./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3239458438 <...> Warning: Permanently added '10.128.1.142' (ED25519) to the list of known hosts. execve("./syz-executor3239458438", ["./syz-executor3239458438"], 0x7ffd00c67550 /* 10 vars */) = 0 brk(NULL) = 0x55557de0c000 brk(0x55557de0cd00) = 0x55557de0cd00 arch_prctl(ARCH_SET_FS, 0x55557de0c380) = 0 set_tid_address(0x55557de0c650) = 5834 set_robust_list(0x55557de0c660, 24) = 0 rseq(0x55557de0cca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3239458438", 4096) = 28 getrandom("\x76\x89\x91\x5b\x4b\xaf\x32\xa6", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557de0cd00 brk(0x55557de2dd00) = 0x55557de2dd00 brk(0x55557de2e000) = 0x55557de2e000 mprotect(0x7f5f022ba000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_STREAM, 0x100 /* IPPROTO_??? */) = 3 bind(3, {sa_family=AF_INET6, sin6_port=htons(20001), sin6_flowinfo=htonl(11), inet_pton(AF_INET6, "::", &sin6_addr), sin6_scope_id=0}, 28) = 0 connect(3, {sa_family=AF_INET6, sin6_port=htons(20001), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::", &sin6_addr), sin6_scope_id=0}, 28) = 0 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 4 [ 79.239415][ T5834] [ 79.241784][ T5834] ====================================================== [ 79.248829][ T5834] WARNING: possible circular locking dependency detected [ 79.255890][ T5834] 6.13.0-syzkaller-09685-gc2933b2befe2 #0 Not tainted [ 79.262691][ T5834] ------------------------------------------------------ [ 79.269728][ T5834] syz-executor323/5834 is trying to acquire lock: [ 79.276189][ T5834] ffff8880352e2cd8 (sk_lock-AF_INET6){+.+.}-{0:0}, at: do_ipv6_setsockopt+0xbf7/0x3640 [ 79.285896][ T5834] [ 79.285896][ T5834] but task is already holding lock: [ 79.293350][ T5834] ffffffff8fcbf088 (rtnl_mutex){+.+.}-{4:4}, at: do_ipv6_setsockopt+0x9e8/0x3640 [ 79.302512][ T5834] [ 79.302512][ T5834] which lock already depends on the new lock. [ 79.302512][ T5834] [ 79.312926][ T5834] [ 79.312926][ T5834] the existing dependency chain (in reverse order) is: [ 79.322247][ T5834] [ 79.322247][ T5834] -> #1 (rtnl_mutex){+.+.}-{4:4}: [ 79.329489][ T5834] lock_acquire+0x1ed/0x550 [ 79.334628][ T5834] __mutex_lock+0x19c/0x1010 [ 79.339926][ T5834] smc_vlan_by_tcpsk+0x399/0x4e0 [ 79.345498][ T5834] __smc_connect+0x296/0x1910 [ 79.350731][ T5834] smc_connect+0x868/0xde0 [ 79.355689][ T5834] __sys_connect+0x288/0x2d0 [ 79.360824][ T5834] __x64_sys_connect+0x7a/0x90 [ 79.366185][ T5834] do_syscall_64+0xf3/0x230 [ 79.371242][ T5834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.377705][ T5834] [ 79.377705][ T5834] -> #0 (sk_lock-AF_INET6){+.+.}-{0:0}: [ 79.385452][ T5834] validate_chain+0x18ef/0x5920 [ 79.390943][ T5834] __lock_acquire+0x1397/0x2100 [ 79.396362][ T5834] lock_acquire+0x1ed/0x550 [ 79.401481][ T5834] lock_sock_nested+0x48/0x100 [ 79.406779][ T5834] do_ipv6_setsockopt+0xbf7/0x3640 [ 79.412453][ T5834] ipv6_setsockopt+0x5d/0x170 [ 79.417660][ T5834] do_sock_setsockopt+0x3af/0x720 [ 79.423237][ T5834] __x64_sys_setsockopt+0x1ee/0x280 [ 79.429409][ T5834] do_syscall_64+0xf3/0x230 [ 79.434453][ T5834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.441036][ T5834] [ 79.441036][ T5834] other info that might help us debug this: [ 79.441036][ T5834] [ 79.451273][ T5834] Possible unsafe locking scenario: [ 79.451273][ T5834] [ 79.458722][ T5834] CPU0 CPU1 [ 79.464082][ T5834] ---- ---- [ 79.469533][ T5834] lock(rtnl_mutex); [ 79.473516][ T5834] lock(sk_lock-AF_INET6); [ 79.480547][ T5834] lock(rtnl_mutex); [ 79.487071][ T5834] lock(sk_lock-AF_INET6); [ 79.491578][ T5834] [ 79.491578][ T5834] *** DEADLOCK *** [ 79.491578][ T5834] [ 79.499731][ T5834] 1 lock held by syz-executor323/5834: [ 79.505201][ T5834] #0: ffffffff8fcbf088 (rtnl_mutex){+.