bond0 (unregistering): Releasing backup interface bond15 bond15 (unregistering): Released all slaves bond14 (unregistering): Releasing active interface vlan6 ============================================ WARNING: possible recursive locking detected 4.19.211-syzkaller #0 Not tainted -------------------------------------------- kworker/u4:11/7136 is trying to acquire lock: 000000008b479e12 (&(&bond->stats_lock)->rlock#3/3){+.+.}, at: bond_get_stats+0xca/0x500 drivers/net/bonding/bond_main.c:3492 but task is already holding lock: 00000000f940de9b (&(&bond->stats_lock)->rlock#3/3){+.+.}, at: bond_get_stats+0xca/0x500 drivers/net/bonding/bond_main.c:3492 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&(&bond->stats_lock)->rlock#3/3); lock(&(&bond->stats_lock)->rlock#3/3); *** DEADLOCK *** May be due to missing lock nesting notation 6 locks held by kworker/u4:11/7136: #0: 00000000b9924de6 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 0000000006e89a54 (net_cleanup_work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 000000004d8d7cf8 (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x8b0 net/core/net_namespace.c:521 #3: 0000000098759eb5 (rtnl_mutex){+.+.}, at: rtnl_lock_unregistering net/core/dev.c:9748 [inline] #3: 0000000098759eb5 (rtnl_mutex){+.+.}, at: default_device_exit_batch+0xea/0x3c0 net/core/dev.c:9786 #4: 00000000f940de9b (&(&bond->stats_lock)->rlock#3/3){+.+.}, at: bond_get_stats+0xca/0x500 drivers/net/bonding/bond_main.c:3492 #5: 0000000052df8569 (rcu_read_lock){....}, at: bond_get_nest_level drivers/net/bonding/bond_main.c:3481 [inline] #5: 0000000052df8569 (rcu_read_lock){....}, at: bond_get_stats+0xae/0x500 drivers/net/bonding/bond_main.c:3492 stack backtrace: CPU: 1 PID: 7136 Comm: kworker/u4:11 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Workqueue: netns cleanup_net Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_deadlock_bug kernel/locking/lockdep.c:1764 [inline] check_deadlock kernel/locking/lockdep.c:1808 [inline] validate_chain kernel/locking/lockdep.c:2404 [inline] __lock_acquire.cold+0x121/0x57e kernel/locking/lockdep.c:3416 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 _raw_spin_lock_nested+0x30/0x40 kernel/locking/spinlock.c:354 bond_get_stats+0xca/0x500 drivers/net/bonding/bond_main.c:3492 dev_get_stats+0xa5/0x2b0 net/core/dev.c:9061 bond_get_stats+0x20f/0x500 drivers/net/bonding/bond_main.c:3498 __bond_release_one+0x46c/0x1620 drivers/net/bonding/bond_main.c:1913 bond_slave_netdev_event drivers/net/bonding/bond_main.c:3155 [inline] bond_netdev_event+0xb61/0xe50 drivers/net/bonding/bond_main.c:3267 notifier_call_chain+0xc0/0x230 kernel/notifier.c:93 call_netdevice_notifiers net/core/dev.c:1762 [inline] rollback_registered_many+0x83e/0xe70 net/core/dev.c:8196 unregister_netdevice_many.part.0+0x1a/0x300 net/core/dev.c:9324 unregister_netdevice_many net/core/dev.c:9323 [inline] default_device_exit_batch+0x2fa/0x3c0 net/core/dev.c:9795 ops_exit_list+0xf9/0x150 net/core/net_namespace.c:156 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:554 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 bond0 (unregistering): Releasing backup interface bond14 bond14 (unregistering): Released all slaves bond13 (unregistering): Releasing active interface vlan5 bond0 (unregistering): Releasing backup interface bond13 bond13 (unregistering): Released all slaves bond12 (unregistering): Releasing active interface vlan4 bond0 (unregistering): Releasing backup interface bond12 bond12 (unregistering): Released all slaves bond11 (unregistering): Releasing active interface vlan3 bond0 (unregistering): Releasing backup interface bond11 bond11 (unregistering): Released all slaves bond10 (unregistering): Releasing active interface vlan2 bond0 (unregistering): Releasing backup interface bond10 bond10 (unregistering): Released all slaves bond9 (unregistering): Releasing active interface vlan0 bond9 (unregistering): Released all slaves bond8 (unregistering): Released all slaves bond7 (unregistering): Released all slaves bond6 (unregistering): Released all slaves bond5 (unregistering): Released all slaves bond4 (unregistering): Released all slaves bond3 (unregistering): Released all slaves bond2 (unregistering): Released all slaves bond1 (unregistering): Released all slaves device hsr_slave_1 left promiscuous mode device hsr_slave_0 left promiscuous mode team0 (unregistering): Port device team_slave_1 removed team0 (unregistering): Port device team_slave_0 removed bond0 (unregistering): Releasing backup interface bond_slave_1 bond0 (unregistering): Releasing backup interface bond_slave_0 bond0 (unregistering): Released all slaves netlink: 3677 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. audit: type=1804 audit(1676401140.427:948): pid=10610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2927874318/syzkaller.OM1KDR/1161/bus" dev="sda1" ino=14547 res=1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. IPVS: ftp: loaded support on port[0] = 21 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. audit: type=1804 audit(1676401141.197:949): pid=10666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2927874318/syzkaller.OM1KDR/1162/bus" dev="sda1" ino=14786 res=1 IPVS: ftp: loaded support on port[0] = 21 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. audit: type=1804 audit(1676401142.307:950): pid=10735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2927874318/syzkaller.OM1KDR/1163/bus" dev="sda1" ino=14994 res=1 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 audit: type=1804 audit(1676401143.378:951): pid=10793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2927874318/syzkaller.OM1KDR/1164/bus" dev="sda1" ino=14740 res=1 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 audit: type=1804 audit(1676401145.798:952): pid=10953 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2784495336/syzkaller.syV8GO/114/bus" dev="sda1" ino=14708 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1676401146.008:953): pid=10979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir2784495336/syzkaller.syV8GO/114/bus" dev="sda1" ino=14708 res=1 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 audit: type=1804 audit(1676401147.058:954): pid=11062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2784495336/syzkaller.syV8GO/115/bus" dev="sda1" ino=14708 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 audit: type=1804 audit(1676401147.258:955): pid=11070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir2784495336/syzkaller.syV8GO/115/bus" dev="sda1" ino=14708 res=1 audit: type=1804 audit(1676401148.208:956): pid=11141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2784495336/syzkaller.syV8GO/116/bus" dev="sda1" ino=14708 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1676401148.398:957): pid=11142 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir2784495336/syzkaller.syV8GO/116/bus" dev="sda1" ino=14708 res=1