============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- net/sched/sch_generic.c:1250 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 0 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 dev_activate+0x250/0xb34 net/sched/sch_generic.c:1250 linkwatch_do_dev+0x11c/0x144 net/core/link_watch.c:173 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- net/sched/sch_generic.c:1228 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 0 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 transition_one_qdisc+0x124/0x18c net/sched/sch_generic.c:1228 netdev_for_each_tx_queue include/linux/netdevice.h:2504 [inline] dev_activate+0x18c/0xb34 net/sched/sch_generic.c:1258 linkwatch_do_dev+0x11c/0x144 net/core/link_watch.c:173 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- include/linux/rtnetlink.h:100 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 0 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 dev_ingress_queue include/linux/rtnetlink.h:100 [inline] dev_activate+0x470/0xb34 net/sched/sch_generic.c:1259 linkwatch_do_dev+0x11c/0x144 net/core/link_watch.c:173 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- include/linux/inetdevice.h:252 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 0 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 __in_dev_get_rtnl include/linux/inetdevice.h:252 [inline] arp_netdev_event+0x230/0x29c net/ipv4/arp.c:1336 notifier_call_chain+0x120/0x3f8 kernel/notifier.c:93 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:461 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:1996 netdev_state_change net/core/dev.c:1378 [inline] netdev_state_change+0xe0/0x10c net/core/dev.c:1371 linkwatch_do_dev+0xd0/0x144 net/core/link_watch.c:177 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- include/linux/inetdevice.h:252 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 0 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 __in_dev_get_rtnl include/linux/inetdevice.h:252 [inline] inetdev_event+0x3b8/0x111c net/ipv4/devinet.c:1572 notifier_call_chain+0x120/0x3f8 kernel/notifier.c:93 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:461 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:1996 netdev_state_change net/core/dev.c:1378 [inline] netdev_state_change+0xe0/0x10c net/core/dev.c:1371 linkwatch_do_dev+0xd0/0x144 net/core/link_watch.c:177 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- include/linux/inetdevice.h:252 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 0 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 __in_dev_get_rtnl include/linux/inetdevice.h:252 [inline] fib_netdev_event+0x1b0/0x4dc net/ipv4/fib_frontend.c:1479 notifier_call_chain+0x120/0x3f8 kernel/notifier.c:93 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:461 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:1996 netdev_state_change net/core/dev.c:1378 [inline] netdev_state_change+0xe0/0x10c net/core/dev.c:1371 linkwatch_do_dev+0xd0/0x144 net/core/link_watch.c:177 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- drivers/net/bonding/bond_main.c:3987 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 0 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 bond_slave_netdev_event drivers/net/bonding/bond_main.c:3987 [inline] bond_netdev_event+0x570/0xa68 drivers/net/bonding/bond_main.c:4129 notifier_call_chain+0x120/0x3f8 kernel/notifier.c:93 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:461 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:1996 netdev_state_change net/core/dev.c:1378 [inline] netdev_state_change+0xe0/0x10c net/core/dev.c:1371 linkwatch_do_dev+0xd0/0x144 net/core/link_watch.c:177 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= WARNING: suspicious RCU usage 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Not tainted ----------------------------- drivers/net/bonding/bond_main.c:4002 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 1 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x23c/0x40c kernel/locking/lockdep.c:6821 