Warning: Permanently added '10.128.0.124' (ED25519) to the list of known hosts. 2024/05/14 07:49:41 ignoring optional flag "sandboxArg"="0" 2024/05/14 07:49:41 parsed 1 programs 2024/05/14 07:49:41 executed programs: 0 [ 45.871509][ T1577] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 48.475920][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 59634. Sending cookies. Check SNMP counters. [ 48.489111][ T1994] [ 48.491442][ T1994] ====================================================== [ 48.498438][ T1994] WARNING: possible circular locking dependency detected [ 48.505709][ T1994] 6.1.90-syzkaller #0 Not tainted [ 48.510787][ T1994] ------------------------------------------------------ [ 48.517804][ T1994] syz-executor.0/1994 is trying to acquire lock: [ 48.524309][ T1994] ffff8881027693c0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}, at: __flush_work+0x5e/0x490 [ 48.535923][ T1994] [ 48.535923][ T1994] but task is already holding lock: [ 48.543445][ T1994] ffff888102768130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0xb7/0x1b0 [ 48.553006][ T1994] [ 48.553006][ T1994] which lock already depends on the new lock. [ 48.553006][ T1994] [ 48.563488][ T1994] [ 48.563488][ T1994] the existing dependency chain (in reverse order) is: [ 48.573254][ T1994] [ 48.573254][ T1994] -> #1 (sk_lock-AF_SMC/1){+.+.}-{0:0}: [ 48.580960][ T1994] lock_sock_nested+0x2a/0x70 [ 48.586186][ T1994] smc_listen_out+0x4d/0x150 [ 48.591303][ T1994] process_one_work+0x235/0x470 [ 48.596656][ T1994] worker_thread+0x214/0x370 [ 48.601749][ T1994] kthread+0xd1/0xe0 [ 48.606235][ T1994] ret_from_fork+0x1f/0x30 [ 48.611201][ T1994] [ 48.611201][ T1994] -> #0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}: [ 48.621586][ T1994] __lock_acquire+0x146d/0x2830 [ 48.627016][ T1994] lock_acquire+0xe3/0x270 [ 48.632128][ T1994] __flush_work+0x77/0x490 [ 48.637163][ T1994] __cancel_work_timer+0x13f/0x1e0 [ 48.642893][ T1994] smc_clcsock_release+0x26/0x60 [ 48.648342][ T1994] __smc_release+0x19c/0x1e0 [ 48.653457][ T1994] smc_close_non_accepted+0x51/0xd0 [ 48.659179][ T1994] smc_close_active+0x24d/0x330 [ 48.664705][ T1994] __smc_release+0x51/0x1e0 [ 48.669800][ T1994] smc_release+0xde/0x1b0 [ 48.674940][ T1994] sock_close+0x42/0xd0 [ 48.679702][ T1994] __fput+0xe1/0x210 [ 48.684121][ T1994] task_work_run+0x79/0xa0 [ 48.689051][ T1994] exit_to_user_mode_loop+0xd2/0xe0 [ 48.694742][ T1994] exit_to_user_mode_prepare+0x9a/0xe0 [ 48.700709][ T1994] syscall_exit_to_user_mode+0x5e/0x210 [ 48.706844][ T1994] do_syscall_64+0x47/0x80 [ 48.711851][ T1994] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.718410][ T1994] [ 48.718410][ T1994] other info that might help us debug this: [ 48.718410][ T1994] [ 48.728866][ T1994] Possible unsafe locking scenario: [ 48.728866][ T1994] [ 48.736288][ T1994] CPU0 CPU1 [ 48.741661][ T1994] ---- ---- [ 48.747010][ T1994] lock(sk_lock-AF_SMC/1); [ 48.751567][ T1994] lock((work_completion)(&new_smc->smc_listen_work)); [ 48.760983][ T1994] lock(sk_lock-AF_SMC/1); [ 48.768054][ T1994] lock((work_completion)(&new_smc->smc_listen_work)); [ 48.775414][ T1994] [ 48.775414][ T1994] *** DEADLOCK *** [ 48.775414][ T1994] [ 48.783612][ T1994] 2 locks held by syz-executor.0/1994: [ 48.789057][ T1994] #0: ffff88810c453e90 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x35/0xd0 [ 48.799185][ T1994] #1: ffff888102768130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0xb7/0x1b0 [ 48.808967][ T1994] [ 48.808967][ T1994] stack backtrace: [ 48.815088][ T1994] CPU: 1 PID: 1994 Comm: syz-executor.0 Not tainted 6.1.90-syzkaller #0 [ 48.823383][ T1994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 48.833681][ T1994] Call Trace: [ 48.836962][ T1994] [ 48.839878][ T1994] dump_stack_lvl+0x89/0xd7 [ 48.844350][ T1994] print_circular_bug+0x2c5/0x300 [ 48.849340][ T1994] check_noncircular+0x106/0x110 [ 48.854351][ T1994] __lock_acquire+0x146d/0x2830 [ 48.859165][ T1994] ? unwind_get_return_address+0x12/0x20 [ 48.865028][ T1994] ? arch_stack_walk+0xf3/0x140 [ 48.869888][ T1994] ? check_noncircular+0xc2/0x110 [ 48.875269][ T1994] ? __flush_work+0x5e/0x490 [ 48.879852][ T1994] lock_acquire+0xe3/0x270 [ 48.884250][ T1994] ? __flush_work+0x5e/0x490 [ 48.888927][ T1994] ? __flush_work+0x5e/0x490 [ 48.893715][ T1994] __flush_work+0x77/0x490 [ 48.898112][ T1994] ? __flush_work+0x5e/0x490 [ 48.902869][ T1994] __cancel_work_timer+0x13f/0x1e0 [ 48.908220][ T1994] ? __local_bh_enable_ip+0xb7/0xf0 [ 48.913578][ T1994] smc_clcsock_release+0x26/0x60 [ 48.918787][ T1994] __smc_release+0x19c/0x1e0 [ 48.923382][ T1994] smc_close_non_accepted+0x51/0xd0 [ 48.928819][ T1994] smc_close_active+0x24d/0x330 [ 48.933750][ T1994] __smc_release+0x51/0x1e0 [ 48.938307][ T1994] smc_release+0xde/0x1b0 [ 48.942782][ T1994] sock_close+0x42/0xd0 [ 48.947438][ T1994] __fput+0xe1/0x210 [ 48.951303][ T1994] task_work_run+0x79/0xa0 [ 48.955792][ T1994] exit_to_user_mode_loop+0xd2/0xe0 [ 48.960954][ T1994] exit_to_user_mode_prepare+0x9a/0xe0 [ 48.966373][ T1994] syscall_exit_to_user_mode+0x5e/0x210 [ 48.972235][ T1994] do_syscall_64+0x47/0x80 [ 48.976714][ T1994] ? clear_bhb_loop+0x45/0xa0 [ 48.981359][ T1994] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.987240][ T1994] RIP: 0033:0x7f40d767bc9a [ 48.991642][ T1994] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 49.011661][ T1994] RSP: 002b:00007fffd2906cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 49.020077][ T1994] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007f40d767bc9a [ 49.028361][ T1994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 49.037295][ T1994] RBP: 0000000000000032 R08: 0000001b2eb60000 R09: 00007f40d77abf8c [ 49.045407][ T1994] R10: 00007fffd2906e10 R11: 0000000000000293 R12: 00007f40d72003f8 [ 49.053463][ T1994] R13: ffffffffffffffff R14: 00007f40d7200000 R15: 000000000000bd4a [ 49.061683][ T1994] [ 49.069340][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 40019. Sending cookies. Check SNMP counters. [ 49.084911][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 60917. Sending cookies. Check SNMP counters. [ 49.099982][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 37991. Sending cookies. Check SNMP counters. [ 49.115327][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 56097. Sending cookies. Check SNMP counters. [ 49.130255][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 38628. Sending cookies. Check SNMP counters. [ 49.146046][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 42820. Sending cookies. Check SNMP counters. [ 49.168311][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 45117. Sending cookies. Check SNMP counters. [ 49.184975][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 36529. Sending cookies. Check SNMP counters. [ 49.202226][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 47093. Sending cookies. Check SNMP counters. 2024/05/14 07:49:46 executed programs: 431 [ 53.481199][ C1] net_ratelimit: 1066 callbacks suppressed [ 53.481203][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 37905. Sending cookies. Check SNMP counters. [ 53.502733][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 53366. Sending cookies. Check SNMP counters. [ 53.518878][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 42906. Sending cookies. Check SNMP counters. [ 53.533974][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 49805. Sending cookies. Check SNMP counters. [ 53.550885][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 42319. Sending cookies. Check SNMP counters. [ 53.566257][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 42240. Sending cookies. Check SNMP counters. [ 53.582651][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 48548. Sending cookies. Check SNMP counters. [ 53.598372][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 51750. Sending cookies. Check SNMP counters. [ 53.614519][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 40050. Sending cookies. Check SNMP counters. [ 53.630852][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 34998. Sending cookies. Check SNMP counters. 2024/05/14 07:49:51 executed programs: 1673