================================
WARNING: inconsistent lock state
4.19.106-syzkaller #0 Not tainted
--------------------------------
inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage.
kworker/u4:7/9941 [HC0[0]:SC1[1]:HE1:SE0] takes:
00000000dcd24b96 (&(&local->client_conns_lock)->rlock){+.?.}, at: spin_lock include/linux/spinlock.h:329 [inline]
00000000dcd24b96 (&(&local->client_conns_lock)->rlock){+.?.}, at: rxrpc_put_one_client_conn net/rxrpc/conn_client.c:949 [inline]
00000000dcd24b96 (&(&local->client_conns_lock)->rlock){+.?.}, at: rxrpc_put_client_conn+0x666/0xc00 net/rxrpc/conn_client.c:1002
{SOFTIRQ-ON-W} state was registered at:
  __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline]
  _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144
  spin_lock include/linux/spinlock.h:329 [inline]
  rxrpc_get_client_conn net/rxrpc/conn_client.c:309 [inline]
  rxrpc_connect_call+0x301/0x4630 net/rxrpc/conn_client.c:702
  rxrpc_new_client_call+0x8c6/0x1850 net/rxrpc/call_object.c:291
  rxrpc_new_client_call_for_sendmsg net/rxrpc/sendmsg.c:596 [inline]
  rxrpc_do_sendmsg+0xf2e/0x1bc1 net/rxrpc/sendmsg.c:652
  rxrpc_sendmsg+0x4a8/0x5b0 net/rxrpc/af_rxrpc.c:593
  sock_sendmsg_nosec net/socket.c:622 [inline]
  sock_sendmsg+0xcf/0x120 net/socket.c:632
  ___sys_sendmsg+0x3e2/0x920 net/socket.c:2115
  __sys_sendmmsg+0x195/0x470 net/socket.c:2210
  __do_sys_sendmmsg net/socket.c:2239 [inline]
  __se_sys_sendmmsg net/socket.c:2236 [inline]
  __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236
  do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
  entry_SYSCALL_64_after_hwframe+0x49/0xbe
irq event stamp: 37293446
hardirqs last  enabled at (37293446): [<ffffffff871f84d7>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline]
hardirqs last  enabled at (37293446): [<ffffffff871f84d7>] _raw_spin_unlock_irqrestore+0x67/0xe0 kernel/locking/spinlock.c:184
hardirqs last disabled at (37293445): [<ffffffff871f8746>] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline]
hardirqs last disabled at (37293445): [<ffffffff871f8746>] _raw_spin_lock_irqsave+0x66/0xbf kernel/locking/spinlock.c:152
softirqs last  enabled at (37293372): [<ffffffff87400650>] __do_softirq+0x650/0x93c kernel/softirq.c:318
softirqs last disabled at (37293387): [<ffffffff813e406b>] invoke_softirq kernel/softirq.c:372 [inline]
softirqs last disabled at (37293387): [<ffffffff813e406b>] irq_exit+0x17b/0x1c0 kernel/softirq.c:412

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&(&local->client_conns_lock)->rlock);
  <Interrupt>
    lock(&(&local->client_conns_lock)->rlock);

 *** DEADLOCK ***

4 locks held by kworker/u4:7/9941:
 #0: 0000000060677a62 ((wq_completion)"%s""netns"){+.+.}, at: __write_once_size include/linux/compiler.h:220 [inline]
 #0: 0000000060677a62 ((wq_completion)"%s""netns"){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: 0000000060677a62 ((wq_completion)"%s""netns"){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:40 [inline]
 #0: 0000000060677a62 ((wq_completion)"%s""netns"){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:59 [inline]
 #0: 0000000060677a62 ((wq_completion)"%s""netns"){+.+.}, at: set_work_data kernel/workqueue.c:617 [inline]
 #0: 0000000060677a62 ((wq_completion)"%s""netns"){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline]
 #0: 0000000060677a62 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x81a/0x1640 kernel/workqueue.c:2124
 #1: 0000000097100b62 (net_cleanup_work){+.+.}, at: process_one_work+0x84e/0x1640 kernel/workqueue.c:2128
 #2: 00000000ef0ad91f (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x850 net/core/net_namespace.c:520
 #3: 0000000048d41b54 (rcu_callback){....}, at: __rcu_reclaim kernel/rcu/rcu.h:226 [inline]
 #3: 0000000048d41b54 (rcu_callback){....}, at: rcu_do_batch kernel/rcu/tree.c:2584 [inline]
 #3: 0000000048d41b54 (rcu_callback){....}, at: invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline]
 #3: 0000000048d41b54 (rcu_callback){....}, at: __rcu_process_callbacks kernel/rcu/tree.c:2864 [inline]
 #3: 0000000048d41b54 (rcu_callback){....}, at: rcu_process_callbacks+0xbff/0x17f0 kernel/rcu/tree.c:2881

