./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor649541892 <...> DUID 00:04:98:96:05:40:f2:aa:0a:66:7a:29:c2:20:2e:76:e0:ec forked to background, child pid 3209 [ 32.567886][ T3210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.592801][ T3210] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.10.11' (ECDSA) to the list of known hosts. execve("./syz-executor649541892", ["./syz-executor649541892"], 0x7ffd5322f4d0 /* 10 vars */) = 0 brk(NULL) = 0x555555e1f000 brk(0x555555e1fc40) = 0x555555e1fc40 arch_prctl(ARCH_SET_FS, 0x555555e1f300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor649541892", 4096) = 27 brk(0x555555e40c40) = 0x555555e40c40 brk(0x555555e41000) = 0x555555e41000 mprotect(0x7fe6a8c14000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 3635 attached , child_tidptr=0x555555e1f5d0) = 3635 [pid 3635] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 3635] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 3635] setsid() = 1 [pid 3635] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 3635] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 3635] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 3635] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 3635] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 3635] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 3635] unshare(CLONE_NEWNS) = 0 [pid 3635] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 3635] unshare(CLONE_NEWIPC) = 0 [pid 3635] unshare(CLONE_NEWCGROUP) = 0 [pid 3635] unshare(CLONE_NEWUTS) = 0 [pid 3635] unshare(CLONE_SYSVSEM) = 0 [pid 3635] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 3635] write(3, "16777216", 8) = 8 [pid 3635] close(3) = 0 [pid 3635] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 3635] write(3, "536870912", 9) = 9 [pid 3635] close(3) = 0 [pid 3635] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 3635] write(3, "1024", 4) = 4 [pid 3635] close(3) = 0 [pid 3635] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 3635] write(3, "8192", 4) = 4 [pid 3635] close(3) = 0 [pid 3635] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 3635] write(3, "1024", 4) = 4 [pid 3635] close(3) = 0 [pid 3635] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 3635] write(3, "1024", 4) = 4 [pid 3635] close(3) = 0 [pid 3635] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 3635] write(3, "1024 1048576 500 1024", 21) = 21 [pid 3635] close(3) = 0 [pid 3635] getpid() = 1 [pid 3635] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1< SOFTIRQ-unsafe lock order detected [ 61.000264][ T3635] 6.1.0-rc5-syzkaller-00103-g81ac25651a62 #0 Not tainted [ 61.007262][ T3635] ----------------------------------------------------- [ 61.014169][ T3635] syz-executor649/3635 [HC0[0]:SC0[4]:HE1:SE0] is trying to acquire: [ 61.022218][ T3635] ffff888079771bb8 (k-clock-AF_INET){+++.}-{2:2}, at: __mptcp_close+0x349/0x8d0 [ 61.031274][ T3635] [ 61.031274][ T3635] and this task is already holding: [ 61.038617][ T3635] ffff8880797718b0 (k-slock-AF_INET){+.