================================ WARNING: inconsistent lock state 5.9.0-rc5-next-20200915-syzkaller #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-R} usage. systemd-udevd/3912 [HC0[0]:SC1[5]:HE0:SE0] takes: ffff888091fc3e28 (&s->seqcount#9){+.+-}-{0:0}, at: xfrm_policy_lookup_inexact_addr+0x57/0x200 net/xfrm/xfrm_policy.c:1909 {SOFTIRQ-ON-W} state was registered at: lock_acquire+0x1f2/0xaa0 kernel/locking/lockdep.c:5398 write_seqcount_t_begin_nested include/linux/seqlock.h:509 [inline] write_seqcount_t_begin include/linux/seqlock.h:535 [inline] write_seqlock include/linux/seqlock.h:883 [inline] xfrm_set_spdinfo+0x302/0x660 net/xfrm/xfrm_user.c:1185 xfrm_user_rcv_msg+0x414/0x700 net/xfrm/xfrm_user.c:2684 netlink_rcv_skb+0x15a/0x430 net/netlink/af_netlink.c:2470 xfrm_netlink_rcv+0x6b/0x90 net/xfrm/xfrm_user.c:2692 netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1330 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1919 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:671 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2362 ___sys_sendmsg+0xf3/0x170 net/socket.c:2416 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2449 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 irq event stamp: 14062373 hardirqs last enabled at (14062372): [] seqcount_lockdep_reader_access+0x14b/0x1a0 include/linux/seqlock.h:105 hardirqs last disabled at (14062373): [] seqcount_lockdep_reader_access+0x11b/0x1a0 include/linux/seqlock.h:102 softirqs last enabled at (14061542): [] asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:786 softirqs last disabled at (14062311): [] asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:786 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&s->seqcount#9); lock(&s->seqcount#9); *** DEADLOCK *** 6 locks held by systemd-udevd/3912: #0: ffffffff8a34fc80 (tomoyo_ss){....}-{0:0}, at: tomoyo_path_perm+0x1b8/0x3f0 security/tomoyo/file.c:847 #1: ffffc90000007d80 ((&ndev->rs_timer)){+.-.}-{0:0}, at: lockdep_copy_map include/linux/lockdep.h:35 [inline] #1: ffffc90000007d80 ((&ndev->rs_timer)){+.-.}-{0:0}, at: call_timer_fn+0xd5/0x6b0 kernel/time/timer.c:1403 #2: ffffffff89e71c80 (rcu_read_lock){....}-{1:2}, at: ip6_nd_hdr net/ipv6/ndisc.c:464 [inline] #2: ffffffff89e71c80 (rcu_read_lock){....}-{1:2}, at: ndisc_send_skb+0x81b/0x1720 net/ipv6/ndisc.c:500 #3: ffffffff89e71c20 (rcu_read_lock_bh){....}-{1:2}, at: lwtunnel_xmit_redirect include/net/lwtunnel.h:92 [inline] #3: ffffffff89e71c20 (rcu_read_lock_bh){....}-{1:2}, at: ip6_finish_output2+0x190/0x1770 net/ipv6/ip6_output.c:103 #4: ffffffff89e71c20 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1d7/0x2d10 net/core/dev.c:4072 #5: ffffffff89e71c80 (rcu_read_lock){....}-{1:2}, at: xfrm_policy_lookup_bytype+0x104/0xa40 net/xfrm/xfrm_policy.c:2082 stack backtrace: CPU: 0 PID: 3912 Comm: systemd-udevd Not tainted 5.9.0-rc5-next-20200915-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x198/0x1fb lib/dump_stack.c:118 print_usage_bug kernel/locking/lockdep.c:3694 [inline] valid_state kernel/locking/lockdep.c:3705 [inline] mark_lock_irq kernel/locking/lockdep.c:3908 [inline] mark_lock.cold+0x13/0x10d kernel/locking/lockdep.c:4375 mark_usage kernel/locking/lockdep.c:4252 [inline] __lock_acquire+0x1402/0x55d0 kernel/locking/lockdep.c:4750 lock_acquire+0x1f2/0xaa0 kernel/locking/lockdep.c:5398 seqcount_lockdep_reader_access+0x139/0x1a0 include/linux/seqlock.h:103 xfrm_policy_lookup_inexact_addr+0x57/0x200 net/xfrm/xfrm_policy.c:1909 xfrm_policy_find_inexact_candidates+0xac/0x1d0 net/xfrm/xfrm_policy.c:1953 xfrm_policy_lookup_bytype+0x4b8/0xa40 net/xfrm/xfrm_policy.c:2108 xfrm_policy_lookup