Warning: Permanently added '10.128.1.154' (ED25519) to the list of known hosts. [ 32.379715][ T6407] chnl_net:caif_netlink_parms(): no params data found [ 32.408566][ T6407] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.410383][ T6407] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.412204][ T6407] bridge_slave_0: entered allmulticast mode [ 32.414143][ T6407] bridge_slave_0: entered promiscuous mode [ 32.417737][ T6407] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.419323][ T6407] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.421101][ T6407] bridge_slave_1: entered allmulticast mode [ 32.422975][ T6407] bridge_slave_1: entered promiscuous mode [ 32.434400][ T6407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.437941][ T6407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.448338][ T6407] team0: Port device team_slave_0 added [ 32.450967][ T6407] team0: Port device team_slave_1 added [ 32.460966][ T6407] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.462517][ T6407] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.468494][ T6407] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.472362][ T6407] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.473853][ T6407] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.480766][ T6407] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.518781][ T6407] hsr_slave_0: entered promiscuous mode [ 32.567170][ T6407] hsr_slave_1: entered promiscuous mode [ 32.669769][ T6407] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.673364][ T6407] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.676235][ T6407] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.679491][ T6407] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.693135][ T6407] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.694760][ T6407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.696606][ T6407] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.698370][ T6407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.721133][ T6407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.730387][ T582] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.732894][ T582] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.740984][ T6407] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.747325][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.748831][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.753604][ T582] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.755157][ T582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.785367][ T6407] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.803744][ T6407] veth0_vlan: entered promiscuous mode [ 32.808684][ T6407] veth1_vlan: entered promiscuous mode [ 32.821130][ T6407] veth0_macvtap: entered promiscuous mode [ 32.823995][ T6407] veth1_macvtap: entered promiscuous mode [ 32.831322][ T6407] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.836284][ T6407] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.840447][ T6407] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.842498][ T6407] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.844468][ T6407] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.846587][ T6407] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 32.935966][ C1] [ 32.936563][ C1] ================================ [ 32.937761][ C1] WARNING: inconsistent lock state [ 32.938976][ C1] 6.11.0-rc7-syzkaller-g5f5673607153 #0 Not tainted [ 32.940498][ C1] -------------------------------- [ 32.941644][ C1] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 32.943181][ C1] ksoftirqd/1/24 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 32.944638][ C1] ffff0000db7f11e0 (&pch->downl){+.?.}-{2:2}, at: ppp_input+0x16c/0x854 [ 32.946614][ C1] {SOFTIRQ-ON-W} state was registered at: [ 32.947821][ C1] lock_acquire+0x240/0x728 [ 32.948809][ C1] _raw_spin_lock+0x48/0x60 [ 32.949814][ C1] ppp_input+0x16c/0x854 [ 32.950750][ C1] pppoe_rcv_core+0xfc/0x314 [ 32.951834][ C1] __release_sock+0x1a8/0x3d8 [ 32.952919][ C1] release_sock+0x68/0x1b8 [ 32.953955][ C1] pppoe_sendmsg+0xc8/0x5d8 [ 32.954942][ C1] __sys_sendto+0x374/0x4f4 [ 32.955948][ C1] __arm64_sys_sendto+0xd8/0xf8 [ 32.956990][ C1] invoke_syscall+0x98/0x2b8 [ 32.958110][ C1] el0_svc_common+0x130/0x23c [ 32.959277][ C1] do_el0_svc+0x48/0x58 [ 32.960225][ C1] el0_svc+0x54/0x168 [ 32.961129][ C1] el0t_64_sync_handler+0x84/0xfc [ 32.962341][ C1] el0t_64_sync+0x190/0x194 [ 32.963344][ C1] irq event stamp: 282914 [ 32.964280][ C1] hardirqs last enabled at (282914): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 32.966744][ C1] hardirqs last disabled at (282913): [] _raw_spin_lock_irqsave+0x2c/0x7c [ 32.969045][ C1] softirqs last enabled at (282904): [] handle_softirqs+0xa3c/0xbfc [ 32.971215][ C1] softirqs last disabled at (282909): [] run_ksoftirqd+0x70/0x158 [ 32.973192][ C1] [ 32.973192][ C1] other info that might help us debug this: [ 32.974913][ C1] Possible unsafe locking scenario: [ 32.974913][ C1] [ 32.976492][ C1] CPU0 [ 32.977228][ C1] ---- [ 32.977986][ C1] lock(&pch->downl); [ 32.978925][ C1] [ 32.979711][ C1] lock(&pch->downl); [ 32.980559][ C1] [ 32.980559][ C1] *** DEADLOCK *** [ 32.980559][ C1] [ 32.982259][ C1] 1 lock held by ksoftirqd/1/24: [ 32.983386][ C1] #0: ffff80008f74dfa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c [ 32.985522][ C1] [ 32.985522][ C1] stack backtrace: [ 32.986815][ C1] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0 [ 32.988998][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 32.991195][ C1] Call trace: [ 32.991997][ C1] dump_backtrace+0x1b8/0x1e4 [ 32.992971][ C1] show_stack+0x2c/0x3c [ 32.993979][ C1] dump_stack_lvl+0xe4/0x150 [ 32.995036][ C1] dump_stack+0x1c/0x28 [ 32.996008][ C1] print_usage_bug+0x698/0x9ac [ 32.997014][ C1] mark_lock_irq+0x980/0xd2c [ 32.997960][ C1] mark_lock+0x258/0x360 [ 32.998845][ C1] __lock_acquire+0xf48/0x779c [ 32.999912][ C1] lock_acquire+0x240/0x728 [ 33.000924][ C1] _raw_spin_lock+0x48/0x60 [ 33.001901][ C1] ppp_input+0x16c/0x854 [ 33.002794][ C1] ppp_async_process+0x98/0x150 [ 33.003733][ C1] tasklet_action_common+0x318/0x3f4 [ 33.004932][ C1] tasklet_action+0x68/0x8c [ 33.005921][ C1] handle_softirqs+0x2e4/0xbfc [ 33.006967][ C1] run_ksoftirqd+0x70/0x158 [ 33.007970][ C1] smpboot_thread_fn+0x4b0/0x90c [ 33.009056][ C1] kthread+0x288/0x310 [ 33.009915][ C1] ret_from_fork+0x10/0x20