Warning: Permanently added '10.128.1.100' (ED25519) to the list of known hosts. 2024/08/31 00:30:37 ignoring optional flag "sandboxArg"="0" 2024/08/31 00:30:37 parsed 1 programs 2024/08/31 00:30:37 executed programs: 0 [ 49.660895][ T1506] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 52.073521][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 33707. Sending cookies. Check SNMP counters. [ 52.085979][ T1929] [ 52.088286][ T1929] ====================================================== [ 52.095299][ T1929] WARNING: possible circular locking dependency detected [ 52.102367][ T1929] 6.1.107-syzkaller #0 Not tainted [ 52.107445][ T1929] ------------------------------------------------------ [ 52.114426][ T1929] syz-executor.0/1929 is trying to acquire lock: [ 52.120804][ T1929] ffff8881087d93c0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}, at: __flush_work+0x5e/0x490 [ 52.132167][ T1929] [ 52.132167][ T1929] but task is already holding lock: [ 52.139500][ T1929] ffff8881087d8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0xb7/0x1b0 [ 52.148316][ T1929] [ 52.148316][ T1929] which lock already depends on the new lock. [ 52.148316][ T1929] [ 52.158679][ T1929] [ 52.158679][ T1929] the existing dependency chain (in reverse order) is: [ 52.167657][ T1929] [ 52.167657][ T1929] -> #1 (sk_lock-AF_SMC/1){+.+.}-{0:0}: [ 52.175341][ T1929] lock_sock_nested+0x2a/0x70 [ 52.180510][ T1929] smc_listen_out+0x4d/0x150 [ 52.185775][ T1929] process_one_work+0x235/0x470 [ 52.191114][ T1929] worker_thread+0x214/0x370 [ 52.196555][ T1929] kthread+0xd1/0xe0 [ 52.201043][ T1929] ret_from_fork+0x1f/0x30 [ 52.205951][ T1929] [ 52.205951][ T1929] -> #0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}: [ 52.216453][ T1929] __lock_acquire+0x146d/0x2830 [ 52.222092][ T1929] lock_acquire+0xe3/0x270 [ 52.227080][ T1929] __flush_work+0x77/0x490 [ 52.231979][ T1929] __cancel_work_timer+0x13f/0x1e0 [ 52.237571][ T1929] smc_clcsock_release+0x26/0x60 [ 52.243284][ T1929] __smc_release+0x19c/0x1e0 [ 52.248365][ T1929] smc_close_non_accepted+0x51/0xd0 [ 52.254044][ T1929] smc_close_active+0x24d/0x330 [ 52.259378][ T1929] __smc_release+0x51/0x1e0 [ 52.264448][ T1929] smc_release+0xde/0x1b0 [ 52.269343][ T1929] sock_close+0x42/0xd0 [ 52.274067][ T1929] __fput+0x7a/0x220 [ 52.278443][ T1929] task_work_run+0x79/0xa0 [ 52.283339][ T1929] exit_to_user_mode_loop+0xd2/0xe0 [ 52.289101][ T1929] exit_to_user_mode_prepare+0x9a/0xe0 [ 52.295122][ T1929] syscall_exit_to_user_mode+0x5e/0x210 [ 52.301154][ T1929] do_syscall_64+0x47/0x80 [ 52.306055][ T1929] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 52.312428][ T1929] [ 52.312428][ T1929] other info that might help us debug this: [ 52.312428][ T1929] [ 52.322622][ T1929] Possible unsafe locking scenario: [ 52.322622][ T1929] [ 52.330118][ T1929] CPU0 CPU1 [ 52.335462][ T1929] ---- ---- [ 52.340799][ T1929] lock(sk_lock-AF_SMC/1); [ 52.345269][ T1929] lock((work_completion)(&new_smc->smc_listen_work)); [ 52.354684][ T1929] lock(sk_lock-AF_SMC/1); [ 52.361763][ T1929] lock((work_completion)(&new_smc->smc_listen_work)); [ 52.368676][ T1929] [ 52.368676][ T1929] *** DEADLOCK *** [ 52.368676][ T1929] [ 52.376784][ T1929] 2 locks held by syz-executor.0/1929: [ 52.382199][ T1929] #0: ffff88810c4ada10 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x35/0xd0 [ 52.392318][ T1929] #1: ffff8881087d8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0xb7/0x1b0 [ 52.401568][ T1929] [ 52.401568][ T1929] stack backtrace: [ 52.407430][ T1929] CPU: 1 PID: 1929 Comm: syz-executor.0 Not tainted 6.1.107-syzkaller #0 [ 52.415824][ T1929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 52.425932][ T1929] Call Trace: [ 52.429198][ T1929] [ 52.432099][ T1929] dump_stack_lvl+0x89/0xd7 [ 52.436564][ T1929] print_circular_bug+0x2c5/0x300 [ 52.441550][ T1929] check_noncircular+0x106/0x110 [ 52.446445][ T1929] __lock_acquire+0x146d/0x2830 [ 52.451255][ T1929] ? unwind_get_return_address+0x12/0x20 [ 52.456847][ T1929] ? arch_stack_walk+0xf3/0x140 [ 52.461663][ T1929] ? check_noncircular+0xc2/0x110 [ 52.466652][ T1929] ? __flush_work+0x5e/0x490 [ 52.471294][ T1929] lock_acquire+0xe3/0x270 [ 52.475693][ T1929] ? __flush_work+0x5e/0x490 [ 52.480249][ T1929] ? __flush_work+0x5e/0x490 [ 52.484887][ T1929] __flush_work+0x77/0x490 [ 52.489349][ T1929] ? __flush_work+0x5e/0x490 [ 52.494078][ T1929] __cancel_work_timer+0x13f/0x1e0 [ 52.499157][ T1929] ? __local_bh_enable_ip+0xb7/0xf0 [ 52.504319][ T1929] smc_clcsock_release+0x26/0x60 [ 52.509221][ T1929] __smc_release+0x19c/0x1e0 [ 52.513860][ T1929] smc_close_non_accepted+0x51/0xd0 [ 52.519019][ T1929] smc_close_active+0x24d/0x330 [ 52.523901][ T1929] __smc_release+0x51/0x1e0 [ 52.528455][ T1929] smc_release+0xde/0x1b0 [ 52.532743][ T1929] sock_close+0x42/0xd0 [ 52.536886][ T1929] __fput+0x7a/0x220 [ 52.540749][ T1929] task_work_run+0x79/0xa0 [ 52.545130][ T1929] exit_to_user_mode_loop+0xd2/0xe0 [ 52.550295][ T1929] exit_to_user_mode_prepare+0x9a/0xe0 [ 52.555723][ T1929] syscall_exit_to_user_mode+0x5e/0x210 [ 52.561449][ T1929] do_syscall_64+0x47/0x80 [ 52.565828][ T1929] ? clear_bhb_loop+0x45/0xa0 [ 52.570485][ T1929] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 52.576344][ T1929] RIP: 0033:0x7fcce127bc9a [ 52.580745][ T1929] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 52.600506][ T1929] RSP: 002b:00007ffe445ac590 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 52.609199][ T1929] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fcce127bc9a [ 52.617152][ T1929] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 52.625136][ T1929] RBP: 0000000000000032 R08: 0000001b32160000 R09: 00007fcce13abf8c [ 52.633071][ T1929] R10: 00007ffe445ac6e0 R11: 0000000000000293 R12: 00007fcce0e003f8 [ 52.641006][ T1929] R13: ffffffffffffffff R14: 00007fcce0e00000 R15: 000000000000cb4a [ 52.648942][ T1929] [ 52.657119][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 54523. Sending cookies. Check SNMP counters. [ 52.672521][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 53577. Sending cookies. Check SNMP counters. [ 52.687386][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 54641. Sending cookies. Check SNMP counters. [ 52.702387][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 59547. Sending cookies. Check SNMP counters. [ 52.717298][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 59328. Sending cookies. Check SNMP counters. [ 52.732398][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 41126. Sending cookies. Check SNMP counters. [ 52.747278][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 56753. Sending cookies. Check SNMP counters. [ 52.761970][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 52629. Sending cookies. Check SNMP counters. [ 52.776611][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 52056. Sending cookies. Check SNMP counters. 2024/08/31 00:30:42 executed programs: 558 [ 57.079653][ C1] net_ratelimit: 1221 callbacks suppressed [ 57.079657][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 58809. Sending cookies. Check SNMP counters. [ 57.101154][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 49223. Sending cookies. Check SNMP counters. [ 57.115313][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 51304. Sending cookies. Check SNMP counters. [ 57.129398][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 57276. Sending cookies. Check SNMP counters. [ 57.143403][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 42594. Sending cookies. Check SNMP counters. [ 57.157538][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 54547. Sending cookies. Check SNMP counters. [ 57.172537][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 58108. Sending cookies. Check SNMP counters. [ 57.187874][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 45219. Sending cookies. Check SNMP counters. [ 57.202585][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 38001. Sending cookies. Check SNMP counters. [ 57.217338][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 34345. Sending cookies. Check SNMP counters. 2024/08/31 00:30:47 executed programs: 1997