Warning: Permanently added '10.128.1.9' (ED25519) to the list of known hosts. 2024/03/06 04:39:07 ignoring optional flag "sandboxArg"="0" 2024/03/06 04:39:07 parsed 1 programs 2024/03/06 04:39:07 executed programs: 0 2024/03/06 04:39:13 executed programs: 4 2024/03/06 04:39:18 executed programs: 11 2024/03/06 04:39:23 executed programs: 20 2024/03/06 04:39:28 executed programs: 26 2024/03/06 04:39:33 executed programs: 32 2024/03/06 04:39:38 executed programs: 38 2024/03/06 04:39:43 executed programs: 45 2024/03/06 04:39:48 executed programs: 51 2024/03/06 04:39:53 executed programs: 57 2024/03/06 04:39:58 executed programs: 63 2024/03/06 04:40:03 executed programs: 69 2024/03/06 04:40:08 executed programs: 75 2024/03/06 04:40:13 executed programs: 81 2024/03/06 04:40:18 executed programs: 87 2024/03/06 04:40:24 executed programs: 94 2024/03/06 04:40:29 executed programs: 100 2024/03/06 04:40:34 executed programs: 108 2024/03/06 04:40:39 executed programs: 114 2024/03/06 04:40:44 executed programs: 120 2024/03/06 04:40:49 executed programs: 127 2024/03/06 04:40:54 executed programs: 134 2024/03/06 04:40:59 executed programs: 141 2024/03/06 04:41:04 executed programs: 149 2024/03/06 04:41:09 executed programs: 155 2024/03/06 04:41:14 executed programs: 161 2024/03/06 04:41:19 executed programs: 168 2024/03/06 04:41:24 executed programs: 174 2024/03/06 04:41:29 executed programs: 181 2024/03/06 04:41:35 executed programs: 189 2024/03/06 04:41:40 executed programs: 196 2024/03/06 04:41:45 executed programs: 202 2024/03/06 04:41:50 executed programs: 209 2024/03/06 04:41:55 executed programs: 215 2024/03/06 04:42:00 executed programs: 222 2024/03/06 04:42:05 executed programs: 228 2024/03/06 04:42:10 executed programs: 234 2024/03/06 04:42:15 executed programs: 241 2024/03/06 04:42:20 executed programs: 248 2024/03/06 04:42:25 executed programs: 254 2024/03/06 04:42:30 executed programs: 261 2024/03/06 04:42:36 executed programs: 271 2024/03/06 04:42:41 executed programs: 278 2024/03/06 04:42:46 executed programs: 285 2024/03/06 04:42:51 executed programs: 292 2024/03/06 04:42:56 executed programs: 299 [ 277.707961][ T3420] [ 277.710301][ T3420] ====================================================== [ 277.717459][ T3420] WARNING: possible circular locking dependency detected [ 277.724443][ T3420] 6.1.80-syzkaller #0 Not tainted [ 277.729430][ T3420] ------------------------------------------------------ [ 277.736502][ T3420] syz-executor.0/3420 is trying to acquire lock: [ 277.742892][ T3420] ffff8881073eb8e0 (&rs->rs_recv_lock){...-}-{2:2}, at: rds_wake_sk_sleep+0x17/0x50 [ 277.752228][ T3420] [ 277.752228][ T3420] but task is already holding lock: [ 277.759734][ T3420] ffff888101bd0500 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0x6b/0x300 [ 277.770031][ T3420] [ 277.770031][ T3420] which lock already depends on the new lock. [ 277.770031][ T3420] [ 277.780487][ T3420] [ 277.780487][ T3420] the existing dependency chain (in reverse order) is: [ 277.789560][ T3420] [ 277.789560][ T3420] -> #1 (&rm->m_rs_lock){..-.}-{2:2}: [ 277.797171][ T3420] _raw_spin_lock_irqsave+0x5d/0x90 [ 277.802951][ T3420] rds_message_put+0x69/0x3b0 [ 277.808123][ T3420] rds_clear_recv_queue+0xab/0xe0 [ 277.813723][ T3420] rds_release+0x50/0x130 [ 277.818547][ T3420] sock_close+0x42/0xd0 [ 277.823275][ T3420] __fput+0xe1/0x210 [ 277.827740][ T3420] task_work_run+0x79/0xa0 [ 277.832819][ T3420] exit_to_user_mode_loop+0xd2/0xe0 [ 277.838980][ T3420] exit_to_user_mode_prepare+0x9a/0xe0 [ 277.844921][ T3420] syscall_exit_to_user_mode+0x5e/0x210 [ 277.850953][ T3420] do_syscall_64+0x49/0x80 [ 277.855857][ T3420] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 277.862233][ T3420] [ 277.862233][ T3420] -> #0 (&rs->rs_recv_lock){...