./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1656859975 <...> Warning: Permanently added '10.128.1.105' (ED25519) to the list of known hosts. execve("./syz-executor1656859975", ["./syz-executor1656859975"], 0x7ffc7ae9cac0 /* 10 vars */) = 0 brk(NULL) = 0x55557f8c1000 brk(0x55557f8c1d00) = 0x55557f8c1d00 arch_prctl(ARCH_SET_FS, 0x55557f8c1380) = 0 set_tid_address(0x55557f8c1650) = 5086 set_robust_list(0x55557f8c1660, 24) = 0 rseq(0x55557f8c1ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1656859975", 4096) = 28 getrandom("\x52\x87\x7f\xa8\xec\x37\xe5\xcd", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557f8c1d00 brk(0x55557f8e2d00) = 0x55557f8e2d00 brk(0x55557f8e3000) = 0x55557f8e3000 mprotect(0x7faaad4d4000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_SOCKHASH, key_size=1, value_size=8, max_entries=12, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=13, insns=0x20000280, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="kfree", prog_fd=4}}, 16) = 5 perf_event_open({type=PERF_TYPE_TRACEPOINT, size=PERF_ATTR_SIZE_VER7, config=509, sample_period=0, sample_type=0, read_format=0, precise_ip=0 /* arbitrary skid */, ...}, 0, 0, -1, 0) = 6 socketpair(AF_UNIX, SOCK_STREAM, 0, [7, 8]) = 0 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_SOCKHASH, key_size=2, value_size=4, max_entries=2, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 9 bpf(BPF_MAP_UPDATE_ELEM, {map_fd=9, key=0x20000580, value=0x200005c0, flags=BPF_ANY}, 32) = 0 [ 73.198286][ T5086] [ 73.200662][ T5086] ============================================ [ 73.206890][ T5086] WARNING: possible recursive locking detected [ 73.213115][ T5086] 6.9.0-rc5-syzkaller-01502-gfcd1ed89a043 #0 Not tainted [ 73.220127][ T5086] -------------------------------------------- [ 73.226274][ T5086] syz-executor165/5086 is trying to acquire lock: [ 73.232677][ T5086] ffff8880787c9338 (&htab->buckets[i].lock){+...}-{2:2}, at: sock_hash_delete_elem+0x17c/0x400 [ 73.243069][ T5086] [ 73.243069][ T5086] but task is already holding lock: [ 73.250424][ T5086] ffff88802e861168 (&htab->buckets[i].lock){+...}-{2:2}, at: sock_hash_delete_elem+0x17c/0x400 [ 73.260777][ T5086] [ 73.260777][ T5086] other info that might help us debug this: [ 73.268824][ T5086] Possible unsafe locking scenario: [ 73.268824][ T5086] [ 73.276275][ T5086] CPU0 [ 73.279545][ T5086] ---- [ 73.282815][ T5086] lock(&htab->buckets[i].lock); [ 73.287855][ T5086] lock(&htab->buckets[i].lock); [ 73.292871][ T5086] [ 73.292871][ T5086] *** DEADLOCK *** [ 73.292871][ T5086] [ 73.301001][ T5086] May be due to missing lock nesting notation [ 73.301001][ T5086] [ 73.309305][ T5086] 4 locks held by syz-executor165/5086: [ 73.315445][ T5086] #0: ffffffff8e334e20 (rcu_read_lock){....}-{1:2}, at: map_delete_elem+0x388/0x5e0 [ 73.324934][ T5086] #1: ffff88802e861168 (&htab->buckets[i].lock){+...}-{2:2}, at: sock_hash_delete_elem+0x17c/0x400 [ 73.335725][ T5086] #2: ffff8880787cd2b0 (&psock->link_lock){+...