./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3584307702

<...>
Warning: Permanently added '10.128.0.167' (ED25519) to the list of known hosts.
execve("./syz-executor3584307702", ["./syz-executor3584307702"], 0x7ffe738014e0 /* 10 vars */) = 0
brk(NULL)                               = 0x555577de5000
brk(0x555577de5d00)                     = 0x555577de5d00
arch_prctl(ARCH_SET_FS, 0x555577de5380) = 0
set_tid_address(0x555577de5650)         = 5228
set_robust_list(0x555577de5660, 24)     = 0
rseq(0x555577de5ca0, 0x20, 0, 0x53053053) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor3584307702", 4096) = 28
getrandom("\x59\x9f\xd2\x28\x4b\x73\xd2\x80", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x555577de5d00
brk(0x555577e06d00)                     = 0x555577e06d00
brk(0x555577e07000)                     = 0x555577e07000
mprotect(0x7fcd75e32000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5229 attached
, child_tidptr=0x555577de5650) = 5229
[pid  5229] set_robust_list(0x555577de5660, 24) = 0
[pid  5229] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid  5229] setpgid(0, 0)               = 0
[pid  5229] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid  5229] write(3, "1000", 4)         = 4
[pid  5229] close(3)                    = 0
executing program
[pid  5229] write(1, "executing program\n", 18) = 18
[pid  5229] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=7, value_size=65537, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3
[pid  5229] bpf(BPF_MAP_UPDATE_ELEM, {map_fd=3, key=0x20000580, value=0x200005c0, flags=BPF_ANY}, 32) = 0
[pid  5229] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=13, insns=0x200002c0, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4
[pid  5229] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=4}}, 16) = 5
[   54.965629][ T5223] 
[   54.967978][ T5223] ======================================================
[   54.974975][ T5223] WARNING: possible circular locking dependency detected
[   54.981969][ T5223] 6.12.0-rc1-syzkaller-00185-g8ca77b8f6223 #0 Not tainted
[   54.989055][ T5223] ------------------------------------------------------
[   54.996047][ T5223] sshd/5223 is trying to acquire lock:
[   55.001479][ T5223] ffff8880b8729430 (krc.lock){....}-{2:2}, at: kvfree_call_rcu+0x18a/0x790
[   55.010113][ T5223] 
[   55.010113][ T5223] but task is already holding lock:
[   55.017454][ T5223] ffff8880b872a718 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240
[   55.026306][ T5223] 
[   55.026306][ T5223] which lock already depends on the new lock.
[   55.026306][ T5223] 
[   55.036681][ T5223] 
[   55.036681][ T5223] the existing dependency chain (in reverse order) is:
[   55.045670][ T5223] 
[   55.045670][ T5223] -> #1 (&base->lock){-.-.}-{2:2}:
[   55.052966][ T5223]        lock_acquire+0x1ed/0x550
[   55.057975][ T5223]        _raw_spin_lock_irqsave+0xd5/0x120
[   55.063775][ T5223]        lock_timer_base+0x112/0x240
[   55.069038][ T5223]        __mod_timer+0x1ca/0xeb0
[   55.073953][ T5223]        queue_delayed_work_on+0x1ca/0x390
[   55.079742][ T5223]        kvfree_call_rcu+0x47f/0x790
[   55.085007][ T5223]        pwq_release_workfn+0x664/0x800
[   55.090532][ T5223]        kthread_worker_fn+0x500/0xb70
[   55.095970][ T5223]        kthread+0x2f0/0x390
[   55.100535][ T5223]        ret_from_fork+0x4b/0x80
[   55.105452][ T5223]        ret_from_fork_asm+0x1a/0x30
[   55.110715][ T5223] 
[   55.110715][ T5223] -> #0 (krc.lock){....}-{2:2}:
[   55.117729][ T5223]        validate_chain+0x18ef/0x5920
