Warning: Permanently added '10.128.0.132' (ED25519) to the list of known hosts. 1970/01/01 00:00:58 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:00:59 parsed 1 programs [ 59.261583][ T6517] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k SS 1970/01/01 00:00:59 executed programs: 0 [ 59.298215][ T5743] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 59.301084][ T5743] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 59.303145][ T5743] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 59.306254][ T5743] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 59.308355][ T5743] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 59.310074][ T5743] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 59.374287][ T6524] chnl_net:caif_netlink_parms(): no params data found [ 59.403305][ T6524] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.405009][ T6524] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.406934][ T6524] bridge_slave_0: entered allmulticast mode [ 59.408770][ T6524] bridge_slave_0: entered promiscuous mode [ 59.411370][ T6524] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.413116][ T6524] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.414928][ T6524] bridge_slave_1: entered allmulticast mode [ 59.416875][ T6524] bridge_slave_1: entered promiscuous mode [ 59.428064][ T6524] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.431497][ T6524] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.443861][ T6524] team0: Port device team_slave_0 added [ 59.446607][ T6524] team0: Port device team_slave_1 added [ 59.455848][ T6524] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 59.457402][ T6524] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.463912][ T6524] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 59.467756][ T6524] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 59.469317][ T6524] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.475375][ T6524] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 59.546736][ T6524] hsr_slave_0: entered promiscuous mode [ 59.595480][ T6524] hsr_slave_1: entered promiscuous mode [ 60.280184][ T6524] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 60.319046][ T6524] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 60.357013][ T6524] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 60.396577][ T6524] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 60.471441][ T6524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.480882][ T6524] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.489342][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.491136][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.493946][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.495696][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.580728][ T6524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.599412][ T6524] veth0_vlan: entered promiscuous mode [ 60.607196][ T6524] veth1_vlan: entered promiscuous mode [ 60.620201][ T6524] veth0_macvtap: entered promiscuous mode [ 60.623349][ T6524] veth1_macvtap: entered promiscuous mode [ 60.633086][ T6524] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 60.638797][ T6524] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 60.642857][ T6524] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.644740][ T6524] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.648893][ T6524] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.650968][ T6524] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.693171][ T23] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.695002][ T23] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.709606][ T2046] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.711411][ T2046] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.782103][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:53195. Sending cookies. [ 60.788981][ T6615] [ 60.789541][ T6615] ====================================================== [ 60.791107][ T6615] WARNING: possible circular locking dependency detected [ 60.792633][ T6615] 6.8.0-rc7-syzkaller-00135-g707081b61156 #0 Not tainted [ 60.794212][ T6615] ------------------------------------------------------ [ 60.795880][ T6615] syz-executor.0/6615 is trying to acquire lock: [ 60.797431][ T6615] ffff0000cc4a1ef8 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}, at: __flush_work+0xd0/0x1c0 [ 60.800224][ T6615] [ 60.800224][ T6615] but task is already holding lock: [ 60.801985][ T6615] ffff0000cc4a0c30 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x1e8/0x528 [ 60.804127][ T6615] [ 60.804127][ T6615] which lock already depends on the new lock. [ 60.804127][ T6615] [ 60.806582][ T6615] [ 60.806582][ T6615] the existing dependency chain (in reverse order) is: [ 60.808768][ T6615] [ 60.808768][ T6615] -> #1 (sk_lock-AF_SMC/1){+.+.