t configuration, please check. [ 427.646243][T21918] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 427.681821][T21920] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 427.711520][T21922] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 427.741163][T21924] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 430.549640][ T12] hsr_slave_0: left promiscuous mode [ 430.555450][ T12] hsr_slave_1: left promiscuous mode [ 430.561594][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 430.569172][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 430.577503][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 430.585801][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 430.594230][ T12] bridge_slave_1: left allmulticast mode [ 430.599983][ T12] bridge_slave_1: left promiscuous mode [ 430.605732][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.613995][ T12] bridge_slave_0: left allmulticast mode [ 430.620412][ T12] bridge_slave_0: left promiscuous mode [ 430.626110][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.636179][ T12] veth1_macvtap: left promiscuous mode [ 430.641870][ T12] veth0_macvtap: left promiscuous mode [ 430.647378][ T12] veth1_vlan: left promiscuous mode [ 430.652769][ T12] veth0_vlan: left promiscuous mode [ 430.750638][ T12] team0 (unregistering): Port device team_slave_1 removed [ 430.764543][ T12] team0 (unregistering): Port device team_slave_0 removed [ 430.775546][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 430.788235][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 430.834108][ T12] bond0 (unregistering): Released all slaves [ 434.740424][ T1214] ieee802154 phy0 wpan0: encryption failed: -22 [ 434.747115][ T1214] ieee802154 phy1 wpan1: encryption failed: -22 Warning: Permanently added '10.128.10.46' (ECDSA) to the list of known hosts. [ 435.107312][T22231] chnl_net:caif_netlink_parms(): no params data found [ 435.140893][T22231] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.148468][T22231] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.156250][T22231] bridge_slave_0: entered allmulticast mode [ 435.162692][T22231] bridge_slave_0: entered promiscuous mode [ 435.171335][T22231] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.178440][T22231] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.185706][T22231] bridge_slave_1: entered allmulticast mode [ 435.192135][T22231] bridge_slave_1: entered promiscuous mode [ 435.209766][T22231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 435.220365][T22231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 435.240683][T22231] team0: Port device team_slave_0 added [ 435.248231][T22231] team0: Port device team_slave_1 added [ 435.263924][T22231] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 435.270980][T22231] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.297431][T22231] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 435.310415][T22231] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 435.317359][T22231] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.343409][T22231] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 435.367077][T22231] hsr_slave_0: entered promiscuous mode [ 435.373372][T22231] hsr_slave_1: entered promiscuous mode [ 435.424837][T22231] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.431969][T22231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.439298][T22231] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.446349][T22231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.477339][T22231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 435.488080][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.497227][ T752] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.505334][ T752] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.513471][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 435.525413][T22231] 8021q: adding VLAN 0 to HW filter on device team0 [ 435.535302][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.543851][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.551020][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.562339][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 435.570745][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.577771][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.592883][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 435.601635][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 435.612761][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 435.626125][T22231] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 435.636780][T22231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 435.649806][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 