syzbot


possible deadlock in smc_release

Status: upstream: reported C repro on 2024/01/29 16:17
Bug presence: origin:upstream
Labels: missing-backport
[Documentation on labels]
Reported-by: syzbot+edf7d3f5c58c3780ff30@syzkaller.appspotmail.com
First crash: 545d, last: 1d04h
Bug presence (3)
Date Name Commit Repro Result
2024/06/12 linux-6.1.y (ToT) 88690811da69 C [report] possible deadlock in smc_release
2024/01/29 upstream (ToT) 41bccc98fb79 C [report] possible deadlock in smc_release
2024/06/11 upstream (ToT) 83a7eefedc9b C Didn't crash
Similar bugs (2)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 possible deadlock in smc_release missing-backport origin:upstream 4 C error 546 10d 307d 0/3 upstream: reported C repro on 2024/09/24 05:56
upstream possible deadlock in smc_release smc 4 C error 106 9d02h 541d 0/29 upstream: reported C repro on 2024/02/02 13:26
Fix bisection attempts (5)
Created Duration User Patch Repo Result
2024/08/30 23:31 59m bisect fix linux-6.1.y OK (0) job log log
2024/07/24 03:35 3h59m fix candidate upstream OK (0) job log log
2024/05/14 06:47 1h03m bisect fix linux-6.1.y OK (0) job log log
2024/04/07 11:48 1h10m bisect fix linux-6.1.y OK (0) job log log
2024/03/08 02:31 2h05m bisect fix linux-6.1.y OK (0) job log log

Sample crash report:
netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
======================================================
WARNING: possible circular locking dependency detected
6.1.135-syzkaller #0 Not tainted
------------------------------------------------------
syz-executor345/4247 is trying to acquire lock:
ffff88802f850910 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}, at: __flush_work+0xd4/0xa60 kernel/workqueue.c:3072

but task is already holding lock:
ffff8880773f8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x251/0x530 net/smc/af_smc.c:-1

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 (sk_lock-AF_SMC/1){+.+.}-{0:0}:
       lock_sock_nested+0x44/0x100 net/core/sock.c:3488
       smc_listen_out+0x109/0x3d0 net/smc/af_smc.c:1865
       process_one_work+0x898/0x1160 kernel/workqueue.c:2292
       worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439
       kthread+0x29d/0x330 kernel/kthread.c:376
       ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295

-> #0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}:
       check_prev_add kernel/locking/lockdep.c:3090 [inline]
       check_prevs_add kernel/locking/lockdep.c:3209 [inline]
       validate_chain kernel/locking/lockdep.c:3825 [inline]
       __lock_acquire+0x2cf8/0x7c50 kernel/locking/lockdep.c:5049
       lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662
       __flush_work+0xed/0xa60 kernel/workqueue.c:3072
       __cancel_work_timer+0x3ac/0x520 kernel/workqueue.c:3163
       smc_clcsock_release+0x5c/0xe0 net/smc/smc_close.c:29
       __smc_release+0x661/0x7d0 net/smc/af_smc.c:300
       smc_close_non_accepted+0xd1/0x1f0 net/smc/af_smc.c:1798
       smc_close_cleanup_listen net/smc/smc_close.c:45 [inline]
       smc_close_active+0xb00/0xea0 net/smc/smc_close.c:225
       __smc_release+0x8d/0x7d0 net/smc/af_smc.c:276
       smc_release+0x2ca/0x530 net/smc/af_smc.c:343
       __sock_release net/socket.c:654 [inline]
       sock_close+0xd5/0x240 net/socket.c:1400
       __fput+0x22c/0x920 fs/file_table.c:320
       task_work_run+0x1ca/0x250 kernel/task_work.c:203
       exit_task_work include/linux/task_work.h:39 [inline]
       do_exit+0x936/0x2400 kernel/exit.c:871
       do_group_exit+0x217/0x2d0 kernel/exit.c:1021
       __do_sys_exit_group kernel/exit.c:1032 [inline]
       __se_sys_exit_group kernel/exit.c:1030 [inline]
       __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1030
       do_syscall_x64 arch/x86/entry/common.c:51 [inline]
       do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81
       entry_SYSCALL_64_after_hwframe+0x68/0xd2

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(sk_lock-AF_SMC/1);
                               lock((work_completion)(&new_smc->smc_listen_work));
                               lock(sk_lock-AF_SMC/1);
  lock((work_completion)(&new_smc->smc_listen_work));

 *** DEADLOCK ***

2 locks held by syz-executor345/4247:
 #0: ffff888072779410 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:758 [inline]
 #0: ffff888072779410 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release net/socket.c:653 [inline]
 #0: ffff888072779410 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x90/0x240 net/socket.c:1400
 #1: ffff8880773f8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x251/0x530 net/smc/af_smc.c:-1