+.}-{4:4}, at: do_ipv6_setsockopt+0x9e8/0x3640 [ 79.514813][ T5834] [ 79.514813][ T5834] stack backtrace: [ 79.520813][ T5834] CPU: 0 UID: 0 PID: 5834 Comm: syz-executor323 Not tainted 6.13.0-syzkaller-09685-gc2933b2befe2 #0 [ 79.520831][ T5834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 79.520843][ T5834] Call Trace: [ 79.520851][ T5834] [ 79.520858][ T5834] dump_stack_lvl+0x241/0x360 [ 79.520880][ T5834] ? __pfx_dump_stack_lvl+0x10/0x10 [ 79.520895][ T5834] ? __pfx__printk+0x10/0x10 [ 79.520920][ T5834] print_circular_bug+0x13a/0x1b0 [ 79.520937][ T5834] check_noncircular+0x36a/0x4a0 [ 79.520952][ T5834] ? __pfx_check_noncircular+0x10/0x10 [ 79.520966][ T5834] ? lockdep_lock+0x123/0x2b0 [ 79.520987][ T5834] ? __pfx_validate_chain+0x10/0x10 [ 79.521001][ T5834] validate_chain+0x18ef/0x5920 [ 79.521014][ T5834] ? mark_lock+0x9a/0x360 [ 79.521040][ T5834] ? validate_chain+0x11e/0x5920 [ 79.521064][ T5834] ? __pfx_validate_chain+0x10/0x10 [ 79.521079][ T5834] ? mark_lock+0x9a/0x360 [ 79.521099][ T5834] ? __pfx_validate_chain+0x10/0x10 [ 79.521112][ T5834] ? __lock_acquire+0x1397/0x2100 [ 79.521132][ T5834] ? look_up_lock_class+0x77/0x170 [ 79.521151][ T5834] ? register_lock_class+0x102/0x980 [ 79.521171][ T5834] ? __pfx_register_lock_class+0x10/0x10 [ 79.521192][ T5834] ? mark_lock+0x9a/0x360 [ 79.521213][ T5834] __lock_acquire+0x1397/0x2100 [ 79.521238][ T5834] lock_acquire+0x1ed/0x550 [ 79.521256][ T5834] ? do_ipv6_setsockopt+0xbf7/0x3640 [ 79.521275][ T5834] ? __pfx_lock_acquire+0x10/0x10 [ 79.521295][ T5834] ? do_ipv6_setsockopt+0x9e8/0x3640 [ 79.521311][ T5834] ? __pfx___mutex_lock+0x10/0x10 [ 79.521334][ T5834] lock_sock_nested+0x48/0x100 [ 79.521352][ T5834] ? do_ipv6_setsockopt+0xbf7/0x3640 [ 79.521369][ T5834] do_ipv6_setsockopt+0xbf7/0x3640 [ 79.521389][ T5834] ? __pfx_do_ipv6_setsockopt+0x10/0x10 [ 79.521405][ T5834] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 79.521432][ T5834] ? __pfx___might_resched+0x10/0x10 [ 79.521451][ T5834] ? do_raw_spin_lock+0x14f/0x370 [ 79.521470][ T5834] ? aa_sk_perm+0x96d/0xab0 [ 79.521488][ T5834] ? __pfx_aa_sk_perm+0x10/0x10 [ 79.521504][ T5834] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 79.521525][ T5834] ipv6_setsockopt+0x5d/0x170 [ 79.521542][ T5834] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 79.521560][ T5834] do_sock_setsockopt+0x3af/0x720 [ 79.521584][ T5834] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 79.521605][ T5834] ? ptrace_notify+0x279/0x380 [ 79.521624][ T5834] __x64_sys_setsockopt+0x1ee/0x280 [ 79.521647][ T5834] do_syscall_64+0xf3/0x230 [ 79.521667][ T5834] ? clear_bhb_loop+0x35/0x90 [ 79.521688][ T5834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.521708][ T5834] RIP: 0033:0x7f5f02247369 [ 79.521725][ T5834] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 79.521736][ T5834] RSP: 002b:00007ffe9a248bd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 79.521751][ T5834] RAX: ffffffffffffffda RBX: 00007ffe9a248da8 RCX: 00007f5f02247369 [ 79.521762][ T5834] RDX: 000000000000001b RSI: 0000000000000029 RDI: 0000000000000004 [ 79.521770][ T5834] RBP: 00007f5f022ba610 R08: 0000000000000000 R09: 00007ffe9a248da8 [ 79.521779][ T5834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 setsockopt(4, SOL_IPV6, IPV6_JOIN_ANYCAST, NULL, 0) = -1 EINVAL (Invalid argument) exit_group(0) = ? +++ exited with 0 +++ [ 79.521787][ T5834] R13: 00007ffe9a248d98