-.}-{2:2}, at: __lock_sock_fast+0x40/0xe0 [ 61.047744][ T3635] which would create a new lock dependency: [ 61.053614][ T3635] (k-slock-AF_INET){+.-.}-{2:2} -> (k-clock-AF_INET){+++.}-{2:2} [ 61.061451][ T3635] [ 61.061451][ T3635] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 61.070879][ T3635] (k-slock-AF_INET){+.-.}-{2:2} [ 61.070897][ T3635] [ 61.070897][ T3635] ... which became SOFTIRQ-irq-safe at: [ 61.083492][ T3635] lock_acquire+0x1e3/0x630 [ 61.088079][ T3635] _raw_spin_lock+0x2e/0x40 [ 61.092661][ T3635] dccp_v4_ctl_send_reset+0xb00/0x12f0 [ 61.098222][ T3635] dccp_v4_rcv+0x1283/0x18e0 [ 61.102907][ T3635] ip_protocol_deliver_rcu+0x9f/0x7c0 [ 61.108376][ T3635] ip_local_deliver_finish+0x2ec/0x4c0 [ 61.113927][ T3635] ip_local_deliver+0x1ae/0x200 [ 61.118869][ T3635] ip_rcv_finish+0x1cf/0x2f0 [ 61.123550][ T3635] ip_rcv+0xae/0xd0 [ 61.127448][ T3635] __netif_receive_skb_one_core+0x114/0x180 [ 61.133446][ T3635] __netif_receive_skb+0x1f/0x1c0 [ 61.138577][ T3635] process_backlog+0x3e4/0x810 [ 61.143442][ T3635] __napi_poll+0xb8/0x770 [ 61.147872][ T3635] net_rx_action+0xa00/0xde0 [ 61.152567][ T3635] __do_softirq+0x1fb/0xadc [ 61.157176][ T3635] do_softirq.part.0+0xde/0x130 [ 61.162136][ T3635] __local_bh_enable_ip+0x106/0x130 [ 61.167426][ T3635] ip_finish_output2+0x7dc/0x2180 [ 61.172547][ T3635] __ip_finish_output+0x396/0x650 [ 61.177667][ T3635] ip_finish_output+0x31/0x280 [ 61.182525][ T3635] ip_output+0x1a3/0x320 [ 61.186860][ T3635] __ip_queue_xmit+0x8e2/0x1bf0 [ 61.191804][ T3635] dccp_transmit_skb+0xcfe/0x1450 [ 61.196935][ T3635] dccp_connect+0x39b/0x720 [ 61.201545][ T3635] dccp_v4_connect+0x1098/0x2010 [ 61.206580][ T3635] __inet_stream_connect+0x69e/0xed0 [ 61.211963][ T3635] inet_stream_connect+0x57/0xa0 [ 61.217001][ T3635] __sys_connect_file+0x153/0x1a0 [ 61.222113][ T3635] __sys_connect+0x165/0x1a0 [ 61.226792][ T3635] __x64_sys_connect+0x73/0xb0 [ 61.231645][ T3635] do_syscall_64+0x39/0xb0 [ 61.236162][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.242164][ T3635] [ 61.242164][ T3635] to a SOFTIRQ-irq-unsafe lock: [ 61.249182][ T3635] (k-clock-AF_INET){+++.}-{2:2} [ 61.249213][ T3635] [ 61.249213][ T3635] ... which became SOFTIRQ-irq-unsafe at: [ 61.262113][ T3635] ... [ 61.262120][ T3635] lock_acquire+0x1e3/0x630 [ 61.269304][ T3635] _raw_write_lock+0x2e/0x40 [ 61.273996][ T3635] l2tp_tunnel_register+0x126/0x1210 [ 61.279384][ T3635] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 61.285121][ T3635] genl_family_rcv_msg_doit+0x228/0x320 [ 61.290759][ T3635] genl_rcv_msg+0x445/0x780 [ 61.295357][ T3635] netlink_rcv_skb+0x157/0x430 [ 61.300215][ T3635] genl_rcv+0x28/0x40 [ 61.304288][ T3635] netlink_unicast+0x547/0x7f0 [ 61.309144][ T3635] netlink_sendmsg+0x91b/0xe10 [ 61.314001][ T3635] sock_sendmsg+0xd3/0x120 [ 61.318520][ T3635] ____sys_sendmsg+0x712/0x8c0 [ 61.323389][ T3635] ___sys_sendmsg+0x110/0x1b0 [ 61.328159][ T3635] __sys_sendmsg+0xf7/0x1c0 [ 61.332755][ T3635] do_syscall_64+0x39/0xb0 [ 