./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3827466562 <...> Warning: Permanently added '10.128.1.120' (ED25519) to the list of known hosts. execve("./syz-executor3827466562", ["./syz-executor3827466562"], 0x7ffc3068fd80 /* 10 vars */) = 0 brk(NULL) = 0x555588b9d000 brk(0x555588b9dd00) = 0x555588b9dd00 arch_prctl(ARCH_SET_FS, 0x555588b9d380) = 0 set_tid_address(0x555588b9d650) = 5840 set_robust_list(0x555588b9d660, 24) = 0 rseq(0x555588b9dca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3827466562", 4096) = 28 getrandom("\x15\x24\x1f\x58\x82\x11\x4d\x90", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555588b9dd00 brk(0x555588bbed00) = 0x555588bbed00 brk(0x555588bbf000) = 0x555588bbf000 mprotect(0x7f19bfb46000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555588b9d650) = 5841 ./strace-static-x86_64: Process 5841 attached [pid 5841] set_robust_list(0x555588b9d660, 24) = 0 [pid 5841] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5841] getppid() = 0 [pid 5841] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 5841] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 5841] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 5841] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 5841] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 5841] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 5841] unshare(CLONE_NEWNS) = 0 [pid 5841] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 5841] unshare(CLONE_NEWIPC) = 0 [pid 5841] unshare(CLONE_NEWCGROUP) = 0 [pid 5841] unshare(CLONE_NEWUTS) = 0 [pid 5841] unshare(CLONE_SYSVSEM) = 0 [pid 5841] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5841] write(3, "16777216", 8) = 8 [pid 5841] close(3) = 0 [pid 5841] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 5841] write(3, "536870912", 9) = 9 [pid 5841] close(3) = 0 [pid 5841] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5841] write(3, "1024", 4) = 4 [pid 5841] close(3) = 0 [pid 5841] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5841] write(3, "8192", 4) = 4 [pid 5841] close(3) = 0 [pid 5841] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5841] write(3, "1024", 4) = 4 [pid 5841] close(3) = 0 [pid 5841] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 5841] write(3, "1024", 4) = 4 [pid 5841] close(3) = 0 [pid 5841] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 5841] write(3, "1024 1048576 500 1024", 21) = 21 [pid 5841] close(3) = 0 [pid 5841] getpid() = 1 [pid 5841] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<team_lock_key){+.+.}-{4:4}, at: team_port_change_check+0x51/0x1e0 [ 104.633354][ T3032] [ 104.633354][ T3032] but task is already holding lock: [ 104.640719][ T3032] ffff8880358ccd30 (&dev_instance_lock_key#19){+.+.}-{4:4}, at: __linkwatch_run_queue+0x616/0x940 [ 104.651363][ T3032] [ 104.651363][ T3032] which lock already depends on the new lock. [ 104.651363][ T3032] [ 104.661778][ T3032] [ 104.661778][ T3032] the existing dependency chain (in reverse order) is: [ 104.670803][ T3032] [ 104.670803][ T3032] -> #1 (&dev_instance_lock_key#19){+.