TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. ====================================================== WARNING: possible circular locking dependency detected 6.6.0-rc4-next-20231005-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.3/5195 is trying to acquire lock: ffff88807a574578 (&p->pi_lock){-.-.}-{2:2}, at: class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:518 [inline] ffff88807a574578 (&p->pi_lock){-.-.}-{2:2}, at: try_to_wake_up+0xb0/0x15d0 kernel/sched/core.c:4213 but task is already holding lock: ffffffff8cb98e18 ((console_sem).lock){-.-.}-{2:2}, at: up+0x16/0xb0 kernel/locking/semaphore.c:187 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 ((console_sem).lock){-.-.}-{2:2}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162 down_trylock+0x12/0x70 kernel/locking/semaphore.c:139 __down_trylock_console_sem+0x40/0x140 kernel/printk/printk.c:323 console_trylock+0x73/0x130 kernel/printk/printk.c:2652 console_trylock_spinning kernel/printk/printk.c:1924 [inline] vprintk_emit+0x162/0x5f0 kernel/printk/printk.c:2303 vprintk+0x7b/0x90 kernel/printk/printk_safe.c:45 _printk+0xc8/0x100 kernel/printk/printk.c:2329 pick_eevdf kernel/sched/fair.c:963 [inline] pick_next_entity kernel/sched/fair.c:5247 [inline] pick_next_task_fair+0x1c5/0x1280 kernel/sched/fair.c:8205 __pick_next_task kernel/sched/core.c:5986 [inline] pick_next_task kernel/sched/core.c:6061 [inline] __schedule+0x493/0x5a00 kernel/sched/core.c:6640 __schedule_loop kernel/sched/core.c:6753 [inline] schedule+0xe7/0x270 kernel/sched/core.c:6768 worker_thread+0x2e1/0x1290 kernel/workqueue.c:2799 kthread+0x33c/0x440 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 -> #1 (&rq->__lock){-.-.}-{2:2}: _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0x29/0x130 kernel/sched/core.c:558 raw_spin_rq_lock kernel/sched/sched.h:1357 [inline] rq_lock kernel/sched/sched.h:1671 [inline] task_fork_fair+0x70/0x240 kernel/sched/fair.c:12399 sched_cgroup_fork+0x3cf/0x510 kernel/sched/core.c:4799 copy_process+0x4580/0x74b0 kernel/fork.c:2609 kernel_clone+0xfd/0x920 kernel/fork.c:2907 user_mode_thread+0xb4/0xf0 kernel/fork.c:2985 rest_init+0x27/0x2b0 init/main.c:691 arch_call_rest_init+0x13/0x30 init/main.c:823 start_kernel+0x39f/0x480 init/main.c:1068 x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:556 x86_64_start_kernel+0xb2/0xc0 arch/x86/kernel/head64.c:537 secondary_startup_64_no_verify+0x166/0x16b -> #0 (&p->pi_lock){-.-.}-{2:2}: check_prev_add kernel/locking/lockdep.c:3134 [inline] check_prevs_add kernel/locking/lockdep.c:3253 [inline] validate_chain kernel/locking/lockdep.c:3868 [inline] __lock_acquire+0x2e3d/0x5de0 kernel/locking/lockdep.c:5136 lock_acquire kernel/locking/lockdep.c:5753 [inline] lock_acquire+0x1ae/0x510 kernel/locking/lockdep.c:5718 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162 class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:518 [inline] try_to_wake_up+0xb0/0x15d0 kernel/sched/core.c:4213 up+0x79/0xb0 kernel/locking/semaphore.c:191 __up_console_sem kernel/printk/printk.c:340 [inline] __console_unlock kernel/printk/printk.c:2699 [inline] console_unlock+0x1cf/0x260 kernel/printk/printk.c:3031 vprintk_emit+0x17f/0x5f0 kernel/printk/printk.c:2304 vprintk+0x7b/0x90 kernel/printk/printk_safe.c:45 _printk+0xc8/0x100 kernel/printk/printk.c:2329 tcp_syn_flood_action+0x3fb/0x460 net/ipv4/tcp_input.c:6895 tcp_conn_request+0x1758/0x34a0 net/ipv4/tcp_input.c:6992 tcp_v4_conn_request net/ipv4/tcp_ipv4.c:1543 [inline] tcp_v4_conn_request+0xc5/0x250 net/ipv4/tcp_ipv4.c:1537 tcp_v6_conn_request+0x2e4/0x460 net/ipv6/tcp_ipv6.c:1164 tcp_rcv_state_process+0x11bb/0x4d00 net/ipv4/tcp_input.c:6533 tcp_v4_do_rcv+0x346/0x9e0 net/ipv4/tcp_ipv4.c:1752 tcp_v4_rcv+0x363f/0x3b40 net/ipv4/tcp_ipv4.c:2141 ip_protocol_deliver_rcu+0x9f/0x480 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e4/0x510 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:304 [inline] NF_HOOK include/linux/netfilter.h:298 [inline] ip_local_deliver+0x1b6/0x550 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:468 [inline] ip_rcv_finish+0x1c4/0x2e0 