61.337275][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.343272][ T3635] [ 61.343272][ T3635] other info that might help us debug this: [ 61.343272][ T3635] [ 61.353496][ T3635] Possible interrupt unsafe locking scenario: [ 61.353496][ T3635] [ 61.361807][ T3635] CPU0 CPU1 [ 61.367169][ T3635] ---- ---- [ 61.372527][ T3635] lock(k-clock-AF_INET); [ 61.376944][ T3635] local_irq_disable(); [ 61.383693][ T3635] lock(k-slock-AF_INET); [ 61.390631][ T3635] lock(k-clock-AF_INET); [ 61.397569][ T3635] [ 61.401048][ T3635] lock(k-slock-AF_INET); [ 61.405646][ T3635] [ 61.405646][ T3635] *** DEADLOCK *** [ 61.405646][ T3635] [ 61.413786][ T3635] 4 locks held by syz-executor649/3635: [ 61.419331][ T3635] #0: ffff8880726cac10 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 61.429899][ T3635] #1: ffff888074120130 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_close+0x1d/0x150 [ 61.439148][ T3635] #2: ffff888079771930 (k-sk_lock-AF_INET/1){+.+.}-{0:0}, at: mptcp_close+0x28/0x150 [ 61.448746][ T3635] #3: ffff8880797718b0 (k-slock-AF_INET){+.-.}-{2:2}, at: __lock_sock_fast+0x40/0xe0 [ 61.458346][ T3635] [ 61.458346][ T3635] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 61.468754][ T3635] -> (k-slock-AF_INET){+.-.}-{2:2} { [ 61.474062][ T3635] HARDIRQ-ON-W at: [ 61.478042][ T3635] lock_acquire+0x1e3/0x630 [ 61.484238][ T3635] _raw_spin_lock_bh+0x33/0x40 [ 61.490747][ T3635] lock_sock_nested+0x5f/0xf0 [ 61.497261][ T3635] __inet_bind+0x8c3/0xc90 [ 61.503351][ T3635] inet_bind+0x177/0x220 [ 61.509264][ T3635] udp_sock_create4+0x1d1/0x490 [ 61.515783][ T3635] rxe_setup_udp_tunnel.constprop.0+0xfc/0x220 [ 61.523605][ T3635] rxe_net_init+0x1f/0xd0 [ 61.529597][ T3635] rxe_module_init+0x10/0x49 [ 61.535857][ T3635] do_one_initcall+0x141/0x780 [ 61.542305][ T3635] kernel_init_freeable+0x6ff/0x788 [ 61.549182][ T3635] kernel_init+0x1e/0x1d0 [ 61.555172][ T3635] ret_from_fork+0x1f/0x30 [ 61.561255][ T3635] IN-SOFTIRQ-W at: [ 61.565236][ T3635] lock_acquire+0x1e3/0x630 [ 61.571410][ T3635] _raw_spin_lock+0x2e/0x40 [ 61.577572][ T3635] dccp_v4_ctl_send_reset+0xb00/0x12f0 [ 61.584693][ T3635] dccp_v4_rcv+0x1283/0x18e0 [ 61.590943][ T3635] ip_protocol_deliver_rcu+0x9f/0x7c0 [ 61.597973][ T3635] ip_local_deliver_finish+0x2ec/0x4c0 [ 61.605088][ T3635] ip_local_deliver+0x1ae/0x200 [ 61.611592][ T3635] ip_rcv_finish+0x1cf/0x2f0 [ 61.617838][ T3635] ip_rcv+0xae/0xd0 [ 61.623299][ T3635] __netif_receive_skb_one_core+0x114/0x180 [ 61.630860][ T3635] __netif_receive_skb+0x1f/0x1c0 [ 61.637551][ T3635] process_backlog+0x3e4/0x810 [ 61.643979][ T3635] __napi_poll+0xb8/0x770 [ 61.649974][ T3635] net_rx_action+0xa00/0xde0 [ 61.656233][ T3635] __do_softirq+0x1fb/0xadc [ 61.662403][ T3635] do_softirq.part.0+0xde/0x130 [ 61.668929][ T3635] __local_bh_enable_ip+0x106/0x130 [ 61.675782][ T3635] ip_finish_output2+0x7dc/0x2180 [ 61.682469][ T3635] __ip_finish_output+0x396/0x650 [ 61.689152][ T3635] ip_finish_output+0x31/0x280 [ 61.695576][ T3635] ip_output+0x1a3/0x320 [ 