Warning: Permanently added '10.128.0.114' (ED25519) to the list of known hosts. 2024/04/07 12:57:53 ignoring optional flag "sandboxArg"="0" 2024/04/07 12:57:53 parsed 1 programs 2024/04/07 12:57:53 executed programs: 0 [ 45.388521][ T1578] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.874237][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 35463. Sending cookies. Check SNMP counters. [ 47.886614][ T1994] [ 47.888935][ T1994] ====================================================== [ 47.896005][ T1994] WARNING: possible circular locking dependency detected [ 47.903008][ T1994] 6.1.84-syzkaller #0 Not tainted [ 47.908260][ T1994] ------------------------------------------------------ [ 47.915257][ T1994] syz-executor.0/1994 is trying to acquire lock: [ 47.921548][ T1994] ffff8881067a93c0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}, at: __flush_work+0x5e/0x490 [ 47.933240][ T1994] [ 47.933240][ T1994] but task is already holding lock: [ 47.940840][ T1994] ffff8881067a8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0xb7/0x1b0 [ 47.949663][ T1994] [ 47.949663][ T1994] which lock already depends on the new lock. [ 47.949663][ T1994] [ 47.960269][ T1994] [ 47.960269][ T1994] the existing dependency chain (in reverse order) is: [ 47.969263][ T1994] [ 47.969263][ T1994] -> #1 (sk_lock-AF_SMC/1){+.+.}-{0:0}: [ 47.977215][ T1994] lock_sock_nested+0x2a/0x70 [ 47.982481][ T1994] smc_listen_out+0x4d/0x150 [ 47.987739][ T1994] process_one_work+0x235/0x470 [ 47.993684][ T1994] worker_thread+0x214/0x370 [ 47.998763][ T1994] kthread+0xd1/0xe0 [ 48.003144][ T1994] ret_from_fork+0x1f/0x30 [ 48.008137][ T1994] [ 48.008137][ T1994] -> #0 ((work_completion)(&new_smc->smc_listen_work)){+.+.}-{0:0}: [ 48.018363][ T1994] __lock_acquire+0x146d/0x2830 [ 48.023721][ T1994] lock_acquire+0xe3/0x270 [ 48.028651][ T1994] __flush_work+0x77/0x490 [ 48.033554][ T1994] __cancel_work_timer+0x13f/0x1e0 [ 48.039156][ T1994] smc_clcsock_release+0x26/0x60 [ 48.044713][ T1994] __smc_release+0x19c/0x1e0 [ 48.049794][ T1994] smc_close_non_accepted+0x51/0xd0 [ 48.055486][ T1994] smc_close_active+0x24d/0x330 [ 48.060908][ T1994] __smc_release+0x51/0x1e0 [ 48.065896][ T1994] smc_release+0xde/0x1b0 [ 48.070798][ T1994] sock_close+0x42/0xd0 [ 48.075447][ T1994] __fput+0xe1/0x210 [ 48.079835][ T1994] task_work_run+0x79/0xa0 [ 48.084925][ T1994] exit_to_user_mode_loop+0xd2/0xe0 [ 48.090608][ T1994] exit_to_user_mode_prepare+0x9a/0xe0 [ 48.096638][ T1994] syscall_exit_to_user_mode+0x5e/0x210 [ 48.102777][ T1994] do_syscall_64+0x49/0x80 [ 48.107797][ T1994] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 48.114272][ T1994] [ 48.114272][ T1994] other info that might help us debug this: [ 48.114272][ T1994] [ 48.124481][ T1994] Possible unsafe locking scenario: [ 48.124481][ T1994] [ 48.132016][ T1994] CPU0 CPU1 [ 48.137435][ T1994] ---- ---- [ 48.142786][ T1994] lock(sk_lock-AF_SMC/1); [ 48.147274][ T1994] lock((work_completion)(&new_smc->smc_listen_work)); [ 48.156697][ T1994] lock(sk_lock-AF_SMC/1); [ 48.163693][ T1994] lock((work_completion)(&new_smc->smc_listen_work)); [ 48.170701][ T1994] [ 48.170701][ T1994] *** DEADLOCK *** [ 48.170701][ T1994] [ 48.179070][ T1994] 2 locks held by syz-executor.0/1994: [ 48.184671][ T1994] #0: ffff88810c3bdf90 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x35/0xd0 [ 48.195057][ T1994] #1: ffff8881067a8130 (sk_lock-AF_SMC/1){+.+.}-{0:0}, at: smc_release+0xb7/0x1b0 [ 48.204606][ T1994] [ 48.204606][ T1994] stack backtrace: [ 48.210574][ T1994] CPU: 1 PID: 1994 Comm: syz-executor.0 Not tainted 6.1.84-syzkaller #0 [ 48.219050][ T1994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 48.229331][ T1994] Call Trace: [ 48.232643][ T1994] [ 48.235568][ T1994] dump_stack_lvl+0x89/0xd7 [ 48.240042][ T1994] print_circular_bug+0x2c5/0x300 [ 48.245379][ T1994] check_noncircular+0x106/0x110 [ 48.250571][ T1994] __lock_acquire+0x146d/0x2830 [ 48.255921][ T1994] ? unwind_get_return_address+0x12/0x20 [ 48.262262][ T1994] ? arch_stack_walk+0xf3/0x140 [ 48.267438][ T1994] ? check_noncircular+0xc2/0x110 [ 48.273406][ T1994] ? __flush_work+0x5e/0x490 [ 48.277981][ T1994] lock_acquire+0xe3/0x270 [ 48.282469][ T1994] ? __flush_work+0x5e/0x490 [ 48.287118][ T1994] ? __flush_work+0x5e/0x490 [ 48.291848][ T1994] __flush_work+0x77/0x490 [ 48.296247][ T1994] ? __flush_work+0x5e/0x490 [ 48.300802][ T1994] __cancel_work_timer+0x13f/0x1e0 [ 48.305881][ T1994] ? __local_bh_enable_ip+0xb7/0xf0 [ 48.311067][ T1994] smc_clcsock_release+0x26/0x60 [ 48.315985][ T1994] __smc_release+0x19c/0x1e0 [ 48.320563][ T1994] smc_close_non_accepted+0x51/0xd0 [ 48.325838][ T1994] smc_close_active+0x24d/0x330 [ 48.330656][ T1994] __smc_release+0x51/0x1e0 [ 48.335126][ T1994] smc_release+0xde/0x1b0 [ 48.339439][ T1994] sock_close+0x42/0xd0 [ 48.343561][ T1994] __fput+0xe1/0x210 [ 48.347502][ T1994] task_work_run+0x79/0xa0 [ 48.351918][ T1994] exit_to_user_mode_loop+0xd2/0xe0 [ 48.357097][ T1994] exit_to_user_mode_prepare+0x9a/0xe0 [ 48.362613][ T1994] syscall_exit_to_user_mode+0x5e/0x210 [ 48.368128][ T1994] do_syscall_64+0x49/0x80 [ 48.372856][ T1994] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 48.378817][ T1994] RIP: 0033:0x7fdcde07bc9a [ 48.383217][ T1994] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 48.404140][ T1994] RSP: 002b:00007ffd847ba880 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 48.412881][ T1994] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fdcde07bc9a [ 48.421175][ T1994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 48.429642][ T1994] RBP: 0000000000000032 R08: 0000001b2eb60000 R09: 00007fdcde1abf8c [ 48.438004][ T1994] R10: 00007ffd847ba9d0 R11: 0000000000000293 R12: 00007fdcddc003f8 [ 48.446329][ T1994] R13: ffffffffffffffff R14: 00007fdcddc00000 R15: 000000000000bae2 [ 48.454297][ T1994] [ 48.462283][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 46153. Sending cookies. Check SNMP counters. [ 48.476606][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 44488. Sending cookies. Check SNMP counters. [ 48.491092][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 50468. Sending cookies. Check SNMP counters. [ 48.505439][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 51032. Sending cookies. Check SNMP counters. [ 48.519914][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 45109. Sending cookies. Check SNMP counters. [ 48.534567][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 39695. Sending cookies. Check SNMP counters. [ 48.549787][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 43334. Sending cookies. Check SNMP counters. [ 48.564993][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 41367. Sending cookies. Check SNMP counters. [ 48.579663][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 35266. Sending cookies. Check SNMP counters. 2024/04/07 12:57:58 executed programs: 547 [ 52.882629][ C0] net_ratelimit: 1244 callbacks suppressed [ 52.882632][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 33390. Sending cookies. Check SNMP counters. [ 52.903259][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 55276. Sending cookies. Check SNMP counters. [ 52.917548][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 42392. Sending cookies. Check SNMP counters. [ 52.931543][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 60635. Sending cookies. Check SNMP counters. [ 52.949208][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 48666. Sending cookies. Check SNMP counters. [ 52.963622][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 43367. Sending cookies. Check SNMP counters. [ 52.978063][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 42547. Sending cookies. Check SNMP counters. [ 52.992934][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 48112. Sending cookies. Check SNMP counters. [ 53.007146][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 47792. Sending cookies. Check SNMP counters. [ 53.022010][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 42876. Sending cookies. Check SNMP counters. 2024/04/07 12:58:03 executed programs: 1991