Warning: Permanently added '10.128.0.250' (ED25519) to the list of known hosts. 2024/01/17 07:10:04 ignoring optional flag "sandboxArg"="0" 2024/01/17 07:10:04 parsed 1 programs 2024/01/17 07:10:04 executed programs: 0 2024/01/17 07:10:10 executed programs: 8 2024/01/17 07:10:15 executed programs: 16 2024/01/17 07:10:20 executed programs: 22 [ 56.163933][ T2120] [ 56.166279][ T2120] ====================================================== [ 56.173367][ T2120] WARNING: possible circular locking dependency detected [ 56.180404][ T2120] 5.15.147-syzkaller #0 Not tainted [ 56.185753][ T2120] ------------------------------------------------------ [ 56.193357][ T2120] syz-executor.0/2120 is trying to acquire lock: [ 56.199994][ T2120] ffff88810f266b98 (&rs->rs_recv_lock){....}-{2:2}, at: rds_wake_sk_sleep+0x16/0x60 [ 56.209466][ T2120] [ 56.209466][ T2120] but task is already holding lock: [ 56.217345][ T2120] ffff888106ae9500 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0xd8/0x330 [ 56.227260][ T2120] [ 56.227260][ T2120] which lock already depends on the new lock. [ 56.227260][ T2120] [ 56.237743][ T2120] [ 56.237743][ T2120] the existing dependency chain (in reverse order) is: [ 56.246937][ T2120] [ 56.246937][ T2120] -> #1 (&rm->m_rs_lock){....}-{2:2}: [ 56.254554][ T2120] _raw_spin_lock_irqsave+0x36/0x50 [ 56.260244][ T2120] rds_message_put+0x82/0x3c0 [ 56.265407][ T2120] rds_clear_recv_queue+0x9b/0xd0 [ 56.271003][ T2120] rds_release+0x56/0x140 [ 56.275819][ T2120] __sock_release+0x32/0xa0 [ 56.280896][ T2120] sock_close+0xf/0x20 [ 56.285635][ T2120] __fput+0x8d/0x250 [ 56.290025][ T2120] task_work_run+0x54/0x80 [ 56.294962][ T2120] exit_to_user_mode_prepare+0x1bc/0x1c0 [ 56.301198][ T2120] syscall_exit_to_user_mode+0x19/0x60 [ 56.307432][ T2120] do_syscall_64+0x42/0x80 [ 56.312359][ T2120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 56.318935][ T2120] [ 56.318935][ T2120] -> #0 (&rs->rs_recv_lock){....}-{2:2}: [ 56.327030][ T2120] __lock_acquire+0x10b6/0x1a40 [ 56.332397][ T2120] lock_acquire+0xbb/0x2a0 [ 56.337299][ T2120] _raw_read_lock_irqsave+0x42/0x90 [ 56.342984][ T2120] rds_wake_sk_sleep+0x16/0x60 [ 56.348235][ T2120] rds_send_remove_from_sock+0x103/0x330 [ 56.354439][ T2120] rds_send_path_drop_acked+0x121/0x150 [ 56.360641][ T2120] rds_tcp_write_space+0x9a/0x220 [ 56.366152][ T2120] tcp_check_space+0x31/0x110 [ 56.372297][ T2120] tcp_rcv_established+0x27e/0x730 [ 56.378170][ T2120] tcp_v4_do_rcv+0x17c/0x2f0 [ 56.383430][ T2120] __release_sock+0x54/0xd0 [ 56.388436][ T2120] release_sock+0x26/0xa0 [ 56.393774][ T2120] rds_send_xmit+0x5cc/0xa00 [ 56.398848][ T2120] rds_sendmsg+0xedb/0x1110 [ 56.403921][ T2120] __sock_sendmsg+0x2e/0x40 [ 56.409105][ T2120] ____sys_sendmsg+0x234/0x250 [ 56.414445][ T2120] ___sys_sendmsg+0x6e/0xb0 [ 56.419523][ T2120] __sys_sendmsg+0x54/0xa0 [ 56.424768][ T2120] do_syscall_64+0x35/0x80 [ 56.429675][ T2120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 56.436119][ T2120] [ 56.436119][ T2120] other info that might help us debug this: [ 56.436119][ T2120] [ 56.446329][ T2120] Possible unsafe locking scenario: [ 56.446329][ T2120] [ 56.453780][ T2120] CPU0 CPU1 [ 56.459284][ T2120] ---- ---- [ 56.464729][ T2120] lock(&rm->m_rs_lock); [ 56.469269][ T2120] lock(&rs->rs_recv_lock); [ 56.476369][ T2120] lock(&rm->m_rs_lock); [ 56.483255][ T2120] lock(&rs->rs_recv_lock); [ 56.487911][ T2120] [ 56.487911][ T2120] *** DEADLOCK *** [ 56.487911][ T2120] [ 56.496293][ T2120] 3 locks held by syz-executor.0/2120: [ 56.501729][ T2120] #0: ffff888109aa7420 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0xe/0x40 [ 56.511626][ T2120] #1: ffff888109aa76d8 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x1a/0x220 [ 56.521519][ T2120] #2: ffff888106ae9500 (&rm->m_rs_lock){....