Warning: Permanently added '10.128.0.96' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 74.339320][ C0] [ 74.341794][ C0] ====================================================== [ 74.348792][ C0] WARNING: possible circular locking dependency detected [ 74.355783][ C0] 5.12.0-rc8-syzkaller #0 Not tainted [ 74.361177][ C0] ------------------------------------------------------ [ 74.368189][ C0] syz-executor044/8536 is trying to acquire lock: [ 74.374582][ C0] ffff8880183933a0 (slock-AF_INET6){+.-.}-{2:2}, at: sctp_addr_wq_timeout_handler+0x1a1/0x550 [ 74.384832][ C0] [ 74.384832][ C0] but task is already holding lock: [ 74.392213][ C0] ffffffff8d659620 (&net->sctp.addr_wq_lock){+.-.}-{2:2}, at: sctp_addr_wq_timeout_handler+0x38/0x550 [ 74.403144][ C0] [ 74.403144][ C0] which lock already depends on the new lock. [ 74.403144][ C0] [ 74.413520][ C0] [ 74.413520][ C0] the existing dependency chain (in reverse order) is: [ 74.422543][ C0] [ 74.422543][ C0] -> #1 (&net->sctp.addr_wq_lock){+.-.}-{2:2}: [ 74.430875][ C0] _raw_spin_lock_bh+0x2f/0x40 [ 74.436198][ C0] sctp_destroy_sock+0x204/0x440 [ 74.441636][ C0] sctp_v6_destroy_sock+0x11/0x20 [ 74.447159][ C0] sk_common_release+0x64/0x390 [ 74.452563][ C0] sctp_close+0x4da/0x940 [ 74.457409][ C0] inet_release+0x12e/0x280 [ 74.462410][ C0] inet6_release+0x4c/0x70 [ 74.467327][ C0] __sock_release+0xcd/0x280 [ 74.472429][ C0] sock_close+0x18/0x20 [ 74.477212][ C0] __fput+0x288/0x920 [ 74.481698][ C0] task_work_run+0xdd/0x1a0 [ 74.486703][ C0] do_exit+0xbfc/0x2a60 [ 74.491361][ C0] do_group_exit+0x125/0x310 [ 74.496453][ C0] __x64_sys_exit_group+0x3a/0x50 [ 74.502001][ C0] do_syscall_64+0x2d/0x70 [ 74.507026][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.513529][ C0] [ 74.513529][ C0] -> #0 (slock-AF_INET6){+.-.}-{2:2}: [ 74.521060][ C0] __lock_acquire+0x2b14/0x54c0 [ 74.526429][ C0] lock_acquire+0x1ab/0x740 [ 74.531430][ C0] _raw_spin_lock+0x2a/0x40 [ 74.536431][ C0] sctp_addr_wq_timeout_handler+0x1a1/0x550 [ 74.542836][ C0] call_timer_fn+0x1a5/0x6b0 [ 74.547934][ C0] __run_timers.part.0+0x67c/0xa50 [ 74.553544][ C0] run_timer_softirq+0xb3/0x1d0 [ 74.558892][ C0] __do_softirq+0x29b/0x9f6 [ 74.563897][ C0] irq_exit_rcu+0x134/0x200 [ 74.568897][ C0] sysvec_apic_timer_interrupt+0x93/0xc0 [ 74.575043][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 74.581524][ C0] _raw_spin_unlock_irqrestore+0x38/0x70 [ 74.587654][ C0] debug_check_no_obj_freed+0x20c/0x420 [ 74.593698][ C0] slab_free_freelist_hook+0x147/0x210 [ 74.599660][ C0] kmem_cache_free+0x8a/0x740 [ 74.604841][ C0] exit_fs+0x123/0x170 [ 74.609410][ C0] do_exit+0xbca/0x2a60 [ 74.614074][ C0] do_group_exit+0x125/0x310 [ 74.619163][ C0] __x64_sys_exit_group+0x3a/0x50 [ 74.624709][ C0] do_syscall_64+0x2d/0x70 [ 74.629627][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.636040][ C0] [ 74.636040][ C0] other info that might help us debug this: [ 74.636040][ C0] [ 74.646239][ C0] Possible unsafe locking scenario: [ 74.646239][ C0] [ 74.653661][ C0] CPU0 CPU1 [ 74.659011][ C0] ---- ---- [ 74.664361][ C0] lock(&net->sctp.addr_wq_lock); [ 74.669450][ C0] lock(slock-AF_INET6); [ 74.676278][ C0] lock(&net->sctp.addr_wq_lock); [ 74.683880][ C0] lock(slock-AF_INET6); [ 74.688185][ C0] [ 74.688185][ C0] *** DEADLOCK *** [ 74.688185][ C0] [ 74.696301][ C0] 2 locks held by syz-executor044/8536: [ 74.701818][ C0] #0: ffffc90000007d78 ((&net->sctp.addr_wq_timer)){+.-.}-{0:0}, at: call_timer_fn+0xd5/0x6b0 [ 74.712169][ C0] #1: ffffffff8d659620 (&net->sctp.addr_wq_lock){+.-.