net/ipv4/ip_input.c:449 NF_HOOK include/linux/netfilter.h:304 [inline] NF_HOOK include/linux/netfilter.h:298 [inline] ip_rcv+0xc9/0x430 net/ipv4/ip_input.c:569 __netif_receive_skb_one_core+0x115/0x180 net/core/dev.c:5523 __netif_receive_skb+0x1f/0x1b0 net/core/dev.c:5637 process_backlog+0x101/0x6b0 net/core/dev.c:5965 __napi_poll.constprop.0+0xb4/0x530 net/core/dev.c:6527 napi_poll net/core/dev.c:6594 [inline] net_rx_action+0x956/0xe90 net/core/dev.c:6727 __do_softirq+0x21a/0x968 kernel/softirq.c:553 do_softirq kernel/softirq.c:454 [inline] do_softirq+0xaa/0xe0 kernel/softirq.c:441 __local_bh_enable_ip+0xf8/0x120 kernel/softirq.c:381 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:819 [inline] __dev_queue_xmit+0xa6f/0x3d60 net/core/dev.c:4367 dev_queue_xmit include/linux/netdevice.h:3092 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip_finish_output2+0x169f/0x2550 net/ipv4/ip_output.c:233 __ip_finish_output net/ipv4/ip_output.c:311 [inline] __ip_finish_output+0x38b/0x640 net/ipv4/ip_output.c:293 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:321 NF_HOOK_COND include/linux/netfilter.h:293 [inline] ip_output+0x13b/0x290 net/ipv4/ip_output.c:431 dst_output include/net/dst.h:458 [inline] ip_local_out net/ipv4/ip_output.c:127 [inline] __ip_queue_xmit+0xa15/0x1df0 net/ipv4/ip_output.c:533 __tcp_transmit_skb+0x1a39/0x3b30 net/ipv4/tcp_output.c:1409 tcp_transmit_skb net/ipv4/tcp_output.c:1427 [inline] tcp_connect+0x3509/0x5430 net/ipv4/tcp_output.c:3958 tcp_v4_connect+0x140e/0x1a90 net/ipv4/tcp_ipv4.c:323 __inet_stream_connect+0x38b/0xe20 net/ipv4/af_inet.c:676 inet_stream_connect+0x57/0xa0 net/ipv4/af_inet.c:740 __sys_connect_file+0x15b/0x1a0 net/socket.c:2050 __sys_connect+0x145/0x170 net/socket.c:2067 __do_sys_connect net/socket.c:2077 [inline] __se_sys_connect net/socket.c:2074 [inline] __x64_sys_connect+0x72/0xb0 net/socket.c:2074 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd other info that might help us debug this: Chain exists of: &p->pi_lock --> &rq->__lock --> (console_sem).lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock((console_sem).lock); lock(&rq->__lock); lock((console_sem).lock); lock(&p->pi_lock); *** DEADLOCK *** 7 locks held by syz-executor.3/5195: #0: ffff8880432f99b0 (sk_lock-AF_INET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1722 [inline] #0: ffff8880432f99b0 (sk_lock-AF_INET){+.+.}-{0:0}, at: inet_stream_connect+0x43/0xa0 net/ipv4/af_inet.c:739 #1: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:303 [inline] #1: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:749 [inline] #1: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x6d/0x1df0 net/ipv4/ip_output.c:468 #2: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:303 [inline] #2: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:749 [inline] #2: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0x367/0x2550 net/ipv4/ip_output.c:226 #3: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:303 [inline] #3: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:749 [inline] #3: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x25d/0x6b0 net/core/dev.c:5964 #4: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:303 [inline] #4: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:749 [inline] #4: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x231/0x510 net/ipv4/ip_input.c:232 #5: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:303 [inline] #5: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:749 [inline] #5: ffffffff8cbab220 (rcu_read_lock){....}-{1:2}, at: tcp_rcv_state_process+0x1130/0x4d00 net/ipv4/tcp_input.c:6531 #6: ffffffff8cb98e18 ((console_sem).lock){-.-.