}-{2:2}, at: sock_map_unref+0xcc/0x5e0 [ 73.345412][ T5086] #3: ffffffff8e334e20 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x1fc/0x540 [ 73.354819][ T5086] [ 73.354819][ T5086] stack backtrace: [ 73.360700][ T5086] CPU: 1 PID: 5086 Comm: syz-executor165 Not tainted 6.9.0-rc5-syzkaller-01502-gfcd1ed89a043 #0 [ 73.371114][ T5086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 73.381171][ T5086] Call Trace: [ 73.384453][ T5086] [ 73.387381][ T5086] dump_stack_lvl+0x241/0x360 [ 73.392075][ T5086] ? __pfx_dump_stack_lvl+0x10/0x10 [ 73.397285][ T5086] ? print_deadlock_bug+0x479/0x620 [ 73.402484][ T5086] ? _find_first_zero_bit+0xd4/0x100 [ 73.407790][ T5086] validate_chain+0x15c1/0x58e0 [ 73.412678][ T5086] ? __pfx_validate_chain+0x10/0x10 [ 73.417886][ T5086] ? check_path+0x21/0x40 [ 73.422219][ T5086] ? check_noncircular+0x259/0x4a0 [ 73.427334][ T5086] ? __pfx_validate_chain+0x10/0x10 [ 73.432550][ T5086] ? __pfx_check_noncircular+0x10/0x10 [ 73.438010][ T5086] ? __pfx_lockdep_unlock+0x10/0x10 [ 73.443204][ T5086] ? __pfx_validate_chain+0x10/0x10 [ 73.448399][ T5086] ? validate_chain+0x15a2/0x58e0 [ 73.453439][ T5086] ? mark_lock+0x9a/0x350 [ 73.457770][ T5086] ? mark_lock+0x9a/0x350 [ 73.462098][ T5086] __lock_acquire+0x1346/0x1fd0 [ 73.466953][ T5086] lock_acquire+0x1ed/0x550 [ 73.471465][ T5086] ? sock_hash_delete_elem+0x17c/0x400 [ 73.476926][ T5086] ? __pfx_lock_acquire+0x10/0x10 [ 73.481944][ T5086] ? sock_hash_delete_elem+0x17c/0x400 [ 73.487420][ T5086] ? __pfx___local_bh_disable_ip+0x10/0x10 [ 73.493226][ T5086] ? sock_hash_delete_elem+0x17c/0x400 [ 73.498689][ T5086] _raw_spin_lock_bh+0x35/0x50 [ 73.503453][ T5086] ? sock_hash_delete_elem+0x17c/0x400 [ 73.508905][ T5086] sock_hash_delete_elem+0x17c/0x400 [ 73.514188][ T5086] ? __pfx_sock_hash_delete_elem+0x10/0x10 [ 73.520007][ T5086] ? bpf_trace_run2+0x1fc/0x540 [ 73.524857][ T5086] bpf_prog_967a36a528e40c40+0x47/0x4b [ 73.530306][ T5086] bpf_trace_run2+0x2ec/0x540 [ 73.534987][ T5086] ? __pfx_bpf_trace_run2+0x10/0x10 [ 73.540184][ T5086] ? do_raw_spin_lock+0x14f/0x370 [ 73.545206][ T5086] ? __pfx___local_bh_disable_ip+0x10/0x10 [ 73.551106][ T5086] ? sock_map_unref+0x3ac/0x5e0 [ 73.555953][ T5086] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 73.561330][ T5086] ? sock_map_unref+0x3ac/0x5e0 [ 73.566176][ T5086] kfree+0x2af/0x3a0 [ 73.570105][ T5086] sock_map_unref+0x3ac/0x5e0 [ 73.574783][ T5086] sock_hash_delete_elem+0x392/0x400 [ 73.580092][ T5086] ? __pfx_sock_hash_delete_elem+0x10/0x10 [ 73.585900][ T5086] map_delete_elem+0x464/0x5e0 [ 73.590668][ T5086] __sys_bpf+0x598/0x810 [ 73.594909][ T5086] ? __pfx___sys_bpf+0x10/0x10 [ 73.599676][ T5086] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 73.605998][ T5086] ? do_syscall_64+0x102/0x240 [ 73.610763][ T5086] __x64_sys_bpf+0x7c/0x90 [ 73.615187][ T5086] do_syscall_64+0xf5/0x240 [ 73.619688][ T5086] ? clear_bhb_loop+0x35/0x90 [ 73.624372][ T5086] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.630257][ T5086] RIP: 0033:0x7faaad461829 [ 73.634666][ T5086] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 73.654263][ T5086] RSP: 002b:00007ffe9f8e45d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.662670][ T5086] RAX: ffffffffffffffda RBX: 00007ffe9f8e47a8 RCX: 00007faaad461829 [ 73.670634][ T5086] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000003 [ 73.678754][ T5086] RBP: 00007faaad4d4610 R08: 00007ffe9f8e47a8 R09: 00007ffe9f8e47a8 [ 73.686736][ T5086] R10: 00007ffe9f8e47a8 R11: 0000000000000246 R12: 0000000000000001 bpf(BPF_MAP_DELETE_ELEM, {map_fd=9, key=0x20000040}, 32) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 73.694707][ T5086] R13: 00007ffe9f8e4798 R14: 0000000000000001 R15: 0000000000000001 [ 73.702704][ T5086]