-}-{2:2}: [ 277.870089][ T3420] __lock_acquire+0x146d/0x2830 [ 277.875438][ T3420] lock_acquire+0xe3/0x270 [ 277.880432][ T3420] _raw_read_lock_irqsave+0x65/0xa0 [ 277.886203][ T3420] rds_wake_sk_sleep+0x17/0x50 [ 277.891802][ T3420] rds_send_remove_from_sock+0x9e/0x300 [ 277.897830][ T3420] rds_send_path_drop_acked+0x78/0x130 [ 277.903859][ T3420] rds_tcp_write_space+0xb0/0x210 [ 277.909393][ T3420] tcp_check_space+0x17d/0x200 [ 277.914642][ T3420] tcp_rcv_established+0x4e6/0x620 [ 277.920238][ T3420] tcp_v4_do_rcv+0xdb/0x2c0 [ 277.925240][ T3420] __release_sock+0x92/0x120 [ 277.930405][ T3420] release_sock+0x27/0xa0 [ 277.935225][ T3420] rds_send_xmit+0x683/0x970 [ 277.940494][ T3420] rds_sendmsg+0x9ab/0xb30 [ 277.945517][ T3420] ____sys_sendmsg+0x189/0x220 [ 277.950768][ T3420] ___sys_sendmsg+0x28f/0x2d0 [ 277.955932][ T3420] __se_sys_sendmsg+0xf4/0x130 [ 277.961440][ T3420] do_syscall_64+0x3d/0x80 [ 277.966518][ T3420] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 277.973076][ T3420] [ 277.973076][ T3420] other info that might help us debug this: [ 277.973076][ T3420] [ 277.983357][ T3420] Possible unsafe locking scenario: [ 277.983357][ T3420] [ 277.990771][ T3420] CPU0 CPU1 [ 277.996192][ T3420] ---- ---- [ 278.001524][ T3420] lock(&rm->m_rs_lock); [ 278.005817][ T3420] lock(&rs->rs_recv_lock); [ 278.013064][ T3420] lock(&rm->m_rs_lock); [ 278.019969][ T3420] lock(&rs->rs_recv_lock); [ 278.024611][ T3420] [ 278.024611][ T3420] *** DEADLOCK *** [ 278.024611][ T3420] [ 278.033508][ T3420] 3 locks held by syz-executor.0/3420: [ 278.038928][ T3420] #0: ffff88810338e8b0 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0xe/0x90 [ 278.048961][ T3420] #1: ffff88810338eb38 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x1c/0x210 [ 278.058826][ T3420] #2: ffff888101bd0500 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0x6b/0x300 [ 278.069128][ T3420] [ 278.069128][ T3420] stack backtrace: [ 278.075206][ T3420] CPU: 1 PID: 3420 Comm: syz-executor.0 Not tainted 6.1.80-syzkaller #0 [ 278.083706][ T3420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 278.093986][ T3420] Call Trace: [ 278.097237][ T3420] [ 278.100139][ T3420] dump_stack_lvl+0x89/0xd7 [ 278.104702][ T3420] print_circular_bug+0x2c5/0x300 [ 278.109702][ T3420] check_noncircular+0x106/0x110 [ 278.114697][ T3420] __lock_acquire+0x146d/0x2830 [ 278.119518][ T3420] ? __lock_acquire+0x541/0x2830 [ 278.124515][ T3420] ? rds_wake_sk_sleep+0x17/0x50 [ 278.129415][ T3420] lock_acquire+0xe3/0x270 [ 278.133793][ T3420] ? rds_wake_sk_sleep+0x17/0x50 [ 278.138693][ T3420] _raw_read_lock_irqsave+0x65/0xa0 [ 278.143854][ T3420] ? rds_wake_sk_sleep+0x17/0x50 [ 278.148754][ T3420] rds_wake_sk_sleep+0x17/0x50 [ 278.153568][ T3420] rds_send_remove_from_sock+0x9e/0x300 [ 278.159165][ T3420] ? lockdep_hardirqs_on+0x94/0xf0 [ 278.164249][ T3420] ? rds_tcp_write_space+0x210/0x210 [ 278.169498][ T3420] rds_send_path_drop_acked+0x78/0x130 [ 278.174918][ T3420] ? datagram_poll+0xe0/0xe0 [ 278.179643][ T3420] rds_tcp_write_space+0xb0/0x210 [ 278.184720][ T3420] tcp_check_space+0x17d/0x200 [ 278.189714][ T3420] tcp_rcv_established+0x4e6/0x620 [ 278.194877][ T3420] tcp_v4_do_rcv+0xdb/0x2c0 [ 278.199346][ T3420] __release_sock+0x92/0x120 [ 278.203910][ T3420] release_sock+0x27/0xa0 [ 278.208200][ T3420] rds_send_xmit+0x683/0x970 [ 278.212843][ T3420] rds_sendmsg+0x9ab/0xb30 [ 278.217251][ T3420] ? aa_sk_perm+0x215/0x290 [ 278.221806][ T3420] ____sys_sendmsg+0x189/0x220 [ 278.226575][ T3420] ___sys_sendmsg+0x28f/0x2d0 [ 278.231218][ T3420] __se_sys_sendmsg+0xf4/0x130 [ 278.236121][ T3420] do_syscall_64+0x3d/0x80 [ 278.241022][ T3420] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 278.246880][ T3420] RIP: 0033:0x7f239747c959 [ 278.251261][ T3420] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 278.271119][ T3420] RSP: 002b:00007f23981070c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.279578][ T3420] RAX: ffffffffffffffda RBX: 00007f239759c050 RCX: 00007f239747c959 [ 278.287601][ T3420] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 278.295712][ T3420] RBP: 00007f23974d8c88 R08: 0000000000000000 R09: 0000000000000000 [ 278.303825][ T3420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 278.311848][ T3420] R13: 000000000000000b R14: 00007f239759c050 R15: 00007ffd9eb5ff88 [ 278.319781][ T3420] 2024/03/06 04:43:01 executed programs: 306 2024/03/06 04:43:06 executed programs: 312