Warning: Permanently added '10.128.1.40' (ED25519) to the list of known hosts. 2023/10/22 22:11:11 ignoring optional flag "sandboxArg"="0" 2023/10/22 22:11:11 parsed 1 programs 2023/10/22 22:11:11 executed programs: 0 2023/10/22 22:11:16 executed programs: 4 2023/10/22 22:11:21 executed programs: 11 2023/10/22 22:11:26 executed programs: 17 2023/10/22 22:11:32 executed programs: 23 2023/10/22 22:11:37 executed programs: 30 2023/10/22 22:11:42 executed programs: 37 2023/10/22 22:11:47 executed programs: 44 [ 92.580187][ T2893] [ 92.582536][ T2893] ====================================================== [ 92.589543][ T2893] WARNING: possible circular locking dependency detected [ 92.596545][ T2893] 6.6.0-rc6-syzkaller #0 Not tainted [ 92.601808][ T2893] ------------------------------------------------------ [ 92.608808][ T2893] syz-executor.0/2893 is trying to acquire lock: [ 92.615117][ T2893] ffff888103273100 (&rm->m_rs_lock){....}-{2:2}, at: rds_message_put+0x69/0x3b0 [ 92.624128][ T2893] [ 92.624128][ T2893] but task is already holding lock: [ 92.631473][ T2893] ffff888105ffeba0 (&rs->rs_recv_lock){....}-{2:2}, at: rds_clear_recv_queue+0x1c/0xe0 [ 92.641098][ T2893] [ 92.641098][ T2893] which lock already depends on the new lock. [ 92.641098][ T2893] [ 92.651572][ T2893] [ 92.651572][ T2893] the existing dependency chain (in reverse order) is: [ 92.660579][ T2893] [ 92.660579][ T2893] -> #1 (&rs->rs_recv_lock){....}-{2:2}: [ 92.668369][ T2893] _raw_read_lock_irqsave+0x65/0xa0 [ 92.674069][ T2893] rds_wake_sk_sleep+0x17/0x50 [ 92.679343][ T2893] rds_send_remove_from_sock+0x9e/0x300 [ 92.685385][ T2893] rds_send_path_drop_acked+0x78/0x130 [ 92.691340][ T2893] rds_tcp_write_space+0xb0/0x210 [ 92.696856][ T2893] tcp_check_space+0x17d/0x200 [ 92.702111][ T2893] tcp_rcv_established+0x4a6/0x620 [ 92.707715][ T2893] tcp_v4_do_rcv+0xdb/0x2d0 [ 92.712713][ T2893] __release_sock+0x92/0x120 [ 92.717800][ T2893] release_sock+0x27/0xa0 [ 92.722629][ T2893] rds_send_xmit+0x683/0x970 [ 92.727713][ T2893] rds_sendmsg+0x9ab/0xb30 [ 92.732635][ T2893] ____sys_sendmsg+0x19a/0x230 [ 92.737905][ T2893] ___sys_sendmsg+0x28f/0x2d0 [ 92.743074][ T2893] __se_sys_sendmsg+0xf7/0x130 [ 92.748329][ T2893] do_syscall_64+0x3d/0x80 [ 92.753238][ T2893] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 92.759647][ T2893] [ 92.759647][ T2893] -> #0 (&rm->m_rs_lock){....}-{2:2}: [ 92.767169][ T2893] __lock_acquire+0x136e/0x2660 [ 92.772551][ T2893] lock_acquire+0xe6/0x260 [ 92.777488][ T2893] _raw_spin_lock_irqsave+0x5d/0x90 [ 92.783180][ T2893] rds_message_put+0x69/0x3b0 [ 92.788354][ T2893] rds_clear_recv_queue+0xab/0xe0 [ 92.793870][ T2893] rds_release+0x50/0x130 [ 92.798690][ T2893] sock_close+0x3e/0xd0 [ 92.803339][ T2893] __fput+0xfc/0x270 [ 92.807727][ T2893] __se_sys_close+0x67/0xc0 [ 92.812725][ T2893] do_syscall_64+0x3d/0x80 [ 92.817638][ T2893] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 92.824029][ T2893] [ 92.824029][ T2893] other info that might help us debug this: [ 92.824029][ T2893] [ 92.834244][ T2893] Possible unsafe locking scenario: [ 92.834244][ T2893] [ 92.841672][ T2893] CPU0 CPU1 [ 92.847016][ T2893] ---- ---- [ 92.852358][ T2893] lock(&rs->rs_recv_lock); [ 92.856966][ T2893] lock(&rm->m_rs_lock); [ 92.863793][ T2893] lock(&rs->rs_recv_lock); [ 92.870881][ T2893] lock(&rm->m_rs_lock); [ 92.875207][ T2893] [ 92.875207][ T2893] *** DEADLOCK *** [ 92.875207][ T2893] [ 92.883329][ T2893] 2 locks held by syz-executor.0/2893: [ 92.888762][ T2893] #0: ffff88810b3c0210 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x37/0xd0 [ 92.898813][ T2893] #1: ffff888105ffeba0 (&rs->rs_recv_lock){....}-{2:2}, at: rds_clear_recv_queue+0x1c/0xe0 [ 92.908860][ T2893] [ 92.908860][ T2893] stack backtrace: [ 92.914728][ T2893] CPU: 1 PID: 2893 Comm: syz-executor.0 Not tainted 6.6.0-rc6-syzkaller #0 [ 92.923283][ T2893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 92.933314][ T2893] Call Trace: [ 92.936578][ T2893] [ 92.939491][ T2893] dump_stack_lvl+0x89/0xe0 [ 92.943971][ T2893] print_circular_bug+0x32a/0x360 [ 92.948974][ T2893] check_noncircular+0x113/0x130 [ 92.953889][ T2893] __lock_acquire+0x136e/0x2660 [ 92.958720][ T2893] ? __lock_acquire+0x4e4/0x2660 [ 92.963632][ T2893] ? rds_message_put+0x69/0x3b0 [ 92.968461][ T2893] lock_acquire+0xe6/0x260 [ 92.972866][ T2893] ? rds_message_put+0x69/0x3b0 [ 92.977692][ T2893] _raw_spin_lock_irqsave+0x5d/0x90 [ 92.982864][ T2893] ? rds_message_put+0x69/0x3b0 [ 92.987687][ T2893] rds_message_put+0x69/0x3b0 [ 92.992335][ T2893] rds_clear_recv_queue+0xab/0xe0 [ 92.997337][ T2893] rds_release+0x50/0x130 [ 93.001641][ T2893] sock_close+0x3e/0xd0 [ 93.005771][ T2893] __fput+0xfc/0x270 [ 93.009647][ T2893] __se_sys_close+0x67/0xc0 [ 93.014136][ T2893] do_syscall_64+0x3d/0x80 [ 93.018530][ T2893] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 93.024398][ T2893] RIP: 0033:0x7f07c1e7b95a [ 93.028792][ T2893] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 f3 7d 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 53 7e 02 00 8b 44 24 [ 93.048396][ T2893] RSP: 002b:00007ffe7e6a7050 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 93.056780][ T2893] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f07c1e7b95a [ 93.064727][ T2893] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 93.072674][ T2893] RBP: 00007f07c1f9d980 R08: 0000001b30360000 R09: 00007ffe7e6e70b0 2023/10/22 22:11:52 executed programs: 51 [ 93.080620][ T2893] R10: 00007ffe7e6e7080 R11: 0000000000000293 R12: 0000000000016986 [ 93.088583][ T2893] R13: ffffffffffffffff R14: 00007f07c1a00000 R15: 0000000000016645 [ 93.096533][ T2893] 2023/10/22 22:11:58 executed programs: 57