Warning: Permanently added '10.128.10.56' (ED25519) to the list of known hosts. 2025/03/11 00:34:10 ignoring optional flag "sandboxArg"="0" 2025/03/11 00:34:10 parsed 1 programs [ 53.590679][ T4704] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.654719][ T4755] veth0_vlan: entered promiscuous mode [ 55.941141][ T50] veth0_vlan: left promiscuous mode 2025/03/11 00:34:14 executed programs: 0 [ 56.780976][ T4901] veth0_vlan: entered promiscuous mode [ 56.932833][ T5042] [ 56.935174][ T5042] ====================================================== [ 56.942280][ T5042] WARNING: possible circular locking dependency detected [ 56.949269][ T5042] 6.14.0-rc5-syzkaller #0 Not tainted [ 56.954619][ T5042] ------------------------------------------------------ [ 56.961617][ T5042] syz.2.16/5042 is trying to acquire lock: [ 56.967476][ T5042] ffffffff850be478 (rtnl_mutex){+.+.}-{4:4}, at: smc_pnet_find_ism_resource+0x69/0x180 [ 56.977093][ T5042] [ 56.977093][ T5042] but task is already holding lock: [ 56.984423][ T5042] ffff888117bb0258 (sk_lock-AF_INET){+.+.}-{0:0}, at: smc_connect+0x44/0x2d0 [ 56.993256][ T5042] [ 56.993256][ T5042] which lock already depends on the new lock. [ 56.993256][ T5042] [ 57.003644][ T5042] [ 57.003644][ T5042] the existing dependency chain (in reverse order) is: [ 57.012633][ T5042] [ 57.012633][ T5042] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 57.020241][ T5042] sockopt_lock_sock+0x4b/0x90 [ 57.025664][ T5042] do_ip_setsockopt+0x91d/0x10f0 [ 57.031174][ T5042] ip_setsockopt+0x39/0x80 [ 57.036078][ T5042] dccp_setsockopt+0x86/0x640 [ 57.041268][ T5042] __sys_setsockopt+0xf1/0x110 [ 57.046561][ T5042] __x64_sys_setsockopt+0x1c/0x30 [ 57.052152][ T5042] do_syscall_64+0xa0/0x1b0 [ 57.057137][ T5042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.063512][ T5042] [ 57.063512][ T5042] -> #0 (rtnl_mutex){+.+.}-{4:4}: [ 57.070673][ T5042] __lock_acquire+0x1236/0x2570 [ 57.076053][ T5042] lock_acquire+0xeb/0x270 [ 57.080976][ T5042] __mutex_lock+0xaa/0xa40 [ 57.085885][ T5042] smc_pnet_find_ism_resource+0x69/0x180 [ 57.092091][ T5042] __smc_connect+0x10b/0x610 [ 57.097171][ T5042] smc_connect+0x250/0x2d0 [ 57.102086][ T5042] __sys_connect+0x17b/0x1e0 [ 57.107170][ T5042] __x64_sys_connect+0x15/0x20 [ 57.112422][ T5042] do_syscall_64+0xa0/0x1b0 [ 57.117410][ T5042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.123787][ T5042] [ 57.123787][ T5042] other info that might help us debug this: [ 57.123787][ T5042] [ 57.134269][ T5042] Possible unsafe locking scenario: [ 57.134269][ T5042] [ 57.141702][ T5042] CPU0 CPU1 [ 57.147035][ T5042] ---- ---- [ 57.152456][ T5042] lock(sk_lock-AF_INET); [ 57.156835][ T5042] lock(rtnl_mutex); [ 57.163299][ T5042] lock(sk_lock-AF_INET); [ 57.170286][ T5042] lock(rtnl_mutex); [ 57.174390][ T5042] [ 57.174390][ T5042] *** DEADLOCK *** [ 57.174390][ T5042] [ 57.182684][ T5042] 1 lock held by syz.2.16/5042: [ 57.187527][ T5042] #0: ffff888117bb0258 (sk_lock-AF_INET){+.+.}-{0:0}, at: smc_connect+0x44/0x2d0 [ 57.196696][ T5042] [ 57.196696][ T5042] stack backtrace: [ 57.202577][ T5042] CPU: 0 UID: 0 PID: 5042 Comm: syz.2.16 Not tainted 6.14.0-rc5-syzkaller #0 [ 57.202581][ T5042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 57.202586][ T5042] Call Trace: [ 57.202589][ T5042] [ 57.202591][ T5042] dump_stack_lvl+0xa3/0x100 [ 57.202598][ T5042] print_circular_bug+0x28d/0x2a0 [ 57.202603][ T5042] check_noncircular+0x119/0x140 [ 57.202606][ T5042] __lock_acquire+0x1236/0x2570 [ 57.202609][ T5042] ? __lock_acquire+0x4e1/0x2570 [ 57.202611][ T5042] ? __lock_acquire+0x4e1/0x2570 [ 57.202613][ T5042] ? smc_pnet_find_ism_resource+0x69/0x180 [ 57.202618][ T5042] lock_acquire+0xeb/0x270 [ 57.202620][ T5042] ? smc_pnet_find_ism_resource+0x69/0x180 [ 57.202624][ T5042] ? sk_dst_get+0x12/0x150 [ 57.202628][ T5042] ? smc_pnet_find_ism_resource+0x69/0x180 [ 57.202631][ T5042] __mutex_lock+0xaa/0xa40 [ 57.202636][ T5042] ? smc_pnet_find_ism_resource+0x69/0x180 [ 57.202640][ T5042] smc_pnet_find_ism_resource+0x69/0x180 [ 57.202644][ T5042] ? smc_vlan_by_tcpsk+0x1d6/0x200 [ 57.202647][ T5042] __smc_connect+0x10b/0x610 [ 57.202650][ T5042] smc_connect+0x250/0x2d0 [ 57.202654][ T5042] __sys_connect+0x17b/0x1e0 [ 57.202658][ T5042] __x64_sys_connect+0x15/0x20 [ 57.202661][ T5042] do_syscall_64+0xa0/0x1b0 [ 57.202666][ T5042] ? clear_bhb_loop+0x35/0x90 [ 57.202670][ T5042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.202674][ T5042] RIP: 0033:0x7f5853585d29 [ 57.202678][ T5042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.202680][ T5042] RSP: 002b:00007f5854334038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 57.202684][ T5042] RAX: ffffffffffffffda RBX: 00007f5853775fa0 RCX: 00007f5853585d29 [ 57.202685][ T5042] RDX: 0000000000000010 RSI: 0000000020000080 RDI: 0000000000000004 [ 57.202687][ T5042] RBP: 00007f5853601b08 R08: 0000000000000000 R09: 0000000000000000 [ 57.202689][ T5042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 57.202690][ T5042] R13: 0000000000000000 R14: 00007f5853775fa0 R15: 00007ffd14b610e8 [ 57.202692][ T5042] 2025/03/11 00:34:19 executed programs: 219 2025/03/11 00:34:24 executed programs: 520