./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor198626065 <...> Warning: Permanently added '10.128.1.152' (ED25519) to the list of known hosts. execve("./syz-executor198626065", ["./syz-executor198626065"], 0x7fff8485b4b0 /* 10 vars */) = 0 brk(NULL) = 0x55558ba5b000 brk(0x55558ba5bd00) = 0x55558ba5bd00 arch_prctl(ARCH_SET_FS, 0x55558ba5b380) = 0 set_tid_address(0x55558ba5b650) = 5066 set_robust_list(0x55558ba5b660, 24) = 0 rseq(0x55558ba5bca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor198626065", 4096) = 27 getrandom("\x6c\xcc\x12\x38\x42\xf8\x6f\x8a", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558ba5bd00 brk(0x55558ba7cd00) = 0x55558ba7cd00 brk(0x55558ba7d000) = 0x55558ba7d000 mprotect(0x7fadffb13000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5067 attached , child_tidptr=0x55558ba5b650) = 5067 [pid 5067] set_robust_list(0x55558ba5b660, 24) = 0 [pid 5067] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5067] setpgid(0, 0) = 0 [pid 5067] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5067] write(3, "1000", 4) = 4 [pid 5067] close(3) = 0 [pid 5067] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=2, max_entries=4, map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE, inner_map_fd=-1, numa_node=0, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 5067] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x20000640, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 5067] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=4}}, 16) = 5 [ 61.410255][ T5061] [ 61.412645][ T5061] ====================================================== [ 61.419746][ T5061] WARNING: possible circular locking dependency detected [ 61.426925][ T5061] 6.8.0-syzkaller-05271-gf99c5f563c17 #0 Not tainted [ 61.433606][ T5061] ------------------------------------------------------ [ 61.440690][ T5061] sshd/5061 is trying to acquire lock: [ 61.446128][ T5061] ffff8880b9429470 (krc.lock){....}-{2:2}, at: kvfree_call_rcu+0x18a/0x790 [ 61.454764][ T5061] [ 61.454764][ T5061] but task is already holding lock: [ 61.462197][ T5061] ffff88802a0521f8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x96/0x6a0 [ 61.471075][ T5061] [ 61.471075][ T5061] which lock already depends on the new lock. [ 61.471075][ T5061] [ 61.481725][ T5061] [ 61.481725][ T5061] the existing dependency chain (in reverse order) is: [ 61.490809][ T5061] [ 61.490809][ T5061] -> #2 (&trie->lock){....}-{2:2}: [ 61.498098][ T5061] lock_acquire+0x1e4/0x530 [ 61.503142][ T5061] _raw_spin_lock_irqsave+0xd5/0x120 [ 61.509045][ T5061] trie_delete_elem+0x96/0x6a0 [ 61.514405][ T5061] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 61.520373][ T5061] bpf_trace_run2+0x204/0x420 [ 61.525656][ T5061] enqueue_timer+0x396/0x550 [ 61.531103][ T5061] __mod_timer+0x953/0xeb0 [ 61.536207][ T5061] sk_reset_timer+0x23/0xc0 [ 61.541404][ T5061] tcp_event_new_data_sent+0x203/0x360 [ 61.547376][ T5061] tcp_write_xmit+0x1468/0x6100 [ 61.552740][ T5061] __tcp_push_pending_frames+0x9b/0x360 [ 61.558796][ T5061] tcp_sendmsg_locked+0x42cc/0x4d00 [ 61.564596][ T5061] tcp_sendmsg+0x30/0x50 [ 61.569520][ T5061] __sock_sendmsg+0x1a6/0x270 [ 61.575050][ T5061] sock_write_iter+0x2dd/0x400 [ 61.580438][ T5061] vfs_write+0xa84/0xcb0 [ 61.585316][ T5061] ksys_write+0x1a0/0x2c0 [ 61.590165][ T5061] do_syscall_64+0xfb/0x240 [ 61.595351][ T5061] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 61.602024][ T5061] [ 61.602024][ T5061] -> #1 (&base->lock){-.-.