}-{2:2}, at: sctp_addr_wq_timeout_handler+0x38/0x550 [ 74.723551][ C0] [ 74.723551][ C0] stack backtrace: [ 74.729422][ C0] CPU: 0 PID: 8536 Comm: syz-executor044 Not tainted 5.12.0-rc8-syzkaller #0 [ 74.738166][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.748197][ C0] Call Trace: [ 74.751457][ C0] [ 74.754282][ C0] dump_stack+0x141/0x1d7 [ 74.758606][ C0] check_noncircular+0x25f/0x2e0 [ 74.763538][ C0] ? print_circular_bug+0x480/0x480 [ 74.768718][ C0] ? lockdep_lock+0xc6/0x200 [ 74.773287][ C0] ? call_rcu_zapped+0xb0/0xb0 [ 74.778044][ C0] __lock_acquire+0x2b14/0x54c0 [ 74.782878][ C0] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.788840][ C0] lock_acquire+0x1ab/0x740 [ 74.793323][ C0] ? sctp_addr_wq_timeout_handler+0x1a1/0x550 [ 74.799372][ C0] ? lock_release+0x720/0x720 [ 74.804036][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 74.809040][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 74.813957][ C0] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 74.819834][ C0] _raw_spin_lock+0x2a/0x40 [ 74.824336][ C0] ? sctp_addr_wq_timeout_handler+0x1a1/0x550 [ 74.830471][ C0] sctp_addr_wq_timeout_handler+0x1a1/0x550 [ 74.836352][ C0] ? sctp_defaults_exit+0x510/0x510 [ 74.841527][ C0] call_timer_fn+0x1a5/0x6b0 [ 74.846097][ C0] ? add_timer_on+0x4a0/0x4a0 [ 74.850755][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 74.855595][ C0] ? _raw_spin_unlock_irq+0x1f/0x40 [ 74.860775][ C0] ? sctp_defaults_exit+0x510/0x510 [ 74.865960][ C0] __run_timers.part.0+0x67c/0xa50 [ 74.871050][ C0] ? call_timer_fn+0x6b0/0x6b0 [ 74.875791][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 74.880966][ C0] ? sched_clock+0x2a/0x40 [ 74.885365][ C0] ? sched_clock_cpu+0x18/0x1f0 [ 74.890194][ C0] run_timer_softirq+0xb3/0x1d0 [ 74.895044][ C0] __do_softirq+0x29b/0x9f6 [ 74.899532][ C0] irq_exit_rcu+0x134/0x200 [ 74.904019][ C0] sysvec_apic_timer_interrupt+0x93/0xc0 [ 74.909632][ C0] [ 74.912545][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 74.918506][ C0] RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70 [ 74.924902][ C0] Code: 74 24 10 e8 4a f9 53 f8 48 89 ef e8 82 af 54 f8 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 63 7d 48 f8 65 8b 05 0c 48 fc 76 85 c0 74 0a 5b 5d c3 e8 d0 3c [ 74.944485][ C0] RSP: 0018:ffffc9000173fc50 EFLAGS: 00000206 [ 74.950531][ C0] RAX: 0000000000000002 RBX: 0000000000000200 RCX: 1ffffffff1b89e11 [ 74.958494][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 74.966454][ C0] RBP: ffffffff9006cf00 R08: 0000000000000001 R09: 0000000000000001 [ 74.974411][ C0] R10: ffffffff8179e4c8 R11: 000000000000003f R12: 1ffffffff200d9df [ 74.982368][ C0] R13: 0000000000000000 R14: dead000000000100 R15: dffffc0000000000 [ 74.990338][ C0] ? trace_hardirqs_on+0x38/0x1c0 [ 74.995362][ C0] debug_check_no_obj_freed+0x20c/0x420 [ 75.000893][ C0] ? slab_free_freelist_hook+0xee/0x210 [ 75.006431][ C0] slab_free_freelist_hook+0x147/0x210 [ 75.011873][ C0] kmem_cache_free+0x8a/0x740 [ 75.016528][ C0] ? exit_fs+0x123/0x170 [ 75.020751][ C0] ? dput+0x1de/0xbc0 [ 75.024724][ C0] exit_fs+0x123/0x170 [ 75.028771][ C0] do_exit+0xbca/0x2a60 [ 75.032935][ C0] ? mm_update_next_owner+0x7a0/0x7a0 [ 75.038313][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 75.043153][ C0] do_group_exit+0x125/0x310 [ 75.047746][ C0] __x64_sys_exit_group+0x3a/0x50 [ 75.052753][ C0] do_syscall_64+0x2d/0x70 [ 75.057155][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.063029][ C0] RIP: 0033:0x43ea79 [ 75.066903][ C0] Code: Unable to access opcode bytes at RIP 0x43ea4f. [ 75.073717][ C0] RSP: 002b:00007ffdbc348058 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 75.082108][ C0] RAX: ffffffffffffffda RBX: 00000000004b0330 RCX: 000000000043ea79 [ 75.090159][ C0] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 75.098112][ C0] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000001 [ 75.106064][ C0] R10: 0000000000000001 R11: 0000000000000246 R12: 00000000004b0330 [ 75.114012][ C0] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001