./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1277728072 <...> Warning: Permanently added '10.128.1.150' (ED25519) to the list of known hosts. execve("./syz-executor1277728072", ["./syz-executor1277728072"], 0x7ffc384b72d0 /* 10 vars */) = 0 brk(NULL) = 0x555582954000 brk(0x555582954d00) = 0x555582954d00 arch_prctl(ARCH_SET_FS, 0x555582954380) = 0 set_tid_address(0x555582954650) = 5067 set_robust_list(0x555582954660, 24) = 0 rseq(0x555582954ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1277728072", 4096) = 28 getrandom("\x50\x0c\x7d\xa6\x8f\xf7\x83\xfd", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555582954d00 brk(0x555582975d00) = 0x555582975d00 brk(0x555582976000) = 0x555582976000 mprotect(0x7fea7dec2000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5068 attached [pid 5068] set_robust_list(0x555582954660, 24) = 0 [pid 5067] <... clone resumed>, child_tidptr=0x555582954650) = 5068 [pid 5068] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5068] setpgid(0, 0) = 0 [pid 5068] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5068] write(3, "1000", 4) = 4 [pid 5068] close(3) = 0 [pid 5068] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=2, max_entries=4, map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE, inner_map_fd=-1, numa_node=0, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 5068] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x20000640, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 5068] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=4}}, 16) = 5 [ 64.453570][ T5062] [ 64.455946][ T5062] ====================================================== [ 64.462950][ T5062] WARNING: possible circular locking dependency detected [ 64.469977][ T5062] 6.8.0-syzkaller-05243-g14bb1e8c8d4a #0 Not tainted [ 64.476678][ T5062] ------------------------------------------------------ [ 64.484049][ T5062] sshd/5062 is trying to acquire lock: [ 64.489610][ T5062] ffff8880b9429470 (krc.lock){....}-{2:2}, at: kvfree_call_rcu+0x18a/0x790 [ 64.498256][ T5062] [ 64.498256][ T5062] but task is already holding lock: [ 64.505722][ T5062] ffff88802a58c9f8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x96/0x6a0 [ 64.514712][ T5062] [ 64.514712][ T5062] which lock already depends on the new lock. [ 64.514712][ T5062] [ 64.525131][ T5062] [ 64.525131][ T5062] the existing dependency chain (in reverse order) is: [ 64.534137][ T5062] [ 64.534137][ T5062] -> #2 (&trie->lock){....}-{2:2}: [ 64.541605][ T5062] lock_acquire+0x1e4/0x530 [ 64.546628][ T5062] _raw_spin_lock_irqsave+0xd5/0x120 [ 64.552441][ T5062] trie_delete_elem+0x96/0x6a0 [ 64.557719][ T5062] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 64.563709][ T5062] bpf_trace_run2+0x2ec/0x530 [ 64.568903][ T5062] enqueue_timer+0x396/0x550 [ 64.574027][ T5062] __mod_timer+0xa0e/0xeb0 [ 64.579071][ T5062] sk_reset_timer+0x23/0xc0 [ 64.584283][ T5062] tcp_event_new_data_sent+0x203/0x360 [ 64.590292][ T5062] tcp_write_xmit+0x1468/0x6100 [ 64.596097][ T5062] __tcp_push_pending_frames+0x9b/0x360 [ 64.602175][ T5062] tcp_sendmsg_locked+0x42cc/0x4d00 [ 64.607895][ T5062] tcp_sendmsg+0x30/0x50 [ 64.612734][ T5062] __sock_sendmsg+0x1a6/0x270 [ 64.617917][ T5062] sock_write_iter+0x2dd/0x400 [ 64.623194][ T5062] vfs_write+0xa84/0xcb0 [ 64.627944][ T5062] ksys_write+0x1a0/0x2c0 [ 64.632782][ T5062] do_syscall_64+0xfb/0x240 [ 64.637806][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 64.644318][ T5062] [ 64.644318][ T5062] -> #1 (&base->lock){-.-.