}-{2:2}: [ 61.609400][ T5061] lock_acquire+0x1e4/0x530 [ 61.614415][ T5061] _raw_spin_lock_irqsave+0xd5/0x120 [ 61.620228][ T5061] lock_timer_base+0x112/0x240 [ 61.625593][ T5061] __mod_timer+0x1ca/0xeb0 [ 61.630546][ T5061] queue_delayed_work_on+0x15a/0x260 [ 61.636340][ T5061] kvfree_call_rcu+0x47f/0x790 [ 61.642164][ T5061] rtnl_register_internal+0x482/0x590 [ 61.648235][ T5061] rtnl_register+0x36/0x80 [ 61.653270][ T5061] ip_rt_init+0x2f5/0x3a0 [ 61.658200][ T5061] ip_init+0xe/0x20 [ 61.662536][ T5061] inet_init+0x3d8/0x580 [ 61.668423][ T5061] do_one_initcall+0x238/0x830 [ 61.673896][ T5061] do_initcall_level+0x157/0x210 [ 61.679610][ T5061] do_initcalls+0x3f/0x80 [ 61.684449][ T5061] kernel_init_freeable+0x435/0x5d0 [ 61.690361][ T5061] kernel_init+0x1d/0x2a0 [ 61.695325][ T5061] ret_from_fork+0x4b/0x80 [ 61.700620][ T5061] ret_from_fork_asm+0x1a/0x30 [ 61.705999][ T5061] [ 61.705999][ T5061] -> #0 (krc.lock){....}-{2:2}: [ 61.713113][ T5061] validate_chain+0x18cb/0x58e0 [ 61.718476][ T5061] __lock_acquire+0x1346/0x1fd0 [ 61.724015][ T5061] lock_acquire+0x1e4/0x530 [ 61.729022][ T5061] _raw_spin_lock+0x2e/0x40 [ 61.734039][ T5061] kvfree_call_rcu+0x18a/0x790 [ 61.739316][ T5061] trie_delete_elem+0x52c/0x6a0 [ 61.744790][ T5061] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 61.751064][ T5061] bpf_trace_run2+0x204/0x420 [ 61.756283][ T5061] enqueue_timer+0x396/0x550 [ 61.761402][ T5061] __mod_timer+0x953/0xeb0 [ 61.766458][ T5061] sk_reset_timer+0x23/0xc0 [ 61.771518][ T5061] tcp_event_new_data_sent+0x203/0x360 [ 61.777593][ T5061] tcp_write_xmit+0x1468/0x6100 [ 61.782983][ T5061] __tcp_push_pending_frames+0x9b/0x360 [ 61.789150][ T5061] tcp_sendmsg_locked+0x42cc/0x4d00 [ 61.794889][ T5061] tcp_sendmsg+0x30/0x50 [ 61.799856][ T5061] __sock_sendmsg+0x1a6/0x270 [ 61.805078][ T5061] sock_write_iter+0x2dd/0x400 [ 61.810364][ T5061] vfs_write+0xa84/0xcb0 [ 61.815294][ T5061] ksys_write+0x1a0/0x2c0 [ 61.820132][ T5061] do_syscall_64+0xfb/0x240 [ 61.825147][ T5061] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 61.831640][ T5061] [ 61.831640][ T5061] other info that might help us debug this: [ 61.831640][ T5061] [ 61.842036][ T5061] Chain exists of: [ 61.842036][ T5061] krc.lock --> &base->lock --> &trie->lock [ 61.842036][ T5061] [ 61.854849][ T5061] Possible unsafe locking scenario: [ 61.854849][ T5061] [ 61.862310][ T5061] CPU0 CPU1 [ 61.867729][ T5061] ---- ---- [ 61.873094][ T5061] lock(&trie->lock); [ 61.877357][ T5061] lock(&base->lock); [ 61.884129][ T5061] lock(&trie->lock); [ 61.890891][ T5061] lock(krc.lock); [ 61.894754][ T5061] [ 61.894754][ T5061] *** DEADLOCK *** [ 61.894754][ T5061] [ 61.903060][ T5061] 4 locks held by sshd/5061: [ 61.907742][ T5061] #0: ffff8880793a9ad8 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50 [ 61.917180][ T5061] #1: ffff8880b942a758 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240 [ 61.926581][ T5061] #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x114/0x420 [ 61.936056][ T5061] #3: ffff88802a0521f8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x96/0x6a0 [ 61.945376][ T5061] [ 61.945376][ T5061] stack backtrace: [ 61.951262][ T5061] CPU: 0 PID: 5061 Comm: sshd Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0 [ 61.960364][ T5061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 61.970867][ T5061] Call Trace: [ 61.974227][ T5061] [ 61.977146][ T5061] dump_stack_lvl+0x1e7/0x2e0 [ 61.982005][ T5061] ? __pfx_dump_stack_lvl+0x10/0x10 [ 61.987380][ T5061] ? print_circular_bug+0x130/0x1a0 [ 61.992574][ T5061] check_noncircular+0x36a/0x4a0 [ 61.997686][ T5061] ? __pfx_check_noncircular+0x10/0x10 [ 62.003136][ T5061] ? lockdep_lock+0x123/0x2b0 [ 62.007814][ T5061] ? mark_lock+0x9a/0x350 [ 62.012231][ T5061] ? _find_first_zero_bit+0xd4/0x100 [ 62.017605][ T5061] validate_chain+0x18cb/0x58e0 [ 62.022722][ T5061] ? __pfx_validate_chain+0x10/0x10 [ 62.027998][ T5061] ? stack_depot_save_flags+0x37d/0x860 [ 62.033589][ T5061] ? do_raw_spin_lock+0x14f/0x370 [ 62.038800][ T5061] ? __pfx_lock_release+0x10/0x10 [ 62.043904][ T5061] ? do_raw_spin_unlock+0x13c/0x8b0 [ 62.049119][ T5061] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 62.055264][ T5061] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 62.061760][ T5061] ? stack_trace_save+0x118/0x1d0 [ 62.066905][ T5061] ? mark_lock+0x9a/0x350 [ 62.071399][ T5061] __lock_acquire+0x1346/0x1fd0 [ 62.076427][ T5061] lock_acquire+0x1e4/0x530 [ 62.081718][ T5061] ? kvfree_call_rcu+0x18a/0x790 [ 62.086825][ T5061] ? __pfx_lock_acquire+0x10/0x10 [ 62.091930][ T5061] ? __phys_addr+0xba/0x170 [ 62.096706][ T5061] _raw_spin_lock+0x2e/0x40 [ 62.101220][ T5061] ? kvfree_call_rcu+0x18a/0x790 [ 62.106147][ T5061] kvfree_call_rcu+0x18a/0x790 [ 62.111514][ T5061] ? _raw_spin_lock_irqsave+0xe1/0x120 [ 62.116964][ T5061] ? __pfx_kvfree_call_rcu+0x10/0x10 [ 62.122256][ T5061] ? longest_prefix_match+0x4bf/0x670 [ 62.127884][ T5061] trie_delete_elem+0x52c/0x6a0 [ 62.132735][ T5061] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 62.138195][ T5061] bpf_trace_run2+0x204/0x420 [ 62.143127][ T5061] ? bpf_trace_run2+0x114/0x420 [ 62.147963][ T5061] ? __pfx_bpf_trace_run2+0x10/0x10 [ 62.154138][ T5061] ? __pfx_debug_object_activate+0x10/0x10 [ 62.161408][ T5061] ? __tcp_transmit_skb+0x21fe/0x3b80 [ 62.167560][ T5061] enqueue_timer+0x396/0x550 [ 62.172932][ T5061] __mod_timer+0x953/0xeb0 [ 62.177697][ T5061] ? __pfx___mod_timer+0x10/0x10 [ 62.183876][ T5061] ? seqcount_lockdep_reader_access+0x157/0x220 [ 62.190289][ T5061] ? lockdep_hardirqs_on+0x99/0x150 [ 62.195942][ T5061] ? __asan_memset+0x23/0x50 [ 62.200793][ T5061] sk_reset_timer+0x23/0xc0 [ 62.206026][ T5061] tcp_event_new_data_sent+0x203/0x360 [ 62.211663][ T5061] tcp_write_xmit+0x1468/0x6100 [ 62.216524][ T5061] __tcp_push_pending_frames+0x9b/0x360 [ 62.222591][ T5061] tcp_sendmsg_locked+0x42cc/0x4d00 [ 62.228189][ T5061] ? __pfx_tcp_sendmsg_locked+0x10/0x10 [ 62.233758][ T5061] ? __local_bh_enable_ip+0x168/0x200 [ 62.239689][ T5061] ? do_raw_spin_unlock+0x13c/0x8b0 [ 62.245156][ T5061] tcp_sendmsg+0x30/0x50 [ 62.249599][ T5061] __sock_sendmsg+0x1a6/0x270 [ 62.254291][ T5061] sock_write_iter+0x2dd/0x400 [ 62.259309][ T5061] ? __pfx_sock_write_iter+0x10/0x10 [ 62.264593][ T5061] ? bpf_lsm_file_permission+0x9/0x10 [ 62.270222][ T5061] ? security_file_permission+0x7f/0xa0 [ 62.275789][ T5061] vfs_write+0xa84/0xcb0 [ 62.280070][ T5061] ? __pfx_vfs_write+0x10/0x10 [ 62.285368][ T5061] ? __set_current_blocked+0x310/0x380 [ 62.290948][ T5061] ? __might_fault+0xc6/0x120 [ 62.295624][ T5061] ? __fdget_pos+0x1a2/0x320 [ 62.300388][ T5061] ksys_write+0x1a0/0x2c0 [ 62.304779][ T5061] ? __pfx_ksys_write+0x10/0x10 [ 62.309736][ T5061] ? do_syscall_64+0x10a/0x240 [ 62.314604][ T5061] ? do_syscall_64+0xb6/0x240 [ 62.319272][ T5061] do_syscall_64+0xfb/0x240 [ 62.323943][ T5061] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 62.330336][ T5061] RIP: 0033:0x7f9ebe716bf2 [ 62.334934][ T5061] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83 [ 62.354788][ T5061] RSP: 002b:00007fff20efc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 62.363203][ T5061] RAX: ffffffffffffffda RBX: 000000000000002c RCX: 00007f9ebe716bf2 [ 62.371254][ T5061] RDX: 000000000000002c RSI: 0000560f246af960 RDI: 0000000000000004 [ 62.379298][ T5061] RBP: 0000560f246bd220 R08: 0000000000000000 R09: 0000000000000000 [ 62.387981][ T5061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000560f23059aa4 [ 62.396027][ T5061] R13: 000000000000003d R14: 0000560f2305a3e8 R15: 00007fff20efc0a8 [ 62.403996][ T5061]