Warning: Permanently added '10.128.0.218' (ED25519) to the list of known hosts. 2024/11/25 11:29:04 ignoring optional flag "sandboxArg"="0" 2024/11/25 11:29:04 parsed 1 programs [ 58.017638][ T4143] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 59.815622][ T4175] veth0_vlan: entered promiscuous mode [ 60.042211][ T4175] syz-executor (4175) used greatest stack depth: 10904 bytes left [ 60.150636][ T2570] veth0_vlan: left promiscuous mode 2024/11/25 11:29:07 executed programs: 0 [ 61.225850][ T4412] veth0_vlan: entered promiscuous mode [ 61.451395][ T4604] lo speed is unknown, defaulting to 1000 [ 61.457179][ T4604] lo speed is unknown, defaulting to 1000 [ 61.463724][ T4604] lo speed is unknown, defaulting to 1000 [ 61.471319][ T4604] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 61.480091][ T4604] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 61.489989][ T4604] lo speed is unknown, defaulting to 1000 [ 61.497465][ T4604] [ 61.499900][ T4604] ====================================================== [ 61.507174][ T4604] WARNING: possible circular locking dependency detected [ 61.514204][ T4604] 6.10.0-rc3-syzkaller #0 Not tainted [ 61.519570][ T4604] ------------------------------------------------------ [ 61.526749][ T4604] syz.2.15/4604 is trying to acquire lock: [ 61.532813][ T4604] ffffffff843acc38 (rtnl_mutex){+.+.}-{4:4}, at: ip_mroute_setsockopt+0xa3/0x560 [ 61.542048][ T4604] [ 61.542048][ T4604] but task is already holding lock: [ 61.549438][ T4604] ffff888114eb8a48 (&smc->clcsock_release_lock){+.+.}-{4:4}, at: smc_setsockopt+0xcf/0x360 [ 61.559622][ T4604] [ 61.559622][ T4604] which lock already depends on the new lock. [ 61.559622][ T4604] [ 61.570882][ T4604] [ 61.570882][ T4604] the existing dependency chain (in reverse order) is: [ 61.580231][ T4604] [ 61.580231][ T4604] -> #3 (&smc->clcsock_release_lock){+.+.}-{4:4}: [ 61.588868][ T4604] __mutex_lock+0x99/0x9a0 [ 61.593768][ T4604] smc_switch_to_fallback+0x1f/0x330 [ 61.599544][ T4604] smc_sendmsg+0x67/0x180 [ 61.604462][ T4604] __sock_sendmsg+0x8e/0xb0 [ 61.609536][ T4604] __sys_sendto+0x284/0x2e0 [ 61.614531][ T4604] __x64_sys_sendto+0x21/0x30 [ 61.619730][ T4604] do_syscall_64+0xa0/0x1b0 [ 61.624804][ T4604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.631203][ T4604] [ 61.631203][ T4604] -> #2 (sk_lock-AF_INET){+.+.}-{0:0}: [ 61.638820][ T4604] sock_set_reuseaddr+0x30/0x80 [ 61.644240][ T4604] siw_create_listen+0x77/0x590 [ 61.649583][ T4604] iw_cm_listen+0x80/0xc0 [ 61.654482][ T4604] rdma_listen+0x384/0x420 [ 61.659486][ T4604] cma_listen_on_dev+0x16d/0x210 [ 61.665130][ T4604] cma_add_one+0x21d/0x340 [ 61.670050][ T4604] add_client_context+0x173/0x280 [ 61.675564][ T4604] enable_device_and_get+0xba/0x1c0 [ 61.681253][ T4604] ib_register_device+0x684/0x740 [ 61.686759][ T4604] siw_newlink+0x3a0/0x430 [ 61.691662][ T4604] nldev_newlink+0x26f/0x2f0 [ 61.696753][ T4604] rdma_nl_rcv+0x266/0x310 [ 61.701666][ T4604] netlink_unicast+0x245/0x330 [ 61.707017][ T4604] netlink_sendmsg+0x34d/0x3e0 [ 61.712272][ T4604] __sock_sendmsg+0x8e/0xb0 [ 61.717260][ T4604] ____sys_sendmsg+0x1a7/0x200 [ 61.722510][ T4604] ___sys_sendmsg+0x28f/0x2d0 [ 61.727876][ T4604] __se_sys_sendmsg+0xf7/0x140 [ 61.733128][ T4604] do_syscall_64+0xa0/0x1b0 [ 61.738119][ T4604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.744499][ T4604] [ 61.744499][ T4604] -> #1 (lock#6){+.+.}-{4:4}: [ 61.751404][ T4604] __mutex_lock+0x99/0x9a0 [ 61.756487][ T4604] cma_init+0x18/0x100 [ 61.761133][ T4604] do_one_initcall+0x134/0x320 [ 61.766388][ T4604] do_initcall_level+0x92/0x100 [ 61.771811][ T4604] do_initcalls+0x3a/0x70 [ 61.776878][ T4604] kernel_init_freeable+0x182/0x1f0 [ 61.782562][ T4604] kernel_init+0x15/0x190 [ 61.787373][ T4604] ret_from_fork+0x32/0x40 [ 61.792547][ T4604] ret_from_fork_asm+0x1a/0x30 [ 61.797887][ T4604] [ 61.797887][ T4604] -> #0 (rtnl_mutex){+.