Warning: Permanently added '10.128.1.28' (ED25519) to the list of known hosts. executing program [ 54.024795][ T3498] [ 54.027153][ T3498] ====================================================== [ 54.034173][ T3498] WARNING: possible circular locking dependency detected [ 54.041352][ T3498] 5.15.158-syzkaller #0 Not tainted [ 54.046536][ T3498] ------------------------------------------------------ [ 54.053537][ T3498] syz-executor232/3498 is trying to acquire lock: [ 54.059951][ T3498] ffff88807473a290 (&psock->link_lock){+...}-{2:2}, at: sock_map_update_common+0x31c/0x5b0 [ 54.069975][ T3498] [ 54.069975][ T3498] but task is already holding lock: [ 54.077325][ T3498] ffff88801f6575c0 (&stab->lock){+...}-{2:2}, at: sock_map_update_common+0x1b6/0x5b0 [ 54.086885][ T3498] [ 54.086885][ T3498] which lock already depends on the new lock. [ 54.086885][ T3498] [ 54.097272][ T3498] [ 54.097272][ T3498] the existing dependency chain (in reverse order) is: [ 54.106270][ T3498] [ 54.106270][ T3498] -> #1 (&stab->lock){+...}-{2:2}: [ 54.113575][ T3498] lock_acquire+0x1db/0x4f0 [ 54.118593][ T3498] _raw_spin_lock_bh+0x31/0x40 [ 54.123869][ T3498] sock_map_delete_elem+0x161/0x230 [ 54.129580][ T3498] bpf_prog_330576d32f01b34b+0x5b/0x718 [ 54.135636][ T3498] bpf_trace_run2+0x19e/0x340 [ 54.140826][ T3498] __bpf_trace_kfree+0x6e/0x90 [ 54.146101][ T3498] kfree+0x22f/0x270 [ 54.150507][ T3498] sock_map_unref+0x3ac/0x5d0 [ 54.155696][ T3498] sock_hash_update_common+0x911/0xa30 [ 54.161665][ T3498] sock_map_update_elem_sys+0x485/0x770 [ 54.167721][ T3498] map_update_elem+0x6a0/0x7c0 [ 54.173083][ T3498] __sys_bpf+0x2fd/0x670 [ 54.177836][ T3498] __x64_sys_bpf+0x78/0x90 [ 54.182766][ T3498] do_syscall_64+0x3b/0xb0 [ 54.187702][ T3498] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.194110][ T3498] [ 54.194110][ T3498] -> #0 (&psock->link_lock){+...}-{2:2}: [ 54.201960][ T3498] validate_chain+0x1649/0x5930 [ 54.207355][ T3498] __lock_acquire+0x1295/0x1ff0 [ 54.212738][ T3498] lock_acquire+0x1db/0x4f0 [ 54.217758][ T3498] _raw_spin_lock_bh+0x31/0x40 [ 54.223042][ T3498] sock_map_update_common+0x31c/0x5b0 [ 54.228933][ T3498] sock_map_update_elem_sys+0x440/0x770 [ 54.235089][ T3498] map_update_elem+0x6a0/0x7c0 [ 54.240387][ T3498] __sys_bpf+0x2fd/0x670 [ 54.245268][ T3498] __x64_sys_bpf+0x78/0x90 [ 54.250219][ T3498] do_syscall_64+0x3b/0xb0 [ 54.255180][ T3498] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.261591][ T3498] [ 54.261591][ T3498] other info that might help us debug this: [ 54.261591][ T3498] [ 54.271815][ T3498] Possible unsafe locking scenario: [ 54.271815][ T3498] [ 54.279266][ T3498] CPU0 CPU1 [ 54.285416][ T3498] ---- ---- [ 54.290856][ T3498] lock(&stab->lock); [ 54.295099][ T3498] lock(&psock->link_lock); [ 54.302206][ T3498] lock(&stab->lock); [ 54.308793][ T3498] lock(&psock->link_lock); [ 54.313390][ T3498] [ 54.313390][ T3498] *** DEADLOCK *** [ 54.313390][ T3498] [ 54.321549][ T3498] 3 locks held by syz-executor232/3498: [ 54.327085][ T3498] #0: ffff88801da61920 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sock_map_update_elem_sys+0x1c8/0x770 [ 54.337544][ T3498] #1: ffffffff8c91fae0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 [ 54.346854][ T3498] #2: ffff88801f6575c0 (&stab->lock){+...