Warning: Permanently added '10.128.0.212' (ED25519) to the list of known hosts. 2023/12/26 16:09:03 ignoring optional flag "sandboxArg"="0" 2023/12/26 16:09:03 parsed 1 programs 2023/12/26 16:09:03 executed programs: 0 2023/12/26 16:09:08 executed programs: 4 2023/12/26 16:09:13 executed programs: 10 2023/12/26 16:09:18 executed programs: 16 2023/12/26 16:09:24 executed programs: 24 2023/12/26 16:09:29 executed programs: 31 2023/12/26 16:09:34 executed programs: 37 2023/12/26 16:09:39 executed programs: 43 2023/12/26 16:09:44 executed programs: 50 2023/12/26 16:09:49 executed programs: 56 2023/12/26 16:09:54 executed programs: 62 2023/12/26 16:09:59 executed programs: 68 2023/12/26 16:10:04 executed programs: 74 2023/12/26 16:10:09 executed programs: 81 2023/12/26 16:10:14 executed programs: 87 2023/12/26 16:10:19 executed programs: 95 2023/12/26 16:10:24 executed programs: 101 2023/12/26 16:10:29 executed programs: 109 2023/12/26 16:10:35 executed programs: 115 2023/12/26 16:10:40 executed programs: 122 2023/12/26 16:10:45 executed programs: 129 2023/12/26 16:10:50 executed programs: 135 2023/12/26 16:10:55 executed programs: 142 2023/12/26 16:11:00 executed programs: 149 2023/12/26 16:11:05 executed programs: 155 [ 166.990193][ T2733] [ 166.992532][ T2733] ====================================================== [ 166.999532][ T2733] WARNING: possible circular locking dependency detected [ 167.006518][ T2733] 6.1.69-syzkaller #0 Not tainted [ 167.011588][ T2733] ------------------------------------------------------ [ 167.018566][ T2733] syz-executor.0/2733 is trying to acquire lock: [ 167.024849][ T2733] ffff888107b9b8e0 (&rs->rs_recv_lock){...-}-{2:2}, at: rds_wake_sk_sleep+0x17/0x50 [ 167.034181][ T2733] [ 167.034181][ T2733] but task is already holding lock: [ 167.041504][ T2733] ffff8881400d6900 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0x6b/0x300 [ 167.051355][ T2733] [ 167.051355][ T2733] which lock already depends on the new lock. [ 167.051355][ T2733] [ 167.061717][ T2733] [ 167.061717][ T2733] the existing dependency chain (in reverse order) is: [ 167.070705][ T2733] [ 167.070705][ T2733] -> #1 (&rm->m_rs_lock){..-.}-{2:2}: [ 167.078296][ T2733] _raw_spin_lock_irqsave+0x5d/0x90 [ 167.083979][ T2733] rds_message_put+0x69/0x3b0 [ 167.089244][ T2733] rds_clear_recv_queue+0xab/0xe0 [ 167.094920][ T2733] rds_release+0x50/0x130 [ 167.099732][ T2733] sock_close+0x42/0xd0 [ 167.104471][ T2733] __fput+0xe1/0x210 [ 167.108857][ T2733] task_work_run+0x79/0xa0 [ 167.114067][ T2733] exit_to_user_mode_loop+0xd2/0xe0 [ 167.119741][ T2733] exit_to_user_mode_prepare+0x9a/0xe0 [ 167.125683][ T2733] syscall_exit_to_user_mode+0x5e/0x210 [ 167.131807][ T2733] do_syscall_64+0x49/0x80 [ 167.136713][ T2733] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 167.143096][ T2733] [ 167.143096][ T2733] -> #0 (&rs->rs_recv_lock){...-}-{2:2}: [ 167.150952][ T2733] __lock_acquire+0x146d/0x2830 [ 167.156337][ T2733] lock_acquire+0xe3/0x270 [ 167.161392][ T2733] _raw_read_lock_irqsave+0x65/0xa0 [ 167.167089][ T2733] rds_wake_sk_sleep+0x17/0x50 [ 167.172347][ T2733] rds_send_remove_from_sock+0x9e/0x300 [ 167.178380][ T2733] rds_send_path_drop_acked+0x78/0x130 [ 167.184512][ T2733] rds_tcp_write_space+0xb0/0x210 [ 167.190018][ T2733] tcp_check_space+0x17d/0x200 [ 167.195278][ T2733] tcp_rcv_established+0x4e6/0x620 [ 167.200978][ T2733] tcp_v4_do_rcv+0xdb/0x2c0 [ 167.205968][ T2733] __release_sock+0x92/0x120 [ 167.211047][ T2733] release_sock+0x27/0xa0 [ 167.215880][ T2733] rds_send_xmit+0x683/0x970 [ 167.221329][ T2733] rds_sendmsg+0x9ab/0xb30 [ 167.226318][ T2733] ____sys_sendmsg+0x182/0x220 [ 167.231753][ T2733] ___sys_sendmsg+0x28f/0x2d0 [ 167.236919][ T2733] __se_sys_sendmsg+0xf4/0x130 [ 167.242262][ T2733] do_syscall_64+0x3d/0x80 [ 167.247249][ T2733] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 167.253713][ T2733] [ 167.253713][ T2733] other info that might help us debug this: [ 167.253713][ T2733] [ 167.263919][ T2733] Possible unsafe locking scenario: [ 167.263919][ T2733] [ 167.271425][ T2733] CPU0 CPU1 [ 167.276969][ T2733] ---- ---- [ 167.284122][ T2733] lock(&rm->m_rs_lock); [ 167.288497][ T2733] lock(&rs->rs_recv_lock); [ 167.295574][ T2733] lock(&rm->m_rs_lock); [ 167.302479][ T2733] lock(&rs->rs_recv_lock); [ 167.307035][ T2733] [ 167.307035][ T2733] *** DEADLOCK *** [ 167.307035][ T2733] [ 167.315229][ T2733] 3 locks held by syz-executor.0/2733: [ 167.320655][ T2733] #0: ffff888102b07430 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0xe/0x90 [ 167.330707][ T2733] #1: ffff888102b076b8 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x1c/0x210 [ 167.340660][ T2733] #2: ffff8881400d6900 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0x6b/0x300 [ 167.351836][ T2733] [ 167.351836][ T2733] stack backtrace: [ 167.357775][ T2733] CPU: 0 PID: 2733 Comm: syz-executor.0 Not tainted 6.1.69-syzkaller #0 [ 167.366164][ T2733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 167.376272][ T2733] Call Trace: [ 167.379708][ T2733] [ 167.382608][ T2733] dump_stack_lvl+0x89/0xd7 [ 167.387164][ T2733] print_circular_bug+0x2c5/0x300 [ 167.392153][ T2733] check_noncircular+0x106/0x110 [ 167.397062][ T2733] __lock_acquire+0x146d/0x2830 [ 167.401880][ T2733] ? debug_check_no_obj_freed+0xc3/0x260 [ 167.407476][ T2733] ? _raw_spin_unlock_irqrestore+0x3f/0xb0 [ 167.413435][ T2733] ? rds_wake_sk_sleep+0x17/0x50 [ 167.418354][ T2733] lock_acquire+0xe3/0x270 [ 167.422830][ T2733] ? rds_wake_sk_sleep+0x17/0x50 [ 167.427729][ T2733] _raw_read_lock_irqsave+0x65/0xa0 [ 167.432886][ T2733] ? rds_wake_sk_sleep+0x17/0x50 [ 167.437787][ T2733] rds_wake_sk_sleep+0x17/0x50 [ 167.442687][ T2733] rds_send_remove_from_sock+0x9e/0x300 [ 167.448220][ T2733] ? lockdep_hardirqs_on+0x94/0xf0 [ 167.453379][ T2733] ? rds_tcp_write_space+0x210/0x210 [ 167.458635][ T2733] rds_send_path_drop_acked+0x78/0x130 [ 167.464148][ T2733] ? datagram_poll+0xe0/0xe0 [ 167.468795][ T2733] rds_tcp_write_space+0xb0/0x210 [ 167.473956][ T2733] tcp_check_space+0x17d/0x200 [ 167.478776][ T2733] tcp_rcv_established+0x4e6/0x620 [ 167.484281][ T2733] tcp_v4_do_rcv+0xdb/0x2c0 [ 167.488831][ T2733] __release_sock+0x92/0x120 [ 167.493381][ T2733] release_sock+0x27/0xa0 [ 167.497677][ T2733] rds_send_xmit+0x683/0x970 [ 167.502407][ T2733] rds_sendmsg+0x9ab/0xb30 [ 167.506906][ T2733] ? aa_sk_perm+0x215/0x290 [ 167.511393][ T2733] ____sys_sendmsg+0x182/0x220 [ 167.516129][ T2733] ___sys_sendmsg+0x28f/0x2d0 [ 167.520770][ T2733] __se_sys_sendmsg+0xf4/0x130 [ 167.525584][ T2733] do_syscall_64+0x3d/0x80 [ 167.530061][ T2733] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 167.535912][ T2733] RIP: 0033:0x7fa47ba7c959 [ 167.540289][ T2733] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 167.560204][ T2733] RSP: 002b:00007fa47c8690c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 167.568576][ T2733] RAX: ffffffffffffffda RBX: 00007fa47bb9bf80 RCX: 00007fa47ba7c959 [ 167.576507][ T2733] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 167.584535][ T2733] RBP: 00007fa47bad8c88 R08: 0000000000000000 R09: 0000000000000000 [ 167.592466][ T2733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 167.600407][ T2733] R13: 0000000000000006 R14: 00007fa47bb9bf80 R15: 00007ffdd77299a8 [ 167.608341][ T2733] 2023/12/26 16:11:11 executed programs: 162 2023/12/26 16:11:16 executed programs: 169