Warning: Permanently added '10.128.10.1' (ED25519) to the list of known hosts. [ 35.734697][ T6093] chnl_net:caif_netlink_parms(): no params data found [ 35.763827][ T6093] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.765462][ T6093] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.767145][ T6093] bridge_slave_0: entered allmulticast mode [ 35.769324][ T6093] bridge_slave_0: entered promiscuous mode [ 35.772389][ T6093] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.773927][ T6093] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.775580][ T6093] bridge_slave_1: entered allmulticast mode [ 35.777292][ T6093] bridge_slave_1: entered promiscuous mode [ 35.789774][ T6093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.793143][ T6093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.805262][ T6093] team0: Port device team_slave_0 added [ 35.808126][ T6093] team0: Port device team_slave_1 added [ 35.817763][ T6093] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.819172][ T6093] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.824717][ T6093] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.828638][ T6093] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.830137][ T6093] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.835665][ T6093] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.909004][ T6093] hsr_slave_0: entered promiscuous mode [ 35.967726][ T6093] hsr_slave_1: entered promiscuous mode [ 36.072833][ T6093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.109454][ T6093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.158976][ T6093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.208858][ T6093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.262800][ T6093] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.264477][ T6093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.266451][ T6093] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.268253][ T6093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.295285][ T6093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.304077][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.306910][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.314579][ T6093] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.320965][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.322568][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.329381][ T6101] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.331021][ T6101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.357324][ T6093] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.380412][ T6093] veth0_vlan: entered promiscuous mode [ 36.385516][ T6093] veth1_vlan: entered promiscuous mode [ 36.400931][ T6093] veth0_macvtap: entered promiscuous mode [ 36.404064][ T6093] veth1_macvtap: entered promiscuous mode [ 36.414257][ T6093] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.418699][ T6093] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.424693][ T6093] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.426659][ T6093] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.429296][ T6093] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.431205][ T6093] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 36.453836][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:36932. Sending cookies. [ 40.068775][ T6093] [ 40.069343][ T6093] ====================================================== [ 40.070855][ T6093] WARNING: possible circular locking dependency detected [ 40.072347][ T6093] 6.7.0-rc8-syzkaller-g0802e17d9aca #0 Not tainted [ 40.073754][ T6093] ------------------------------------------------------ [ 40.075205][ T6093] syz-executor411/6093 is trying to acquire lock: [ 40.076534][ T6093] ffff0000dc8e9450 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}, at: __flush_work+0xd0/0x1c0 [ 40.079115][ T6093] [ 40.079115][ T6093] but task is already holding lock: [ 40.080676][ T6093] ffff0000dc8e8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x1e8/0x528 [ 40.082636][ T6093] [ 40.082636][ T6093] which lock already depends on the new lock. [ 40.082636][ T6093] [ 40.085066][ T6093] [ 40.085066][ T6093] the existing dependency chain (in reverse order) is: [ 40.087003][ T6093] [ 40.087003][ T6093] -> #1 (sk_lock-AF_SMC/1){+.