[ 127.582103][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 189.016647][ T1206] ieee802154 phy0 wpan0: encryption failed: -22 [ 189.023004][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 196.223544][ T5036] Bluetooth: hci0: command 0x0406 tx timeout [ 250.455655][ T1206] ieee802154 phy0 wpan0: encryption failed: -22 [ 250.461987][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 311.896493][ T1206] ieee802154 phy0 wpan0: encryption failed: -22 [ 311.903423][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 373.335670][ T1206] ieee802154 phy0 wpan0: encryption failed: -22 [ 373.342102][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 432.006609][ T10] device hsr_slave_0 left promiscuous mode [ 432.012873][ T10] device hsr_slave_1 left promiscuous mode [ 432.019417][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 432.027441][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 432.036354][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 432.044306][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 432.053514][ T10] device bridge_slave_1 left promiscuous mode [ 432.060329][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.068434][ T10] device bridge_slave_0 left promiscuous mode [ 432.074952][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.085747][ T10] device veth1_macvtap left promiscuous mode [ 432.092113][ T10] device veth0_macvtap left promiscuous mode [ 432.098626][ T10] device veth1_vlan left promiscuous mode [ 432.104875][ T10] device veth0_vlan left promiscuous mode [ 432.223197][ T10] team0 (unregistering): Port device team_slave_1 removed [ 432.241186][ T10] team0 (unregistering): Port device team_slave_0 removed [ 432.251658][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 432.265137][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 432.309106][ T10] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.10.4' (ECDSA) to the list of known hosts. [ 433.548425][ T6765] cgroup: Unknown subsys name 'net' [ 433.558030][ T6765] cgroup: Unknown subsys name 'rlimit' [ 433.659821][ T6766] chnl_net:caif_netlink_parms(): no params data found [ 433.720917][ T6766] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.728453][ T6766] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.737044][ T6766] device bridge_slave_0 entered promiscuous mode [ 433.745658][ T6766] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.752967][ T6766] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.760800][ T6766] device bridge_slave_1 entered promiscuous mode [ 433.786906][ T6766] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 433.797760][ T6766] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 433.820419][ T6766] team0: Port device team_slave_0 added [ 433.828421][ T6766] team0: Port device team_slave_1 added [ 433.844755][ T6766] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 433.851810][ T6766] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 433.878072][ T6766] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 433.890157][ T6766] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 433.897295][ T6766] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 433.923865][ T6766] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 433.948762][ T6766] device hsr_slave_0 entered promiscuous mode [ 433.955476][ T6766] device hsr_slave_1 entered promiscuous mode [ 434.015259][ T6766] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.022574][ T6766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.030199][ T6766] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.037367][ T6766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.071700][ T6766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 434.084360][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.094609][ T2232] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.102672][ T2232] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.111484][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 434.124026][ T6766] 8021q: adding VLAN 0 to HW filter on device team0 [ 434.134554][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.142967][ T2232] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.150506][ T2232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.160956][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.170132][ T6705] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.177395][ T6705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.196391][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 434.205305][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 434.219465][ T6766] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 434.230462][ T6766] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 434.243502][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 