=============================
WARNING: suspicious RCU usage
6.14.0-rc4-syzkaller-ge056da87c780 #0 Not tainted
-----------------------------
net/sched/sch_generic.c:1285 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:2/43:
 #0: ffff0000dc105148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x674/0x1638 kernel/workqueue.c:3210
 #1: ffff8000993a7ba0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x1638 kernel/workqueue.c:3210
 #2: ffff80008fda22a0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:336

stack backtrace:
CPU: 1 UID: 0 PID: 43 Comm: kworker/u8:2 Not tainted 6.14.0-rc4-syzkaller-ge056da87c780 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: bond0 bond_mii_monitor
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120
 dump_stack+0x1c/0x28 lib/dump_stack.c:129
 lockdep_rcu_suspicious+0x264/0x46c kernel/locking/lockdep.c:6847
 dev_deactivate_queue+0xac/0x1e4 net/sched/sch_generic.c:1285
 netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]
 dev_deactivate_many+0x130/0xb70 net/sched/sch_generic.c:1361
 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1398
 linkwatch_do_dev+0x100/0x1a8 net/core/link_watch.c:184
 linkwatch_sync_dev+0x150/0x16c net/core/link_watch.c:272
 ethtool_op_get_link+0x20/0x5c net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1ac/0x3f4 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x3d8/0x28b4 drivers/net/bonding/bond_main.c:2962
 process_one_work+0x810/0x1638 kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862

=============================
WARNING: suspicious RCU usage
6.14.0-rc4-syzkaller-ge056da87c780 #0 Not tainted
-----------------------------
./include/linux/rtnetlink.h:162 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:2/43:
 #0: ffff0000dc105148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x674/0x1638 kernel/workqueue.c:3210
 #1: ffff8000993a7ba0 ((work_completion)(&(&bond->mii_work)->work)
){+.+.}-{0:0}
, at: process_one_work+0x708/0x1638 kernel/workqueue.c:3210
 #2: 
ffff80008fda22a0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:336

stack backtrace:
CPU: 1 UID: 0 PID: 43 Comm: kworker/u8:2 Not tainted 6.14.0-rc4-syzkaller-ge056da87c780 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: bond0 bond_mii_monitor
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120
 dump_stack+0x1c/0x28 lib/dump_stack.c:129
 lockdep_rcu_suspicious+0x264/0x46c kernel/locking/lockdep.c:6847
 dev_ingress_queue include/linux/rtnetlink.h:162 [inline]
 dev_deactivate_many+0x208/0xb70 net/sched/sch_generic.c:1363
 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1398
 linkwatch_do_dev+0x100/0x1a8 net/core/link_watch.c:184
 linkwatch_sync_dev+0x150/0x16c net/core/link_watch.c:272
 ethtool_op_get_link+0x20/0x5c net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1ac/0x3f4 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x3d8/0x28b4 drivers/net/bonding/bond_main.c:2962
 process_one_work+0x810/0x1638 kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862

=============================
WARNING: suspicious RCU usage
6.14.0-rc4-syzkaller-ge056da87c780 #0 Not tainted
-----------------------------
net/sched/sch_generic.c:1301 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:2/43:
 #0: ffff0000dc105148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x674/0x1638 kernel/workqueue.c:3210
 #1: ffff8000993a7ba0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x1638 kernel/workqueue.c:3210
 #2: ffff80008fda22a0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:336

stack backtrace:
CPU: 1 UID: 0 PID: 43 Comm: kworker/u8:2 Not tainted 6.14.0-rc4-syzkaller-ge056da87c780 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: bond0 bond_mii_monitor
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120
 dump_stack+0x1c/0x28 lib/dump_stack.c:129
 lockdep_rcu_suspicious+0x264/0x46c kernel/locking/lockdep.c:6847
 dev_reset_queue+0xa8/0x1fc net/sched/sch_generic.c:1301
 netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]
 dev_deactivate_many+0x5c8/0xb70 net/sched/sch_generic.c:1375
 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1398
 linkwatch_do_dev+0x100/0x1a8 net/core/link_watch.c:184
 linkwatch_sync_dev+0x150/0x16c net/core/link_watch.c:272
 ethtool_op_get_link+0x20/0x5c net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1ac/0x3f4 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x3d8/0x28b4 drivers/net/bonding/bond_main.c:2962
 process_one_work+0x810/0x1638 kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862

=============================
WARNING: suspicious RCU usage
6.14.0-rc4-syzkaller-ge056da87c780 #0 Not tainted
-----------------------------
net/sched/sch_generic.c:1332 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:2/43:
 #0: ffff0000dc105148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x674/0x1638 kernel/workqueue.c:3210
 #1: ffff8000993a7ba0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x1638 kernel/workqueue.c:3210
 #2: ffff80008fda22a0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:336