+.}-{4:4}: [ 61.805138][ T4604] __lock_acquire+0x1245/0x24d0 [ 61.810484][ T4604] lock_acquire+0xeb/0x270 [ 61.815484][ T4604] __mutex_lock+0x99/0x9a0 [ 61.820645][ T4604] ip_mroute_setsockopt+0xa3/0x560 [ 61.826242][ T4604] do_ip_setsockopt+0x523/0x10c0 [ 61.831669][ T4604] ip_setsockopt+0x39/0x80 [ 61.836571][ T4604] smc_setsockopt+0x109/0x360 [ 61.841734][ T4604] __sys_setsockopt+0xef/0x110 [ 61.847155][ T4604] __x64_sys_setsockopt+0x1c/0x30 [ 61.852855][ T4604] do_syscall_64+0xa0/0x1b0 [ 61.857920][ T4604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.864402][ T4604] [ 61.864402][ T4604] other info that might help us debug this: [ 61.864402][ T4604] [ 61.874782][ T4604] Chain exists of: [ 61.874782][ T4604] rtnl_mutex --> sk_lock-AF_INET --> &smc->clcsock_release_lock [ 61.874782][ T4604] [ 61.888455][ T4604] Possible unsafe locking scenario: [ 61.888455][ T4604] [ 61.896227][ T4604] CPU0 CPU1 [ 61.901560][ T4604] ---- ---- [ 61.906993][ T4604] lock(&smc->clcsock_release_lock); [ 61.912417][ T4604] lock(sk_lock-AF_INET); [ 61.919401][ T4604] lock(&smc->clcsock_release_lock); [ 61.927351][ T4604] lock(rtnl_mutex); [ 61.931307][ T4604] [ 61.931307][ T4604] *** DEADLOCK *** [ 61.931307][ T4604] [ 61.939530][ T4604] 1 lock held by syz.2.15/4604: [ 61.944445][ T4604] #0: ffff888114eb8a48 (&smc->clcsock_release_lock){+.+.}-{4:4}, at: smc_setsockopt+0xcf/0x360 [ 61.955008][ T4604] [ 61.955008][ T4604] stack backtrace: [ 61.960917][ T4604] CPU: 0 PID: 4604 Comm: syz.2.15 Not tainted 6.10.0-rc3-syzkaller #0 [ 61.969034][ T4604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 61.979416][ T4604] Call Trace: [ 61.982848][ T4604] [ 61.985766][ T4604] dump_stack_lvl+0xa3/0x100 [ 61.990460][ T4604] check_noncircular+0x119/0x140 [ 61.995372][ T4604] __lock_acquire+0x1245/0x24d0 [ 62.000202][ T4604] ? finish_task_switch+0xb4/0x3a0 [ 62.005367][ T4604] ? look_up_lock_class+0x6a/0xd0 [ 62.010528][ T4604] ? ip_mroute_setsockopt+0xa3/0x560 [ 62.016040][ T4604] lock_acquire+0xeb/0x270 [ 62.020511][ T4604] ? ip_mroute_setsockopt+0xa3/0x560 [ 62.025934][ T4604] ? ip_mroute_setsockopt+0xa3/0x560 [ 62.031187][ T4604] __mutex_lock+0x99/0x9a0 [ 62.035651][ T4604] ? ip_mroute_setsockopt+0xa3/0x560 [ 62.040993][ T4604] ? __lock_acquire+0x4fe/0x24d0 [ 62.045894][ T4604] ip_mroute_setsockopt+0xa3/0x560 [ 62.050975][ T4604] do_ip_setsockopt+0x523/0x10c0 [ 62.055880][ T4604] ? __mutex_lock+0x230/0x9a0 [ 62.060616][ T4604] ip_setsockopt+0x39/0x80 [ 62.064998][ T4604] smc_setsockopt+0x109/0x360 [ 62.069642][ T4604] __sys_setsockopt+0xef/0x110 [ 62.074455][ T4604] __x64_sys_setsockopt+0x1c/0x30 [ 62.079448][ T4604] do_syscall_64+0xa0/0x1b0 [ 62.084008][ T4604] ? clear_bhb_loop+0x35/0x90 [ 62.088748][ T4604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.094613][ T4604] RIP: 0033:0x7f088ff7e819 [ 62.099019][ T4604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.118680][ T4604] RSP: 002b:00007f0890dcb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 62.127052][ T4604] RAX: ffffffffffffffda RBX: 00007f0890135fa0 RCX: 00007f088ff7e819 [ 62.134985][ T4604] RDX: 00000000000000d2 RSI: 0000000000000000 RDI: 0000000000000005 [ 62.143010][ T4604] RBP: 00007f088fff175e R08: 0000000000000000 R09: 0000000000000000 [ 62.150952][ T4604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 62.158973][ T4604] R13: 0000000000000000 R14: 00007f0890135fa0 R15: 00007ffd0efb4158 [ 62.166912][ T4604] [ 62.172795][ T4604] syz.2.15 (4604) used greatest stack depth: 10752 bytes left 2024/11/25 11:29:12 executed programs: 189 2024/11/25 11:29:17 executed programs: 486