+.}-{4:4}: [ 104.679345][ T3032] lock_acquire+0x116/0x2f0 [ 104.684383][ T3032] __mutex_lock+0x1a5/0x10c0 [ 104.689501][ T3032] dev_set_mtu+0x11c/0x270 [ 104.694448][ T3032] team_add_slave+0x83b/0x28b0 [ 104.699742][ T3032] do_set_master+0x579/0x730 [ 104.704859][ T3032] do_setlink+0xf76/0x4390 [ 104.709800][ T3032] rtnl_newlink+0x17e2/0x1fe0 [ 104.714998][ T3032] rtnetlink_rcv_msg+0x80f/0xd70 [ 104.720459][ T3032] netlink_rcv_skb+0x208/0x480 [ 104.725749][ T3032] netlink_unicast+0x7f8/0x9a0 [ 104.731032][ T3032] netlink_sendmsg+0x8c3/0xcd0 [ 104.736319][ T3032] __sock_sendmsg+0x221/0x270 [ 104.741526][ T3032] ____sys_sendmsg+0x523/0x860 [ 104.746819][ T3032] __sys_sendmsg+0x271/0x360 [ 104.751939][ T3032] do_syscall_64+0xf3/0x210 [ 104.756965][ T3032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.763378][ T3032] [ 104.763378][ T3032] -> #0 (team->team_lock_key){+.+.}-{4:4}: [ 104.771378][ T3032] validate_chain+0xa69/0x24e0 [ 104.776665][ T3032] __lock_acquire+0xad5/0xd80 [ 104.781867][ T3032] lock_acquire+0x116/0x2f0 [ 104.786898][ T3032] __mutex_lock+0x1a5/0x10c0 [ 104.792010][ T3032] team_port_change_check+0x51/0x1e0 [ 104.797817][ T3032] team_device_event+0x437/0x5b0 [ 104.803274][ T3032] notifier_call_chain+0x1a5/0x3f0 [ 104.808906][ T3032] netif_state_change+0x123/0x1a0 [ 104.814454][ T3032] linkwatch_do_dev+0x112/0x170 [ 104.819832][ T3032] __linkwatch_run_queue+0x63b/0x940 [ 104.825634][ T3032] linkwatch_event+0x4c/0x60 [ 104.830741][ T3032] process_scheduled_works+0xac3/0x18e0 [ 104.836816][ T3032] worker_thread+0x870/0xd50 [ 104.841923][ T3032] kthread+0x7b7/0x940 [ 104.846515][ T3032] ret_from_fork+0x4b/0x80 [ 104.851469][ T3032] ret_from_fork_asm+0x1a/0x30 [ 104.856773][ T3032] [ 104.856773][ T3032] other info that might help us debug this: [ 104.856773][ T3032] [ 104.867006][ T3032] Possible unsafe locking scenario: [ 104.867006][ T3032] [ 104.874456][ T3032] CPU0 CPU1 [ 104.879816][ T3032] ---- ---- [ 104.885176][ T3032] lock(&dev_instance_lock_key#19); [ 104.890482][ T3032] lock(team->team_lock_key); [ 104.897771][ T3032] lock(&dev_instance_lock_key#19); [ 104.905587][ T3032] lock(team->team_lock_key); [ 104.910352][ T3032] [ 104.910352][ T3032] *** DEADLOCK *** [ 104.910352][ T3032] [ 104.918506][ T3032] 4 locks held by kworker/u8:8/3032: [ 104.923803][ T3032] #0: ffff88801b089148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x990/0x18e0 [ 104.935521][ T3032] #1: ffffc9000ba27c60 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9cb/0x18e0 [ 104.946509][ T3032] #2: ffffffff900fd488 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 [ 104.955484][ T3032] #3: ffff8880358ccd30 (&dev_instance_lock_key#19){+.+.