Warning: Permanently added '10.128.10.4' (ECDSA) to the list of known hosts. executing program [ 29.394324] [ 29.395956] ====================================================== [ 29.402244] WARNING: possible circular locking dependency detected [ 29.408534] 4.14.287-syzkaller #0 Not tainted [ 29.412997] ------------------------------------------------------ [ 29.419305] kworker/u4:0/5 is trying to acquire lock: [ 29.424477] (sk_lock-AF_INET6){+.+.}, at: [] strp_work+0x3e/0x100 [ 29.432340] [ 29.432340] but task is already holding lock: [ 29.438285] ((&strp->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 29.446668] [ 29.446668] which lock already depends on the new lock. [ 29.446668] [ 29.454954] [ 29.454954] the existing dependency chain (in reverse order) is: [ 29.462543] [ 29.462543] -> #1 ((&strp->work)){+.+.}: [ 29.468060] flush_work+0xad/0x770 [ 29.472096] __cancel_work_timer+0x321/0x460 [ 29.477019] strp_done+0x53/0xd0 [ 29.480880] kcm_ioctl+0x828/0xfb0 [ 29.484914] sock_ioctl+0x2cc/0x4c0 [ 29.489037] do_vfs_ioctl+0x75a/0xff0 [ 29.493331] SyS_ioctl+0x7f/0xb0 [ 29.497203] do_syscall_64+0x1d5/0x640 [ 29.501586] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 29.507270] [ 29.507270] -> #0 (sk_lock-AF_INET6){+.+.}: [ 29.513047] lock_acquire+0x170/0x3f0 [ 29.517342] lock_sock_nested+0xb7/0x100 [ 29.521911] strp_work+0x3e/0x100 [ 29.525857] process_one_work+0x793/0x14a0 [ 29.530588] worker_thread+0x5cc/0xff0 [ 29.534969] kthread+0x30d/0x420 [ 29.538826] ret_from_fork+0x24/0x30 [ 29.543030] [ 29.543030] other info that might help us debug this: [ 29.543030] [ 29.551145] Possible unsafe locking scenario: [ 29.551145] [ 29.557172] CPU0 CPU1 [ 29.561808] ---- ---- [ 29.566446] lock((&strp->work)); [ 29.569960] lock(sk_lock-AF_INET6); [ 29.576257] lock((&strp->work)); [ 29.582378] lock(sk_lock-AF_INET6); [ 29.586158] [ 29.586158] *** DEADLOCK *** [ 29.586158] [ 29.592187] 2 locks held by kworker/u4:0/5: [ 29.596474] #0: ("%s""kstrp"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 [ 29.605113] #1: ((&strp->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 29.613923] [ 29.613923] stack backtrace: [ 29.618389] CPU: 1 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.287-syzkaller #0 [ 29.625715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 29.635048] Workqueue: kstrp strp_work [ 29.638903] Call Trace: [ 29.641467] dump_stack+0x1b2/0x281 [ 29.645066] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 29.650840] __lock_acquire+0x2e0e/0x3f20 [ 29.654961] ? __schedule+0x893/0x1de0 [ 29.658831] ? trace_hardirqs_on+0x10/0x10 [ 29.663036] ? lock_acquire+0x170/0x3f0 [ 29.666980] ? lock_sock_nested+0x98/0x100 [ 29.671184] lock_acquire+0x170/0x3f0 [ 29.674957] ? strp_work+0x3e/0x100 [ 29.678558] lock_sock_nested+0xb7/0x100 [ 29.682603] ? strp_work+0x3e/0x100 [ 29.686212] strp_work+0x3e/0x100 [ 29.689639] process_one_work+0x793/0x14a0 [ 29.693856] ? wo