./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1430595273 <...> Warning: Permanently added '10.128.1.45' (ED25519) to the list of known hosts. execve("./syz-executor1430595273", ["./syz-executor1430595273"], 0x7fffd96cce70 /* 10 vars */) = 0 brk(NULL) = 0x55557b2dd000 brk(0x55557b2ddd00) = 0x55557b2ddd00 arch_prctl(ARCH_SET_FS, 0x55557b2dd380) = 0 set_tid_address(0x55557b2dd650) = 5235 set_robust_list(0x55557b2dd660, 24) = 0 rseq(0x55557b2ddca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1430595273", 4096) = 28 getrandom("\x36\xdf\x49\x91\xe2\x9a\x3e\x9a", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557b2ddd00 brk(0x55557b2fed00) = 0x55557b2fed00 brk(0x55557b2ff000) = 0x55557b2ff000 mprotect(0x7f7dda214000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5236 attached [pid 5236] set_robust_list(0x55557b2dd660, 24 [pid 5235] <... clone resumed>, child_tidptr=0x55557b2dd650) = 5236 [pid 5236] <... set_robust_list resumed>) = 0 [pid 5236] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5236] setpgid(0, 0) = 0 [pid 5236] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5236] write(3, "1000", 4) = 4 [pid 5236] close(3) = 0 [pid 5236] write(1, "executing program\n", 18executing program ) = 18 [pid 5236] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x20000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=4294966948, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 5236] socketpair(AF_TIPC, SOCK_DGRAM, 0, [3, 4]) = 0 [pid 5236] close(3) = 0 [pid 5236] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=7, value_size=65537, max_entries=8, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 5236] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x20000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 5236] close(3) = 0 [pid 5236] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=7, value_size=3983, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 5236] bpf(BPF_MAP_UPDATE_ELEM, {map_fd=3, key=0x20000340, value=0x20000200, flags=BPF_ANY}, 32) = 0 [pid 5236] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x20000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 5 [pid 5236] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=5}}, 16) = 6 [ 76.545399][ T5230] [ 76.547973][ T5230] ====================================================== [ 76.555186][ T5230] WARNING: possible circular locking dependency detected [ 76.562856][ T5230] 6.11.0-rc5-syzkaller-00154-g9b0874286768 #0 Not tainted [ 76.570226][ T5230] ------------------------------------------------------ [ 76.577476][ T5230] sshd/5230 is trying to acquire lock: [ 76.583515][ T5230] ffff8880b8829430 (krc.lock){....}-{2:2}, at: kvfree_call_rcu+0x18a/0x790 [ 76.592210][ T5230] [ 76.592210][ T5230] but task is already holding lock: [ 76.599601][ T5230] ffff8880b882a718 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240 [ 76.608581][ T5230] [ 76.608581][ T5230] which lock already depends on the new lock. [ 76.608581][ T5230] [ 76.619071][ T5230] [ 76.619071][ T5230] the existing dependency chain (in reverse order) is: [ 76.628088][ T5230] [ 76.628088][ T5230] -> #1 (&base->lock){-.-.