Warning: Permanently added '10.128.1.14' (ED25519) to the list of known hosts. 2024/07/09 03:40:45 ignoring optional flag "sandboxArg"="0" 2024/07/09 03:40:45 parsed 1 programs 2024/07/09 03:40:45 executed programs: 0 2024/07/09 03:40:51 executed programs: 5 2024/07/09 03:40:56 executed programs: 11 2024/07/09 03:41:01 executed programs: 17 2024/07/09 03:41:06 executed programs: 24 2024/07/09 03:41:11 executed programs: 31 2024/07/09 03:41:16 executed programs: 37 2024/07/09 03:41:21 executed programs: 44 2024/07/09 03:41:26 executed programs: 52 2024/07/09 03:41:31 executed programs: 59 2024/07/09 03:41:36 executed programs: 65 2024/07/09 03:41:41 executed programs: 72 2024/07/09 03:41:46 executed programs: 79 2024/07/09 03:41:51 executed programs: 86 2024/07/09 03:41:56 executed programs: 93 2024/07/09 03:42:01 executed programs: 99 2024/07/09 03:42:07 executed programs: 106 2024/07/09 03:42:12 executed programs: 113 2024/07/09 03:42:17 executed programs: 120 2024/07/09 03:42:22 executed programs: 127 2024/07/09 03:42:27 executed programs: 134 2024/07/09 03:42:32 executed programs: 141 2024/07/09 03:42:37 executed programs: 148 2024/07/09 03:42:42 executed programs: 154 2024/07/09 03:42:47 executed programs: 160 2024/07/09 03:42:52 executed programs: 166 2024/07/09 03:42:57 executed programs: 173 2024/07/09 03:43:02 executed programs: 180 2024/07/09 03:43:07 executed programs: 188 2024/07/09 03:43:12 executed programs: 195 2024/07/09 03:43:17 executed programs: 201 2024/07/09 03:43:22 executed programs: 207 2024/07/09 03:43:28 executed programs: 214 2024/07/09 03:43:33 executed programs: 221 2024/07/09 03:43:38 executed programs: 227 2024/07/09 03:43:43 executed programs: 235 2024/07/09 03:43:48 executed programs: 242 2024/07/09 03:43:53 executed programs: 248 2024/07/09 03:43:58 executed programs: 257 2024/07/09 03:44:03 executed programs: 265 2024/07/09 03:44:08 executed programs: 271 2024/07/09 03:44:13 executed programs: 277 2024/07/09 03:44:18 executed programs: 283 2024/07/09 03:44:23 executed programs: 290 2024/07/09 03:44:28 executed programs: 297 2024/07/09 03:44:33 executed programs: 304 2024/07/09 03:44:38 executed programs: 311 2024/07/09 03:44:43 executed programs: 317 2024/07/09 03:44:48 executed programs: 323 2024/07/09 03:44:54 executed programs: 330 2024/07/09 03:44:59 executed programs: 336 2024/07/09 03:45:04 executed programs: 343 2024/07/09 03:45:09 executed programs: 349 2024/07/09 03:45:14 executed programs: 356 2024/07/09 03:45:19 executed programs: 362 2024/07/09 03:45:24 executed programs: 368 2024/07/09 03:45:29 executed programs: 374 2024/07/09 03:45:34 executed programs: 381 2024/07/09 03:45:39 executed programs: 387 2024/07/09 03:45:44 executed programs: 395 2024/07/09 03:45:49 executed programs: 401 2024/07/09 03:45:54 executed programs: 407 2024/07/09 03:45:59 executed programs: 414 2024/07/09 03:46:04 executed programs: 421 2024/07/09 03:46:09 executed programs: 428 2024/07/09 03:46:14 executed programs: 436 2024/07/09 03:46:19 executed programs: 443 2024/07/09 03:46:25 executed programs: 450 [ 407.400597][ T4061] [ 407.402949][ T4061] ====================================================== [ 407.409959][ T4061] WARNING: possible circular locking dependency detected [ 407.416955][ T4061] 5.15.162-syzkaller #0 Not tainted [ 407.422111][ T4061] ------------------------------------------------------ [ 407.429235][ T4061] syz-executor.0/4061 is trying to acquire lock: [ 407.435812][ T4061] ffff88810e89fa18 (&rs->rs_recv_lock){...