+.}-{0:0}: [ 40.088692][ T6093] lock_sock_nested+0x5c/0x11c [ 40.089834][ T6093] smc_listen_out+0x10c/0x3bc [ 40.090936][ T6093] smc_listen_work+0x1e4/0xfc8 [ 40.092113][ T6093] process_one_work+0x694/0x1204 [ 40.093335][ T6093] worker_thread+0x938/0xef4 [ 40.094477][ T6093] kthread+0x288/0x310 [ 40.095423][ T6093] ret_from_fork+0x10/0x20 [ 40.096526][ T6093] [ 40.096526][ T6093] -> #0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}: [ 40.098651][ T6093] __lock_acquire+0x3384/0x763c [ 40.099850][ T6093] lock_acquire+0x23c/0x71c [ 40.100955][ T6093] __flush_work+0xf8/0x1c0 [ 40.102021][ T6093] __cancel_work_timer+0x3e4/0x540 [ 40.103313][ T6093] cancel_work_sync+0x24/0x38 [ 40.104351][ T6093] smc_clcsock_release+0x64/0xec [ 40.105558][ T6093] __smc_release+0x55c/0x700 [ 40.106834][ T6093] smc_close_non_accepted+0xd8/0x260 [ 40.108171][ T6093] smc_close_active+0x9bc/0xd20 [ 40.109408][ T6093] __smc_release+0xa0/0x700 [ 40.110583][ T6093] smc_release+0x260/0x528 [ 40.111687][ T6093] sock_close+0xa4/0x1e8 [ 40.112791][ T6093] __fput+0x308/0x8e4 [ 40.113733][ T6093] ____fput+0x20/0x30 [ 40.114743][ T6093] task_work_run+0x230/0x2e0 [ 40.115940][ T6093] do_exit+0x618/0x1f64 [ 40.116909][ T6093] do_group_exit+0x194/0x22c [ 40.118052][ T6093] pid_child_should_wake+0x0/0x1dc [ 40.119281][ T6093] invoke_syscall+0x98/0x2b8 [ 40.120375][ T6093] el0_svc_common+0x130/0x23c [ 40.121470][ T6093] do_el0_svc+0x48/0x58 [ 40.122441][ T6093] el0_svc+0x54/0x158 [ 40.123466][ T6093] el0t_64_sync_handler+0x84/0xfc [ 40.124643][ T6093] el0t_64_sync+0x190/0x194 [ 40.125634][ T6093] [ 40.125634][ T6093] other info that might help us debug this: [ 40.125634][ T6093] [ 40.127851][ T6093] Possible unsafe locking scenario: [ 40.127851][ T6093] [ 40.129553][ T6093] CPU0 CPU1 [ 40.130760][ T6093] ---- ---- [ 40.131854][ T6093] lock(sk_lock-AF_SMC/1); [ 40.132808][ T6093] lock((work_completion)(&new_smc->smc_listen_work)); [ 40.134964][ T6093] lock(sk_lock-AF_SMC/1); [ 40.136507][ T6093] lock((work_completion)(&new_smc->smc_listen_work)); [ 40.138053][ T6093] [ 40.138053][ T6093] *** DEADLOCK *** [ 40.138053][ T6093] [ 40.139851][ T6093] 2 locks held by syz-executor411/6093: [ 40.140968][ T6093] #0: ffff0000dc2f6810 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x80/0x1e8 [ 40.143143][ T6093] #1: ffff0000dc8e8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x1e8/0x528 [ 40.145162][ T6093] [ 40.145162][ T6093] stack backtrace: [ 40.146424][ T6093] CPU: 0 PID: 6093 Comm: syz-executor411 Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 40.148624][ T6093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 40.150789][ T6093] Call trace: [ 40.151469][ T6093] dump_backtrace+0x1b8/0x1e4 [ 40.152517][ T6093] show_stack+0x2c/0x3c [ 40.153384][ T6093] dump_stack_lvl+0xd0/0x124 [ 40.154353][ T6093] dump_stack+0x1c/0x28 [ 40.155171][ T6093] print_circular_bug+0x150/0x1b8 [ 40.156250][ T6093] check_noncircular+0x310/0x404 [ 40.157288][ T6093] __lock_acquire+0x3384/0x763c [ 40.158342][ T6093] lock_acquire+0x23c/0x71c [ 40.159249][ T6093] __flush_work+0xf8/0x1c0 [ 40.160249][ T6093] __cancel_work_timer+0x3e4/0x540 [ 40.161346][ T6093] cancel_work_sync+0x24/0x38 [ 40.162340][ T6093] smc_clcsock_release+0x64/0xec [ 40.163420][ T6093] __smc_release+0x55c/0x700 [ 40.164313][ T6093] smc_close_non_accepted+0xd8/0x260 [ 40.165380][ T6093] smc_close_active+0x9bc/0xd20 [ 40.166423][ T6093] __smc_release+0xa0/0x700 [ 40.167330][ T6093] smc_release+0x260/0x528 [ 40.168245][ T6093] sock_close+0xa4/0x1e8 [ 40.169141][ T6093] __fput+0x308/0x8e4 [ 40.170017][ T6093] ____fput+0x20/0x30 [ 40.170796][ T6093] task_work_run+0x230/0x2e0 [ 40.171771][ T6093] do_exit+0x618/0x1f64 [ 40.172700][ T6093] do_group_exit+0x194/0x22c [ 40.173651][ T6093] pid_child_should_wake+0x0/0x1dc [ 40.174731][ T6093] invoke_syscall+0x98/0x2b8 [ 40.175757][ T6093] el0_svc_common+0x130/0x23c [ 40.176763][ T6093] do_el0_svc+0x48/0x58 [ 40.177565][ T6093] el0_svc+0x54/0x158 [ 40.178335][ T6093] el0t_64_sync_handler+0x84/0xfc [ 40.179359][ T6093] el0t_64_sync+0x190/0x194