bond_slave_1: left allmulticast mode .`: left promiscuous mode bond_slave_0: left promiscuous mode bond_slave_1: left promiscuous mode bridge0: port 3(.`) entered disabled state ============================================ WARNING: possible recursive locking detected syzkaller #0 Not tainted -------------------------------------------- syz.2.974/9145 is trying to acquire lock: ffffc90004efd0d8 (&rb->spinlock){-.-.}-{2:2}, at: __bpf_ringbuf_reserve+0x1c8/0x5a0 kernel/bpf/ringbuf.c:423 but task is already holding lock: ffffc90004f130d8 (&rb->spinlock){-.-.}-{2:2}, at: __bpf_ringbuf_reserve+0x1c8/0x5a0 kernel/bpf/ringbuf.c:423 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&rb->spinlock); lock(&rb->spinlock); *** DEADLOCK *** May be due to missing lock nesting notation 5 locks held by syz.2.974/9145: #0: ffffffff8dfbc648 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:78 [inline] #0: ffffffff8dfbc648 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x76f/0xf10 net/core/rtnetlink.c:6472 #1: ffff8880b8f3c458 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:558 #2: ffffffff8cd2fc20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline] #2: ffffffff8cd2fc20 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline] #2: ffffffff8cd2fc20 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2321 [inline] #2: ffffffff8cd2fc20 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0xde/0x3c0 kernel/trace/bpf_trace.c:2361 #3: ffffc90004f130d8 (&rb->spinlock){-.-.}-{2:2}, at: __bpf_ringbuf_reserve+0x1c8/0x5a0 kernel/bpf/ringbuf.c:423 #4: ffffffff8cd2fc20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline] #4: ffffffff8cd2fc20 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline] #4: ffffffff8cd2fc20 (rcu_read_lock){....}-{1:2}, at: trace_call_bpf+0xc3/0x690 kernel/trace/bpf_trace.c:142 stack backtrace: CPU: 1 PID: 9145 Comm: syz.2.974 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: dump_stack_lvl+0x16c/0x230 lib/dump_stack.c:106 check_deadlock kernel/locking/lockdep.c:3062 [inline] validate_chain kernel/locking/lockdep.c:3856 [inline] __lock_acquire+0x5d40/0x7c80 kernel/locking/lockdep.c:5137 lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xa8/0xf0 kernel/locking/spinlock.c:162 __bpf_ringbuf_reserve+0x1c8/0x5a0 kernel/bpf/ringbuf.c:423 ____bpf_ringbuf_reserve kernel/bpf/ringbuf.c:474 [inline] bpf_ringbuf_reserve+0x5c/0x70 kernel/bpf/ringbuf.c:466 bpf_prog_ba4789e7f2e155d6+0x35/0x52 bpf_dispatcher_nop_func include/linux/bpf.h:1223 [inline] __bpf_prog_run include/linux/filter.h:605 [inline] bpf_prog_run include/linux/filter.h:619 [inline] bpf_prog_run_array include/linux/bpf.h:1993 [inline] trace_call_bpf+0x39f/0x690 kernel/trace/bpf_trace.c:143 perf_trace_run_bpf_submit+0x7a/0x1c0 kernel/events/core.c:10262 perf_trace_contention_begin+0x254/0x2f0 include/trace/events/lock.h:95 trace_contention_begin+0xe9/0x110 include/trace/events/lock.h:95 __pv_queued_spin_lock_slowpath+0xe0/0x9d0 kernel/locking/qspinlock.c:405 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:586 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0x24e/0x2c0 kernel/locking/spinlock_debug.c:115 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] _raw_spin_lock_irqsave+0xb4/0xf0 kernel/locking/spinlock.c:162 __bpf_ringbuf_reserve+0x1c8/0x5a0 kernel/bpf/ringbuf.c:423 ____bpf_ringbuf_reserve kernel/bpf/ringbuf.c:474 [inline] bpf_ringbuf_reserve+0x5c/0x70 kernel/bpf/ringbuf.c:466 bpf_prog_1c4dcbae11bca85e+0x35/0x61 bpf_dispatcher_nop_func include/linux/bpf.h:1223 [inline] __bpf_prog_run include/linux/filter.h:605 [inline] bpf_prog_run include/linux/filter.h:619 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2322 [inline] bpf_trace_run2+0x312/0x3c0 kernel/trace/bpf_trace.c:2361 __bpf_trace_tlb_flush+0xf6/0x150 include/trace/events/tlb.h:38 trace_tlb_flush+0xea/0x110 include/trace/events/tlb.h:38 switch_mm_irqs_off+0x7aa/0xb10 arch/x86/mm/tlb.c:-1 context_switch kernel/sched/core.c:5364 [inline] __schedule+0xf22/0x44d0 kernel/sched/core.c:6699 preempt_schedule_common+0x82/0xc0 kernel/sched/core.c:6866 preempt_schedule+0xab/0xc0 kernel/sched/core.c:6890 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk_64.S:45 __local_bh_enable_ip+0x13f/0x1c0 kernel/softirq.c:413 spin_unlock_bh include/linux/spinlock.h:396 [inline] __ip6_ins_rt net/ipv6/route.c:1344 [inline] ip6_route_add+0x94/0x130 net/ipv6/route.c:3893 addrconf_add_mroute net/ipv6/addrconf.c:2514 [inline] addrconf_add_dev+0x257/0x340 net/ipv6/addrconf.c:2532 addrconf_dev_config net/ipv6/addrconf.c:3451 [inline] addrconf_init_auto_addrs+0x5cc/0xaa0 net/ipv6/addrconf.c:3539 addrconf_notify+0xb62/0x1010 net/ipv6/addrconf.c:3712 notifier_call_chain+0x197/0x390 kernel/notifier.c:93 call_netdevice_notifiers_mtu net/core/dev.c:2101 [inline] dev_set_mtu_ext+0x436/0x620 net/core/dev.c:8828 dev_set_mtu+0xb9/0x170 net/core/dev.c:8849 br_mtu_auto_adjust+0x241/0x290 net/bridge/br_if.c:524 br_del_if+0x169/0x330 net/bridge/br_if.c:741 do_set_master net/core/rtnetlink.c:2692 [inline] do_setlink+0xe92/0x3fb0 net/core/rtnetlink.c:2912 __rtnl_newlink net/core/rtnetlink.c:3703 [inline] rtnl_newlink+0x175b/0x2020 net/core/rtnetlink.c:3750 rtnetlink_rcv_msg+0x7c7/0xf10 net/core/rtnetlink.c:6475 netlink_rcv_skb+0x216/0x480 net/netlink/af_netlink.c:2545 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x751/0x8d0 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x8c1/0xbe0 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] ____sys_sendmsg+0x5bf/0x950 net/socket.c:2595 ___sys_sendmsg+0x220/0x290 net/socket.c:2649 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2687 [inline] __se_sys_sendmsg+0x1a5/0x270 net/socket.c:2685 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fe204d8eba9 Code: Unable to access opcode bytes at 0x7fe204d8eb7f. RSP: 002b:00007fe205bf2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fe204fd5fa0 RCX: 00007fe204d8eba9 RDX: 0000000000000084 RSI: 0000200000000600 RDI: 000000000000000d RBP: 00007fe204e11e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fe204fd6038 R14: 00007fe204fd5fa0 R15: 00007fff5fe9fa78 8021q: adding VLAN 0 to HW filter on device .` team0: Port device .` added syz.2.974 (9145) used greatest stack depth: 16704 bytes left