Warning: Permanently added '10.128.1.131' (ED25519) to the list of known hosts. 2023/11/16 04:51:18 ignoring optional flag "sandboxArg"="0" 2023/11/16 04:51:18 parsed 1 programs 2023/11/16 04:51:18 executed programs: 0 2023/11/16 04:51:24 executed programs: 6 2023/11/16 04:51:29 executed programs: 13 2023/11/16 04:51:34 executed programs: 20 2023/11/16 04:51:39 executed programs: 26 2023/11/16 04:51:44 executed programs: 33 2023/11/16 04:51:49 executed programs: 39 2023/11/16 04:51:54 executed programs: 45 2023/11/16 04:51:59 executed programs: 51 2023/11/16 04:52:04 executed programs: 58 2023/11/16 04:52:09 executed programs: 64 2023/11/16 04:52:14 executed programs: 70 2023/11/16 04:52:19 executed programs: 76 2023/11/16 04:52:24 executed programs: 82 2023/11/16 04:52:29 executed programs: 88 2023/11/16 04:52:34 executed programs: 94 2023/11/16 04:52:39 executed programs: 100 2023/11/16 04:52:44 executed programs: 107 2023/11/16 04:52:49 executed programs: 114 2023/11/16 04:52:54 executed programs: 120 2023/11/16 04:52:59 executed programs: 126 2023/11/16 04:53:05 executed programs: 133 2023/11/16 04:53:10 executed programs: 139 2023/11/16 04:53:15 executed programs: 146 2023/11/16 04:53:20 executed programs: 152 2023/11/16 04:53:25 executed programs: 160 2023/11/16 04:53:30 executed programs: 169 2023/11/16 04:53:35 executed programs: 175 2023/11/16 04:53:40 executed programs: 182 2023/11/16 04:53:45 executed programs: 188 2023/11/16 04:53:50 executed programs: 195 2023/11/16 04:53:55 executed programs: 201 2023/11/16 04:54:00 executed programs: 207 2023/11/16 04:54:05 executed programs: 214 2023/11/16 04:54:10 executed programs: 221 2023/11/16 04:54:15 executed programs: 227 2023/11/16 04:54:20 executed programs: 234 2023/11/16 04:54:25 executed programs: 240 2023/11/16 04:54:30 executed programs: 246 2023/11/16 04:54:35 executed programs: 253 2023/11/16 04:54:41 executed programs: 260 2023/11/16 04:54:46 executed programs: 266 2023/11/16 04:54:51 executed programs: 273 2023/11/16 04:54:56 executed programs: 281 2023/11/16 04:55:01 executed programs: 287 2023/11/16 04:55:06 executed programs: 295 2023/11/16 04:55:11 executed programs: 302 2023/11/16 04:55:16 executed programs: 308 2023/11/16 04:55:21 executed programs: 314 2023/11/16 04:55:26 executed programs: 322 2023/11/16 04:55:31 executed programs: 331 2023/11/16 04:55:36 executed programs: 338 2023/11/16 04:55:41 executed programs: 344 2023/11/16 04:55:46 executed programs: 350 2023/11/16 04:55:51 executed programs: 356 2023/11/16 04:55:56 executed programs: 363 2023/11/16 04:56:01 executed programs: 369 2023/11/16 04:56:07 executed programs: 377 2023/11/16 04:56:12 executed programs: 384 2023/11/16 04:56:17 executed programs: 390 [ 349.940556][ T4484] [ 349.942997][ T4484] ====================================================== [ 349.950599][ T4484] WARNING: possible circular locking dependency detected [ 349.957850][ T4484] 6.7.0-rc1-syzkaller #0 Not tainted [ 349.963194][ T4484] ------------------------------------------------------ [ 349.970176][ T4484] syz-executor.0/4484 is trying to acquire lock: [ 349.976963][ T4484] ffff88810d12a908 (&rs->rs_recv_lock){....