stack backtrace:
CPU: 0 PID: 9941 Comm: kworker/u4:7 Not tainted 4.19.106-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x188/0x20d lib/dump_stack.c:118
 print_usage_bug.cold+0x327/0x425 kernel/locking/lockdep.c:2540
 valid_state kernel/locking/lockdep.c:2553 [inline]
 mark_lock_irq kernel/locking/lockdep.c:2747 [inline]
 mark_lock+0xc71/0x11b0 kernel/locking/lockdep.c:3127
 mark_irqflags kernel/locking/lockdep.c:3005 [inline]
 __lock_acquire+0xc62/0x49c0 kernel/locking/lockdep.c:3368
 lock_acquire+0x170/0x400 kernel/locking/lockdep.c:3903
 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline]
 _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144
 spin_lock include/linux/spinlock.h:329 [inline]
 rxrpc_put_one_client_conn net/rxrpc/conn_client.c:949 [inline]
 rxrpc_put_client_conn+0x666/0xc00 net/rxrpc/conn_client.c:1002
 rxrpc_put_connection net/rxrpc/ar-internal.h:951 [inline]
 rxrpc_rcu_destroy_call+0xb6/0x1e0 net/rxrpc/call_object.c:657
 __rcu_reclaim kernel/rcu/rcu.h:236 [inline]
 rcu_do_batch kernel/rcu/tree.c:2584 [inline]
 invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline]
 __rcu_process_callbacks kernel/rcu/tree.c:2864 [inline]
 rcu_process_callbacks+0xb2d/0x17f0 kernel/rcu/tree.c:2881
 __do_softirq+0x26c/0x93c kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:372 [inline]
 irq_exit+0x17b/0x1c0 kernel/softirq.c:412
 exiting_irq arch/x86/include/asm/apic.h:544 [inline]
 smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1094
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893
 </IRQ>
RIP: 0010:lock_acquire+0x3e/0x400 kernel/locking/lockdep.c:3895
Code: 41 55 41 89 d5 41 54 41 89 f4 55 48 89 fd 53 65 48 8b 1c 25 40 ee 01 00 48 8d bb 7c 08 00 00 48 83 ec 20 48 89 fa 4c 89 0c 24 <48> c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84
RSP: 0018:ffff88805fb37af8 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
RAX: dffffc0000000000 RBX: ffff8880a1208240 RCX: 0000000000000002
RDX: ffff8880a1208abc RSI: 0000000000000000 RDI: ffff8880a1208abc
RBP: ffffffff88b92960 R08: 0000000000000000 R09: 0000000000000000
R10: ffffed1015cc4732 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000002 R15: dffffc0000000000
 rcu_lock_acquire include/linux/rcupdate.h:242 [inline]
 rcu_read_lock include/linux/rcupdate.h:627 [inline]
 inet_twsk_purge+0x112/0x765 net/ipv4/inet_timewait_sock.c:267
 ops_exit_list.isra.0+0xef/0x140 net/core/net_namespace.c:156
 cleanup_net+0x3bf/0x850 net/core/net_namespace.c:553
 process_one_work+0x91f/0x1640 kernel/workqueue.c:2153
 worker_thread+0x96/0xe20 kernel/workqueue.c:2296
 kthread+0x34a/0x420 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'.
selinux_nlmsg_perm: 14 callbacks suppressed
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'.
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3870 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3841 comm=syz-executor.3
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3870 comm=syz-executor.3
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'.
XFS (loop2): Invalid superblock magic number
XFS (loop2): Invalid superblock magic number
XFS (loop2): Invalid superblock magic number
XFS (loop2): Invalid superblock magic number
vivid-000: kernel_thread() failed