Warning: Permanently added '10.128.0.49' (ED25519) to the list of known hosts. executing program [ 35.401392][ T6388] [ 35.402016][ T6388] ====================================================== [ 35.403412][ T6388] WARNING: possible circular locking dependency detected [ 35.404828][ T6388] 6.11.0-rc5-syzkaller-gdf54f4a16f82 #0 Not tainted [ 35.406146][ T6388] ------------------------------------------------------ [ 35.407523][ T6388] syz-executor272/6388 is trying to acquire lock: [ 35.408809][ T6388] ffff8000923b6ce8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock+0x20/0x2c [ 35.410415][ T6388] [ 35.410415][ T6388] but task is already holding lock: [ 35.411944][ T6388] ffff0000dc408a50 (&smc->clcsock_release_lock){+.+.}-{3:3}, at: smc_setsockopt+0x178/0x10fc [ 35.414029][ T6388] [ 35.414029][ T6388] which lock already depends on the new lock. [ 35.414029][ T6388] [ 35.416213][ T6388] [ 35.416213][ T6388] the existing dependency chain (in reverse order) is: [ 35.418077][ T6388] [ 35.418077][ T6388] -> #2 (&smc->clcsock_release_lock){+.+.}-{3:3}: [ 35.419929][ T6388] __mutex_lock_common+0x190/0x21a0 [ 35.421109][ T6388] mutex_lock_nested+0x2c/0x38 [ 35.422233][ T6388] smc_switch_to_fallback+0x48/0xa80 [ 35.423431][ T6388] smc_sendmsg+0xfc/0x9f8 [ 35.424442][ T6388] __sys_sendto+0x374/0x4f4 [ 35.425475][ T6388] __arm64_sys_sendto+0xd8/0xf8 [ 35.426581][ T6388] invoke_syscall+0x98/0x2b8 [ 35.427614][ T6388] el0_svc_common+0x130/0x23c [ 35.428653][ T6388] do_el0_svc+0x48/0x58 [ 35.429575][ T6388] el0_svc+0x54/0x168 [ 35.430518][ T6388] el0t_64_sync_handler+0x84/0xfc [ 35.431657][ T6388] el0t_64_sync+0x190/0x194 [ 35.432753][ T6388] [ 35.432753][ T6388] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 35.434325][ T6388] sockopt_lock_sock+0x88/0x148 [ 35.435472][ T6388] do_ip_setsockopt+0x1438/0x346c [ 35.436601][ T6388] ip_setsockopt+0x80/0x128 [ 35.437593][ T6388] raw_setsockopt+0x100/0x294 [ 35.438779][ T6388] sock_common_setsockopt+0xb0/0xcc [ 35.439963][ T6388] do_sock_setsockopt+0x2a0/0x4e0 [ 35.441117][ T6388] __sys_setsockopt+0x128/0x1a8 [ 35.442199][ T6388] __arm64_sys_setsockopt+0xb8/0xd4 [ 35.443358][ T6388] invoke_syscall+0x98/0x2b8 [ 35.444428][ T6388] el0_svc_common+0x130/0x23c [ 35.445507][ T6388] do_el0_svc+0x48/0x58 [ 35.446533][ T6388] el0_svc+0x54/0x168 [ 35.447533][ T6388] el0t_64_sync_handler+0x84/0xfc [ 35.448669][ T6388] el0t_64_sync+0x190/0x194 [ 35.449706][ T6388] [ 35.449706][ T6388] -> #0 (rtnl_mutex){+.+.