stack backtrace:
CPU: 1 PID: 4247 Comm: syz-executor345 Not tainted 6.1.135-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
 <TASK>
 dump_stack_lvl+0x168/0x22e lib/dump_stack.c:106
 check_noncircular+0x274/0x310 kernel/locking/lockdep.c:2170
 check_prev_add kernel/locking/lockdep.c:3090 [inline]
 check_prevs_add kernel/locking/lockdep.c:3209 [inline]
 validate_chain kernel/locking/lockdep.c:3825 [inline]
 __lock_acquire+0x2cf8/0x7c50 kernel/locking/lockdep.c:5049
 lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662
 __flush_work+0xed/0xa60 kernel/workqueue.c:3072
 __cancel_work_timer+0x3ac/0x520 kernel/workqueue.c:3163
 smc_clcsock_release+0x5c/0xe0 net/smc/smc_close.c:29
 __smc_release+0x661/0x7d0 net/smc/af_smc.c:300
 smc_close_non_accepted+0xd1/0x1f0 net/smc/af_smc.c:1798
 smc_close_cleanup_listen net/smc/smc_close.c:45 [inline]
 smc_close_active+0xb00/0xea0 net/smc/smc_close.c:225
 __smc_release+0x8d/0x7d0 net/smc/af_smc.c:276
 smc_release+0x2ca/0x530 net/smc/af_smc.c:343
 __sock_release net/socket.c:654 [inline]
 sock_close+0xd5/0x240 net/socket.c:1400
 __fput+0x22c/0x920 fs/file_table.c:320
 task_work_run+0x1ca/0x250 kernel/task_work.c:203
 exit_task_work include/linux/task_work.h:39 [inline]
 do_exit+0x936/0x2400 kernel/exit.c:871
 do_group_exit+0x217/0x2d0 kernel/exit.c:1021
 __do_sys_exit_group kernel/exit.c:1032 [inline]
 __se_sys_exit_group kernel/exit.c:1030 [inline]
 __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1030
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f594b9c78e9
Code: Unable to access opcode bytes at 0x7f594b9c78bf.
RSP: 002b:00007fff6de6d728 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f594b9c78e9
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 00007f594ba47390 R08: ffffffffffffffb8 R09: 0

Crashes (561):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/04/27 08:59 linux-6.1.y 535ec20c5027 c6b4fb39 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2024/01/29 20:22 linux-6.1.y 883d1a956208 991a98f4 .config console log report syz C [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/01/17 04:19 linux-6.1.y c63962be84ef f9e07a6e .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2024/01/29 20:17 linux-6.1.y 883d1a956208 991a98f4 .config console log report syz C [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/21 23:49 linux-6.1.y 3369c6df2fae 56d87229 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/19 08:48 linux-6.1.y 3369c6df2fae 7117feec .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/18 13:25 linux-6.1.y 3369c6df2fae 88248e14 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/18 00:35 linux-6.1.y f2198ea7eb3e 0d1223f1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/17 20:46 linux-6.1.y f2198ea7eb3e 0d1223f1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/17 19:34 linux-6.1.y f2198ea7eb3e 0d1223f1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/17 08:20 linux-6.1.y f2198ea7eb3e 44f8051e .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/16 05:38 linux-6.1.y f2198ea7eb3e 03fcfc4b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/12 15:17 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/12 06:25 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/12 01:17 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/07 23:12 linux-6.1.y 04d1ccaa9c28 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/05 15:33 linux-6.1.y 7e69c33e4858 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/05 05:35 linux-6.1.y 7e69c33e4858 d869b261 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/04 13:32 linux-6.1.y 7e69c33e4858 76ad128c .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/06/30 06:50 linux-6.1.y 7e69c33e4858 fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/06/29 16:07 linux-6.1.y 7e69c33e4858 fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/06/29 16:07 linux-6.1.y 7e69c33e4858 fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/06/27 01:26 linux-6.1.y 58485ff1a74f 803ce19b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/06/27 00:12 linux-6.1.y 58485ff1a74f 803ce19b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/06/26 03:58 linux-6.1.y 58485ff1a74f 26d77996 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan possible deadlock in smc_release
2025/07/27 02:59 linux-6.1.y 3594f306da12 fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/21 20:28 linux-6.1.y 3369c6df2fae 56d87229 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/20 13:47 linux-6.1.y 3369c6df2fae 7117feec .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/17 09:46 linux-6.1.y f2198ea7eb3e 44f8051e .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/17 08:43 linux-6.1.y f2198ea7eb3e 44f8051e .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/17 06:05 linux-6.1.y f2198ea7eb3e 44f8051e .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/17 05:00 linux-6.1.y f2198ea7eb3e 44f8051e .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/16 17:12 linux-6.1.y f2198ea7eb3e 124ec9cc .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/12 13:17 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/12 10:27 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/12 10:23 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/11 23:10 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/11 20:59 linux-6.1.y dfc486ec9cce 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/08 23:11 linux-6.1.y 04d1ccaa9c28 4d9fdfa4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/08 00:32 linux-6.1.y 04d1ccaa9c28 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/06 06:34 linux-6.1.y 7e69c33e4858 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/05 14:35 linux-6.1.y 7e69c33e4858 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/05 01:03 linux-6.1.y 7e69c33e4858 d869b261 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/04 09:58 linux-6.1.y 7e69c33e4858 76ad128c .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/07/02 19:20 linux-6.1.y 7e69c33e4858 bc80e4f0 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/06/30 03:33 linux-6.1.y 7e69c33e4858 fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2025/06/26 21:58 linux-6.1.y 58485ff1a74f 803ce19b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
2024/01/29 16:16 linux-6.1.y 883d1a956208 991a98f4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 possible deadlock in smc_release
* Struck through repros no longer work on HEAD.