Warning: Permanently added '10.128.0.179' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 26.987525] [ 26.989160] ====================================================== [ 26.995448] WARNING: possible circular locking dependency detected [ 27.001735] 4.14.288-syzkaller #0 Not tainted [ 27.006196] ------------------------------------------------------ [ 27.012487] kworker/u4:3/239 is trying to acquire lock: [ 27.017815] (sk_lock-AF_INET6){+.+.}, at: [] strp_work+0x3e/0x100 [ 27.025676] [ 27.025676] but task is already holding lock: [ 27.031616] ((&strp->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 27.039999] [ 27.039999] which lock already depends on the new lock. [ 27.039999] [ 27.048289] [ 27.048289] the existing dependency chain (in reverse order) is: [ 27.055890] [ 27.055890] -> #1 ((&strp->work)){+.+.}: [ 27.061418] flush_work+0xad/0x770 [ 27.065463] __cancel_work_timer+0x321/0x460 [ 27.070379] strp_done+0x53/0xd0 [ 27.074242] kcm_ioctl+0x828/0xfb0 [ 27.078280] sock_ioctl+0x2cc/0x4c0 [ 27.082403] do_vfs_ioctl+0x75a/0xff0 [ 27.086698] SyS_ioctl+0x7f/0xb0 [ 27.090572] do_syscall_64+0x1d5/0x640 [ 27.094955] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 27.100632] [ 27.100632] -> #0 (sk_lock-AF_INET6){+.+.}: [ 27.106423] lock_acquire+0x170/0x3f0 [ 27.110717] lock_sock_nested+0xb7/0x100 [ 27.115271] strp_work+0x3e/0x100 [ 27.119216] process_one_work+0x793/0x14a0 [ 27.124030] worker_thread+0x5cc/0xff0 [ 27.128408] kthread+0x30d/0x420 [ 27.132268] ret_from_fork+0x24/0x30 [ 27.136472] [ 27.136472] other info that might help us debug this: [ 27.136472] [ 27.144585] Possible unsafe locking scenario: [ 27.144585] [ 27.150623] CPU0 CPU1 [ 27.155279] ---- ---- [ 27.159919] lock((&strp->work)); [ 27.163432] lock(sk_lock-AF_INET6); [ 27.169722] lock((&strp->work)); [ 27.175755] lock(sk_lock-AF_INET6); [ 27.179528] [ 27.179528] *** DEADLOCK *** [ 27.179528] [ 27.185559] 2 locks held by kworker/u4:3/239: [ 27.190019] #0: ("%s""kstrp"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 [ 27.198662] #1: ((&strp->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 [ 27.207475] [ 27.207475] stack backtrace: [ 27.211942] CPU: 1 PID: 239 Comm: kworker/u4:3 Not tainted 4.14.288-syzkaller #0 [ 27.219448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 27.228786] Workqueue: kstrp strp_work [ 27.232645] Call Trace: [ 27.235223] dump_stack+0x1b2/0x281 [ 27.238827] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 27.244600] __lock_acquire+0x2e0e/0x3f20 [ 27.248737] ? __schedule+0x893/0x1de0 [ 27.252607] ? trace_hardirqs_on+0x10/0x10 [ 27.256810] ? lock_acquire+0x170/0x3f0 [ 27.260756] ? lock_sock_nested+0x98/0x100 [ 27.264962] lock_acquire+0x170/0x3f0 [ 27.268738] ? strp_work+0x3e/0x100 [ 27.272335] lock_sock_nested+0xb7/0x100 [ 27.276368] ? strp_work+0x3e/0x100 [ 27.279965] strp_work+0x3e/0x100 [ 27.283392] process_one_work+0x793/0x14a0 [ 27.287606]