}-{3:3}: [ 35.451207][ T6388] __lock_acquire+0x33d8/0x779c [ 35.452319][ T6388] lock_acquire+0x240/0x728 [ 35.453391][ T6388] __mutex_lock_common+0x190/0x21a0 [ 35.454556][ T6388] mutex_lock_nested+0x2c/0x38 [ 35.455652][ T6388] rtnl_lock+0x20/0x2c [ 35.456689][ T6388] do_ip_setsockopt+0xe8c/0x346c [ 35.457814][ T6388] ip_setsockopt+0x80/0x128 [ 35.458864][ T6388] tcp_setsockopt+0xcc/0xe8 [ 35.459901][ T6388] sock_common_setsockopt+0xb0/0xcc [ 35.461077][ T6388] smc_setsockopt+0x204/0x10fc [ 35.462179][ T6388] do_sock_setsockopt+0x2a0/0x4e0 [ 35.463344][ T6388] __sys_setsockopt+0x128/0x1a8 [ 35.464439][ T6388] __arm64_sys_setsockopt+0xb8/0xd4 [ 35.465751][ T6388] invoke_syscall+0x98/0x2b8 [ 35.466859][ T6388] el0_svc_common+0x130/0x23c [ 35.467936][ T6388] do_el0_svc+0x48/0x58 [ 35.468886][ T6388] el0_svc+0x54/0x168 [ 35.469861][ T6388] el0t_64_sync_handler+0x84/0xfc [ 35.471029][ T6388] el0t_64_sync+0x190/0x194 [ 35.472044][ T6388] [ 35.472044][ T6388] other info that might help us debug this: [ 35.472044][ T6388] [ 35.474234][ T6388] Chain exists of: [ 35.474234][ T6388] rtnl_mutex --> sk_lock-AF_INET --> &smc->clcsock_release_lock [ 35.474234][ T6388] [ 35.477134][ T6388] Possible unsafe locking scenario: [ 35.477134][ T6388] [ 35.478635][ T6388] CPU0 CPU1 [ 35.479738][ T6388] ---- ---- [ 35.480918][ T6388] lock(&smc->clcsock_release_lock); [ 35.482096][ T6388] lock(sk_lock-AF_INET); [ 35.483597][ T6388] lock(&smc->clcsock_release_lock); [ 35.485272][ T6388] lock(rtnl_mutex); [ 35.486092][ T6388] [ 35.486092][ T6388] *** DEADLOCK *** [ 35.486092][ T6388] [ 35.487800][ T6388] 1 lock held by syz-executor272/6388: [ 35.488914][ T6388] #0: ffff0000dc408a50 (&smc->clcsock_release_lock){+.+.}-{3:3}, at: smc_setsockopt+0x178/0x10fc [ 35.491136][ T6388] [ 35.491136][ T6388] stack backtrace: [ 35.492392][ T6388] CPU: 1 UID: 0 PID: 6388 Comm: syz-executor272 Not tainted 6.11.0-rc5-syzkaller-gdf54f4a16f82 #0 [ 35.494556][ T6388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 35.496647][ T6388] Call trace: [ 35.497322][ T6388] dump_backtrace+0x1b8/0x1e4 [ 35.498283][ T6388] show_stack+0x2c/0x3c [ 35.499139][ T6388] dump_stack_lvl+0xe4/0x150 [ 35.500172][ T6388] dump_stack+0x1c/0x28 [ 35.501070][ T6388] print_circular_bug+0x150/0x1b8 [ 35.502186][ T6388] check_noncircular+0x310/0x404 [ 35.503202][ T6388] __lock_acquire+0x33d8/0x779c [ 35.504207][ T6388] lock_acquire+0x240/0x728 [ 35.505147][ T6388] __mutex_lock_common+0x190/0x21a0 [ 35.506237][ T6388] mutex_lock_nested+0x2c/0x38 [ 35.507216][ T6388] rtnl_lock+0x20/0x2c [ 35.508054][ T6388] do_ip_setsockopt+0xe8c/0x346c [ 35.509145][ T6388] ip_setsockopt+0x80/0x128 [ 35.510106][ T6388] tcp_setsockopt+0xcc/0xe8 [ 35.511026][ T6388] sock_common_setsockopt+0xb0/0xcc [ 35.512108][ T6388] smc_setsockopt+0x204/0x10fc [ 35.513122][ T6388] do_sock_setsockopt+0x2a0/0x4e0 [ 35.514157][ T6388] __sys_setsockopt+0x128/0x1a8 [ 35.515156][ T6388] __arm64_sys_setsockopt+0xb8/0xd4 [ 35.516279][ T6388] invoke_syscall+0x98/0x2b8 [ 35.517271][ T6388] el0_svc_common+0x130/0x23c [ 35.518189][ T6388] do_el0_svc+0x48/0x58 [ 35.519104][ T6388] el0_svc+0x54/0x168 [ 35.519920][ T6388] el0t_64_sync_handler+0x84/0xfc [ 35.520969][ T6388] el0t_64_sync+0x190/0x194