Warning: Permanently added '10.128.0.223' (ED25519) to the list of known hosts. 2024/08/25 03:35:25 ignoring optional flag "sandboxArg"="0" 2024/08/25 03:35:25 parsed 1 programs [ 53.342166][ T3574] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.008669][ T3593] veth0_vlan: entered promiscuous mode [ 55.338958][ T2228] veth0_vlan: left promiscuous mode 2024/08/25 03:35:28 executed programs: 0 [ 56.546922][ T3844] veth0_vlan: entered promiscuous mode [ 56.780335][ T4035] [ 56.782659][ T4035] ====================================================== [ 56.789638][ T4035] WARNING: possible circular locking dependency detected [ 56.796620][ T4035] 6.10.0-rc3-syzkaller #0 Not tainted [ 56.801951][ T4035] ------------------------------------------------------ [ 56.808931][ T4035] syz.0.15/4035 is trying to acquire lock: [ 56.814787][ T4035] ffff888117278258 (sk_lock-AF_INET){+.+.}-{0:0}, at: do_ip_setsockopt+0x91d/0x10c0 [ 56.824131][ T4035] [ 56.824131][ T4035] but task is already holding lock: [ 56.831458][ T4035] ffffffff843aa278 (rtnl_mutex){+.+.}-{3:3}, at: do_ip_setsockopt+0x914/0x10c0 [ 56.840438][ T4035] [ 56.840438][ T4035] which lock already depends on the new lock. [ 56.840438][ T4035] [ 56.850804][ T4035] [ 56.850804][ T4035] the existing dependency chain (in reverse order) is: [ 56.859785][ T4035] [ 56.859785][ T4035] -> #1 (rtnl_mutex){+.+.}-{3:3}: [ 56.867028][ T4035] __mutex_lock+0x99/0x9a0 [ 56.871926][ T4035] smc_vlan_by_tcpsk+0x15b/0x200 [ 56.877348][ T4035] __smc_connect+0xd3/0x610 [ 56.882345][ T4035] smc_connect+0x250/0x2d0 [ 56.887248][ T4035] __sys_connect+0x1c1/0x1f0 [ 56.892319][ T4035] __x64_sys_connect+0x15/0x20 [ 56.897564][ T4035] do_syscall_64+0xa0/0x1b0 [ 56.902558][ T4035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.909018][ T4035] [ 56.909018][ T4035] -> #0 (sk_lock-AF_INET){+.+.}-{0:0}: [ 56.916627][ T4035] __lock_acquire+0x11fe/0x2490 [ 56.921971][ T4035] lock_acquire+0xeb/0x270 [ 56.926870][ T4035] sockopt_lock_sock+0x4b/0x90 [ 56.932205][ T4035] do_ip_setsockopt+0x91d/0x10c0 [ 56.937631][ T4035] ip_setsockopt+0x39/0x80 [ 56.942626][ T4035] __sys_setsockopt+0xef/0x110 [ 56.947976][ T4035] __x64_sys_setsockopt+0x1c/0x30 [ 56.953493][ T4035] do_syscall_64+0xa0/0x1b0 [ 56.958481][ T4035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.964869][ T4035] [ 56.964869][ T4035] other info that might help us debug this: [ 56.964869][ T4035] [ 56.975077][ T4035] Possible unsafe locking scenario: [ 56.975077][ T4035] [ 56.982496][ T4035] CPU0 CPU1 [ 56.987827][ T4035] ---- ---- [ 56.993155][ T4035] lock(rtnl_mutex); [ 56.997099][ T4035] lock(sk_lock-AF_INET); [ 57.003996][ T4035] lock(rtnl_mutex); [ 57.010455][ T4035] lock(sk_lock-AF_INET); [ 57.014834][ T4035] [ 57.014834][ T4035] *** DEADLOCK *** [ 57.014834][ T4035] [ 57.022939][ T4035] 1 lock held by syz.0.15/4035: [ 57.027754][ T4035] #0: ffffffff843aa278 (rtnl_mutex){+.+.}-{3:3}, at: do_ip_setsockopt+0x914/0x10c0 [ 57.037087][ T4035] [ 57.037087][ T4035] stack backtrace: [ 57.042945][ T4035] CPU: 1 PID: 4035 Comm: syz.0.15 Not tainted 6.10.0-rc3-syzkaller #0 [ 57.051059][ T4035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 57.061088][ T4035] Call Trace: [ 57.064340][ T4035] [ 57.067244][ T4035] dump_stack_lvl+0xa3/0x100 [ 57.071885][ T4035] check_noncircular+0x119/0x140 [ 57.076882][ T4035] __lock_acquire+0x11fe/0x2490 [ 57.081718][ T4035] ? do_ip_setsockopt+0x914/0x10c0 [ 57.086792][ T4035] ? do_ip_setsockopt+0x914/0x10c0 [ 57.091984][ T4035] ? do_ip_setsockopt+0x91d/0x10c0 [ 57.097141][ T4035] lock_acquire+0xeb/0x270 [ 57.101520][ T4035] ? do_ip_setsockopt+0x91d/0x10c0 [ 57.106594][ T4035] ? __fget_files+0x1e/0x180 [ 57.111157][ T4035] sockopt_lock_sock+0x4b/0x90 [ 57.115974][ T4035] ? do_ip_setsockopt+0x91d/0x10c0 [ 57.121044][ T4035] do_ip_setsockopt+0x91d/0x10c0 [ 57.126043][ T4035] ? __fget_files+0x1e/0x180 [ 57.130622][ T4035] ip_setsockopt+0x39/0x80 [ 57.135006][ T4035] __sys_setsockopt+0xef/0x110 [ 57.139821][ T4035] __x64_sys_setsockopt+0x1c/0x30 [ 57.144824][ T4035] do_syscall_64+0xa0/0x1b0 [ 57.149333][ T4035] ? clear_bhb_loop+0x35/0x90 [ 57.153971][ T4035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.159836][ T4035] RIP: 0033:0x7f0537b79e79 [ 57.164211][ T4035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.183785][ T4035] RSP: 002b:00007f05388e6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 57.192427][ T4035] RAX: ffffffffffffffda RBX: 00007f0537d15f80 RCX: 00007f0537b79e79 [ 57.200535][ T4035] RDX: 0000000000000023 RSI: 0000000000000000 RDI: 0000000000000004 [ 57.208472][ T4035] RBP: 00007f0537be793e R08: 0000000000000000 R09: 0000000000000000 [ 57.216448][ T4035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 57.224380][ T4035] R13: 0000000000000000 R14: 00007f0537d15f80 R15: 00007ffe7c128c78 [ 57.232487][ T4035] 2024/08/25 03:35:33 executed programs: 210 2024/08/25 03:35:38 executed programs: 510