net/xfrm/xfrm_policy.c:2144 [inline] xfrm_bundle_lookup net/xfrm/xfrm_policy.c:2944 [inline] xfrm_lookup_with_ifid+0xaa1/0x2100 net/xfrm/xfrm_policy.c:3085 xfrm_lookup net/xfrm/xfrm_policy.c:3177 [inline] xfrm_lookup_route+0x36/0x1e0 net/xfrm/xfrm_policy.c:3188 ip_route_output_flow+0xa6/0xc0 net/ipv4/route.c:2771 ipip6_tunnel_xmit net/ipv6/sit.c:946 [inline] sit_tunnel_xmit+0x1a99/0x29e0 net/ipv6/sit.c:1079 __netdev_start_xmit include/linux/netdevice.h:4656 [inline] netdev_start_xmit include/linux/netdevice.h:4670 [inline] xmit_one net/core/dev.c:3562 [inline] dev_hard_start_xmit+0x188/0x880 net/core/dev.c:3578 __dev_queue_xmit+0x2059/0x2d10 net/core/dev.c:4137 neigh_connected_output+0x299/0x370 net/core/neighbour.c:1518 neigh_output include/net/neighbour.h:509 [inline] ip6_finish_output2+0x8ec/0x1770 net/ipv6/ip6_output.c:117 __ip6_finish_output net/ipv6/ip6_output.c:143 [inline] __ip6_finish_output+0x447/0xab0 net/ipv6/ip6_output.c:128 ip6_finish_output+0x34/0x1f0 net/ipv6/ip6_output.c:153 NF_HOOK_COND include/linux/netfilter.h:290 [inline] ip6_output+0x1db/0x520 net/ipv6/ip6_output.c:176 dst_output include/net/dst.h:443 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ndisc_send_skb+0xa69/0x1720 net/ipv6/ndisc.c:506 ndisc_send_rs+0x12e/0x700 net/ipv6/ndisc.c:700 addrconf_rs_timer+0x2ec/0x7c0 net/ipv6/addrconf.c:3873 call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1413 expire_timers kernel/time/timer.c:1458 [inline] __run_timers.part.0+0x67c/0xa50 kernel/time/timer.c:1755 __run_timers kernel/time/timer.c:1736 [inline] run_timer_softirq+0xae/0x1a0 kernel/time/timer.c:1768 __do_softirq+0x202/0xa42 kernel/softirq.c:298 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:786 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x9d/0xd0 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu kernel/softirq.c:423 [inline] irq_exit_rcu+0x235/0x280 kernel/softirq.c:435 sysvec_apic_timer_interrupt+0x51/0xf0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 RIP: 0010:__sanitizer_cov_trace_pc+0x30/0x60 kernel/kcov.c:197 Code: fe 01 00 65 8b 05 00 33 8f 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74 35 8b 82 4c 14 00 00 85 c0 74 2b 8b 82 28 14 00 00 <83> f8 02 75 20 48 8b 8a 30 14 00 00 8b 92 2c 14 00 00 48 8b 01 48 RSP: 0018:ffffc900011d7ab0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff8880a8448e00 RCX: 0000000000000001 RDX: ffff8880a3fe4040 RSI: ffffffff83615298 RDI: 0000000000000001 RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a604ec10 R13: ffffc900011d7be0 R14: 0000000000000000 R15: 0000000000000000 tomoyo_check_acl+0x98/0x410 security/tomoyo/domain.c:173 tomoyo_path_permission security/tomoyo/file.c:586 [inline] tomoyo_path_permission+0x1f5/0x360 security/tomoyo/file.c:573 tomoyo_path_perm+0x2e7/0x3f0 security/tomoyo/file.c:838 security_inode_getattr+0xcf/0x140 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx_fd+0x70/0xf0 fs/stat.c:151 vfs_fstat include/linux/fs.h:3200 [inline] __do_sys_newfstat+0x88/0x100 fs/stat.c:398 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7ff551ffc2e2 Code: 48 8b 05 b9 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 77 33 48 63 fe b8 05 00 00 00 48 89 d6 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 8b 15 81 db 2b 00 f7 RSP: 002b:00007ffeb3dd2078 EFLAGS: 00000246 ORIG_RAX: 0000000000000005 RAX: ffffffffffffffda RBX: 00007ff5522b7440 RCX: 00007ff551ffc2e2 RDX: 00007ffeb3dd2080 RSI: 00007ffeb3dd2080 RDI: 000000000000000e RBP: 000055a1ef10e870 R08: 0000000000000b40 R09: 000055a1ef10eaa0 R10: 000055a1ef10e870 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000001000 R14: 000055a1ef10eaa0 R15: 00007ffeb3dd2340