[   55.123078][ T5223]        __lock_acquire+0x1384/0x2050
[   55.128435][ T5223]        lock_acquire+0x1ed/0x550
[   55.133439][ T5223]        _raw_spin_lock+0x2e/0x40
[   55.138440][ T5223]        kvfree_call_rcu+0x18a/0x790
[   55.143704][ T5223]        trie_delete_elem+0x546/0x6a0
[   55.149057][ T5223]        bpf_prog_4febba1e7eaf042b+0x4b/0x54
[   55.155021][ T5223]        bpf_trace_run2+0x2ec/0x540
[   55.160197][ T5223]        enqueue_timer+0x3ce/0x570
[   55.165288][ T5223]        __mod_timer+0x953/0xeb0
[   55.170203][ T5223]        sk_reset_timer+0x23/0xc0
[   55.175206][ T5223]        tcp_event_new_data_sent+0x203/0x360
[   55.181170][ T5223]        tcp_write_xmit+0x17d8/0x6bf0
[   55.186541][ T5223]        __tcp_push_pending_frames+0x9b/0x360
[   55.192589][ T5223]        tcp_sendmsg_locked+0x45f9/0x50a0
[   55.198305][ T5223]        tcp_sendmsg+0x30/0x50
[   55.203045][ T5223]        __sock_sendmsg+0x1a6/0x270
[   55.208226][ T5223]        sock_write_iter+0x2d7/0x3f0
[   55.213491][ T5223]        vfs_write+0xa6d/0xc90
[   55.218231][ T5223]        ksys_write+0x183/0x2b0
[   55.223058][ T5223]        do_syscall_64+0xf3/0x230
[   55.228059][ T5223]        entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   55.234456][ T5223] 
[   55.234456][ T5223] other info that might help us debug this:
[   55.234456][ T5223] 
[   55.244659][ T5223]  Possible unsafe locking scenario:
[   55.244659][ T5223] 
[   55.252098][ T5223]        CPU0                    CPU1
[   55.257437][ T5223]        ----                    ----
[   55.262779][ T5223]   lock(&base->lock);
[   55.266829][ T5223]                                lock(krc.lock);
[   55.273135][ T5223]                                lock(&base->lock);
[   55.279702][ T5223]   lock(krc.lock);
[   55.283489][ T5223] 
[   55.283489][ T5223]  *** DEADLOCK ***
[   55.283489][ T5223] 
[   55.291612][ T5223] 3 locks held by sshd/5223:
[   55.296175][ T5223]  #0: ffff888021741bd8 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50
[   55.305290][ T5223]  #1: ffff8880b872a718 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240
[   55.314580][ T5223]  #2: ffffffff8e937de0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x1fc/0x540
[   55.323952][ T5223] 
[   55.323952][ T5223] stack backtrace:
[   55.329831][ T5223] CPU: 1 UID: 0 PID: 5223 Comm: sshd Not tainted 6.12.0-rc1-syzkaller-00185-g8ca77b8f6223 #0
[   55.339964][ T5223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[   55.350004][ T5223] Call Trace:
[   55.353267][ T5223]  <TASK>
[   55.356179][ T5223]  dump_stack_lvl+0x241/0x360
[   55.360837][ T5223]  ? __pfx_dump_stack_lvl+0x10/0x10
[   55.366017][ T5223]  ? __pfx__printk+0x10/0x10
[   55.370595][ T5223]  print_circular_bug+0x13a/0x1b0
[   55.375601][ T5223]  check_noncircular+0x36a/0x4a0
[   55.380535][ T5223]  ? __pfx_check_noncircular+0x10/0x10
[   55.385974][ T5223]  ? lockdep_lock+0x123/0x2b0
[   55.390635][ T5223]  ? __bfs+0x368/0x6f0
[   55.394679][ T5223]  ? __pfx_validate_chain+0x10/0x10
[   55.399855][ T5223]  ? lockdep_unlock+0x16a/0x300
[   55.404687][ T5223]  validate_chain+0x18ef/0x5920
[   55.409520][ T5223]  ? __pfx_validate_chain+0x10/0x10
[   55.414697][ T5223]  ? mark_lock+0x9a/0x360
[   55.419004][ T5223]  ? __lock_acquire+0x1384/0x2050
[   55.424014][ T5223]  ? mark_lock+0x9a/0x360
[   55.428327][ T5223]  ? mark_lock+0x9a/0x360
[   55.432642][ T5223]  __lock_acquire+0x1384/0x2050
[   55.437479][ T5223]  lock_acquire+0x1ed/0x550
[   55.441966][ T5223]  ? kvfree_call_rcu+0x18a/0x790
[   55.446883][ T5223]  ? __pfx_lock_acquire+0x10/0x10
