Warning: Permanently added '10.128.1.56' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 110.265530][ T9905] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 125.627889][T10129] [ 125.630417][T10129] ====================================================== [ 125.637607][T10129] WARNING: possible circular locking dependency detected [ 125.645338][T10129] 5.6.0-rc1-syzkaller #0 Not tainted [ 125.650607][T10129] ------------------------------------------------------ [ 125.657922][T10129] syz-executor432/10129 is trying to acquire lock: [ 125.664633][T10129] ffff8880988693e0 (&htab->buckets[i].lock){....}, at: htab_lru_map_delete_node+0xce/0x2f0 [ 125.674731][T10129] [ 125.674731][T10129] but task is already holding lock: [ 125.682301][T10129] ffff888098869a18 (&l->lock){....}, at: bpf_lru_pop_free+0x67f/0x1670 [ 125.690542][T10129] [ 125.690542][T10129] which lock already depends on the new lock. [ 125.690542][T10129] [ 125.701077][T10129] [ 125.701077][T10129] the existing dependency chain (in reverse order) is: [ 125.710124][T10129] [ 125.710124][T10129] -> #2 (&l->lock){....}: [ 125.716753][T10129] _raw_spin_lock+0x2f/0x40 [ 125.721769][T10129] bpf_lru_pop_free+0x67f/0x1670 [ 125.727222][T10129] prealloc_lru_pop+0x2c/0xa0 [ 125.732424][T10129] __htab_lru_percpu_map_update_elem+0x67e/0xa90 [ 125.739272][T10129] bpf_percpu_hash_update+0x16e/0x210 [ 125.745155][T10129] bpf_map_update_value.isra.0+0x2d7/0x8e0 [ 125.751658][T10129] generic_map_update_batch+0x41f/0x610 [ 125.757742][T10129] bpf_map_do_batch+0x3f5/0x510 [ 125.763142][T10129] __do_sys_bpf+0x9b7/0x41e0 [ 125.768291][T10129] __x64_sys_bpf+0x73/0xb0 [ 125.773213][T10129] do_syscall_64+0xfa/0x790 [ 125.778230][T10129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.784752][T10129] [ 125.784752][T10129] -> #1 (&loc_l->lock){....}: [ 125.791818][T10129] _raw_spin_lock_irqsave+0x95/0xcd [ 125.797977][T10129] bpf_lru_push_free+0x250/0x5b0 [ 125.803436][T10129] __htab_map_lookup_and_delete_batch+0x8d4/0x1540 [ 125.810457][T10129] htab_lru_map_lookup_and_delete_batch+0x34/0x40 [ 125.817408][T10129] bpf_map_do_batch+0x3f5/0x510 [ 125.822781][T10129] __do_sys_bpf+0x1f7d/0x41e0 [ 125.828143][T10129] __x64_sys_bpf+0x73/0xb0 [ 125.833220][T10129] do_syscall_64+0xfa/0x790 [ 125.838253][T10129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.844756][T10129] [ 125.844756][T10129] -> #0 (&htab->buckets[i].lock){....}: [ 125.852472][T10129] __lock_acquire+0x2596/0x4a00 [ 125.857837][T10129] lock_acquire+0x190/0x410 [ 125.862849][T10129] _raw_spin_lock_irqsave+0x95/0xcd [ 125.869260][T10129] htab_lru_map_delete_node+0xce/0x2f0 [ 125.875842][T10129] __bpf_lru_list_shrink+0xf9/0x470 [ 125.881637][T10129] bpf_lru_pop_free+0x87c/0x1670 [ 125.887135][T10129] prealloc_lru_pop+0x2c/0xa0 [ 125.892372][T10129] __htab_lru_percpu_map_update_elem+0x67e/0xa90 [ 125.899225][T10129] bpf_percpu_hash_update+0x16e/0x210 [ 125.905222][T10129] bpf_map_update_value.isra.0+0x2d7/0x8e0 [ 125.911536][T10129] generic_map_update_batch+0x41f/0x610 [ 125.917676][T10129] bpf_map_do_batch+0x3f5/0x510 [ 125.923051][T10129] __do_sys_bpf+0x9b7/0x41e0 [ 125.928147][T10129] __x64_sys_bpf+0x73/0xb0 [ 125.933078][T10129] do_syscall_64+0xfa/0x790 [ 125.938088][T10129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.944539][T10129] [ 125.944539][T10129] other info that might help us debug this: [ 125.944539][T10129] [ 125.954774][T10129] Chain exists of: [ 125.954774][T10129] &htab->buckets[i].lock --> &loc_l->lock --> &l->lock [ 125.954774][T10129] [ 125.967613][T10129] Possible unsafe locking scenario: [ 125.967613][T10129] [ 125.975178][T10129] CPU0 CPU1 [ 125.980765][T10129] ---- ---- [ 125.986119][T10129] lock(&l->lock); [ 125.990025][T10129] lock(&loc_l->lock); [ 125.996710][T10129] lock(&l->lock); [ 126.003065][T10129] lock(&htab->buckets[i].lock); [ 126.008076][T10129] [ 126.008076][T10129] *** DEADLOCK *** [ 126.008076][T10129] [ 126.016220][T10129] 3 locks held by syz-executor432/10129: [ 126.021880][T10129] #0: ffffffff89bac240 (rcu_read_lock){....