Warning: Permanently added '10.128.0.106' (ECDSA) to the list of known hosts. executing program [ 30.491892] [ 30.493529] ====================================================== [ 30.499818] WARNING: possible circular locking dependency detected [ 30.506106] 4.14.287-syzkaller #0 Not tainted [ 30.510568] ------------------------------------------------------ [ 30.516858] kworker/u4:4/2850 is trying to acquire lock: [ 30.522284] (sk_lock-AF_INET6){+.+.}, at: [] strp_work+0x3e/0x100 [ 30.530233] [ 30.530233] but task is already holding lock: [ 30.536171] ((&strp->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 30.544566] [ 30.544566] which lock already depends on the new lock. [ 30.544566] [ 30.552848] [ 30.552848] the existing dependency chain (in reverse order) is: [ 30.560439] [ 30.560439] -> #1 ((&strp->work)){+.+.}: [ 30.565955] flush_work+0xad/0x770 [ 30.569985] __cancel_work_timer+0x321/0x460 [ 30.574884] strp_done+0x53/0xd0 [ 30.578742] kcm_ioctl+0x828/0xfb0 [ 30.582772] sock_ioctl+0x2cc/0x4c0 [ 30.586890] do_vfs_ioctl+0x75a/0xff0 [ 30.591179] SyS_ioctl+0x7f/0xb0 [ 30.595037] do_syscall_64+0x1d5/0x640 [ 30.599415] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 30.605092] [ 30.605092] -> #0 (sk_lock-AF_INET6){+.+.}: [ 30.610874] lock_acquire+0x170/0x3f0 [ 30.615164] lock_sock_nested+0xb7/0x100 [ 30.619716] strp_work+0x3e/0x100 [ 30.623660] process_one_work+0x793/0x14a0 [ 30.628394] worker_thread+0x5cc/0xff0 [ 30.632773] kthread+0x30d/0x420 [ 30.636628] ret_from_fork+0x24/0x30 [ 30.640842] [ 30.640842] other info that might help us debug this: [ 30.640842] [ 30.648961] Possible unsafe locking scenario: [ 30.648961] [ 30.654988] CPU0 CPU1 [ 30.659621] ---- ---- [ 30.664257] lock((&strp->work)); [ 30.667783] lock(sk_lock-AF_INET6); [ 30.674079] lock((&strp->work)); [ 30.680103] lock(sk_lock-AF_INET6); [ 30.683873] [ 30.683873] *** DEADLOCK *** [ 30.683873] [ 30.689902] 2 locks held by kworker/u4:4/2850: [ 30.694448] #0: ("%s""kstrp"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 [ 30.703089] #1: ((&strp->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 30.711901] [ 30.711901] stack backtrace: [ 30.716374] CPU: 1 PID: 2850 Comm: kworker/u4:4 Not tainted 4.14.287-syzkaller #0 [ 30.723960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 30.733301] Workqueue: kstrp strp_work [ 30.737162] Call Trace: [ 30.739722] dump_stack+0x1b2/0x281 [ 30.743321] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 30.749089] __lock_acquire+0x2e0e/0x3f20 [ 30.753210] ? __schedule+0x893/0x1de0 [ 30.757068] ? trace_hardirqs_on+0x10/0x10 [ 30.761273] ? lock_acquire+0x170/0x3f0 [ 30.765232] ? lock_sock_nested+0x98/0x100 [ 30.769443] lock_acquire+0x170/0x3f0 [ 30.773227] ? strp_work+0x3e/0x100 [ 30.776828] lock_sock_nested+0xb7/0x100 [ 30.780863] ? strp_work+0x3e/0x100 [ 30.784462] strp_work+0x3e/0x100 [ 30.787888] process_one_work+0x793/0x14a0 [ 30.79209