stack backtrace:
CPU: 1 UID: 0 PID: 43 Comm: kworker/u8:2 Not tainted 6.14.0-rc4-syzkaller-ge056da87c780 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: bond0 bond_mii_monitor
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120
 dump_stack+0x1c/0x28 lib/dump_stack.c:129
 lockdep_rcu_suspicious+0x264/0x46c kernel/locking/lockdep.c:6847
 some_qdisc_is_busy net/sched/sch_generic.c:1332 [inline]
 dev_deactivate_many+0x8c4/0xb70 net/sched/sch_generic.c:1383
 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1398
 linkwatch_do_dev+0x100/0x1a8 net/core/link_watch.c:184
 linkwatch_sync_dev+0x150/0x16c net/core/link_watch.c:272
 ethtool_op_get_link+0x20/0x5c net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1ac/0x3f4 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x3d8/0x28b4 drivers/net/bonding/bond_main.c:2962
 process_one_work+0x810/0x1638 kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862
BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 43, name: kworker/u8:2
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
3 locks held by kworker/u8:2/43:
 #0: ffff0000dc105148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x674/0x1638 kernel/workqueue.c:3210
 #1: ffff8000993a7ba0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x1638 kernel/workqueue.c:3210
 #2: ffff80008fda22a0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:336
CPU: 1 UID: 0 PID: 43 Comm: kworker/u8:2 Not tainted 6.14.0-rc4-syzkaller-ge056da87c780 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: bond0 bond_mii_monitor
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120
 dump_stack+0x1c/0x28 lib/dump_stack.c:129
 __might_resched+0x374/0x4d0 kernel/sched/core.c:8767
 __might_sleep+0x90/0xe4 kernel/sched/core.c:8696
 down_read+0x30/0x2fc kernel/locking/rwsem.c:1523
 wireless_nlevent_flush net/wireless/wext-core.c:351 [inline]
 wext_netdev_notifier_call+0x2c/0x124 net/wireless/wext-core.c:371
 notifier_call_chain+0x1c4/0x550 kernel/notifier.c:85
 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453
 call_netdevice_notifiers_info net/core/dev.c:2212 [inline]
 netdev_state_change+0x184/0x238 net/core/dev.c:1537
 linkwatch_do_dev+0x108/0x1a8 net/core/link_watch.c:186
 linkwatch_sync_dev+0x150/0x16c net/core/link_watch.c:272
 ethtool_op_get_link+0x20/0x5c net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1ac/0x3f4 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x3d8/0x28b4 drivers/net/bonding/bond_main.c:2962
 process_one_work+0x810/0x1638 kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862

=============================
[ BUG: Invalid wait context ]
6.14.0-rc4-syzkaller-ge056da87c780 #0 Tainted: G        W         
-----------------------------
kworker/u8:2/43 is trying to lock:
ffff800092b652d0 (net_rwsem){++++}-{4:4}, at: wireless_nlevent_flush net/wireless/wext-core.c:351 [inline]
ffff800092b652d0 (net_rwsem){++++}-{4:4}, at: wext_netdev_notifier_call+0x2c/0x124 net/wireless/wext-core.c:371
other info that might help us debug this:
context-{5:5}
3 locks held by kworker/u8:2/43:
 #0: ffff0000dc105148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x674/0x1638 kernel/workqueue.c:3210
 #1: ffff8000993a7ba0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x1638 kernel/workqueue.c:3210
 #2: ffff80008fda22a0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:336
stack backtrace:
CPU: 1 UID: 0 PID: 43 Comm: kworker/u8:2 Tainted: G        W          6.14.0-rc4-syzkaller-ge056da87c780 #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: bond0 bond_mii_monitor
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120
 dump_stack+0x1c/0x28 lib/dump_stack.c:129
 print_lock_invalid_wait_context kernel/locking/lockdep.c:4828 [inline]
 check_wait_context kernel/locking/lockdep.c:4900 [inline]
 __lock_acquire+0x2034/0x7904 kernel/locking/lockdep.c:5178
 lock_acquire+0x23c/0x724 kernel/locking/lockdep.c:5851
 down_read+0x58/0x2fc kernel/locking/rwsem.c:1524
 wireless_nlevent_flush net/wireless/wext-core.c:351 [inline]
 wext_netdev_notifier_call+0x2c/0x124 net/wireless/wext-core.c:371
 notifier_call_chain+0x1c4/0x550 kernel/notifier.c:85
 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453
 call_netdevice_notifiers_info net/core/dev.c:2212 [inline]
 netdev_state_change+0x184/0x238 net/core/dev.c:1537
 linkwatch_do_dev+0x108/0x1a8 net/core/link_watch.c:186
 linkwatch_sync_dev+0x150/0x16c net/core/link_watch.c:272
 ethtool_op_get_link+0x20/0x5c net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1ac/0x3f4 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x3d8/0x28b4 drivers/net/bonding/bond_main.c:2962
 process_one_work+0x810/0x1638 kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862
netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
bridge_slave_1: left allmulticast mode
bridge_slave_1: left promiscuous mode
bridge0: port 2(bridge_slave_1) entered disabled state
bridge_slave_0: left allmulticast mode
bridge_slave_0: left promiscuous mode
bridge0: port 1(bridge_slave_0) entered disabled state
bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
bond0 (unregistering): Released all slaves
hsr_slave_0: left promiscuous mode
hsr_slave_1: left promiscuous mode
batman_adv: batadv0: Interface deactivated: batadv_slave_0
batman_adv: batadv0: Removing interface: batadv_slave_0
batman_adv: batadv0: Interface deactivated: batadv_slave_1
batman_adv: batadv0: Removing interface: batadv_slave_1
veth1_macvtap: left promiscuous mode
veth0_macvtap: left promiscuous mode
veth1_vlan: left promiscuous mode
veth0_vlan: left promiscuous mode
team0 (unregistering): Port device team_slave_1 removed
team0 (unregistering): Port device team_slave_0 removed