Warning: Permanently added '10.128.0.172' (ED25519) to the list of known hosts. executing program [ 35.257604][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 38915. Sending cookies. Check SNMP counters. [ 35.264874][ T4222] [ 35.265449][ T4222] ====================================================== [ 35.266895][ T4222] WARNING: possible circular locking dependency detected [ 35.268356][ T4222] 6.1.75-syzkaller #0 Not tainted [ 35.269420][ T4222] ------------------------------------------------------ [ 35.270958][ T4222] syz-executor373/4222 is trying to acquire lock: [ 35.272376][ T4222] ffff0000ddda1450 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}, at: __flush_work+0xd0/0x1c0 [ 35.274937][ T4222] [ 35.274937][ T4222] but task is already holding lock: [ 35.276538][ T4222] ffff0000ddda0130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x1e8/0x528 [ 35.278492][ T4222] [ 35.278492][ T4222] which lock already depends on the new lock. [ 35.278492][ T4222] [ 35.280703][ T4222] [ 35.280703][ T4222] the existing dependency chain (in reverse order) is: [ 35.282639][ T4222] [ 35.282639][ T4222] -> #1 (sk_lock-AF_SMC/1){+.+.}-{0:0}: [ 35.284293][ T4222] lock_sock_nested+0x78/0x138 [ 35.285399][ T4222] smc_listen_out+0x10c/0x3bc [ 35.286546][ T4222] smc_listen_work+0x1e4/0x102c [ 35.287655][ T4222] process_one_work+0x7ac/0x1404 [ 35.288737][ T4222] worker_thread+0x8e4/0xfec [ 35.289921][ T4222] kthread+0x250/0x2d8 [ 35.290917][ T4222] ret_from_fork+0x10/0x20 [ 35.292029][ T4222] [ 35.292029][ T4222] -> #0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}: [ 35.294296][ T4222] __lock_acquire+0x3338/0x7680 [ 35.295502][ T4222] lock_acquire+0x26c/0x7cc [ 35.296523][ T4222] __flush_work+0xf8/0x1c0 [ 35.297581][ T4222] __cancel_work_timer+0x3ec/0x548 [ 35.298826][ T4222] cancel_work_sync+0x24/0x38 [ 35.299931][ T4222] smc_clcsock_release+0x64/0xec [ 35.301079][ T4222] __smc_release+0x55c/0x700 [ 35.302106][ T4222] smc_close_non_accepted+0xd8/0x260 [ 35.303316][ T4222] smc_close_active+0x9bc/0xd20 [ 35.304478][ T4222] __smc_release+0xa0/0x700 [ 35.305629][ T4222] smc_release+0x260/0x528 [ 35.306705][ T4222] sock_close+0xb8/0x1fc [ 35.307742][ T4222] __fput+0x30c/0x7bc [ 35.308758][ T4222] ____fput+0x20/0x30 [ 35.309663][ T4222] task_work_run+0x240/0x2f0 [ 35.310816][ T4222] do_exit+0x554/0x1a88 [ 35.311815][ T4222] do_group_exit+0x194/0x22c [ 35.312858][ T4222] __wake_up_parent+0x0/0x60 [ 35.313986][ T4222] invoke_syscall+0x98/0x2c0 [ 35.315039][ T4222] el0_svc_common+0x138/0x258 [ 35.316200][ T4222] do_el0_svc+0x64/0x218 [ 35.317230][ T4222] el0_svc+0x58/0x168 [ 35.318219][ T4222] el0t_64_sync_handler+0x84/0xf0 [ 35.319438][ T4222] el0t_64_sync+0x18c/0x190 [ 35.320579][ T4222] [ 35.320579][ T4222] other info that might help us debug this: [ 35.320579][ T4222] [ 35.322829][ T4222] Possible unsafe locking scenario: [ 35.322829][ T4222] [ 35.324489][ T4222] CPU0 CPU1 [ 35.325662][ T4222] ---- ---- [ 35.326821][ T4222] lock(sk_lock-AF_SMC/1); [ 35.327796][ T4222] lock((work_completion)(&new_smc->smc_listen_work)); [ 35.329848][ T4222] lock(sk_lock-AF_SMC/1); [ 35.331327][ T4222] lock((work_completion)(&new_smc->smc_listen_work)); [ 35.332902][ T4222] [ 35.332902][ T4222] *** DEADLOCK *** [ 35.332902][ T4222] [ 35.334666][ T4222] 2 locks held by syz-executor373/4222: [ 35.335893][ T4222] #0: ffff0000df60c410 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}, at: sock_close+0x80/0x1fc [ 35.338095][ T4222] #1: ffff0000ddda0130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x1e8/0x528 [ 35.340178][ T4222] [ 35.340178][ T4222] stack backtrace: [ 35.341365][ T4222] CPU: 0 PID: 4222 Comm: syz-executor373 Not tainted 6.1.75-syzkaller #0 [ 35.343165][ T4222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 35.345313][ T4222] Call trace: [ 35.345977][ T4222] dump_backtrace+0x1c8/0x1f4 [ 35.347044][ T4222] show_stack+0x2c/0x3c [ 35.347936][ T4222] dump_stack_lvl+0x108/0x170 [ 35.348970][ T4222] dump_stack+0x1c/0x58 [ 35.349832][ T4222] print_circular_bug+0x150/0x1b8 [ 35.350905][ T4222] check_noncircular+0x2cc/0x378 [ 35.352003][ T4222] __lock_acquire+0x3338/0x7680 [ 35.353022][ T4222] lock_acquire+0x26c/0x7cc [ 35.354004][ T4222] __flush_work+0xf8/0x1c0 [ 35.354938][ T4222] __cancel_work_timer+0x3ec/0x548 [ 35.356032][ T4222] cancel_work_sync+0x24/0x38 [ 35.356979][ T4222] smc_clcsock_release+0x64/0xec [ 35.358025][ T4222] __smc_release+0x55c/0x700 [ 35.359020][ T4222] smc_close_non_accepted+0xd8/0x260 [ 35.360182][ T4222] smc_close_active+0x9bc/0xd20 [ 35.361308][ T4222] __smc_release+0xa0/0x700 [ 35.362269][ T4222] smc_release+0x260/0x528 [ 35.363164][ T4222] sock_close+0xb8/0x1fc [ 35.363972][ T4222] __fput+0x30c/0x7bc [ 35.364870][ T4222] ____fput+0x20/0x30 [ 35.365724][ T4222] task_work_run+0x240/0x2f0 [ 35.366776][ T4222] do_exit+0x554/0x1a88 [ 35.367712][ T4222] do_group_exit+0x194/0x22c [ 35.368726][ T4222] __wake_up_parent+0x0/0x60 [ 35.369762][ T4222] invoke_syscall+0x98/0x2c0 [ 35.370724][ T4222] el0_svc_common+0x138/0x258 [ 35.371690][ T4222] do_el0_svc+0x64/0x218 [ 35.372650][ T4222] el0_svc+0x58/0x168 [ 35.373525][ T4222] el0t_64_sync_handler+0x84/0xf0 [ 35.374597][ T4222] el0t_64_sync+0x18c/0x190