}-{4:4}, at: __linkwatch_run_queue+0x616/0x940 [ 104.966546][ T3032] [ 104.966546][ T3032] stack backtrace: [ 104.972450][ T3032] CPU: 1 UID: 0 PID: 3032 Comm: kworker/u8:8 Not tainted 6.15.0-rc2-syzkaller-g82303a059aab #0 PREEMPT(full) [ 104.972474][ T3032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 104.972488][ T3032] Workqueue: events_unbound linkwatch_event [ 104.972514][ T3032] Call Trace: [ 104.972521][ T3032] [ 104.972528][ T3032] dump_stack_lvl+0x241/0x360 [ 104.972554][ T3032] ? __pfx_dump_stack_lvl+0x10/0x10 [ 104.972577][ T3032] ? __pfx__printk+0x10/0x10 [ 104.972599][ T3032] ? print_lock+0x171/0x1a0 [ 104.972625][ T3032] print_circular_bug+0x2e1/0x300 [ 104.972643][ T3032] check_noncircular+0x142/0x160 [ 104.972661][ T3032] validate_chain+0xa69/0x24e0 [ 104.972687][ T3032] __lock_acquire+0xad5/0xd80 [ 104.972711][ T3032] lock_acquire+0x116/0x2f0 [ 104.972731][ T3032] ? team_port_change_check+0x51/0x1e0 [ 104.972754][ T3032] __mutex_lock+0x1a5/0x10c0 [ 104.972770][ T3032] ? team_port_change_check+0x51/0x1e0 [ 104.972790][ T3032] ? call_fib_nh_notifiers+0x359/0x510 [ 104.972809][ T3032] ? team_port_change_check+0x51/0x1e0 [ 104.972825][ T3032] ? bond_netdev_event+0xe0/0xfb0 [ 104.972840][ T3032] ? __pfx___mutex_lock+0x10/0x10 [ 104.972860][ T3032] ? __asan_memset+0x23/0x50 [ 104.972882][ T3032] team_port_change_check+0x51/0x1e0 [ 104.972901][ T3032] team_device_event+0x437/0x5b0 [ 104.972917][ T3032] ? notifier_call_chain+0x15a/0x3f0 [ 104.972933][ T3032] notifier_call_chain+0x1a5/0x3f0 [ 104.972950][ T3032] netif_state_change+0x123/0x1a0 [ 104.972970][ T3032] ? __pfx_netif_state_change+0x10/0x10 [ 104.972991][ T3032] ? rfc2863_policy+0x1ce/0x3f0 [ 104.973015][ T3032] linkwatch_do_dev+0x112/0x170 [ 104.973040][ T3032] __linkwatch_run_queue+0x63b/0x940 [ 104.973054][ T3032] ? __pfx___mutex_lock+0x10/0x10 [ 104.973072][ T3032] ? __pfx___linkwatch_run_queue+0x10/0x10 [ 104.973090][ T3032] ? process_scheduled_works+0x9cb/0x18e0 [ 104.973113][ T3032] linkwatch_event+0x4c/0x60 [ 104.973126][ T3032] process_scheduled_works+0xac3/0x18e0 [ 104.973160][ T3032] ? __pfx_process_scheduled_works+0x10/0x10 [ 104.973187][ T3032] ? assign_work+0x367/0x3d0 [ 104.973211][ T3032] worker_thread+0x870/0xd50 [ 104.973230][ T3032] ? __kthread_parkme+0x1a8/0x200 [ 104.973247][ T3032] ? __pfx_worker_thread+0x10/0x10 [ 104.973261][ T3032] kthread+0x7b7/0x940 [ 104.973279][ T3032] ? __pfx_worker_thread+0x10/0x10 [ 104.973293][ T3032] ? __pfx_kthread+0x10/0x10 [ 104.973314][ T3032] ? __pfx_kthread+0x10/0x10 [pid 5841] exit_group(1) = ? [ 104.973330][ T3032] ? __pfx_kthread+0x10/0x10 [ 104.973347][ T3032] ? __pfx_kthread+0x10/0x10 [ 104.973364][ T3032] ? _raw_spin_unlock_irq+0x23/0x50 [ 104.973386][ T3032] ? lockdep_hardirqs_on+0x9d/0x150 [ 104.973400][ T3032] ? __pfx_kthread+0x10/0x10 [ 104.973417][ T3032] ret_from_fork+0x4b/0x80 [ 104.973432][ T3032] ? __pfx_kthread+0x10/0x10 [ 104.973449][ T3032] ret_from_fork_asm+0x1a/0x30 [ 104.973469][ T3032] [pid 5841] +++ exited with 1 +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=5841, si_uid=0, si_status=1, si_utime=0, si_stime=169 /* 1.69 s */} --- exit_group(0) = ? +++ exited with 0 +++