435.657958][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 435.666986][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 435.682252][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 435.689760][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 435.699297][T22231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 435.852429][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 435.867072][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.875328][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.883250][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 435.893581][T22231] veth0_vlan: entered promiscuous mode [ 435.903843][T22231] veth1_vlan: entered promiscuous mode [ 435.917835][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 435.926638][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 435.935068][ T752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 435.947093][T22231] veth0_macvtap: entered promiscuous mode [ 435.955568][T22231] veth1_macvtap: entered promiscuous mode [ 435.967895][T22231] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 435.976310][ T4963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 435.985668][ T4963] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 435.996275][T22231] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 436.004088][ T4963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 436.070021][ C1] [ 436.072376][ C1] ====================================================== [ 436.079454][ C1] WARNING: possible circular locking dependency detected [ 436.086718][ C1] 6.3.0-syzkaller #0 Not tainted [ 436.091751][ C1] ------------------------------------------------------ [ 436.098752][ C1] ksoftirqd/1/21 is trying to acquire lock: [ 436.104631][ C1] ffff88802894d088 (&priv->active_session_list_lock){+.-.}-{2:2}, at: j1939_session_activate+0x3e/0x3d0 [ 436.115744][ C1] [ 436.115744][ C1] but task is already holding lock: [ 436.123084][ C1] ffff8880783125c8 (&jsk->sk_session_queue_lock){+.-.}-{2:2}, at: j1939_sk_queue_activate_next+0x4c/0x440 [ 436.134529][ C1] [ 436.134529][ C1] which lock already depends on the new lock. [ 436.134529][ C1] [ 436.144909][ C1] [ 436.144909][ C1] the existing dependency chain (in reverse order) is: [ 436.156324][ C1] [ 436.156324][ C1] -> #2 (&jsk->sk_session_queue_lock){+.-.}-{2:2}: [ 436.164974][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 436.170233][ C1] j1939_sk_queue_drop_all+0x33/0x2f0 [ 436.176095][ C1] j1939_sk_netdev_event_netdown+0x71/0x140 [ 436.182474][ C1] j1939_netdev_notify+0x121/0x160 [ 436.188073][ C1] notifier_call_chain+0x94/0x2a0 [ 436.193586][ C1] __dev_notify_flags+0x156/0x240 [ 436.199100][ C1] dev_change_flags+0xf5/0x160 [ 436.204363][ C1] do_setlink+0x873/0x3050 [ 436.209269][ C1] __rtnl_newlink+0x94d/0x1520 [ 436.214519][ C1] rtnl_newlink+0x5a/0x90 [ 436.219336][ C1] rtnetlink_rcv_msg+0x32d/0x9f0 [ 436.224761][ C1] netlink_rcv_skb+0x126/0x380 [ 436.230013][ C1] netlink_unicast+0x433/0x710 [ 436.235277][ C1] netlink_sendmsg+0x78c/0xc40 [ 436.240530][ C1] sock_sendmsg+0xbc/0x150 [ 436.245433][ C1] ____sys_sendmsg+0x5ff/0x8f0 [ 436.250687][ C1] ___sys_sendmsg+0xdb/0x160 [ 436.255865][ C1] __sys_sendmsg+0xc3/0x160 [ 436.260857][ C1] do_syscall_64+0x35/0xb0 [ 436.265765][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 436.272151][ C1] [ 436.272151][ C1] -> #1 (&priv->j1939_socks_lock){+.-.}-{2:2}: [ 436.280554][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 436.285895][ C1] j1939_sk_errqueue+0x8e/0x160 [ 436.291233][ C1] j1939_session_destroy+0x1f4/0x3e0 [ 436.297088][ C1] j1939_session_deactivate_locked+0x212/0x2a0 [ 436.303735][ C1] j1939_cancel_active_session+0x133/0x280 [ 436.310047][ C1] j1939_netdev_notify+0x119/0x160 [ 436.315657][ C1] notifier_call_chain+0x94/0x2a0 [ 436.321778][ C1] __dev_notify_flags+0x156/0x240 [ 436.327289][ C1] dev_change_flags+0xf5/0x160 [ 436.332539][ C1] do_setlink+0x873/0x3050 [ 436.337615][ C1] __rtnl_newlink+0x94d/0x1520 [ 436.342878][ C1] rtnl_newlink+0x5a/0x90 [ 436.347694][ C1] rtnetlink_rcv_msg+0x32d/0x9f0 [ 436.353124][ C1] netlink_rcv_skb+0x126/0x380 [ 436.358376][ C1] netlink_unicast+0x433/0x710 [ 436.365129][ C1] netlink_sendmsg+0x78c/0xc40 [ 436.370573][ C1] sock_sendmsg+0xbc/0x150 [ 436.375486][ C1] ____sys_sendmsg+0x5ff/0x8f0 [ 436.380751][ C1] ___sys_sendmsg+0xdb/0x160 [ 436.385833][ C1] __sys_sendmsg+0xc3/0x160 [ 436.390835][ C1] do_syscall_64+0x35/0xb0 [ 436.395806][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 436.402277][ C1] [ 436.402277][ C1] -> #0 (&priv->active_session_list_lock){+.-.