61.701474][ T3635] __ip_queue_xmit+0x8e2/0x1bf0 [ 61.707982][ T3635] dccp_transmit_skb+0xcfe/0x1450 [ 61.714674][ T3635] dccp_connect+0x39b/0x720 [ 61.720845][ T3635] dccp_v4_connect+0x1098/0x2010 [ 61.727443][ T3635] __inet_stream_connect+0x69e/0xed0 [ 61.734383][ T3635] inet_stream_connect+0x57/0xa0 [ 61.740978][ T3635] __sys_connect_file+0x153/0x1a0 [ 61.747656][ T3635] __sys_connect+0x165/0x1a0 [ 61.753898][ T3635] __x64_sys_connect+0x73/0xb0 [ 61.760316][ T3635] do_syscall_64+0x39/0xb0 [ 61.766401][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.773958][ T3635] INITIAL USE at: [ 61.777852][ T3635] lock_acquire+0x1e3/0x630 [ 61.783934][ T3635] _raw_spin_lock_bh+0x33/0x40 [ 61.790268][ T3635] lock_sock_nested+0x5f/0xf0 [ 61.796528][ T3635] __inet_bind+0x8c3/0xc90 [ 61.802532][ T3635] inet_bind+0x177/0x220 [ 61.808346][ T3635] udp_sock_create4+0x1d1/0x490 [ 61.814769][ T3635] rxe_setup_udp_tunnel.constprop.0+0xfc/0x220 [ 61.822501][ T3635] rxe_net_init+0x1f/0xd0 [ 61.828495][ T3635] rxe_module_init+0x10/0x49 [ 61.834652][ T3635] do_one_initcall+0x141/0x780 [ 61.840991][ T3635] kernel_init_freeable+0x6ff/0x788 [ 61.847774][ T3635] kernel_init+0x1e/0x1d0 [ 61.853672][ T3635] ret_from_fork+0x1f/0x30 [ 61.859667][ T3635] } [ 61.862161][ T3635] ... key at: [] af_family_kern_slock_keys+0x20/0x300 [ 61.871015][ T3635] [ 61.871015][ T3635] the dependencies between the lock to be acquired [ 61.871025][ T3635] and SOFTIRQ-irq-unsafe lock: [ 61.884530][ T3635] -> (k-clock-AF_INET){+++.}-{2:2} { [ 61.889838][ T3635] HARDIRQ-ON-W at: [ 61.893818][ T3635] lock_acquire+0x1e3/0x630 [ 61.899990][ T3635] _raw_write_lock+0x2e/0x40 [ 61.906241][ T3635] l2tp_tunnel_register+0x126/0x1210 [ 61.913190][ T3635] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 61.920489][ T3635] genl_family_rcv_msg_doit+0x228/0x320 [ 61.927695][ T3635] genl_rcv_msg+0x445/0x780 [ 61.933855][ T3635] netlink_rcv_skb+0x157/0x430 [ 61.940273][ T3635] genl_rcv+0x28/0x40 [ 61.945908][ T3635] netlink_unicast+0x547/0x7f0 [ 61.952326][ T3635] netlink_sendmsg+0x91b/0xe10 [ 61.958746][ T3635] sock_sendmsg+0xd3/0x120 [ 61.964831][ T3635] ____sys_sendmsg+0x712/0x8c0 [ 61.971352][ T3635] ___sys_sendmsg+0x110/0x1b0 [ 61.977689][ T3635] __sys_sendmsg+0xf7/0x1c0 [ 61.983848][ T3635] do_syscall_64+0x39/0xb0 [ 61.989930][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.997489][ T3635] HARDIRQ-ON-R at: [ 62.001469][ T3635] lock_acquire+0x1e3/0x630 [ 62.007640][ T3635] _raw_read_lock_bh+0x3f/0x70 [ 62.014063][ T3635] sock_i_uid+0x1f/0xb0 [ 62.019874][ T3635] udp_lib_lport_inuse+0x32/0x490 [ 62.026561][ T3635] udp_lib_get_port+0x835/0x18c0 [ 62.033161][ T3635] __inet_bind+0x831/0xc90 [ 62.039248][ T3635] inet_bind+0x177/0x220 [ 62.045147][ T3635] udp_sock_create4+0x1d1/0x490 [ 62.051656][ T3635] rxe_setup_udp_tunnel.constprop.0+0xfc/0x220 [ 62.059473][ T3635] rxe_net_init+0x1f/0xd0 [ 62.065464][ T3635] rxe_module_init+0x10/0x49 [ 62.071710][ T3635] do_one_initcall+0x141/0x780 [ 62.078142][ T3635] kernel_init_freeable+0x6ff/0x788 [ 62.085015][ T3635] kernel_init+0x1e/0x1d0 [ 62.091001][ T3635] ret_from_fork+0x1f/0x30 [ 62.097089][ T3635] SOFTIRQ-ON-W at: [ 62.101155][ T3635] lock_acquire+0x1e3/0x630 [ 62.107325][ T3635] _raw_write_lock+0x2e/0x40 [ 62.113574][ T3635] l2tp_tunnel_register+0x126/0x1210 [ 62.120522][ T3635] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 62.127838][ T3635] genl_family_rcv_msg_doit+0x228/0x320 [ 62.135055][ T3635] genl_rcv_msg+0x445/0x780 [ 62.141227][ T3635] netlink_rcv_skb+0x157/0x430 [ 62.147649][ T3635] genl_rcv+0x28/0x40 [ 62.153287][ T3635] netlink_unicast+0x547/0x7f0 [ 62.159708][ T3635] netlink_sendmsg+0x91b/0xe10 [ 62.166124][ T3635] sock_sendmsg+0xd3/0x120 [ 62.172206][ T3635] ____sys_sendmsg+0x712/0x8c0 [ 62.178637][ T3635] ___sys_sendmsg+0x110/0x1b0 [ 62.184971][ T3635] __sys_sendmsg+0xf7/0x1c0 [ 62.191139][ T3635] do_syscall_64+0x39/0xb0 [ 62.197249][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.204826][ T3635] INITIAL USE at: [ 62.208725][ T3635] lock_acquire+0x1e3/0x630 [ 62.214816][ T3635] _raw_write_lock+0x2e/0x40 [ 62.220981][ T3635] l2tp_tunnel_register+0x126/0x1210 [ 62.227848][ T3635] l2tp_nl_cmd_tunnel_create+0x3d6/0x8b0 [ 62.235073][ T3635] genl_family_rcv_msg_doit+0x228/0x320 [ 62.242276][ T3635] genl_rcv_msg+0x445/0x780 [ 62.248350][ T3635] netlink_rcv_skb+0x157/0x430 [ 62.254678][ T3635] genl_rcv+0x28/0x40 [ 62.260229][ T3635] netlink_unicast+0x547/0x7f0 [ 62.266559][ T3635] netlink_sendmsg+0x91b/0xe10 [ 62.272891][ T3635] sock_sendmsg+0xd3/0x120 [ 62.278895][ T3635] ____sys_sendmsg+0x712/0x8c0 [ 62.285239][ T3635] ___sys_sendmsg+0x110/0x1b0 [ 62.291488][ T3635] __sys_sendmsg+0xf7/0x1c0 [ 62.297559][ T3635] do_syscall_64+0x39/0xb0 [ 62.303552][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.311025][ T3635] INITIAL READ USE at: [ 62.315354][ T3635] lock_acquire+0x1e3/0x630 [ 62.321875][ T3635] _raw_read_lock_bh+0x3f/0x70 [ 62.328739][ T3635] sock_i_uid+0x1f/0xb0 [ 62.334900][ T3635] udp_lib_lport_inuse+0x32/0x490 [ 62.341937][ T3635] udp_lib_get_port+0x835/0x18c0 [ 62.348883][ T3635] __inet_bind+0x831/0xc90 [ 62.355309][ T3635] inet_bind+0x177/0x220 [ 62.361558][ T3635] udp_sock_create4+0x1d1/0x490 [ 62.368418][ T3635] rxe_setup_udp_tunnel.constprop.0+0xfc/0x220 [ 62.376588][ T3635] rxe_net_init+0x1f/0xd0 [ 62.382950][ T3635] rxe_module_init+0x10/0x49 [ 62.389558][ T3635] do_one_initcall+0x141/0x780 [ 62.396347][ T3635] kernel_init_freeable+0x6ff/0x788 [ 62.403570][ T3635] kernel_init+0x1e/0x1d0 [ 62.409920][ T3635] ret_from_fork+0x1f/0x30 [ 62.416369][ T3635] } [ 62.418880][ T3635] ... key at: [] af_kern_callback_keys+0x20/0x300 [ 62.427409][ T3635] ... acquired at: [ 62.431212][ T3635] lock_acquire+0x1e3/0x630 [ 62.435914][ T3635] _raw_write_lock_bh+0x33/0x40 [ 62.440953][ T3635] __mptcp_close+0x349/0x8d0 [ 62.445835][ T3635] mptcp_close+0x28/0x150 [ 62.450356][ T3635] inet_release+0x132/0x270 [ 62.455056][ T3635] __sock_release+0xcd/0x280 [ 62.459844][ T3635] sock_close+0x1c/0x20 [ 