}-{2:2}, at: rds_wake_sk_sleep+0x1b/0x60 [ 349.986672][ T4484] [ 349.986672][ T4484] but task is already holding lock: [ 349.994359][ T4484] ffff888104f58d00 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0x69/0x320 [ 350.004489][ T4484] [ 350.004489][ T4484] which lock already depends on the new lock. [ 350.004489][ T4484] [ 350.014950][ T4484] [ 350.014950][ T4484] the existing dependency chain (in reverse order) is: [ 350.024554][ T4484] [ 350.024554][ T4484] -> #1 (&rm->m_rs_lock){....}-{2:2}: [ 350.032542][ T4484] _raw_spin_lock_irqsave+0x5e/0x90 [ 350.038426][ T4484] rds_message_put+0x6d/0x3c0 [ 350.043590][ T4484] rds_clear_recv_queue+0xaf/0xe0 [ 350.049112][ T4484] rds_release+0x54/0x130 [ 350.054114][ T4484] sock_close+0x42/0xd0 [ 350.058765][ T4484] __fput+0xf6/0x2b0 [ 350.063157][ T4484] __se_sys_close+0x67/0xb0 [ 350.068293][ T4484] do_syscall_64+0x44/0xe0 [ 350.073287][ T4484] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 350.079686][ T4484] [ 350.079686][ T4484] -> #0 (&rs->rs_recv_lock){....}-{2:2}: [ 350.087544][ T4484] __lock_acquire+0x1321/0x26a0 [ 350.092986][ T4484] lock_acquire+0xd2/0x260 [ 350.097897][ T4484] _raw_read_lock_irqsave+0x66/0xa0 [ 350.103670][ T4484] rds_wake_sk_sleep+0x1b/0x60 [ 350.108921][ T4484] rds_send_remove_from_sock+0x9b/0x320 [ 350.115035][ T4484] rds_send_path_drop_acked+0x7c/0x130 [ 350.120976][ T4484] rds_tcp_write_space+0x9a/0x200 [ 350.126483][ T4484] tcp_check_space+0x186/0x210 [ 350.131747][ T4484] tcp_rcv_established+0x552/0x680 [ 350.137513][ T4484] tcp_v4_do_rcv+0xdf/0x2e0 [ 350.142686][ T4484] __release_sock+0x82/0x110 [ 350.147760][ T4484] release_sock+0x2b/0xa0 [ 350.152756][ T4484] rds_send_xmit+0x659/0x920 [ 350.157830][ T4484] rds_sendmsg+0x95f/0xad0 [ 350.162740][ T4484] ____sys_sendmsg+0x19a/0x240 [ 350.168166][ T4484] ___sys_sendmsg+0x28f/0x2d0 [ 350.173326][ T4484] __se_sys_sendmsg+0xf7/0x130 [ 350.178571][ T4484] do_syscall_64+0x44/0xe0 [ 350.183469][ T4484] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 350.189857][ T4484] [ 350.189857][ T4484] other info that might help us debug this: [ 350.189857][ T4484] [ 350.200061][ T4484] Possible unsafe locking scenario: [ 350.200061][ T4484] [ 350.207560][ T4484] CPU0 CPU1 [ 350.212977][ T4484] ---- ---- [ 350.218404][ T4484] lock(&rm->m_rs_lock); [ 350.222696][ T4484] lock(&rs->rs_recv_lock); [ 350.229769][ T4484] lock(&rm->m_rs_lock); [ 350.236604][ T4484] rlock(&rs->rs_recv_lock); [ 350.241509][ T4484] [ 350.241509][ T4484] *** DEADLOCK *** [ 350.241509][ T4484] [ 350.249711][ T4484] 3 locks held by syz-executor.0/4484: [ 350.255130][ T4484] #0: ffff88810a3f1830 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0x12/0x90 [ 350.264907][ T4484] #1: ffff88810a3f1ab8 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x20/0x200 [ 350.274885][ T4484] #2: ffff888104f58d00 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0x69/0x320 [ 350.285339][ T4484] [ 350.285339][ T4484] stack backtrace: [ 350.291219][ T4484] CPU: 1 PID: 4484 Comm: syz-executor.0 Not tainted 6.7.0-rc1-syzkaller #0 [ 350.299771][ T4484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 350.309890][ T4484] Call Trace: [ 350.313140][ T4484] [ 350.316322][ T4484] dump_stack_lvl+0x8d/0xe0 [ 350.320815][ T4484] print_circular_bug+0x31e/0x360 [ 350.325812][ T4484] check_noncircular+0x113/0x130 [ 350.330782][ T4484] __lock_acquire+0x1321/0x26a0 [ 350.335617][ T4484] ? debug_check_no_obj_freed+0xc7/0x270 [ 350.341281][ T4484] ? lock_acquire+0xd2/0x260 [ 350.345849][ T4484] ? debug_check_no_obj_freed+0xc7/0x270 [ 350.351573][ T4484] ? lockdep_hardirqs_on_prepare+0x11e/0x1c0 [ 350.358044][ T4484] ? rds_wake_sk_sleep+0x1b/0x60 [ 350.362948][ T4484] lock_acquire+0xd2/0x260 [ 350.367602][ T4484] ? rds_wake_sk_sleep+0x1b/0x60 [ 350.372508][ T4484] _raw_read_lock_irqsave+0x66/0xa0 [ 350.377675][ T4484] ? rds_wake_sk_sleep+0x1b/0x60 [ 350.382671][ T4484] rds_wake_sk_sleep+0x1b/0x60 [ 350.387676][ T4484] rds_send_remove_from_sock+0x9b/0x320 [ 350.393288][ T4484] ? rds_tcp_write_space+0x200/0x200 [ 350.398689][ T4484] rds_send_path_drop_acked+0x7c/0x130 [ 350.404164][ T4484] ? csum_and_copy_to_iter+0x940/0x940 [ 350.409763][ T4484] rds_tcp_write_space+0x9a/0x200 [ 350.414773][ T4484] tcp_check_space+0x186/0x210 [ 350.419512][ T4484] tcp_rcv_established+0x552/0x680 [ 350.424592][ T4484] tcp_v4_do_rcv+0xdf/0x2e0 [ 350.429060][ T4484] __release_sock+0x82/0x110 [ 350.433634][ T4484] release_sock+0x2b/0xa0 [ 350.437938][ T4484] rds_send_xmit+0x659/0x920 [ 350.442672][ T4484] rds_sendmsg+0x95f/0xad0 [ 350.447068][ T4484] ? aa_sk_perm+0x229/0x2a0 [ 350.451711][ T4484] ____sys_sendmsg+0x19a/0x240 [ 350.456439][ T4484] ___sys_sendmsg+0x28f/0x2d0 [ 350.461083][ T4484] __se_sys_sendmsg+0xf7/0x130 [ 350.465913][ T4484] do_syscall_64+0x44/0xe0 [ 350.470295][ T4484] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 350.476199][ T4484] RIP: 0033:0x7f5d10c7c959 [ 350.480582][ T4484] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 350.500331][ T4484] RSP: 002b:00007f5d119120c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 350.508975][ T4484] RAX: ffffffffffffffda RBX: 00007f5d10d9bf80 RCX: 00007f5d10c7c959 [ 350.517603][ T4484] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 350.526707][ T4484] RBP: 00007f5d10cd8c88 R08: 0000000000000000 R09: 0000000000000000 [ 350.535352][ T4484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 350.543750][ T4484] R13: 0000000000000006 R14: 00007f5d10d9bf80 R15: 00007ffeec6e5958 [ 350.551992][ T4484] 2023/11/16 04:56:22 executed programs: 398 2023/11/16 04:56:27 executed programs: 404