[   55.451887][ T5223]  ? debug_object_active_state+0x239/0x360
[   55.457687][ T5223]  ? __pfx_debug_object_active_state+0x10/0x10
[   55.463824][ T5223]  ? __virt_addr_valid+0x183/0x530
[   55.468912][ T5223]  ? __virt_addr_valid+0x183/0x530
[   55.474015][ T5223]  ? __virt_addr_valid+0x45f/0x530
[   55.479102][ T5223]  ? __phys_addr+0xba/0x170
[   55.483582][ T5223]  _raw_spin_lock+0x2e/0x40
[   55.488067][ T5223]  ? kvfree_call_rcu+0x18a/0x790
[   55.493001][ T5223]  kvfree_call_rcu+0x18a/0x790
[   55.497756][ T5223]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   55.503635][ T5223]  ? __pfx_kvfree_call_rcu+0x10/0x10
[   55.508903][ T5223]  ? longest_prefix_match+0x49f/0x650
[   55.514262][ T5223]  trie_delete_elem+0x546/0x6a0
[   55.519106][ T5223]  ? bpf_trace_run2+0x1fc/0x540
[   55.523960][ T5223]  bpf_prog_4febba1e7eaf042b+0x4b/0x54
[   55.529404][ T5223]  bpf_trace_run2+0x2ec/0x540
[   55.534067][ T5223]  ? __pfx_bpf_trace_run2+0x10/0x10
[   55.539250][ T5223]  ? __pfx_debug_object_activate+0x10/0x10
[   55.545047][ T5223]  ? __tcp_transmit_skb+0x21e8/0x3b30
[   55.550404][ T5223]  enqueue_timer+0x3ce/0x570
[   55.554978][ T5223]  __mod_timer+0x953/0xeb0
[   55.559383][ T5223]  ? __pfx___mod_timer+0x10/0x10
[   55.564318][ T5223]  ? ktime_get+0x3c/0xb0
[   55.568543][ T5223]  ? tcp_rearm_rto+0x287/0x6b0
[   55.573298][ T5223]  sk_reset_timer+0x23/0xc0
[   55.577786][ T5223]  tcp_event_new_data_sent+0x203/0x360
[   55.583230][ T5223]  tcp_write_xmit+0x17d8/0x6bf0
[   55.588066][ T5223]  ? __alloc_skb+0x2d5/0x440
[   55.592635][ T5223]  ? __virt_addr_valid+0x183/0x530
[   55.597728][ T5223]  __tcp_push_pending_frames+0x9b/0x360
[   55.603256][ T5223]  tcp_sendmsg_locked+0x45f9/0x50a0
[   55.608442][ T5223]  ? __pfx_tcp_sendmsg_locked+0x10/0x10
[   55.613967][ T5223]  ? __local_bh_enable_ip+0x168/0x200
[   55.619325][ T5223]  ? do_raw_spin_unlock+0x13c/0x8b0
[   55.624504][ T5223]  tcp_sendmsg+0x30/0x50
[   55.628726][ T5223]  __sock_sendmsg+0x1a6/0x270
[   55.633386][ T5223]  sock_write_iter+0x2d7/0x3f0
[   55.638146][ T5223]  ? __pfx_sock_write_iter+0x10/0x10
[   55.643414][ T5223]  ? bpf_lsm_file_permission+0x9/0x10
[   55.648779][ T5223]  ? security_file_permission+0x74/0x280
[   55.654394][ T5223]  vfs_write+0xa6d/0xc90
[   55.658620][ T5223]  ? __pfx_sock_write_iter+0x10/0x10
[   55.663886][ T5223]  ? __pfx_vfs_write+0x10/0x10
[   55.668649][ T5223]  ? _copy_to_user+0x86/0xb0
[   55.673219][ T5223]  ? fdget_pos+0x19a/0x320
[   55.677615][ T5223]  ksys_write+0x183/0x2b0
[   55.681924][ T5223]  ? __pfx_ksys_write+0x10/0x10
[   55.686755][ T5223]  ? do_syscall_64+0x100/0x230
[   55.691496][ T5223]  ? do_syscall_64+0xb6/0x230
[   55.696156][ T5223]  do_syscall_64+0xf3/0x230
[   55.700637][ T5223]  ? clear_bhb_loop+0x35/0x90
[   55.705309][ T5223]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   55.711216][ T5223] RIP: 0033:0x7f1087516bf2
[   55.715612][ T5223] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83
[   55.735195][ T5223] RSP: 002b:00007ffe67d79288 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   55.743587][ T5223] RAX: ffffffffffffffda RBX: 000000000000002c RCX: 00007f1087516bf2
[   55.751536][ T5223] RDX: 000000000000002c RSI: 00005651f7105960 RDI: 0000000000000004
[   55.759485][ T5223] RBP: 00005651f7113220 R08: 0000000000000000 R09: 0000000000000000
[   55.767437][ T5223] R10: 0000000000000000 R11: 0000000000000246 R12: 00005651de21daa4
[   55.775386][ T5223] R13: 0000000000000036 R14: 00005651de21e3e8 R15: 00007ffe67d792f8
[   55.783339][ T5223]  </TASK>