Warning: Permanently added '10.128.1.224' (ED25519) to the list of known hosts. 2024/06/11 12:13:05 ignoring optional flag "sandboxArg"="0" 2024/06/11 12:13:05 parsed 1 programs 2024/06/11 12:13:05 executed programs: 0 2024/06/11 12:13:10 executed programs: 3 2024/06/11 12:13:15 executed programs: 10 2024/06/11 12:13:20 executed programs: 17 2024/06/11 12:13:25 executed programs: 24 2024/06/11 12:13:30 executed programs: 31 [ 77.962204][ T2055] [ 77.964549][ T2055] ====================================================== [ 77.971732][ T2055] WARNING: possible circular locking dependency detected [ 77.978822][ T2055] 6.1.92-syzkaller #0 Not tainted [ 77.983915][ T2055] ------------------------------------------------------ [ 77.991086][ T2055] syz-executor.0/2055 is trying to acquire lock: [ 77.997473][ T2055] ffff888101726900 (&rm->m_rs_lock){....}-{2:2}, at: rds_message_put+0x69/0x3b0 [ 78.006945][ T2055] [ 78.006945][ T2055] but task is already holding lock: [ 78.014374][ T2055] ffff888103b72320 (&rs->rs_recv_lock){....}-{2:2}, at: rds_clear_recv_queue+0x1c/0xe0 [ 78.024247][ T2055] [ 78.024247][ T2055] which lock already depends on the new lock. [ 78.024247][ T2055] [ 78.035276][ T2055] [ 78.035276][ T2055] the existing dependency chain (in reverse order) is: [ 78.044447][ T2055] [ 78.044447][ T2055] -> #1 (&rs->rs_recv_lock){....}-{2:2}: [ 78.052338][ T2055] _raw_read_lock_irqsave+0x65/0xa0 [ 78.058039][ T2055] rds_wake_sk_sleep+0x17/0x50 [ 78.063388][ T2055] rds_send_remove_from_sock+0x9e/0x300 [ 78.069529][ T2055] rds_send_path_drop_acked+0x78/0x130 [ 78.075575][ T2055] rds_tcp_write_space+0xb0/0x210 [ 78.081103][ T2055] tcp_check_space+0x17d/0x200 [ 78.086537][ T2055] tcp_rcv_established+0x4e6/0x620 [ 78.092341][ T2055] tcp_v4_do_rcv+0xdb/0x2c0 [ 78.097558][ T2055] __release_sock+0x92/0x120 [ 78.102652][ T2055] release_sock+0x27/0xa0 [ 78.107670][ T2055] rds_send_xmit+0x683/0x970 [ 78.113161][ T2055] rds_sendmsg+0x961/0xad0 [ 78.118432][ T2055] ____sys_sendmsg+0x189/0x220 [ 78.123812][ T2055] ___sys_sendmsg+0x28f/0x2d0 [ 78.129078][ T2055] __se_sys_sendmsg+0xf4/0x130 [ 78.134352][ T2055] do_syscall_64+0x3b/0x80 [ 78.139284][ T2055] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.145677][ T2055] [ 78.145677][ T2055] -> #0 (&rm->m_rs_lock){....}-{2:2}: [ 78.153284][ T2055] __lock_acquire+0x146d/0x2830 [ 78.158635][ T2055] lock_acquire+0xe3/0x270 [ 78.163637][ T2055] _raw_spin_lock_irqsave+0x5d/0x90 [ 78.169345][ T2055] rds_message_put+0x69/0x3b0 [ 78.174524][ T2055] rds_clear_recv_queue+0xab/0xe0 [ 78.180320][ T2055] rds_release+0x50/0x130 [ 78.185447][ T2055] sock_close+0x42/0xd0 [ 78.190681][ T2055] __fput+0xe1/0x210 [ 78.195776][ T2055] task_work_run+0x79/0xa0 [ 78.200843][ T2055] exit_to_user_mode_loop+0xd2/0xe0 [ 78.207157][ T2055] exit_to_user_mode_prepare+0x9a/0xe0 [ 78.213303][ T2055] syscall_exit_to_user_mode+0x5e/0x210 [ 78.219351][ T2055] do_syscall_64+0x47/0x80 [ 78.224278][ T2055] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.230852][ T2055] [ 78.230852][ T2055] other info that might help us debug this: [ 78.230852][ T2055] [ 78.241157][ T2055] Possible unsafe locking scenario: [ 78.241157][ T2055] [ 78.248843][ T2055] CPU0 CPU1 [ 78.254282][ T2055] ---- ---- [ 78.259634][ T2055] lock(&rs->rs_recv_lock); [ 78.264375][ T2055] lock(&rm->m_rs_lock); [ 78.271292][ T2055] lock(&rs->rs_recv_lock); [ 78.278488][ T2055] lock(&rm->m_rs_lock); [ 78.283130][ T2055] [ 78.283130][ T2055] *** DEADLOCK *** [ 78.283130][ T2055] [ 78.291515][ T2055] 2 locks held by syz-executor.0/2055: [ 78.297130][ T2055] #0: ffff88810c2e5f90 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x35/0xd0 [ 78.307292][ T2055] #1: ffff888103b72320 (&rs->rs_recv_lock){....}-{2:2}, at: rds_clear_recv_queue+0x1c/0xe0 [ 78.317865][ T2055] [ 78.317865][ T2055] stack backtrace: [ 78.324101][ T2055] CPU: 1 PID: 2055 Comm: syz-executor.0 Not tainted 6.1.92-syzkaller #0 [ 78.332843][ T2055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 78.343227][ T2055] Call Trace: [ 78.346493][ T2055] [ 78.349402][ T2055] dump_stack_lvl+0x89/0xd7 [ 78.353970][ T2055] print_circular_bug+0x2c5/0x300 [ 78.359105][ T2055] check_noncircular+0x106/0x110 [ 78.364114][ T2055] __lock_acquire+0x146d/0x2830 [ 78.369125][ T2055] ? __lock_acquire+0x541/0x2830 [ 78.374479][ T2055] ? rds_message_put+0x69/0x3b0 [ 78.380468][ T2055] lock_acquire+0xe3/0x270 [ 78.385135][ T2055] ? rds_message_put+0x69/0x3b0 [ 78.390058][ T2055] _raw_spin_lock_irqsave+0x5d/0x90 [ 78.395414][ T2055] ? rds_message_put+0x69/0x3b0 [ 78.400347][ T2055] rds_message_put+0x69/0x3b0 [ 78.405714][ T2055] rds_clear_recv_queue+0xab/0xe0 [ 78.410815][ T2055] rds_release+0x50/0x130 [ 78.415144][ T2055] sock_close+0x42/0xd0 [ 78.420148][ T2055] __fput+0xe1/0x210 [ 78.424107][ T2055] task_work_run+0x79/0xa0 [ 78.428596][ T2055] exit_to_user_mode_loop+0xd2/0xe0 [ 78.434208][ T2055] exit_to_user_mode_prepare+0x9a/0xe0 [ 78.439735][ T2055] syscall_exit_to_user_mode+0x5e/0x210 [ 78.445448][ T2055] do_syscall_64+0x47/0x80 [ 78.449855][ T2055] ? clear_bhb_loop+0x45/0xa0 [ 78.454685][ T2055] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.460648][ T2055] RIP: 0033:0x7f0b0307b95a [ 78.465051][ T2055] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 f3 7d 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 53 7e 02 00 8b 44 24 [ 78.485622][ T2055] RSP: 002b:00007ffd11c95fb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 78.494533][ T2055] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f0b0307b95a [ 78.503010][ T2055] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 78.511059][ T2055] RBP: 00007f0b0319d980 R08: 0000001b31660000 R09: 0000000000000010 [ 78.519275][ T2055] R10: 00007ffd11d21080 R11: 0000000000000293 R12: 0000000000013065 [ 78.528022][ T2055] R13: ffffffffffffffff R14: 00007f0b02c00000 R15: 0000000000012d24 [ 78.536604][ T2055] 2024/06/11 12:13:36 executed programs: 37 2024/06/11 12:13:41 executed programs: 43