bond_slave_netdev_event drivers/net/bonding/bond_main.c:4002 [inline] bond_netdev_event+0x5c8/0xa68 drivers/net/bonding/bond_main.c:4129 notifier_call_chain+0x120/0x3f8 kernel/notifier.c:93 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:461 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:1996 netdev_state_change net/core/dev.c:1378 [inline] netdev_state_change+0xe0/0x10c net/core/dev.c:1371 linkwatch_do_dev+0xd0/0x144 net/core/link_watch.c:177 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585 in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 6803, name: kworker/u8:10 preempt_count: 0, expected: 0 RCU nest depth: 1, expected: 0 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 CPU: 1 UID: 0 PID: 6803 Comm: kworker/u8:10 Not tainted 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xdc/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 __might_resched+0x3dc/0x5bc kernel/sched/core.c:8653 __might_sleep+0x94/0x154 kernel/sched/core.c:8582 __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0xbc/0x840 kernel/locking/mutex.c:752 mutex_lock_nested+0x24/0x30 kernel/locking/mutex.c:804 tee_netdev_event+0x78/0x3e4 net/netfilter/xt_TEE.c:68 notifier_call_chain+0x120/0x3f8 kernel/notifier.c:93 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:461 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:1996 netdev_state_change net/core/dev.c:1378 [inline] netdev_state_change+0xe0/0x10c net/core/dev.c:1371 linkwatch_do_dev+0xd0/0x144 net/core/link_watch.c:177 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 ============================= [ BUG: Invalid wait context ] 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Tainted: G W ----------------------------- kworker/u8:10/6803 is trying to lock: ffff000016216878 (&tn->lock){+.+.}-{3:3}, at: tee_netdev_event+0x78/0x3e4 net/netfilter/xt_TEE.c:68 other info that might help us debug this: context-{4:4} 3 locks held by kworker/u8:10/6803: #0: ffff000019fc2148 ((wq_completion)bond0#2){+.+.}-{0:0}, at: process_one_work+0x6e4/0x189c kernel/workqueue.c:3204 #1: ffff80008f497ce0 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x708/0x189c kernel/workqueue.c:3204 #2: ffff800086de64e0 (rcu_read_lock){....}-{1:2}, at: bond_mii_monitor+0xfc/0x20b0 drivers/net/bonding/bond_main.c:2934 stack backtrace: CPU: 1 UID: 0 PID: 6803 Comm: kworker/u8:10 Tainted: G W 6.12.0-rc4-syzkaller-00047-gc2ee9f594da8 #0 Tainted: [W]=WARN Hardware name: linux,dummy-virt (DT) Workqueue: bond0 bond_mii_monitor Call trace: dump_backtrace+0x9c/0x11c arch/arm64/kernel/stacktrace.c:319 show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xa4/0xf4 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 print_lock_invalid_wait_context kernel/locking/lockdep.c:4802 [inline] check_wait_context kernel/locking/lockdep.c:4874 [inline] __lock_acquire+0x1498/0x64bc kernel/locking/lockdep.c:5152 lock_acquire.part.0+0x224/0x4f4 kernel/locking/lockdep.c:5825 lock_acquire+0x90/0xb4 kernel/locking/lockdep.c:5798 __mutex_lock_common kernel/locking/mutex.c:608 [inline] __mutex_lock+0x134/0x840 kernel/locking/mutex.c:752 mutex_lock_nested+0x24/0x30 kernel/locking/mutex.c:804 tee_netdev_event+0x78/0x3e4 net/netfilter/xt_TEE.c:68 notifier_call_chain+0x120/0x3f8 kernel/notifier.c:93 raw_notifier_call_chain+0x18/0x24 kernel/notifier.c:461 call_netdevice_notifiers_info+0x88/0xe8 net/core/dev.c:1996 netdev_state_change net/core/dev.c:1378 [inline] netdev_state_change+0xe0/0x10c net/core/dev.c:1371 linkwatch_do_dev+0xd0/0x144 net/core/link_watch.c:177 linkwatch_sync_dev+0x11c/0x1b0 net/core/link_watch.c:263 ethtool_op_get_link+0x18/0x54 net/ethtool/ioctl.c:62 bond_check_dev_link+0x140/0x2a0 drivers/net/bonding/bond_main.c:873 bond_miimon_inspect drivers/net/bonding/bond_main.c:2717 [inline] bond_mii_monitor+0x2f0/0x20b0 drivers/net/bonding/bond_main.c:2939 process_one_work+0x7b8/0x189c kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x730/0xb74 kernel/workqueue.c:3391 kthread+0x27c/0x300 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860