Warning: Permanently added '10.128.0.43' (ED25519) to the list of known hosts. executing program syzkaller login: [ 50.366765][ T3499] [ 50.369125][ T3499] ====================================================== [ 50.376146][ T3499] WARNING: possible circular locking dependency detected [ 50.383242][ T3499] 5.15.152-syzkaller #0 Not tainted [ 50.388432][ T3499] ------------------------------------------------------ [ 50.395537][ T3499] syz-executor108/3499 is trying to acquire lock: [ 50.401935][ T3499] ffff8880b9a27e78 (krc.lock){....}-{2:2}, at: kvfree_call_rcu+0x1b5/0x8a0 [ 50.410558][ T3499] [ 50.410558][ T3499] but task is already holding lock: [ 50.417913][ T3499] ffff88801ca8c1b8 (&trie->lock){-...}-{2:2}, at: trie_update_elem+0xc5/0xc00 [ 50.426903][ T3499] [ 50.426903][ T3499] which lock already depends on the new lock. [ 50.426903][ T3499] [ 50.437303][ T3499] [ 50.437303][ T3499] the existing dependency chain (in reverse order) is: [ 50.446307][ T3499] [ 50.446307][ T3499] -> #2 (&trie->lock){-...}-{2:2}: [ 50.453595][ T3499] lock_acquire+0x1db/0x4f0 [ 50.458617][ T3499] _raw_spin_lock_irqsave+0xd1/0x120 [ 50.464454][ T3499] trie_delete_elem+0x90/0x690 [ 50.469821][ T3499] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf88 [ 50.476013][ T3499] bpf_trace_run3+0x1d1/0x380 [ 50.481211][ T3499] enqueue_timer+0x3ae/0x540 [ 50.486316][ T3499] __mod_timer+0x9ca/0xeb0 [ 50.491246][ T3499] sk_reset_timer+0x1f/0xb0 [ 50.496265][ T3499] tcp_event_new_data_sent+0x203/0x360 [ 50.502238][ T3499] tcp_write_xmit+0x1a0b/0x65f0 [ 50.507621][ T3499] __tcp_push_pending_frames+0x90/0x250 [ 50.513678][ T3499] tcp_sendmsg_locked+0x315c/0x3a90 [ 50.519387][ T3499] tcp_sendmsg+0x2c/0x40 [ 50.524246][ T3499] sock_write_iter+0x39b/0x530 [ 50.529537][ T3499] vfs_write+0xacf/0xe50 [ 50.534292][ T3499] ksys_write+0x1a2/0x2c0 [ 50.539221][ T3499] do_syscall_64+0x3d/0xb0 [ 50.544153][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.550558][ T3499] [ 50.550558][ T3499] -> #1 (&base->lock){-.-.}-{2:2}: [ 50.557845][ T3499] lock_acquire+0x1db/0x4f0 [ 50.562891][ T3499] _raw_spin_lock_irqsave+0xd1/0x120 [ 50.568690][ T3499] lock_timer_base+0x120/0x260 [ 50.573987][ T3499] __mod_timer+0x1d6/0xeb0 [ 50.578916][ T3499] queue_delayed_work_on+0x156/0x250 [ 50.584879][ T3499] kvfree_call_rcu+0x50e/0x8a0 [ 50.590169][ T3499] rtnl_register_internal+0x443/0x530 [ 50.596066][ T3499] rtnl_register+0x32/0x70 [ 50.601000][ T3499] ip_rt_init+0x2e6/0x390 [ 50.605845][ T3499] ip_init+0xa/0x14 [ 50.610166][ T3499] inet_init+0x27c/0x38e [ 50.614925][ T3499] do_one_initcall+0x22b/0x7a0 [ 50.620211][ T3499] do_initcall_level+0x157/0x207 [ 50.625700][ T3499] do_initcalls+0x49/0x86 [ 50.630541][ T3499] kernel_init_freeable+0x425/0x5b5 [ 50.636256][ T3499] kernel_init+0x19/0x290 [ 50.641118][ T3499] ret_from_fork+0x1f/0x30 [ 50.646054][ T3499] [ 50.646054][ T3499] -> #0 (krc.lock){....}-{2:2}: [ 50.653297][ T3499] validate_chain+0x1649/0x5930 [ 50.658659][ T3499] __lock_acquire+0x1295/0x1ff0 [ 50.664019][ T3499] lock_acquire+0x1db/0x4f0 [ 50.669130][ T3499] _raw_spin_lock+0x2a/0x40 [ 50.674143][ T3499] kvfree_call_rcu+0x1b5/0x8a0 [ 50.679420][ T3499] trie_update_elem+0x808/0xc00 [ 50.684783][ T3499] bpf_map_update_value+0x5d7/0x6c0 [ 50.690496][ T3499] generic_map_update_batch+0x54d/0x8b0 [ 50.696551][ T3499] bpf_map_do_batch+0x4d0/0x620 [ 50.701918][ T3499] __sys_bpf+0x55c/0x670 [ 50.706673][ T3499] __x64_sys_bpf+0x78/0x90 [ 50.711621][ T3499] do_syscall_64+0x3d/0xb0 [ 50.716548][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.722951][ T3499] [ 50.722951][ T3499] other info that might help us debug this: [ 50.722951][ T3499] [ 50.733270][ T3499] Chain exists of: [ 50.733270][ T3499] krc.lock --> &base->lock --> &trie->lock [ 50.733270][ T3499] [ 50.744996][ T3499] Possible unsafe locking scenario: [ 50.744996][ T3499] [ 50.752439][ T3499] CPU0 CPU1 [ 50.757790][ T3499] ---- ---- [ 50.763141][ T3499] lock(&trie->lock); [ 50.767203][ T3499] lock(&base->lock); [ 50.773780][ T3499] lock(&trie->lock); [ 50.780358][ T3499] lock(krc.lock); [ 50.784157][ T3499] [ 50.784157][ T3499] *** DEADLOCK *** [ 50.784157][ T3499] [ 50.792409][ T3499] 2 locks held by syz-executor108/3499: [ 50.797947][ T3499] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 [ 50.807339][ T3499] #1: ffff88801ca8c1b8 (&trie->lock){-...}-{2:2}, at: trie_update_elem+0xc5/0xc00 [ 50.816752][ T3499] [ 50.816752][ T3499] stack backtrace: [ 50.822634][ T3499] CPU: 0 PID: 3499 Comm: syz-executor108 Not tainted 5.15.152-syzkaller #0 [ 50.831236][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 50.841285][ T3499] Call Trace: [ 50.844557][ T3499] [ 50.847483][ T3499] dump_stack_lvl+0x1e3/0x2cb [ 50.852161][ T3499] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 50.857789][ T3499] ? print_circular_bug+0x12b/0x1a0 [ 50.862988][ T3499] check_noncircular+0x2f8/0x3b0 [ 50.867941][ T3499] ? add_chain_block+0x850/0x850 [ 50.872893][ T3499] ? lockdep_lock+0x11f/0x2a0 [ 50.877590][ T3499] validate_chain+0x1649/0x5930 [ 50.882532][ T3499] ? reacquire_held_locks+0x660/0x660 [ 50.887902][ T3499] ? reacquire_held_locks+0x660/0x660 [ 50.893270][ T3499] ? get_page_from_freelist+0x3249/0x33c0 [ 50.898987][ T3499] ? mark_lock+0x98/0x340 [ 50.903310][ T3499] ? __lock_acquire+0x1295/0x1ff0 [ 50.908329][ T3499] ? mark_lock+0x98/0x340 [ 50.912649][ T3499] __lock_acquire+0x1295/0x1ff0 [ 50.917496][ T3499] lock_acquire+0x1db/0x4f0 [ 50.921992][ T3499] ? kvfree_call_rcu+0x1b5/0x8a0 [ 50.926923][ T3499] ? __lock_acquire+0x1ff0/0x1ff0 [ 50.931939][ T3499] ? read_lock_is_recursive+0x10/0x10 [ 50.937321][ T3499] ? do_raw_spin_unlock+0x137/0x8b0 [ 50.942514][ T3499] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 50.948405][ T3499] ? _raw_spin_unlock+0x40/0x40 [ 50.953249][ T3499] ? debug_object_active_state+0x6b/0x380 [ 50.958969][ T3499] _raw_spin_lock+0x2a/0x40 [ 50.963465][ T3499] ? kvfree_call_rcu+0x1b5/0x8a0 [ 50.968430][ T3499] kvfree_call_rcu+0x1b5/0x8a0 [ 50.973189][ T3499] ? call_rcu+0xa70/0xa70 [ 50.977510][ T3499] ? __kmalloc_node+0x278/0x390 [ 50.982355][ T3499] ? longest_prefix_match+0x2db/0x640 [ 50.987721][ T3499] trie_update_elem+0x808/0xc00 [ 50.992573][ T3499] bpf_map_update_value+0x5d7/0x6c0 [ 50.997766][ T3499] generic_map_update_batch+0x54d/0x8b0 [ 51.003315][ T3499] ? rcu_read_unlock+0x90/0x90 [ 51.008076][ T3499] ? __fdget+0x158/0x220 [ 51.012310][ T3499] ? rcu_read_unlock+0x90/0x90 [ 51.017092][ T3499] bpf_map_do_batch+0x4d0/0x620 [ 51.021943][ T3499] __sys_bpf+0x55c/0x670 [ 51.026180][ T3499] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 51.031567][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230 [ 51.037541][ T3499] ? lockdep_hardirqs_on+0x94/0x130 [ 51.042747][ T3499] __x64_sys_bpf+0x78/0x90 [ 51.047160][ T3499] do_syscall_64+0x3d/0xb0 [ 51.051592][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.057484][ T3499] RIP: 0033:0x7fca39d407e9 [ 51.061892][ T3499] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.081491][ T3499] RSP: 002b:00007fff502c1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.089900][ T3499] RAX: ffffffffffffffda RBX: 00007fff502c1e38 RCX: 00007fca39d407e9 [ 51.097862][ T3499] RDX: 0000000000000038 RSI: 0000000020000300 RDI: 000000000000001a [ 51.105829][ T3499] RBP: 00007fca39db3610 R08: 00007fff502c1e38 R09: 00007fff502c1e38 [ 51.113813][ T3499] R10: 00007fff502c1e38 R11: 0000000000000246 R12: 0