Warning: Permanently added '10.128.1.131' (ED25519) to the list of known hosts. 2023/11/16 01:54:55 ignoring optional flag "sandboxArg"="0" 2023/11/16 01:54:55 parsed 1 programs 2023/11/16 01:54:55 executed programs: 0 2023/11/16 01:55:00 executed programs: 6 2023/11/16 01:55:06 executed programs: 14 2023/11/16 01:55:11 executed programs: 20 2023/11/16 01:55:16 executed programs: 27 2023/11/16 01:55:21 executed programs: 34 2023/11/16 01:55:26 executed programs: 41 2023/11/16 01:55:31 executed programs: 47 2023/11/16 01:55:36 executed programs: 53 2023/11/16 01:55:41 executed programs: 59 2023/11/16 01:55:46 executed programs: 65 2023/11/16 01:55:51 executed programs: 71 2023/11/16 01:55:56 executed programs: 77 2023/11/16 01:56:01 executed programs: 83 2023/11/16 01:56:06 executed programs: 89 2023/11/16 01:56:11 executed programs: 97 2023/11/16 01:56:16 executed programs: 103 2023/11/16 01:56:21 executed programs: 111 2023/11/16 01:56:26 executed programs: 118 2023/11/16 01:56:31 executed programs: 127 2023/11/16 01:56:36 executed programs: 134 2023/11/16 01:56:41 executed programs: 140 2023/11/16 01:56:46 executed programs: 146 2023/11/16 01:56:52 executed programs: 152 2023/11/16 01:56:57 executed programs: 159 2023/11/16 01:57:02 executed programs: 166 2023/11/16 01:57:07 executed programs: 173 2023/11/16 01:57:12 executed programs: 180 2023/11/16 01:57:17 executed programs: 188 2023/11/16 01:57:22 executed programs: 194 2023/11/16 01:57:27 executed programs: 200 2023/11/16 01:57:32 executed programs: 207 2023/11/16 01:57:37 executed programs: 213 [ 210.534883][ T3022] [ 210.537539][ T3022] ====================================================== [ 210.544697][ T3022] WARNING: possible circular locking dependency detected [ 210.552207][ T3022] 5.15.138-syzkaller #0 Not tainted [ 210.557364][ T3022] ------------------------------------------------------ [ 210.564522][ T3022] syz-executor.0/3022 is trying to acquire lock: [ 210.571532][ T3022] ffff8881099d0618 (&rs->rs_recv_lock){....}-{2:2}, at: rds_wake_sk_sleep+0x16/0x60 [ 210.582095][ T3022] [ 210.582095][ T3022] but task is already holding lock: [ 210.589511][ T3022] ffff888106b85500 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0xd8/0x330 [ 210.599363][ T3022] [ 210.599363][ T3022] which lock already depends on the new lock. [ 210.599363][ T3022] [ 210.609918][ T3022] [ 210.609918][ T3022] the existing dependency chain (in reverse order) is: [ 210.618914][ T3022] [ 210.618914][ T3022] -> #1 (&rm->m_rs_lock){....}-{2:2}: [ 210.626425][ T3022] _raw_spin_lock_irqsave+0x36/0x50 [ 210.632323][ T3022] rds_message_put+0x82/0x3c0 [ 210.637697][ T3022] rds_clear_recv_queue+0x9b/0xd0 [ 210.643382][ T3022] rds_release+0x56/0x140 [ 210.648590][ T3022] __sock_release+0x32/0xa0 [ 210.653984][ T3022] sock_close+0xf/0x20 [ 210.659934][ T3022] __fput+0x8d/0x250 [ 210.666023][ T3022] task_work_run+0x54/0x80 [ 210.671404][ T3022] exit_to_user_mode_prepare+0x1bc/0x1c0 [ 210.677701][ T3022] syscall_exit_to_user_mode+0x19/0x60 [ 210.683646][ T3022] do_syscall_64+0x42/0x80 [ 210.688719][ T3022] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 210.695546][ T3022] [ 210.695546][ T3022] -> #0 (&rs->rs_recv_lock){....}-{2:2}: [ 210.703357][ T3022] __lock_acquire+0x10cb/0x1a30 [ 210.708782][ T3022] lock_acquire+0xbb/0x2a0 [ 210.713789][ T3022] _raw_read_lock_irqsave+0x42/0x90 [ 210.719563][ T3022] rds_wake_sk_sleep+0x16/0x60 [ 210.724900][ T3022] rds_send_remove_from_sock+0x103/0x330 [ 210.731276][ T3022] rds_send_path_drop_acked+0x121/0x150 [ 210.737301][ T3022] rds_tcp_write_space+0x9a/0x220 [ 210.742944][ T3022] tcp_check_space+0x31/0x110 [ 210.748124][ T3022] tcp_rcv_established+0x27e/0x730 [ 210.753843][ T3022] tcp_v4_do_rcv+0x17c/0x2f0 [ 210.759088][ T3022] __release_sock+0x54/0xd0 [ 210.764187][ T3022] release_sock+0x26/0xa0 [ 210.769032][ T3022] rds_send_xmit+0x5cc/0xa00 [ 210.774410][ T3022] rds_sendmsg+0xedb/0x1110 [ 210.779419][ T3022] __sock_sendmsg+0x2e/0x40 [ 210.784681][ T3022] ____sys_sendmsg+0x234/0x250 [ 210.790199][ T3022] ___sys_sendmsg+0x6e/0xb0 [ 