434.251672][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.260817][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.269211][ T2232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 434.287348][ T6766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 434.295384][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 434.302897][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 434.514134][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 434.527746][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.536733][ T6766] device veth0_vlan entered promiscuous mode [ 434.545779][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.553738][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.565814][ T6766] device veth1_vlan entered promiscuous mode [ 434.582763][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 434.590778][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 434.599003][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 434.609482][ T6766] device veth0_macvtap entered promiscuous mode [ 434.618356][ T6766] device veth1_macvtap entered promiscuous mode [ 434.632015][ T6766] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 434.640531][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 434.650237][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 434.660796][ T6766] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 434.669797][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 434.678530][ T6705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 434.774594][ T1206] ieee802154 phy0 wpan0: encryption failed: -22 [ 434.780937][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 496.216089][ T1206] ieee802154 phy0 wpan0: encryption failed: -22 [ 496.222495][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 557.656483][ T1206] ieee802154 phy0 wpan0: encryption failed: -22 [ 557.662902][ T1206] ieee802154 phy1 wpan1: encryption failed: -22 [ 574.630660][ T8619] [ 574.633035][ T8619] ====================================================== [ 574.640047][ T8619] WARNING: possible circular locking dependency detected [ 574.647040][ T8619] 6.2.0-rc6-syzkaller #0 Not tainted [ 574.652465][ T8619] ------------------------------------------------------ [ 574.659450][ T8619] syz-executor343/8619 is trying to acquire lock: [ 574.665835][ T8619] ffff888028fed630 (&rs->rs_recv_lock){...-}-{2:2}, at: rds_wake_sk_sleep+0x1a/0xc0 [ 574.675290][ T8619] [ 574.675290][ T8619] but task is already holding lock: [ 574.682688][ T8619] ffff88807dd3c100 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0x1e7/0x9a0 [ 574.692892][ T8619] [ 574.692892][ T8619] which lock already depends on the new lock. [ 574.692892][ T8619] [ 574.703370][ T8619] [ 574.703370][ T8619] the existing dependency chain (in reverse order) is: [ 574.712404][ T8619] [ 574.712404][ T8619] -> #1 (&rm->m_rs_lock){..-.}-{2:2}: [ 574.719963][ T8619] _raw_spin_lock_irqsave+0x39/0x50 [ 574.725729][ T8619] rds_message_put+0x16d/0xad0 [ 574.730993][ T8619] rds_clear_recv_queue+0x1c5/0x350 [ 574.736685][ T8619] rds_release+0xca/0x350 [ 574.741677][ T8619] __sock_release+0xbb/0x270 [ 574.746841][ T8619] sock_close+0xf/0x20 [ 574.751437][ T8619] __fput+0x1fa/0x9a0 [ 574.756073][ T8619] task_work_run+0x12b/0x220 [ 574.761203][ T8619] exit_to_user_mode_prepare+0x23c/0x250 [ 574.767387][ T8619] syscall_exit_to_user_mode+0x19/0x50 [ 574.773349][ T8619] do_syscall_64+0x42/0xb0 [ 574.778277][ T8619] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 574.784819][ T8619] [ 574.784819][ T8619] -> #0 (&rs->rs_recv_lock){...-}-{2:2}: [ 574.792709][ T8619] __lock_acquire+0x2a43/0x56d0 [ 574.798139][ T8619] lock_acquire+0x1df/0x630 [ 574.803574][ T8619] _raw_read_lock_irqsave+0x45/0x90 [ 574.809286][ T8619] rds_wake_sk_sleep+0x1a/0xc0 [ 574.814630][ T8619] rds_send_remove_from_sock+0x256/0x9a0 [ 574.820780][ T8619] rds_send_path_drop_acked+0x276/0x360 [ 574.826905][ T8619] rds_tcp_write_space+0x196/0x5a0 [ 574.832564][ T8619] tcp_check_space+0xde/0x730 [ 574.837762][ T8619] tcp_rcv_established+0x7b5/0x2250 [ 574.843451][ T8619] tcp_v4_do_rcv+0x540/0x7f0 [ 574.848673][ T8619] __release_sock+0x113/0x360 [ 574.853853][ T8619] release_sock+0x4a/0x170 [ 574.858940][ T8619] rds_send_xmit+0x87e/0x2360 [ 574.864373][ T8619] rds_sendmsg+0x1d90/0x28d0 [ 574.869541][ T8619] sock_sendmsg+0xab/0xe0 [ 574.874709][ T8619] __sys_sendto+0x1bb/0x290 [ 574.879700][ T8619] __x64_sys_sendto+0xd8/0x1b0 [ 574.885050][ T8619] do_syscall_64+0x35/0xb0 [ 574.889968][ T8619] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 574.896452][ T8619] [ 574.896452][ T8619] other info that might help us debug this: [ 574.896452][ T8619] [ 574.906655][ T8619] Possible unsafe locking scenario: [ 574.906655][ T8619] [ 