Warning: Permanently added '10.128.0.234' (ED25519) to the list of known hosts. 2024/04/06 14:50:27 ignoring optional flag "sandboxArg"="0" 2024/04/06 14:50:27 parsed 1 programs 2024/04/06 14:50:27 executed programs: 0 2024/04/06 14:50:32 executed programs: 3 2024/04/06 14:50:38 executed programs: 9 2024/04/06 14:50:43 executed programs: 15 2024/04/06 14:50:48 executed programs: 21 2024/04/06 14:50:53 executed programs: 27 2024/04/06 14:50:58 executed programs: 35 2024/04/06 14:51:03 executed programs: 41 2024/04/06 14:51:08 executed programs: 48 2024/04/06 14:51:13 executed programs: 55 2024/04/06 14:51:18 executed programs: 62 2024/04/06 14:51:23 executed programs: 68 2024/04/06 14:51:28 executed programs: 74 2024/04/06 14:51:33 executed programs: 80 2024/04/06 14:51:38 executed programs: 87 2024/04/06 14:51:43 executed programs: 93 2024/04/06 14:51:48 executed programs: 101 2024/04/06 14:51:54 executed programs: 108 2024/04/06 14:51:59 executed programs: 115 2024/04/06 14:52:04 executed programs: 122 2024/04/06 14:52:09 executed programs: 129 2024/04/06 14:52:14 executed programs: 135 2024/04/06 14:52:19 executed programs: 142 2024/04/06 14:52:24 executed programs: 149 2024/04/06 14:52:29 executed programs: 158 2024/04/06 14:52:34 executed programs: 164 2024/04/06 14:52:39 executed programs: 170 2024/04/06 14:52:44 executed programs: 177 2024/04/06 14:52:49 executed programs: 184 2024/04/06 14:52:54 executed programs: 192 2024/04/06 14:52:59 executed programs: 198 2024/04/06 14:53:04 executed programs: 204 2024/04/06 14:53:10 executed programs: 210 2024/04/06 14:53:15 executed programs: 217 2024/04/06 14:53:20 executed programs: 223 2024/04/06 14:53:25 executed programs: 230 2024/04/06 14:53:30 executed programs: 236 2024/04/06 14:53:35 executed programs: 244 2024/04/06 14:53:40 executed programs: 253 2024/04/06 14:53:45 executed programs: 259 2024/04/06 14:53:50 executed programs: 266 2024/04/06 14:53:55 executed programs: 272 2024/04/06 14:54:00 executed programs: 280 2024/04/06 14:54:05 executed programs: 286 2024/04/06 14:54:10 executed programs: 293 [ 280.868988][ T3388] [ 280.871314][ T3388] ====================================================== [ 280.878383][ T3388] WARNING: possible circular locking dependency detected [ 280.885365][ T3388] 6.1.84-syzkaller #0 Not tainted [ 280.890355][ T3388] ------------------------------------------------------ [ 280.897347][ T3388] syz-executor.0/3388 is trying to acquire lock: [ 280.903632][ T3388] ffff888107f355e0 (&rs->rs_recv_lock){....}-{2:2}, at: rds_wake_sk_sleep+0x17/0x50 [ 280.912970][ T3388] [ 280.912970][ T3388] but task is already holding lock: [ 280.920308][ T3388] ffff8881400a2900 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0x6b/0x300 [ 280.930179][ T3388] [ 280.930179][ T3388] which lock already depends on the new lock. [ 280.930179][ T3388] [ 280.940562][ T3388] [ 280.940562][ T3388] the existing dependency chain (in reverse order) is: [ 280.949565][ T3388] [ 280.949565][ T3388] -> #1 (&rm->m_rs_lock){....}-{2:2}: [ 280.957123][ T3388] _raw_spin_lock_irqsave+0x5d/0x90 [ 280.962813][ T3388] rds_message_put+0x69/0x3b0 [ 280.967972][ T3388] rds_clear_recv_queue+0xab/0xe0 [ 280.973480][ T3388] rds_release+0x50/0x130 [ 280.978309][ T3388] sock_close+0x42/0xd0 [ 280.982947][ T3388] __fput+0xe1/0x210 [ 280.987326][ T3388] task_work_run+0x79/0xa0 [ 280.992327][ T3388] exit_to_user_mode_loop+0xd2/0xe0 [ 280.998097][ T3388] exit_to_user_mode_prepare+0x9a/0xe0 [ 281.004037][ T3388] syscall_exit_to_user_mode+0x5e/0x210 [ 281.010067][ T3388] do_syscall_64+0x49/0x80 [ 281.014983][ T3388] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 281.021371][ T3388] [ 281.021371][ T3388] -> #0 (&rs->rs_recv_lock){....