}-{2:2}: [ 64.651608][ T5062] lock_acquire+0x1e4/0x530 [ 64.656626][ T5062] _raw_spin_lock_irqsave+0xd5/0x120 [ 64.662601][ T5062] lock_timer_base+0x112/0x240 [ 64.667881][ T5062] __mod_timer+0x1ca/0xeb0 [ 64.672929][ T5062] queue_delayed_work_on+0x15a/0x260 [ 64.678796][ T5062] kvfree_call_rcu+0x47f/0x790 [ 64.684212][ T5062] rtnl_register_internal+0x482/0x590 [ 64.690133][ T5062] rtnl_register+0x36/0x80 [ 64.695159][ T5062] ip_rt_init+0x2f5/0x3a0 [ 64.700028][ T5062] ip_init+0xe/0x20 [ 64.704362][ T5062] inet_init+0x3d8/0x580 [ 64.709159][ T5062] do_one_initcall+0x238/0x830 [ 64.714439][ T5062] do_initcall_level+0x157/0x210 [ 64.719893][ T5062] do_initcalls+0x3f/0x80 [ 64.725452][ T5062] kernel_init_freeable+0x435/0x5d0 [ 64.731185][ T5062] kernel_init+0x1d/0x2a0 [ 64.736047][ T5062] ret_from_fork+0x4b/0x80 [ 64.740986][ T5062] ret_from_fork_asm+0x1a/0x30 [ 64.746282][ T5062] [ 64.746282][ T5062] -> #0 (krc.lock){....}-{2:2}: [ 64.753404][ T5062] validate_chain+0x18cb/0x58e0 [ 64.758767][ T5062] __lock_acquire+0x1346/0x1fd0 [ 64.764126][ T5062] lock_acquire+0x1e4/0x530 [ 64.769310][ T5062] _raw_spin_lock+0x2e/0x40 [ 64.774340][ T5062] kvfree_call_rcu+0x18a/0x790 [ 64.779883][ T5062] trie_delete_elem+0x52c/0x6a0 [ 64.785335][ T5062] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 64.791303][ T5062] bpf_trace_run2+0x2ec/0x530 [ 64.796535][ T5062] enqueue_timer+0x396/0x550 [ 64.801880][ T5062] __mod_timer+0x953/0xeb0 [ 64.806917][ T5062] sk_reset_timer+0x23/0xc0 [ 64.811954][ T5062] tcp_schedule_loss_probe+0x419/0x560 [ 64.818016][ T5062] tcp_write_xmit+0x3682/0x6100 [ 64.823563][ T5062] __tcp_push_pending_frames+0x9b/0x360 [ 64.829707][ T5062] tcp_sendmsg_locked+0x42cc/0x4d00 [ 64.835879][ T5062] tcp_sendmsg+0x30/0x50 [ 64.840807][ T5062] __sock_sendmsg+0x1a6/0x270 [ 64.846108][ T5062] sock_write_iter+0x2dd/0x400 [ 64.851672][ T5062] vfs_write+0xa84/0xcb0 [ 64.856534][ T5062] ksys_write+0x1a0/0x2c0 [ 64.861386][ T5062] do_syscall_64+0xfb/0x240 [ 64.866412][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 64.872936][ T5062] [ 64.872936][ T5062] other info that might help us debug this: [ 64.872936][ T5062] [ 64.883242][ T5062] Chain exists of: [ 64.883242][ T5062] krc.lock --> &base->lock --> &trie->lock [ 64.883242][ T5062] [ 64.894969][ T5062] Possible unsafe locking scenario: [ 64.894969][ T5062] [ 64.902515][ T5062] CPU0 CPU1 [ 64.907955][ T5062] ---- ---- [ 64.913563][ T5062] lock(&trie->lock); [ 64.917714][ T5062] lock(&base->lock); [ 64.924550][ T5062] lock(&trie->lock); [ 64.931213][ T5062] lock(krc.lock); [ 64.935009][ T5062] [ 64.935009][ T5062] *** DEADLOCK *** [ 64.935009][ T5062] [ 64.943135][ T5062] 4 locks held by sshd/5062: [ 64.947987][ T5062] #0: ffff88807b3d1ad8 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50 [ 64.957232][ T5062] #1: ffff8880b942a758 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240 [ 64.967522][ T5062] #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x1fc/0x530 [ 64.977031][ T5062] #3: ffff88802a58c9f8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x96/0x6a0 [ 64.986655][ T5062] [ 64.986655][ T5062] stack backtrace: [ 64.992551][ T5062] CPU: 0 PID: 5062 Comm: sshd Not tainted 6.8.0-syzkaller-05243-g14bb1e8c8d4a #0 [ 65.001840][ T5062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 65.011887][ T5062] Call Trace: [ 65.015235][ T5062] [ 65.018168][ T5062] dump_stack_lvl+0x1e7/0x2e0 [ 65.022942][ T5062] ? __pfx_dump_stack_lvl+0x10/0x10 [ 65.028175][ T5062] ? print_circular_bug+0x130/0x1a0 [ 65.033393][ T5062] check_noncircular+0x36a/0x4a0 [ 65.038437][ T5062] ? __pfx_check_noncircular+0x10/0x10 [ 65.043906][ T5062] ? lockdep_lock+0x123/0x2b0 [ 65.048578][ T5062] ? mark_lock+0x9a/0x350 [ 65.052897][ T5062] ? _find_first_zero_bit+0xd4/0x100 [ 65.058177][ T5062] validate_chain+0x18cb/0x58e0 [ 65.063028][ T5062] ? __pfx_validate_chain+0x10/0x10 [ 65.068218][ T5062] ? stack_depot_save_flags+0x37d/0x860 [ 65.073753][ T5062] ? do_raw_spin_lock+0x14f/0x370 [ 65.078769][ T5062] ? __pfx_lock_release+0x10/0x10 [ 65.083783][ T5062] ? do_raw_spin_unlock+0x13c/0x8b0 [ 65.088975][ T5062] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 65.094859][ T5062] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 65.101173][ T5062] ? stack_trace_save+0x118/0x1d0 [ 65.106194][ T5062] ? mark_lock+0x9a/0x350 [ 65.110512][ T5062] __lock_acquire+0x1346/0x1fd0 [ 65.115449][ T5062] lock_acquire+0x1e4/0x530 [ 65.120048][ T5062] ? kvfree_call_rcu+0x18a/0x790 [ 65.124980][ T5062] ? __pfx_lock_acquire+0x10/0x10 [ 65.130143][ T5062] ? __phys_addr+0xba/0x170 [ 65.134643][ T5062] _raw_spin_lock+0x2e/0x40 [ 65.139541][ T5062] ? kvfree_call_rcu+0x18a/0x790 [ 65.144564][ T5062] kvfree_call_rcu+0x18a/0x790 [ 65.149435][ T5062] ? _raw_spin_lock_irqsave+0xe1/0x120 [ 65.155009][ T5062] ? __pfx_kvfree_call_rcu+0x10/0x10 [ 65.160652][ T5062] ? longest_prefix_match+0x4bf/0x670 [ 65.166109][ T5062] trie_delete_elem+0x52c/0x6a0 [ 65.171053][ T5062] ? bpf_trace_run2+0x1fc/0x530 [ 65.175898][ T5062] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 65.181350][ T5062] bpf_trace_run2+0x2ec/0x530 [ 65.186019][ T5062] ? __pfx_bpf_trace_run2+0x10/0x10 [ 65.191299][ T5062] ? __pfx_debug_object_activate+0x10/0x10 [ 65.197194][ T5062] enqueue_timer+0x396/0x550 [ 65.202053][ T5062] __mod_timer+0x953/0xeb0 [ 65.206835][ T5062] ? __pfx___mod_timer+0x10/0x10 [ 65.211768][ T5062] ? __asan_memset+0x23/0x50 [ 65.216348][ T5062] sk_reset_timer+0x23/0xc0 [ 65.220846][ T5062] tcp_schedule_loss_probe+0x419/0x560 [ 65.226296][ T5062] tcp_write_xmit+0x3682/0x6100 [ 65.231153][ T5062] __tcp_push_pending_frames+0x9b/0x360 [ 65.236740][ T5062] tcp_sendmsg_locked+0x42cc/0x4d00 [ 65.241942][ T5062] ? __pfx_tcp_sendmsg_locked+0x10/0x10 [ 65.247489][ T5062] ? __local_bh_enable_ip+0x168/0x200 [ 65.252940][ T5062] ? do_raw_spin_unlock+0x13c/0x8b0 [ 65.258487][ T5062] tcp_sendmsg+0x30/0x50 [ 65.262820][ T5062] __sock_sendmsg+0x1a6/0x270 [ 65.267486][ T5062] sock_write_iter+0x2dd/0x400 [ 65.272254][ T5062] ? __pfx_sock_write_iter+0x10/0x10 [ 65.277544][ T5062] ? bpf_lsm_file_permission+0x9/0x10 [ 65.282991][ T5062] ? security_file_permission+0x7f/0xa0 [ 65.288535][ T5062] vfs_write+0xa84/0xcb0 [ 65.292983][ T5062] ? __pfx_vfs_write+0x10/0x10 [ 65.297760][ T5062] ? __set_current_blocked+0x310/0x380 [ 65.303917][ T5062] ? __might_fault+0xc6/0x120 [ 65.308682][ T5062] ? __fdget_pos+0x1a2/0x320 [ 65.313529][ T5062] ksys_write+0x1a0/0x2c0 [ 65.318025][ T5062] ? __pfx_ksys_write+0x10/0x10 [ 65.322865][ T5062] ? do_syscall_64+0x10a/0x240 [ 65.327819][ T5062] ? do_syscall_64+0xb6/0x240 [ 65.332569][ T5062] do_syscall_64+0xfb/0x240 [ 65.337152][ T5062] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 65.343230][ T5062] RIP: 0033:0x7f8ac3716bf2 [ 65.347636][ T5062] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83 [ 65.368561][ T5062] RSP: 002b:00007ffe300ad6a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 65.377250][ T5062] RAX: ffffffffffffffda RBX: 000000000000008c RCX: 00007f8ac3716bf2 [ 65.385481][ T5062] RDX: 000000000000008c RSI: 000055c7662f0960 RDI: 0000000000000004 [ 65.393631][ T5062] RBP: 000055c7662fe220 R08: 0000000000000000 R09: 0000000000000000 [ 65.401687][ T5062] R10: 0000000000000000 R11: 0000000000000246 R12: 000055c74c925aa4 [ 65.410011][ T5062] R13: 0000000000000040 R14: 000055c74c9263e8 R15: 00007ffe300ad718 [ 65.417980][ T5062]