574.914176][ T8619] CPU0 CPU1 [ 574.919613][ T8619] ---- ---- [ 574.925037][ T8619] lock(&rm->m_rs_lock); [ 574.929361][ T8619] lock(&rs->rs_recv_lock); [ 574.936441][ T8619] lock(&rm->m_rs_lock); [ 574.943263][ T8619] lock(&rs->rs_recv_lock); [ 574.947916][ T8619] [ 574.947916][ T8619] *** DEADLOCK *** [ 574.947916][ T8619] [ 574.956224][ T8619] 3 locks held by syz-executor343/8619: [ 574.961841][ T8619] #0: ffff88807e2bc7b0 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0xe/0x70 [ 574.971632][ T8619] #1: ffff88807e2bca38 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x20/0x5a0 [ 574.981852][ T8619] #2: ffff88807dd3c100 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0x1e7/0x9a0 [ 574.992264][ T8619] [ 574.992264][ T8619] stack backtrace: [ 574.998142][ T8619] CPU: 0 PID: 8619 Comm: syz-executor343 Not tainted 6.2.0-rc6-syzkaller #0 [ 575.006798][ T8619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 575.016920][ T8619] Call Trace: [ 575.020183][ T8619] [ 575.023097][ T8619] dump_stack_lvl+0x57/0x7d [ 575.027615][ T8619] check_noncircular+0x25f/0x2e0 [ 575.032805][ T8619] ? print_circular_bug+0x1e0/0x1e0 [ 575.038070][ T8619] ? register_lock_class+0xbe/0x1120 [ 575.043413][ T8619] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 575.049232][ T8619] ? __stack_depot_save+0x260/0x560 [ 575.054721][ T8619] ? is_dynamic_key.part.0+0x130/0x130 [ 575.060154][ T8619] __lock_acquire+0x2a43/0x56d0 [ 575.064980][ T8619] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 575.070932][ T8619] ? lock_chain_count+0x20/0x20 [ 575.075756][ T8619] ? debug_check_no_obj_freed+0x20c/0x420 [ 575.081508][ T8619] lock_acquire+0x1df/0x630 [ 575.085985][ T8619] ? rds_wake_sk_sleep+0x1a/0xc0 [ 575.090894][ T8619] ? lock_release+0x810/0x810 [ 575.095626][ T8619] ? lock_release+0x810/0x810 [ 575.100293][ T8619] ? do_raw_spin_lock+0x120/0x2a0 [ 575.105291][ T8619] ? rwlock_bug.part.0+0x90/0x90 [ 575.110288][ T8619] ? lockdep_hardirqs_on_prepare+0x17b/0x400 [ 575.116239][ T8619] _raw_read_lock_irqsave+0x45/0x90 [ 575.121499][ T8619] ? rds_wake_sk_sleep+0x1a/0xc0 [ 575.126416][ T8619] rds_wake_sk_sleep+0x1a/0xc0 [ 575.131585][ T8619] rds_send_remove_from_sock+0x256/0x9a0 [ 575.137215][ T8619] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 575.142995][ T8619] rds_send_path_drop_acked+0x276/0x360 [ 575.148521][ T8619] ? rds_tcp_recv_exit+0x10/0x10 [ 575.153558][ T8619] ? rds_send_remove_from_sock+0x9a0/0x9a0 [ 575.159358][ T8619] ? mark_held_locks+0x9f/0xe0 [ 575.164179][ T8619] ? sk_stream_wait_close+0x300/0x300 [ 575.169635][ T8619] rds_tcp_write_space+0x196/0x5a0 [ 575.174717][ T8619] tcp_check_space+0xde/0x730 [ 575.179377][ T8619] tcp_rcv_established+0x7b5/0x2250 [ 575.184672][ T8619] ? __release_sock+0xc2/0x360 [ 575.189496][ T8619] ? tcp_check_space+0x730/0x730 [ 575.194684][ T8619] tcp_v4_do_rcv+0x540/0x7f0 [ 575.199255][ T8619] __release_sock+0x113/0x360 [ 575.203904][ T8619] release_sock+0x4a/0x170 [ 575.208316][ T8619] rds_send_xmit+0x87e/0x2360 [ 575.212979][ T8619] ? lockdep_hardirqs_on_prepare+0x17b/0x400 [ 575.219105][ T8619] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 575.225236][ T8619] ? lockdep_hardirqs_on+0x79/0x100 [ 575.230406][ T8619] ? rds_rdma_send_complete+0x470/0x470 [ 575.235926][ T8619] ? rds_send_queue_rm+0x4bc/0x6c0 [ 575.241012][ T8619] rds_sendmsg+0x1d90/0x28d0 [ 575.245572][ T8619] ? rds_send_drop_to+0x1380/0x1380 [ 575.250744][ T8619] ? selinux_socket_getpeername+0x2a0/0x2a0 [ 575.256677][ T8619] ? tomoyo_socket_bind_permission+0x2c0/0x2c0 [ 575.262923][ T8619] ? __fget_files+0x1bf/0x3a0 [ 575.267614][ T8619] ? rds_send_drop_to+0x1380/0x1380 [ 575.272976][ T8619] sock_sendmsg+0xab/0xe0 [ 575.277742][ T8619] __sys_sendto+0x1bb/0x290 [ 575.282231][ T8619] ? __ia32_sys_getpeername+0xa0/0xa0 [ 575.287747][ T8619] ? lock_downgrade+0x6e0/0x6e0 [ 575.292829][ T8619] ? lock_downgrade+0x6e0/0x6e0 [ 575.297735][ T8619] __x64_sys_sendto+0xd8/0x1b0 [ 575.302557][ T8619] ? syscall_enter_from_user_mode+0x22/0xb0 [ 575.308681][ T8619] do_syscall_64+0x35/0xb0 [ 575.313097][ T8619] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 575.318963][ T8619] RIP: 0033:0x7f294cf89139 [ 575.323350][ T8619] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 575.343383][ T8619] RSP: 002b:00007f294cf36308 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 575.351767][ T8619] RAX: ffffffffffffffda RBX: 00007f294d0124c8 RCX: 00007f294cf89139 [ 575.359714][ T8619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 575.367829][ T8619] RBP: 00007f294d0124c0 R08: 0000000000000000 R09: 0000000000000000 [ 575.375777][ T8619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f294cfdf5d0 [ 575.383736][ T8619] R13: 00007ffff27e954f R14: 00007f294cf36400 R15: 0000000000022000 [ 575.391684][ T8619]