}-{2:2}, at: up+0x16/0xb0 kernel/locking/semaphore.c:187 stack backtrace: CPU: 1 PID: 5195 Comm: syz-executor.3 Not tainted 6.6.0-rc4-next-20231005-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 check_noncircular+0x311/0x3f0 kernel/locking/lockdep.c:2187 check_prev_add kernel/locking/lockdep.c:3134 [inline] check_prevs_add kernel/locking/lockdep.c:3253 [inline] validate_chain kernel/locking/lockdep.c:3868 [inline] __lock_acquire+0x2e3d/0x5de0 kernel/locking/lockdep.c:5136 lock_acquire kernel/locking/lockdep.c:5753 [inline] lock_acquire+0x1ae/0x510 kernel/locking/lockdep.c:5718 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162 class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:518 [inline] try_to_wake_up+0xb0/0x15d0 kernel/sched/core.c:4213 up+0x79/0xb0 kernel/locking/semaphore.c:191 __up_console_sem kernel/printk/printk.c:340 [inline] __console_unlock kernel/printk/printk.c:2699 [inline] console_unlock+0x1cf/0x260 kernel/printk/printk.c:3031 vprintk_emit+0x17f/0x5f0 kernel/printk/printk.c:2304 vprintk+0x7b/0x90 kernel/printk/printk_safe.c:45 _printk+0xc8/0x100 kernel/printk/printk.c:2329 tcp_syn_flood_action+0x3fb/0x460 net/ipv4/tcp_input.c:6895 tcp_conn_request+0x1758/0x34a0 net/ipv4/tcp_input.c:6992 tcp_v4_conn_request net/ipv4/tcp_ipv4.c:1543 [inline] tcp_v4_conn_request+0xc5/0x250 net/ipv4/tcp_ipv4.c:1537 tcp_v6_conn_request+0x2e4/0x460 net/ipv6/tcp_ipv6.c:1164 tcp_rcv_state_process+0x11bb/0x4d00 net/ipv4/tcp_input.c:6533 tcp_v4_do_rcv+0x346/0x9e0 net/ipv4/tcp_ipv4.c:1752 tcp_v4_rcv+0x363f/0x3b40 net/ipv4/tcp_ipv4.c:2141 ip_protocol_deliver_rcu+0x9f/0x480 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e4/0x510 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:304 [inline] NF_HOOK include/linux/netfilter.h:298 [inline] ip_local_deliver+0x1b6/0x550 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:468 [inline] ip_rcv_finish+0x1c4/0x2e0 net/ipv4/ip_input.c:449 NF_HOOK include/linux/netfilter.h:304 [inline] NF_HOOK include/linux/netfilter.h:298 [inline] ip_rcv+0xc9/0x430 net/ipv4/ip_input.c:569 __netif_receive_skb_one_core+0x115/0x180 net/core/dev.c:5523 __netif_receive_skb+0x1f/0x1b0 net/core/dev.c:5637 process_backlog+0x101/0x6b0 net/core/dev.c:5965 __napi_poll.constprop.0+0xb4/0x530 net/core/dev.c:6527 napi_poll net/core/dev.c:6594 [inline] net_rx_action+0x956/0xe90 net/core/dev.c:6727 __do_softirq+0x21a/0x968 kernel/softirq.c:553 do_softirq kernel/softirq.c:454 [inline] do_softirq+0xaa/0xe0 kernel/softirq.c:441 __local_bh_enable_ip+0xf8/0x120 kernel/softirq.c:381 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:819 [inline] __dev_queue_xmit+0xa6f/0x3d60 net/core/dev.c:4367 dev_queue_xmit include/linux/netdevice.h:3092 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip_finish_output2+0x169f/0x2550 net/ipv4/ip_output.c:233 __ip_finish_output net/ipv4/ip_output.c:311 [inline] __ip_finish_output+0x38b/0x640 net/ipv4/ip_output.c:293 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:321 NF_HOOK_COND include/linux/netfilter.h:293 [inline] ip_output+0x13b/0x290 net/ipv4/ip_output.c:431 dst_output include/net/dst.h:458 [inline] ip_local_out net/ipv4/ip_output.c:127 [inline] __ip_queue_xmit+0xa15/0x1df0 net/ipv4/ip_output.c:533 __tcp_transmit_skb+0x1a39/0x3b30 net/ipv4/tcp_output.c:1409 tcp_transmit_skb net/ipv4/tcp_output.c:1427 [inline] tcp_connect+0x3509/0x5430 net/ipv4/tcp_output.c:3958 tcp_v4_connect+0x140e/0x1a90 net/ipv4/tcp_ipv4.c:323 __inet_stream_connect+0x38b/0xe20 net/ipv4/af_inet.c:676 inet_stream_connect+0x57/0xa0 net/ipv4/af_inet.c:740 __sys_connect_file+0x15b/0x1a0 net/socket.c:2050 __sys_connect+0x145/0x170 net/socket.c:2067 __do_sys_connect net/socket.c:2077 [inline] __se_sys_connect net/socket.c:2074 [inline] __x64_sys_connect+0x72/0xb0 net/socket.c:2074 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f08b3e7cae9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f08b4bdf0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007f08b3f9bf80 RCX: 00007f08b3e7cae9 RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 RBP: 00007f08b3ec847a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f08b3f9bf80 R15: 00007ffd8804fc08 TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. EEVDF scheduling fail, picking leftmost TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. EEVDF scheduling fail, picking leftmost TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. EEVDF scheduling fail, picking leftmost EEVDF scheduling fail, picking leftmost EEVDF scheduling fail, picking leftmost