernel paging request at virtual address 05ffc00000000054 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 [05ffc00000000054] address between user and kernel address ranges Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 3072 Comm: syz-executor.2 Tainted: G W 6.0.0-rc6-syzkaller-17742-gc194837ebb57 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : vxlan_handle_lowerdev_unregister drivers/net/vxlan/vxlan_core.c:4450 [inline] pc : vxlan_netdevice_event+0x118/0x268 drivers/net/vxlan/vxlan_core.c:4464 lr : vxlan_handle_lowerdev_unregister drivers/net/vxlan/vxlan_core.c:4441 [inline] lr : vxlan_netdevice_event+0x164/0x268 drivers/net/vxlan/vxlan_core.c:4464 sp : ffff8000127639d0 x29: ffff8000127639f0 x28: ffff000103a745a0 x27: ffff800012763aa8 x26: ffff80000d30d9f8 x25: 0000000000000001 x24: 05ffc00000000000 x23: 05ffc00000000000 x22: 000000000000000b x21: 00000000dead0000 x20: ffff000103717000 x19: ffff000103a74000 x18: 00000000000000ca x17: ffff80000bffd6bc x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 000000000000001d x12: ffff80000d68f848 x11: ff80800009e58650 x10: 0000000000000000 x9 : ffff800009e58650 x8 : ffff0000c3d9cf80 x7 : 0000000000000000 x6 : ffff800009e49d08 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002 x2 : 0000000000000000 x1 : 000000000000000b x0 : 00000000dead0000 Call trace: vxlan_handle_lowerdev_unregister drivers/net/vxlan/vxlan_core.c:4441 [inline] vxlan_netdevice_event+0x118/0x268 drivers/net/vxlan/vxlan_core.c:4464 notifier_call_chain kernel/notifier.c:87 [inline] raw_notifier_call_chain+0x7c/0x108 kernel/notifier.c:455 call_netdevice_notifiers_info net/core/dev.c:1945 [inline] call_netdevice_notifiers_extack net/core/dev.c:1983 [inline] call_netdevice_notifiers net/core/dev.c:1997 [inline] netdev_wait_allrefs_any net/core/dev.c:10250 [inline] netdev_run_todo+0x340/0x6f0 net/core/dev.c:10364 rtnl_unlock+0x14/0x20 net/core/rtnetlink.c:147 tun_detach drivers/net/tun.c:704 [inline] tun_chr_close+0xe8/0xfc drivers/net/tun.c:3455 __fput+0x198/0x3dc fs/file_table.c:320 ____fput+0x20/0x30 fs/file_table.c:353 task_work_run+0xc4/0x14c kernel/task_work.c:177 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x26c/0xbe0 kernel/exit.c:795 do_group_exit+0x70/0xe8 kernel/exit.c:925 get_signal+0xb0c/0xb40 kernel/signal.c:2857 do_signal+0x128/0x438 arch/arm64/kernel/signal.c:1071 do_notify_resume+0xc0/0x1f0 arch/arm64/kernel/signal.c:1124 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline] el0_svc+0x9c/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 Code: a900a3e8 f9400298 eb18029f 54000860 (b9405715) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: a900a3e8 stp x8, x8, [sp, #8] 4: f9400298 ldr x24, [x20] 8: eb18029f cmp x20, x24 c: 54000860 b.eq 0x118 // b.none * 10: b9405715 ldr w21, [x24, #84] <-- trapping instruction