-}-{2:2}, at: rds_wake_sk_sleep+0x16/0x60 [ 407.445336][ T4061] [ 407.445336][ T4061] but task is already holding lock: [ 407.452758][ T4061] ffff8881065d6d00 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0xd8/0x330 [ 407.462643][ T4061] [ 407.462643][ T4061] which lock already depends on the new lock. [ 407.462643][ T4061] [ 407.473038][ T4061] [ 407.473038][ T4061] the existing dependency chain (in reverse order) is: [ 407.482046][ T4061] [ 407.482046][ T4061] -> #1 (&rm->m_rs_lock){..-.}-{2:2}: [ 407.489583][ T4061] _raw_spin_lock_irqsave+0x36/0x50 [ 407.495372][ T4061] rds_message_put+0x82/0x3c0 [ 407.500667][ T4061] rds_clear_recv_queue+0x9b/0xd0 [ 407.506182][ T4061] rds_release+0x56/0x140 [ 407.511025][ T4061] __sock_release+0x32/0xa0 [ 407.516047][ T4061] sock_close+0xf/0x20 [ 407.520635][ T4061] __fput+0x8d/0x250 [ 407.525107][ T4061] task_work_run+0x54/0x80 [ 407.530006][ T4061] exit_to_user_mode_prepare+0x1bf/0x1d0 [ 407.536135][ T4061] syscall_exit_to_user_mode+0x19/0x60 [ 407.542098][ T4061] do_syscall_64+0x40/0x80 [ 407.547097][ T4061] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.553497][ T4061] [ 407.553497][ T4061] -> #0 (&rs->rs_recv_lock){...-}-{2:2}: [ 407.561357][ T4061] __lock_acquire+0x10b6/0x1a40 [ 407.566894][ T4061] lock_acquire+0xbb/0x2a0 [ 407.571964][ T4061] _raw_read_lock_irqsave+0x42/0x90 [ 407.578009][ T4061] rds_wake_sk_sleep+0x16/0x60 [ 407.583592][ T4061] rds_send_remove_from_sock+0x103/0x330 [ 407.589830][ T4061] rds_send_path_drop_acked+0x121/0x150 [ 407.596026][ T4061] rds_tcp_write_space+0x9a/0x220 [ 407.601751][ T4061] tcp_check_space+0x31/0x110 [ 407.607115][ T4061] tcp_rcv_established+0x27e/0x730 [ 407.612779][ T4061] tcp_v4_do_rcv+0x17c/0x2f0 [ 407.618047][ T4061] __release_sock+0x54/0xd0 [ 407.623219][ T4061] release_sock+0x26/0xa0 [ 407.628068][ T4061] rds_send_xmit+0x5cc/0xa00 [ 407.633358][ T4061] rds_sendmsg+0xea1/0x1100 [ 407.638549][ T4061] __sock_sendmsg+0x2e/0x40 [ 407.643731][ T4061] ____sys_sendmsg+0x234/0x250 [ 407.649089][ T4061] ___sys_sendmsg+0x6e/0xb0 [ 407.654077][ T4061] __sys_sendmsg+0x54/0xa0 [ 407.658981][ T4061] do_syscall_64+0x33/0x80 [ 407.663952][ T4061] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.670530][ T4061] [ 407.670530][ T4061] other info that might help us debug this: [ 407.670530][ T4061] [ 407.680841][ T4061] Possible unsafe locking scenario: [ 407.680841][ T4061] [ 407.688253][ T4061] CPU0 CPU1 [ 407.693605][ T4061] ---- ---- [ 407.699270][ T4061] lock(&rm->m_rs_lock); [ 407.703565][ T4061] lock(&rs->rs_recv_lock); [ 407.710948][ T4061] lock(&rm->m_rs_lock); [ 407.717772][ T4061] lock(&rs->rs_recv_lock); [ 407.722593][ T4061] [ 407.722593][ T4061] *** DEADLOCK *** [ 407.722593][ T4061] [ 407.731060][ T4061] 3 locks held by syz-executor.0/4061: [ 407.736484][ T4061] #0: ffff8881065aaf20 (k-sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sock_set_cork+0xe/0x40 [ 407.746433][ T4061] #1: ffff8881065ab1d8 (k-clock-AF_INET){++.