}-{2:2}, at: sock_map_update_common+0x1b6/0x5b0 [ 54.356950][ T3498] [ 54.356950][ T3498] stack backtrace: [ 54.362937][ T3498] CPU: 1 PID: 3498 Comm: syz-executor232 Not tainted 5.15.158-syzkaller #0 [ 54.371637][ T3498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 54.381693][ T3498] Call Trace: [ 54.384968][ T3498] [ 54.387895][ T3498] dump_stack_lvl+0x1e3/0x2d0 [ 54.392588][ T3498] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 54.398236][ T3498] ? print_circular_bug+0x12b/0x1a0 [ 54.403448][ T3498] check_noncircular+0x2f8/0x3b0 [ 54.408388][ T3498] ? add_chain_block+0x850/0x850 [ 54.413373][ T3498] ? lockdep_lock+0x11f/0x2a0 [ 54.418068][ T3498] validate_chain+0x1649/0x5930 [ 54.422978][ T3498] ? reacquire_held_locks+0x660/0x660 [ 54.428357][ T3498] ? mark_lock+0x29b/0x340 [ 54.432774][ T3498] ? look_up_lock_class+0x77/0x120 [ 54.437887][ T3498] ? register_lock_class+0x100/0x9a0 [ 54.443336][ T3498] ? is_dynamic_key+0x1f0/0x1f0 [ 54.448195][ T3498] ? mark_lock+0x98/0x340 [ 54.452531][ T3498] __lock_acquire+0x1295/0x1ff0 [ 54.457400][ T3498] lock_acquire+0x1db/0x4f0 [ 54.461911][ T3498] ? sock_map_update_common+0x31c/0x5b0 [ 54.467480][ T3498] ? _local_bh_enable+0xa0/0xa0 [ 54.472434][ T3498] ? read_lock_is_recursive+0x10/0x10 [ 54.477920][ T3498] ? sock_map_update_common+0x31c/0x5b0 [ 54.483616][ T3498] ? __bpf_trace_softirq+0x10/0x10 [ 54.488731][ T3498] ? __rwlock_init+0x140/0x140 [ 54.493565][ T3498] ? sock_map_update_common+0x31c/0x5b0 [ 54.499128][ T3498] _raw_spin_lock_bh+0x31/0x40 [ 54.503919][ T3498] ? sock_map_update_common+0x31c/0x5b0 [ 54.509476][ T3498] sock_map_update_common+0x31c/0x5b0 [ 54.514844][ T3498] sock_map_update_elem_sys+0x440/0x770 [ 54.520417][ T3498] ? sock_map_prog_detach+0x290/0x290 [ 54.525785][ T3498] map_update_elem+0x6a0/0x7c0 [ 54.530547][ T3498] __sys_bpf+0x2fd/0x670 [ 54.534783][ T3498] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 54.540152][ T3498] ? syscall_enter_from_user_mode+0x2e/0x240 [ 54.546213][ T3498] ? lockdep_hardirqs_on+0x94/0x130 [ 54.551409][ T3498] __x64_sys_bpf+0x78/0x90 [ 54.555976][ T3498] do_syscall_64+0x3b/0xb0 [ 54.560461][ T3498] ? clear_bhb_loop+0x15/0x70 [ 54.565922][ T3498] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.571813][ T3498] RIP: 0033:0x7f9a3d891b69 [ 54.576229][ T3498] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.595916][ T3498] RSP: 002b:00007ffc3226fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.604328][ T3498] RAX: ffffffffffffffda RBX: 00007ffc3226fc58 RCX: 00007f9a3d891b69 [ 54.612873][ T3498] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000002 [ 54.620964][ T3498] RBP: 00007f9a3d905610 R08: 00007ffc3226fc58 R09: 000