}-{2:2}: [ 281.029235][ T3388] __lock_acquire+0x146d/0x2830 [ 281.034570][ T3388] lock_acquire+0xe3/0x270 [ 281.039466][ T3388] _raw_read_lock_irqsave+0x65/0xa0 [ 281.045166][ T3388] rds_wake_sk_sleep+0x17/0x50 [ 281.050424][ T3388] rds_send_remove_from_sock+0x9e/0x300 [ 281.056464][ T3388] rds_send_path_drop_acked+0x78/0x130 [ 281.062414][ T3388] rds_tcp_write_space+0xb0/0x210 [ 281.067946][ T3388] tcp_check_space+0x17d/0x200 [ 281.073204][ T3388] tcp_rcv_established+0x4e6/0x620 [ 281.078839][ T3388] tcp_v4_do_rcv+0xdb/0x2c0 [ 281.083831][ T3388] __release_sock+0x92/0x120 [ 281.088903][ T3388] release_sock+0x27/0xa0 [ 281.093893][ T3388] rds_send_xmit+0x683/0x970 [ 281.098965][ T3388] rds_sendmsg+0x961/0xad0 [ 281.103951][ T3388] ____sys_sendmsg+0x189/0x220 [ 281.109200][ T3388] ___sys_sendmsg+0x28f/0x2d0 [ 281.114362][ T3388] __se_sys_sendmsg+0xf4/0x130 [ 281.119610][ T3388] do_syscall_64+0x3d/0x80 [ 281.124598][ T3388] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 281.130973][ T3388] [ 281.130973][ T3388] other info that might help us debug this: [ 281.130973][ T3388] [ 281.141165][ T3388] Possible unsafe locking scenario: [ 281.141165][ T3388] [ 281.148708][ T3388] CPU0 CPU1 [ 281.154052][ T3388] ---- ---- [ 281.159382][ T3388] lock(&rm->m_rs_lock); [ 281.163673][ T3388] lock(&rs->rs_recv_lock); [ 281.170767][ T3388] lock(&rm->m_rs_lock); [ 281.177574][ T3388] lock(&rs->rs_recv_lock); [ 281.182133][ T3388] [ 281.182133][ T3388] *** DEADLOCK *** [ 281.182133][ T3388] [ 281.190239][ T3388] 3 locks held by syz-executor.0/3388: [ 281.195658][ T3388] #0: ffff8881067b7430 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0xe/0x90 [ 281.205341][ T3388] #1: ffff8881067b76b8 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x1c/0x210 [ 281.215292][ T3388] #2: ffff8881400a2900 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0x6b/0x300 [ 281.225579][ T3388] [ 281.225579][ T3388] stack backtrace: [ 281.231448][ T3388] CPU: 0 PID: 3388 Comm: syz-executor.0 Not tainted 6.1.84-syzkaller #0 [ 281.239736][ T3388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 281.249853][ T3388] Call Trace: [ 281.253280][ T3388] [ 281.256277][ T3388] dump_stack_lvl+0x89/0xd7 [ 281.260756][ T3388] print_circular_bug+0x2c5/0x300 [ 281.265833][ T3388] check_noncircular+0x106/0x110 [ 281.270732][ T3388] __lock_acquire+0x146d/0x2830 [ 281.275636][ T3388] ? debug_check_no_obj_freed+0xd0/0x240 [ 281.281235][ T3388] ? rds_wake_sk_sleep+0x17/0x50 [ 281.286137][ T3388] lock_acquire+0xe3/0x270 [ 281.290609][ T3388] ? rds_wake_sk_sleep+0x17/0x50 [ 281.295510][ T3388] _raw_read_lock_irqsave+0x65/0xa0 [ 281.300680][ T3388] ? rds_wake_sk_sleep+0x17/0x50 [ 281.305580][ T3388] rds_wake_sk_sleep+0x17/0x50 [ 281.310324][ T3388] rds_send_remove_from_sock+0x9e/0x300 [ 281.315833][ T3388] ? lockdep_hardirqs_on+0x94/0xf0 [ 281.320904][ T3388] ? rds_tcp_write_space+0x210/0x210 [ 281.326162][ T3388] rds_send_path_drop_acked+0x78/0x130 [ 281.331580][ T3388] ? datagram_poll+0xe0/0xe0 [ 281.336162][ T3388] rds_tcp_write_space+0xb0/0x210 [ 281.341152][ T3388] tcp_check_space+0x17d/0x200 [ 281.345881][ T3388] tcp_rcv_established+0x4e6/0x620 [ 281.350954][ T3388] tcp_v4_do_rcv+0xdb/0x2c0 [ 281.355427][ T3388] __release_sock+0x92/0x120 [ 281.360002][ T3388] release_sock+0x27/0xa0 [ 281.364293][ T3388] rds_send_xmit+0x683/0x970 [ 281.368958][ T3388] rds_sendmsg+0x961/0xad0 [ 281.373333][ T3388] ? aa_sk_perm+0x215/0x290 [ 281.377797][ T3388] ____sys_sendmsg+0x189/0x220 [ 281.382524][ T3388] ___sys_sendmsg+0x28f/0x2d0 [ 281.387246][ T3388] ? preempt_schedule+0x4f/0x60 [ 281.392071][ T3388] __se_sys_sendmsg+0xf4/0x130 [ 281.396794][ T3388] do_syscall_64+0x3d/0x80 [ 281.401269][ T3388] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 281.407130][ T3388] RIP: 0033:0x7faf9c27c959 [ 281.411507][ T3388] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 281.431084][ T3388] RSP: 002b:00007faf9d0ae0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 281.439458][ T3388] RAX: ffffffffffffffda RBX: 00007faf9c39bf80 RCX: 00007faf9c27c959 [ 281.447397][ T3388] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 281.455334][ T3388] RBP: 00007faf9c2d8c88 R08: 0000000000000000 R09: 0000000000000000 [ 281.463282][ T3388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2024/04/06 14:54:16 executed programs: 302 [ 281.471247][ T3388] R13: 0000000000000006 R14: 00007faf9c39bf80 R15: 00007ffd7bf41af8 [ 281.479192][ T3388] 2024/04/06 14:54:21 executed programs: 308