}-{0:0}: [ 60.810815][ T6615] lock_sock_nested+0x5c/0x11c [ 60.812203][ T6615] smc_listen_out+0x10c/0x3bc [ 60.813292][ T6615] smc_listen_work+0x1e4/0xfcc [ 60.814404][ T6615] process_one_work+0x694/0x1204 [ 60.815577][ T6615] worker_thread+0x938/0xef4 [ 60.816736][ T6615] kthread+0x288/0x310 [ 60.817828][ T6615] ret_from_fork+0x10/0x20 [ 60.819015][ T6615] [ 60.819015][ T6615] -> #0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}: [ 60.821574][ T6615] __lock_acquire+0x3384/0x763c [ 60.822890][ T6615] lock_acquire+0x23c/0x71c [ 60.824254][ T6615] __flush_work+0xf8/0x1c0 [ 60.825539][ T6615] __cancel_work_timer+0x3e4/0x540 [ 60.826893][ T6615] cancel_work_sync+0x24/0x38 [ 60.828259][ T6615] smc_clcsock_release+0x64/0xec [ 60.829765][ T6615] __smc_release+0x55c/0x700 [ 60.831009][ T6615] smc_close_non_accepted+0xd8/0x260 [ 60.832385][ T6615] smc_close_active+0x9bc/0xd20 [ 60.833800][ T6615] __smc_release+0xa0/0x700 [ 60.835061][ T6615] smc_release+0x260/0x528 [ 60.836317][ T6615] sock_close+0xa4/0x1e8 [ 60.837373][ T6615] __fput+0x30c/0x738 [ 60.838356][ T6615] __fput_sync+0x60/0x9c [ 60.839394][ T6615] __arm64_sys_close+0x150/0x1e0 [ 60.840749][ T6615] invoke_syscall+0x98/0x2b8 [ 60.841985][ T6615] el0_svc_common+0x130/0x23c [ 60.843263][ T6615] do_el0_svc+0x48/0x58 [ 60.844430][ T6615] el0_svc+0x54/0x168 [ 60.845557][ T6615] el0t_64_sync_handler+0x84/0xfc [ 60.846874][ T6615] el0t_64_sync+0x190/0x194 [ 60.848088][ T6615] [ 60.848088][ T6615] other info that might help us debug this: [ 60.848088][ T6615] [ 60.850426][ T6615] Possible unsafe locking scenario: [ 60.850426][ T6615] [ 60.852364][ T6615] CPU0 CPU1 [ 60.853655][ T6615] ---- ---- [ 60.854922][ T6615] lock(sk_lock-AF_SMC/1); [ 60.855942][ T6615] lock((work_completion)(&new_smc->smc_listen_work)); [ 60.858220][ T6615] lock(sk_lock-AF_SMC/1); [ 60.859949][ T6615] lock((work_completion)(&new_smc->smc_listen_work)); [ 60.861606][ T6615] [ 60.861606][ T6615] *** DEADLOCK *** [ 60.861606][ T6615] [ 60.863845][ T6615] 2 locks held by syz-executor.0/6615: [ 60.865053][ T6615] #0: ffff0000dbbb5610 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x80/0x1e8 [ 60.867361][ T6615] #1: ffff0000cc4a0c30 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0x1e8/0x528 [ 60.869588][ T6615] [ 60.869588][ T6615] stack backtrace: [ 60.871007][ T6615] CPU: 0 PID: 6615 Comm: syz-executor.0 Not tainted 6.8.0-rc7-syzkaller-00135-g707081b61156 #0 [ 60.873276][ T6615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 60.875595][ T6615] Call trace: [ 60.876279][ T6615] dump_backtrace+0x1b8/0x1e4 [ 60.877362][ T6615] show_stack+0x2c/0x3c [ 60.878353][ T6615] dump_stack_lvl+0xd0/0x124 [ 60.879387][ T6615] dump_stack+0x1c/0x28 [ 60.880328][ T6615] print_circular_bug+0x150/0x1b8 [ 60.881506][ T6615] check_noncircular+0x310/0x404 [ 60.882690][ T6615] __lock_acquire+0x3384/0x763c [ 60.883764][ T6615] lock_acquire+0x23c/0x71c [ 60.884814][ T6615] __flush_work+0xf8/0x1c0 [ 60.885883][ T6615] __cancel_work_timer+0x3e4/0x540 [ 60.887162][ T6615] cancel_work_sync+0x24/0x38 [ 60.888191][ T6615] smc_clcsock_release+0x64/0xec [ 60.889266][ T6615] __smc_release+0x55c/0x700 [ 60.890251][ T6615] smc_close_non_accepted+0xd8/0x260 [ 60.891504][ T6615] smc_close_active+0x9bc/0xd20 [ 60.892615][ T6615] __smc_release+0xa0/0x700 [ 60.893623][ T6615] smc_release+0x260/0x528 [ 60.894668][ T6615] sock_close+0xa4/0x1e8 [ 60.895706][ T6615] __fput+0x30c/0x738 [ 60.896698][ T6615] __fput_sync+0x60/0x9c [ 60.897734][ T6615] __arm64_sys_close+0x150/0x1e0 [ 60.898966][ T6615] invoke_syscall+0x98/0x2b8 [ 60.900004][ T6615] el0_svc_common+0x130/0x23c [ 60.901133][ T6615] do_el0_svc+0x48/0x58 [ 60.902189][ T6615] el0_svc+0x54/0x168 [ 60.903116][ T6615] el0t_64_sync_handler+0x84/0xfc [ 60.904262][ T6615] el0t_64_sync+0x190/0x194 [ 60.922977][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:33752. Sending cookies. [ 60.936291][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:52181. Sending cookies. [ 60.954030][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:56062. Sending cookies. [ 60.972944][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:58944. Sending cookies. [ 60.991038][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:40199. Sending cookies. [ 61.002461][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:60871. Sending cookies. [ 61.023830][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:47004. Sending cookies. [ 61.042084][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:54621. Sending cookies. [ 61.057740][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:33666. Sending cookies. [ 61.365581][ T5743] Bluetooth: hci0: command 0x0409 tx timeout [ 63.445795][ T5743] Bluetooth: hci0: command 0x041b tx timeout 1970/01/01 00:01:04 executed programs: 291 [ 64.485804][ T2253] ieee802154 phy0 wpan0: encryption failed: -22 [ 64.487307][ T2253] ieee802154 phy1 wpan1: encryption failed: -22 [ 65.525196][ T5743] Bluetooth: hci0: command 0x040f tx timeout [ 65.792581][ C0] net_ratelimit: 433 callbacks suppressed [ 65.792595][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:36813. Sending cookies. [ 65.805705][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:44581. Sending cookies. [ 65.817462][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:56726. Sending cookies. [ 65.829392][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:38993. Sending cookies. [ 65.841958][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:32937. Sending cookies. [ 65.855383][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:53249. Sending cookies. [ 65.866481][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:48262. Sending cookies. [ 65.877209][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:49348. Sending cookies. [ 65.889749][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:44563. Sending cookies. [ 65.901162][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:58934. Sending cookies. [ 67.605449][ T5743] Bluetooth: hci0: command 0x0419 tx timeout 1970/01/01 00:01:09 executed programs: 855 [ 69.605459][ T25] cfg80211: failed to load regulatory.db