210.795280][ T3022] __sys_sendmsg+0x54/0xa0 [ 210.801244][ T3022] do_syscall_64+0x35/0x80 [ 210.806141][ T3022] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 210.812775][ T3022] [ 210.812775][ T3022] other info that might help us debug this: [ 210.812775][ T3022] [ 210.823085][ T3022] Possible unsafe locking scenario: [ 210.823085][ T3022] [ 210.830589][ T3022] CPU0 CPU1 [ 210.836100][ T3022] ---- ---- [ 210.843254][ T3022] lock(&rm->m_rs_lock); [ 210.847543][ T3022] lock(&rs->rs_recv_lock); [ 210.854705][ T3022] lock(&rm->m_rs_lock); [ 210.861780][ T3022] lock(&rs->rs_recv_lock); [ 210.866764][ T3022] [ 210.866764][ T3022] *** DEADLOCK *** [ 210.866764][ T3022] [ 210.875307][ T3022] 3 locks held by syz-executor.0/3022: [ 210.880926][ T3022] #0: ffff888109c30ca0 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0xe/0x40 [ 210.890728][ T3022] #1: ffff888109c30f58 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x1a/0x220 [ 210.900596][ T3022] #2: ffff888106b85500 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0xd8/0x330 [ 210.911348][ T3022] [ 210.911348][ T3022] stack backtrace: [ 210.917475][ T3022] CPU: 1 PID: 3022 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 210.926467][ T3022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 210.936505][ T3022] Call Trace: [ 210.939772][ T3022] [ 210.942674][ T3022] dump_stack_lvl+0x57/0x7d [ 210.947440][ T3022] check_noncircular+0xcc/0xe0 [ 210.952769][ T3022] ? register_lock_class+0x41/0x630 [ 210.958233][ T3022] __lock_acquire+0x10cb/0x1a30 [ 210.963232][ T3022] lock_acquire+0xbb/0x2a0 [ 210.967701][ T3022] ? rds_wake_sk_sleep+0x16/0x60 [ 210.972699][ T3022] ? rds_send_remove_from_sock+0xd8/0x330 [ 210.978421][ T3022] _raw_read_lock_irqsave+0x42/0x90 [ 210.983585][ T3022] ? rds_wake_sk_sleep+0x16/0x60 [ 210.988502][ T3022] rds_wake_sk_sleep+0x16/0x60 [ 210.993343][ T3022] rds_send_remove_from_sock+0x103/0x330 [ 210.999834][ T3022] ? lockdep_hardirqs_on_prepare+0x9d/0xf0 [ 211.006736][ T3022] ? _raw_spin_unlock_irqrestore+0x44/0x60 [ 211.012935][ T3022] ? rds_tcp_recv_exit+0x10/0x10 [ 211.017836][ T3022] rds_send_path_drop_acked+0x121/0x150 [ 211.023342][ T3022] ? sk_stream_wait_memory+0x370/0x370 [ 211.028761][ T3022] rds_tcp_write_space+0x9a/0x220 [ 211.034021][ T3022] tcp_check_space+0x31/0x110 [ 211.038669][ T3022] tcp_rcv_established+0x27e/0x730 [ 211.043752][ T3022] tcp_v4_do_rcv+0x17c/0x2f0 [ 211.048302][ T3022] __release_sock+0x54/0xd0 [ 211.052774][ T3022] release_sock+0x26/0xa0 [ 211.057150][ T3022] rds_send_xmit+0x5cc/0xa00 [ 211.061963][ T3022] rds_sendmsg+0xedb/0x1110 [ 211.066433][ T3022] ? aa_sk_perm+0x5e/0x310 [ 211.070898][ T3022] __sock_sendmsg+0x2e/0x40 [ 211.075728][ T3022] ____sys_sendmsg+0x234/0x250 [ 211.080550][ T3022] ? import_iovec+0x17/0x20 [ 211.085110][ T3022] ? sendmsg_copy_msghdr+0x77/0xa0 [ 211.090195][ T3022] ___sys_sendmsg+0x6e/0xb0 [ 211.094749][ T3022] ? lock_acquire+0xbb/0x2a0 [ 211.099820][ T3022] ? ksys_dup3+0x160/0x160 [ 211.104490][ T3022] ? find_held_lock+0x2b/0x80 [ 211.109215][ T3022] ? __fget_files+0xb9/0x190 [ 211.113764][ T3022] ? __fget_files+0xd1/0x190 [ 211.118420][ T3022] __sys_sendmsg+0x54/0xa0 [ 211.122816][ T3022] ? lockdep_hardirqs_on_prepare+0xcd/0xf0 [ 211.129216][ T3022] do_syscall_64+0x35/0x80 [ 211.133609][ T3022] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.139495][ T3022] RIP: 0033:0x7ff1389cc959 [ 211.144055][ T3022] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 211.165720][ T3022] RSP: 002b:00007ff13850d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 211.174598][ T3022] RAX: ffffffffffffffda RBX: 00007ff138aec120 RCX: 00007ff1389cc959 [ 211.182640][ T3022] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 211.190951][ T3022] RBP: 00007ff138a28c88 R08: 0000000000000000 R09: 0000000000000000 [ 211.198985][ T3022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 211.207385][ T3022] R13: 000000000000006e R14: 00007ff138aec120 R15: 00007ffc72ccc4f8 [ 211.215408][ T3022] 2023/11/16 01:57:43 executed programs: 220 2023/11/16 01:57:48 executed programs: 226