}, at: bpf_percpu_hash_update+0x0/0x210 [ 126.031399][T10129] #1: ffffe8ffffc49e40 (&loc_l->lock){....}, at: bpf_lru_pop_free+0x32b/0x1670 [ 126.040625][T10129] #2: ffff888098869a18 (&l->lock){....}, at: bpf_lru_pop_free+0x67f/0x1670 [ 126.049357][T10129] [ 126.049357][T10129] stack backtrace: [ 126.055356][T10129] CPU: 0 PID: 10129 Comm: syz-executor432 Not tainted 5.6.0-rc1-syzkaller #0 [ 126.064096][T10129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.074802][T10129] Call Trace: [ 126.078086][T10129] dump_stack+0x197/0x210 [ 126.082461][T10129] print_circular_bug.isra.0.cold+0x163/0x172 [ 126.088588][T10129] check_noncircular+0x32e/0x3e0 [ 126.093519][T10129] ? do_huge_pmd_anonymous_page+0x1454/0x1a50 [ 126.099582][T10129] ? print_circular_bug.isra.0+0x230/0x230 [ 126.105382][T10129] ? do_huge_pmd_anonymous_page+0x1454/0x1a50 [ 126.111450][T10129] ? alloc_list_entry+0xc0/0xc0 [ 126.116305][T10129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 126.122548][T10129] ? find_first_zero_bit+0x9a/0xc0 [ 126.127654][T10129] __lock_acquire+0x2596/0x4a00 [ 126.132752][T10129] ? do_raw_spin_unlock+0x181/0x270 [ 126.137992][T10129] ? mark_held_locks+0xf0/0xf0 [ 126.142841][T10129] ? __kasan_check_read+0x11/0x20 [ 126.148311][T10129] ? __lock_acquire+0x16f2/0x4a00 [ 126.153325][T10129] lock_acquire+0x190/0x410 [ 126.157966][T10129] ? htab_lru_map_delete_node+0xce/0x2f0 [ 126.163594][T10129] _raw_spin_lock_irqsave+0x95/0xcd [ 126.169022][T10129] ? htab_lru_map_delete_node+0xce/0x2f0 [ 126.174649][T10129] htab_lru_map_delete_node+0xce/0x2f0 [ 126.180098][T10129] ? __kasan_check_write+0x14/0x20 [ 126.185197][T10129] __bpf_lru_list_shrink+0xf9/0x470 [ 126.190392][T10129] bpf_lru_pop_free+0x87c/0x1670 [ 126.195348][T10129] prealloc_lru_pop+0x2c/0xa0 [ 126.200039][T10129] __htab_lru_percpu_map_update_elem+0x67e/0xa90 [ 126.206454][T10129] bpf_percpu_hash_update+0x16e/0x210 [ 126.211886][T10129] bpf_map_update_value.isra.0+0x2d7/0x8e0 [ 126.217771][T10129] generic_map_update_batch+0x41f/0x610 [ 126.223968][T10129] ? generic_map_delete_batch+0x6a0/0x6a0 [ 126.229724][T10129] ? __fget_light+0x1ad/0x270 [ 126.234406][T10129] ? generic_map_delete_batch+0x6a0/0x6a0 [ 126.240119][T10129] bpf_map_do_batch+0x3f5/0x510 [ 126.244965][T10129] __do_sys_bpf+0x9b7/0x41e0 [ 126.249666][T10129] ? find_held_lock+0x35/0x130 [ 126.254419][T10129] ? bpf_prog_load+0x1820/0x1820 [ 126.259340][T10129] ? lock_downgrade+0x920/0x920 [ 126.264206][T10129] ? handle_mm_fault+0x292/0xa50 [ 126.269139][T10129] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 126.274587][T10129] ? do_syscall_64+0x26/0x790 [ 126.279356][T10129] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.286809][T10129] ? do_syscall_64+0x26/0x790 [ 126.291482][T10129] __x64_sys_bpf+0x73/0xb0 [ 126.296026][T10129] do_syscall_64+0xfa/0x790 [ 126.300554][T10129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.306500][T10129] RIP: 0033:0x446b99 [ 126.310492][T10129] Code: e8 bc b4 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 ab 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 executing program [ 126.330198][T10129] RSP: 002b:00007f14c0df8db8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.338803][T10129] RAX: ffffffffffffffda RBX: 00000000006dbc28 RCX: 0000000000446b99 [ 126.346758][T10129] RDX: 0000000000000038 RSI: 0000000020000040 RDI: 000000000000001a [ 126.354769][T10129] RBP: 00000000006dbc20 R08: 0000000000000000 R09: 0000000000000000 [ 126.363193][T10129] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc2c [ 126.371298][T10129] R13: 00007ffc51c1364f R14: 00007f14c0df99c0 R15: 0000000000000000 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program