-}-{2:2}, at: rds_tcp_write_space+0x1a/0x220 [ 407.756719][ T4061] #2: ffff8881065d6d00 (&rm->m_rs_lock){..-.}-{2:2}, at: rds_send_remove_from_sock+0xd8/0x330 [ 407.767032][ T4061] [ 407.767032][ T4061] stack backtrace: [ 407.773107][ T4061] CPU: 1 PID: 4061 Comm: syz-executor.0 Not tainted 5.15.162-syzkaller #0 [ 407.781750][ T4061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 407.792047][ T4061] Call Trace: [ 407.795331][ T4061] [ 407.798244][ T4061] dump_stack_lvl+0x57/0x7d [ 407.802718][ T4061] check_noncircular+0xcc/0xe0 [ 407.807443][ T4061] ? register_lock_class+0x41/0x630 [ 407.812704][ T4061] __lock_acquire+0x10b6/0x1a40 [ 407.817524][ T4061] lock_acquire+0xbb/0x2a0 [ 407.822029][ T4061] ? rds_wake_sk_sleep+0x16/0x60 [ 407.826931][ T4061] ? rds_send_remove_from_sock+0xd8/0x330 [ 407.832712][ T4061] _raw_read_lock_irqsave+0x42/0x90 [ 407.837885][ T4061] ? rds_wake_sk_sleep+0x16/0x60 [ 407.842801][ T4061] rds_wake_sk_sleep+0x16/0x60 [ 407.847623][ T4061] rds_send_remove_from_sock+0x103/0x330 [ 407.853400][ T4061] ? lockdep_hardirqs_on_prepare+0x9d/0xf0 [ 407.859262][ T4061] ? _raw_spin_unlock_irqrestore+0x44/0x60 [ 407.865137][ T4061] ? rds_tcp_recv_exit+0x10/0x10 [ 407.870051][ T4061] rds_send_path_drop_acked+0x121/0x150 [ 407.875834][ T4061] ? sk_stream_wait_memory+0x370/0x370 [ 407.881366][ T4061] rds_tcp_write_space+0x9a/0x220 [ 407.886361][ T4061] tcp_check_space+0x31/0x110 [ 407.891018][ T4061] tcp_rcv_established+0x27e/0x730 [ 407.896358][ T4061] tcp_v4_do_rcv+0x17c/0x2f0 [ 407.900923][ T4061] __release_sock+0x54/0xd0 [ 407.905396][ T4061] release_sock+0x26/0xa0 [ 407.909782][ T4061] rds_send_xmit+0x5cc/0xa00 [ 407.914566][ T4061] rds_sendmsg+0xea1/0x1100 [ 407.919132][ T4061] ? aa_sk_perm+0x5e/0x310 [ 407.923513][ T4061] __sock_sendmsg+0x2e/0x40 [ 407.927984][ T4061] ____sys_sendmsg+0x234/0x250 [ 407.932719][ T4061] ? import_iovec+0x17/0x20 [ 407.937186][ T4061] ? sendmsg_copy_msghdr+0x77/0xa0 [ 407.942699][ T4061] ___sys_sendmsg+0x6e/0xb0 [ 407.947167][ T4061] ? lock_acquire+0xbb/0x2a0 [ 407.951799][ T4061] ? ksys_dup3+0x160/0x160 [ 407.956297][ T4061] ? find_held_lock+0x2b/0x80 [ 407.960944][ T4061] ? __fget_files+0xb9/0x190 [ 407.965592][ T4061] ? __fget_files+0xd1/0x190 [ 407.970351][ T4061] __sys_sendmsg+0x54/0xa0 [ 407.975018][ T4061] ? lockdep_hardirqs_on_prepare+0xcd/0xf0 [ 407.980817][ T4061] do_syscall_64+0x33/0x80 [ 407.985209][ T4061] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.991079][ T4061] RIP: 0033:0x7f51de554959 [ 407.995880][ T4061] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 408.015460][ T4061] RSP: 002b:00007f51de0d70c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 408.023861][ T4061] RAX: ffffffffffffffda RBX: 00007f51de673f80 RCX: 00007f51de554959 [ 408.031816][ T4061] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 408.039985][ T4061] RBP: 00007f51de5b0c88 R08: 0000000000000000 R09: 0000000000000000 [ 408.048044][ T4061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 408.056083][ T4061] R13: 0000000000000006 R14: 00007f51de673f80 R15: 00007ffc4f139318 [ 408.064033][ T4061] 2024/07/09 03:46:30 executed programs: 456 2024/07/09 03:46:35 executed programs: 463