}-{2:2}, at: rds_send_remove_from_sock+0xd8/0x330 [ 56.533553][ T2120] [ 56.533553][ T2120] stack backtrace: [ 56.539781][ T2120] CPU: 1 PID: 2120 Comm: syz-executor.0 Not tainted 5.15.147-syzkaller #0 [ 56.549929][ T2120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 56.560305][ T2120] Call Trace: [ 56.563658][ T2120] [ 56.566654][ T2120] dump_stack_lvl+0x57/0x7d [ 56.571299][ T2120] check_noncircular+0xcc/0xe0 [ 56.578822][ T2120] ? register_lock_class+0x41/0x630 [ 56.583986][ T2120] __lock_acquire+0x10b6/0x1a40 [ 56.589061][ T2120] lock_acquire+0xbb/0x2a0 [ 56.593531][ T2120] ? rds_wake_sk_sleep+0x16/0x60 [ 56.598430][ T2120] ? rds_send_remove_from_sock+0xd8/0x330 [ 56.604234][ T2120] _raw_read_lock_irqsave+0x42/0x90 [ 56.609663][ T2120] ? rds_wake_sk_sleep+0x16/0x60 [ 56.614603][ T2120] rds_wake_sk_sleep+0x16/0x60 [ 56.619434][ T2120] rds_send_remove_from_sock+0x103/0x330 [ 56.625132][ T2120] ? lockdep_hardirqs_on_prepare+0x9d/0xf0 [ 56.630911][ T2120] ? _raw_spin_unlock_irqrestore+0x44/0x60 [ 56.636692][ T2120] ? rds_tcp_recv_exit+0x10/0x10 [ 56.641789][ T2120] rds_send_path_drop_acked+0x121/0x150 [ 56.647397][ T2120] ? sk_stream_wait_memory+0x370/0x370 [ 56.653003][ T2120] rds_tcp_write_space+0x9a/0x220 [ 56.658431][ T2120] tcp_check_space+0x31/0x110 [ 56.663508][ T2120] tcp_rcv_established+0x27e/0x730 [ 56.668773][ T2120] tcp_v4_do_rcv+0x17c/0x2f0 [ 56.673322][ T2120] __release_sock+0x54/0xd0 [ 56.677970][ T2120] release_sock+0x26/0xa0 [ 56.682433][ T2120] rds_send_xmit+0x5cc/0xa00 [ 56.687592][ T2120] rds_sendmsg+0xedb/0x1110 [ 56.692334][ T2120] ? aa_sk_perm+0x5e/0x310 [ 56.696820][ T2120] __sock_sendmsg+0x2e/0x40 [ 56.701292][ T2120] ____sys_sendmsg+0x234/0x250 [ 56.706020][ T2120] ? import_iovec+0x17/0x20 [ 56.710487][ T2120] ? sendmsg_copy_msghdr+0x77/0xa0 [ 56.716287][ T2120] ___sys_sendmsg+0x6e/0xb0 [ 56.720786][ T2120] ? lock_acquire+0xbb/0x2a0 [ 56.725574][ T2120] ? ksys_dup3+0x160/0x160 [ 56.730136][ T2120] ? find_held_lock+0x2b/0x80 [ 56.734796][ T2120] ? __fget_files+0xb9/0x190 [ 56.739456][ T2120] ? __fget_files+0xd1/0x190 [ 56.744018][ T2120] __sys_sendmsg+0x54/0xa0 [ 56.748585][ T2120] ? lockdep_hardirqs_on_prepare+0xcd/0xf0 [ 56.754367][ T2120] do_syscall_64+0x35/0x80 [ 56.758872][ T2120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 56.764773][ T2120] RIP: 0033:0x7f0b3ffdb959 [ 56.769242][ T2120] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 56.789848][ T2120] RSP: 002b:00007f0b3fb1c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 56.798342][ T2120] RAX: ffffffffffffffda RBX: 00007f0b400fb120 RCX: 00007f0b3ffdb959 [ 56.806488][ T2120] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 56.814446][ T2120] RBP: 00007f0b40037c88 R08: 0000000000000000 R09: 0000000000000000 [ 56.822616][ T2120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 56.830912][ T2120] R13: 000000000000006e R14: 00007f0b400fb120 R15: 00007fff277f1148 [ 56.838952][ T2120] 2024/01/17 07:10:26 executed programs: 28 2024/01/17 07:10:31 executed programs: 35