}-{2:2}: [ 436.411359][ C1] __lock_acquire+0x2f21/0x5df0 [ 436.416699][ C1] lock_acquire+0x1ad/0x520 [ 436.421777][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 436.427059][ C1] j1939_session_activate+0x3e/0x3d0 [ 436.432852][ C1] j1939_sk_queue_activate_next+0x24d/0x440 [ 436.439236][ C1] j1939_xtp_rx_eoma+0x21d/0x550 [ 436.444686][ C1] j1939_tp_recv+0x699/0xc10 [ 436.449769][ C1] j1939_can_recv+0x60b/0x8a0 [ 436.454933][ C1] can_rcv_filter+0x4ce/0x7b0 [ 436.460112][ C1] can_receive+0x2ae/0x4b0 [ 436.465016][ C1] can_rcv+0x15a/0x220 [ 436.469572][ C1] __netif_receive_skb_one_core+0x104/0x180 [ 436.475953][ C1] process_backlog+0xca/0x5c0 [ 436.481115][ C1] __napi_poll+0x9a/0x550 [ 436.485938][ C1] net_rx_action+0x792/0xbb0 [ 436.491019][ C1] __do_softirq+0x1d0/0x901 [ 436.496015][ C1] run_ksoftirqd+0x2d/0x60 [ 436.500930][ C1] smpboot_thread_fn+0x548/0x8c0 [ 436.506357][ C1] kthread+0x2e6/0x3c0 [ 436.510926][ C1] ret_from_fork+0x1f/0x30 [ 436.515881][ C1] [ 436.515881][ C1] other info that might help us debug this: [ 436.515881][ C1] [ 436.526087][ C1] Chain exists of: [ 436.526087][ C1] &priv->active_session_list_lock --> &priv->j1939_socks_lock --> &jsk->sk_session_queue_lock [ 436.526087][ C1] [ 436.542387][ C1] Possible unsafe locking scenario: [ 436.542387][ C1] [ 436.549821][ C1] CPU0 CPU1 [ 436.555243][ C1] ---- ---- [ 436.560603][ C1] lock(&jsk->sk_session_queue_lock); [ 436.566387][ C1] lock(&priv->j1939_socks_lock); [ 436.574246][ C1] lock(&jsk->sk_session_queue_lock); [ 436.582290][ C1] lock(&priv->active_session_list_lock); [ 436.588251][ C1] [ 436.588251][ C1] *** DEADLOCK *** [ 436.588251][ C1] [ 436.596364][ C1] 3 locks held by ksoftirqd/1/21: [ 436.601353][ C1] #0: ffffffff8b187a80 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x1cd/0x5c0 [ 436.610786][ C1] #1: ffffffff8b187a80 (rcu_read_lock){....}-{1:2}, at: can_receive+0x1c4/0x4b0 [ 436.619887][ C1] #2: ffff8880783125c8 (&jsk->sk_session_queue_lock){+.-.}-{2:2}, at: j1939_sk_queue_activate_next+0x4c/0x440 [ 436.631572][ C1] [ 436.631572][ C1] stack backtrace: [ 436.637429][ C1] CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 6.3.0-syzkaller #0 [ 436.645200][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 436.655316][ C1] Call Trace: [ 436.658838][ C1] [ 436.661841][ C1] dump_stack_lvl+0x60/0xa0 [ 436.666396][ C1] check_noncircular+0x25f/0x2e0 [ 436.671308][ C1] ? print_circular_bug+0x730/0x730 [ 436.676740][ C1] ? print_usage_bug.part.0+0x660/0x660 [ 436.682252][ C1] ? print_usage_bug.part.0+0x660/0x660 [ 436.687768][ C1] __lock_acquire+0x2f21/0x5df0 [ 436.692689][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 436.698640][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 436.704596][ C1] lock_acquire+0x1ad/0x520 [ 436.709076][ C1] ? j1939_session_activate+0x3e/0x3d0 [ 436.714862][ C1] ? lock_sync+0x180/0x180 [ 436.719261][ C1] ? lock_sync+0x180/0x180 [ 436.723643][ C1] ? find_held_lock+0x2d/0x110 [ 436.728397][ C1] _raw_spin_lock_bh+0x2f/0x40 [ 436.733130][ C1] ? j1939_session_activate+0x3e/0x3d0 [ 436.738578][ C1] j1939_session_activate+0x3e/0x3d0 [ 436.743858][ C1] j1939_sk_queue_activate_next+0x24d/0x440 [ 436.749735][ C1] ? j1939_session_completed+0x7e/0x140 [ 436.755353][ C1] ? __local_bh_enable_ip+0xa0/0x120 [ 436.760630][ C1] j1939_xtp_rx_eoma+0x21d/0x550 [ 436.765549][ C1] j1939_tp_recv+0x699/0xc10 [ 436.770113][ C1] j1939_can_recv+0x60b/0x8a0 [ 436.774867][ C1] ? j1939_netdev_notify+0x160/0x160 [ 436.780140][ C1] ? slab_free_freelist_hook+0x8b/0x1c0 [ 436.785666][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 436.791701][ C1] ? can_receive+0x2dd/0x4b0 [ 436.796282][ C1] can_rcv_filter+0x4ce/0x7b0 [ 436.800926][ C1] can_receive+0x2ae/0x4b0 [ 436.805310][ C1] ? can_receive+0x4b0/0x4b0 [ 436.809881][ C1] can_rcv+0x15a/0x220 [ 436.813932][ C1] __netif_receive_skb_one_core+0x104/0x180 [ 436.819798][ C1] ? __netif_receive_skb_core+0x2f20/0x2f20 [ 436.825655][ C1] ? spin_bug+0x1c0/0x1c0 [ 436.829974][ C1] process_backlog+0xca/0x5c0 [ 436.834618][ C1] ? rcu_core+0x7f5/0x1ac0 [ 436.839097][ C1] __napi_poll+0x9a/0x550 [ 436.843395][ C1] net_rx_action+0x792/0xbb0 [ 436.848214][ C1] ? napi_threaded_poll+0x7c0/0x7c0 [ 436.853391][ C1] ? lock_downgrade+0x690/0x690 [ 436.858207][ C1] ? rcu_report_dead+0x600/0x610 [ 436.863300][ C1] __do_softirq+0x1d0/0x901 [ 436.867797][ C1] ? __irq_exit_rcu+0x190/0x190 [ 436.872639][ C1] ? smpboot_thread_fn+0x66/0x8c0 [ 436.877832][ C1] run_ksoftirqd+0x2d/0x60 [ 436.882228][ C1] smpboot_thread_fn+0x548/0x8c0 [ 436.887142][ C1] ? sort_range+0x20/0x20 [ 436.891621][ C1] kthread+0x2e6/0x3c0 [ 436.895660][ C1] ? kthread_complete_and_exit+0x20/0x20 [ 436.901260][ C1] ret_from_fork+0x1f/0x30 [ 436.905662][ C1] [ 439.088025][T22231] net_ratelimit: 147 callbacks suppressed [ 439.088032][T22231] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check.