62.464196][ T3635] __fput+0x27c/0xa90 [ 62.468372][ T3635] task_work_run+0x16f/0x270 [ 62.473155][ T3635] do_exit+0xb3d/0x2a30 [ 62.477501][ T3635] do_group_exit+0xd4/0x2a0 [ 62.482194][ T3635] __x64_sys_exit_group+0x3e/0x50 [ 62.487409][ T3635] do_syscall_64+0x39/0xb0 [ 62.492016][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.498113][ T3635] [ 62.500432][ T3635] [ 62.500432][ T3635] stack backtrace: [ 62.506314][ T3635] CPU: 0 PID: 3635 Comm: syz-executor649 Not tainted 6.1.0-rc5-syzkaller-00103-g81ac25651a62 #0 [ 62.516730][ T3635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 62.526784][ T3635] Call Trace: [ 62.530070][ T3635] [ 62.533012][ T3635] dump_stack_lvl+0xd1/0x138 [ 62.537621][ T3635] check_irq_usage.cold+0x4e4/0x761 [ 62.542840][ T3635] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 62.549981][ T3635] ? check_path.constprop.0+0x24/0x50 [ 62.555375][ T3635] ? lock_chain_count+0x20/0x20 [ 62.560246][ T3635] ? save_trace+0x43/0xad0 [ 62.564683][ T3635] ? _find_first_zero_bit+0x94/0xb0 [ 62.569906][ T3635] ? lockdep_unlock+0x11b/0x290 [ 62.574776][ T3635] __lock_acquire+0x2a5b/0x56d0 [ 62.579657][ T3635] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 62.585662][ T3635] ? lockdep_hardirqs_on+0x7d/0x100 [ 62.590871][ T3635] lock_acquire+0x1e3/0x630 [ 62.595397][ T3635] ? __mptcp_close+0x349/0x8d0 [ 62.600174][ T3635] ? lock_release+0x810/0x810 [ 62.604875][ T3635] ? do_raw_spin_lock+0x124/0x2b0 [ 62.609906][ T3635] ? rwlock_bug.part.0+0x90/0x90 [ 62.614857][ T3635] _raw_write_lock_bh+0x33/0x40 [ 62.619749][ T3635] ? __mptcp_close+0x349/0x8d0 [ 62.624525][ T3635] __mptcp_close+0x349/0x8d0 [ 62.629131][ T3635] mptcp_close+0x28/0x150 [ 62.633471][ T3635] inet_release+0x132/0x270 [ 62.637990][ T3635] __sock_release+0xcd/0x280 [ 62.642604][ T3635] sock_close+0x1c/0x20 [ 62.646777][ T3635] __fput+0x27c/0xa90 [ 62.650796][ T3635] ? __sock_release+0x280/0x280 [ 62.655667][ T3635] task_work_run+0x16f/0x270 [ 62.660275][ T3635] ? task_work_cancel+0x30/0x30 [ 62.665156][ T3635] do_exit+0xb3d/0x2a30 [ 62.669333][ T3635] ? lock_downgrade+0x6e0/0x6e0 [ 62.674205][ T3635] ? do_raw_spin_lock+0x124/0x2b0 [ 62.679237][ T3635] ? mm_update_next_owner+0x7b0/0x7b0 [ 62.684631][ T3635] ? rwlock_bug.part.0+0x90/0x90 [ 62.689574][ T3635] ? _raw_spin_unlock_irq+0x23/0x50 [ 62.694796][ T3635] do_group_exit+0xd4/0x2a0 [ 62.699404][ T3635] __x64_sys_exit_group+0x3e/0x50 [ 62.704457][ T3635] do_syscall_64+0x39/0xb0 [ 62.708895][ T3635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.714811][ T3635] RIP: 0033:0x7fe6a8b9f199 [ 62.719228][ T3635] Code: Unable to access opcode bytes at 0x7fe6a8b9f16f. [ 62.726243][ T3635] RSP: 002b:00007ffd14689b88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [pid 3635] +++ exited with 1 +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=3635, si_uid=0, si_status=1, si_utime=0, si_stime=78} --- exit_group(0) = ? +++ exited with 0 +++ [ 62.734664][ T3635] RAX: ffffffffffffffda RBX: 00007fe6a8c1a410 RCX: 00007fe6a