}-{2:2}: [ 76.635598][ T5230] lock_acquire+0x1ed/0x550 [ 76.640635][ T5230] _raw_spin_lock_irqsave+0xd5/0x120 [ 76.646461][ T5230] lock_timer_base+0x112/0x240 [ 76.651758][ T5230] __mod_timer+0x1ca/0xeb0 [ 76.656790][ T5230] queue_delayed_work_on+0x1ca/0x390 [ 76.662727][ T5230] kvfree_call_rcu+0x47f/0x790 [ 76.668200][ T5230] pwq_release_workfn+0x6d1/0x860 [ 76.673757][ T5230] kthread_worker_fn+0x500/0xaf0 [ 76.679327][ T5230] kthread+0x2f0/0x390 [ 76.683959][ T5230] ret_from_fork+0x4b/0x80 [ 76.689084][ T5230] ret_from_fork_asm+0x1a/0x30 [ 76.694383][ T5230] [ 76.694383][ T5230] -> #0 (krc.lock){....}-{2:2}: [ 76.701442][ T5230] validate_chain+0x18e0/0x5900 [ 76.707033][ T5230] __lock_acquire+0x137a/0x2040 [ 76.712599][ T5230] lock_acquire+0x1ed/0x550 [ 76.717722][ T5230] _raw_spin_lock+0x2e/0x40 [ 76.722758][ T5230] kvfree_call_rcu+0x18a/0x790 [ 76.728057][ T5230] trie_delete_elem+0x546/0x6a0 [ 76.733440][ T5230] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 76.739451][ T5230] bpf_trace_run2+0x2ec/0x540 [ 76.744659][ T5230] enqueue_timer+0x3ce/0x570 [ 76.749887][ T5230] __mod_timer+0x953/0xeb0 [ 76.755018][ T5230] sk_reset_timer+0x23/0xc0 [ 76.760228][ T5230] tcp_event_new_data_sent+0x203/0x360 [ 76.766398][ T5230] tcp_write_xmit+0x18dc/0x6a10 [ 76.771889][ T5230] __tcp_push_pending_frames+0x9b/0x360 [ 76.778224][ T5230] tcp_sendmsg_locked+0x43b1/0x4e10 [ 76.783953][ T5230] tcp_sendmsg+0x30/0x50 [ 76.788834][ T5230] __sock_sendmsg+0x1a6/0x270 [ 76.794065][ T5230] sock_write_iter+0x2dd/0x400 [ 76.799493][ T5230] vfs_write+0xa72/0xc90 [ 76.804289][ T5230] ksys_write+0x1a0/0x2c0 [ 76.809258][ T5230] do_syscall_64+0xf3/0x230 [ 76.814351][ T5230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 76.820879][ T5230] [ 76.820879][ T5230] other info that might help us debug this: [ 76.820879][ T5230] [ 76.831165][ T5230] Possible unsafe locking scenario: [ 76.831165][ T5230] [ 76.838632][ T5230] CPU0 CPU1 [ 76.844172][ T5230] ---- ---- [ 76.849624][ T5230] lock(&base->lock); [ 76.854142][ T5230] lock(krc.lock); [ 76.860828][ T5230] lock(&base->lock); [ 76.867441][ T5230] lock(krc.lock); [ 76.871252][ T5230] [ 76.871252][ T5230] *** DEADLOCK *** [ 76.871252][ T5230] [ 76.879388][ T5230] 3 locks held by sshd/5230: [ 76.883989][ T5230] #0: ffff88806665b358 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50 [ 76.893323][ T5230] #1: ffff8880b882a718 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240 [ 76.902871][ T5230] #2: ffffffff8e938320 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x1fc/0x540 [ 76.912479][ T5230] [ 76.912479][ T5230] stack backtrace: [ 76.918764][ T5230] CPU: 0 UID: 0 PID: 5230 Comm: sshd Not tainted 6.11.0-rc5-syzkaller-00154-g9b0874286768 #0 [ 76.929016][ T5230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 76.939078][ T5230] Call Trace: [ 76.942362][ T5230] [ 76.945405][ T5230] dump_stack_lvl+0x241/0x360 [ 76.950189][ T5230] ? __pfx_dump_stack_lvl+0x10/0x10 [ 76.955398][ T5230] ? print_circular_bug+0x130/0x1a0 [ 76.960614][ T5230] check_noncircular+0x36a/0x4a0 [ 76.965562][ T5230] ? __pfx_check_noncircular+0x10/0x10 [ 76.971024][ T5230] ? lockdep_lock+0x123/0x2b0 [ 76.975711][ T5230] ? mark_lock+0x9a/0x350 [ 76.980054][ T5230] validate_chain+0x18e0/0x5900 [ 76.985007][ T5230] ? __pfx_validate_chain+0x10/0x10 [ 76.990211][ T5230] ? stack_depot_save_flags+0x6e4/0x830 [ 76.995791][ T5230] ? do_raw_spin_lock+0x14f/0x370 [ 77.000843][ T5230] ? __pfx_lock_release+0x10/0x10 [ 77.005971][ T5230] ? do_raw_spin_unlock+0x13c/0x8b0 [ 77.011355][ T5230] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 77.017267][ T5230] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 77.023624][ T5230] ? stack_trace_save+0x118/0x1d0 [ 77.028685][ T5230] ? mark_lock+0x9a/0x350 [ 77.033058][ T5230] __lock_acquire+0x137a/0x2040 [ 77.037948][ T5230] lock_acquire+0x1ed/0x550 [ 77.042551][ T5230] ? kvfree_call_rcu+0x18a/0x790 [ 77.047504][ T5230] ? __pfx_lock_acquire+0x10/0x10 [ 77.052551][ T5230] ? __phys_addr+0xba/0x170 [ 77.057059][ T5230] _raw_spin_lock+0x2e/0x40 [ 77.061573][ T5230] ? kvfree_call_rcu+0x18a/0x790 [ 77.066521][ T5230] kvfree_call_rcu+0x18a/0x790 [ 77.071299][ T5230] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 77.077294][ T5230] ? __pfx_kvfree_call_rcu+0x10/0x10 [ 77.082592][ T5230] ? longest_prefix_match+0x49f/0x650 [ 77.087978][ T5230] trie_delete_elem+0x546/0x6a0 [ 77.092868][ T5230] ? bpf_trace_run2+0x1fc/0x540 [ 77.097920][ T5230] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 77.103402][ T5230] bpf_trace_run2+0x2ec/0x540 [ 77.108097][ T5230] ? __pfx_bpf_trace_run2+0x10/0x10 [ 77.113308][ T5230] ? __pfx_debug_object_activate+0x10/0x10 [ 77.119156][ T5230] ? __tcp_transmit_skb+0x21e8/0x3b30 [ 77.124661][ T5230] enqueue_timer+0x3ce/0x570 [ 77.129269][ T5230] __mod_timer+0x953/0xeb0 [ 77.133721][ T5230] ? __pfx___mod_timer+0x10/0x10 [ 77.138671][ T5230] ? __pfx_seqcount_lockdep_reader_access+0x10/0x10 [ 77.145269][ T5230] ? ktime_get+0x3c/0xb0 [ 77.149556][ T5230] ? __asan_memset+0x23/0x50 [ 77.154206][ T5230] sk_reset_timer+0x23/0xc0 [ 77.158915][ T5230] tcp_event_new_data_sent+0x203/0x360 [ 77.164491][ T5230] tcp_write_xmit+0x18dc/0x6a10 [ 77.169641][ T5230] ? __virt_addr_valid+0x183/0x530 [ 77.175025][ T5230] ? __alloc_skb+0x2d5/0x440 [ 77.179728][ T5230] __tcp_push_pending_frames+0x9b/0x360 [ 77.185469][ T5230] tcp_sendmsg_locked+0x43b1/0x4e10 [ 77.190809][ T5230] ? __pfx_tcp_sendmsg_locked+0x10/0x10 [ 77.196571][ T5230] ? __local_bh_enable_ip+0x168/0x200 [ 77.202054][ T5230] ? do_raw_spin_unlock+0x13c/0x8b0 [ 77.207296][ T5230] tcp_sendmsg+0x30/0x50 [ 77.211600][ T5230] __sock_sendmsg+0x1a6/0x270 [ 77.216300][ T5230] sock_write_iter+0x2dd/0x400 [ 77.221173][ T5230] ? __pfx_sock_write_iter+0x10/0x10 [ 77.226663][ T5230] ? bpf_lsm_file_permission+0x9/0x10 [ 77.232069][ T5230] ? security_file_permission+0x7f/0xa0 [ 77.237735][ T5230] vfs_write+0xa72/0xc90 [ 77.241992][ T5230] ? __pfx_sock_write_iter+0x10/0x10 [ 77.247386][ T5230] ? __pfx_vfs_write+0x10/0x10 [ 77.252177][ T5230] ? __set_current_blocked+0x310/0x380 [ 77.257739][ T5230] ? __might_fault+0xc6/0x120 [ 77.262458][ T5230] ksys_write+0x1a0/0x2c0 [ 77.266799][ T5230] ? __pfx_ksys_write+0x10/0x10 [ 77.271660][ T5230] ? do_syscall_64+0x100/0x230 [ 77.276434][ T5230] ? do_syscall_64+0xb6/0x230 [ 77.281377][ T5230] do_syscall_64+0xf3/0x230 [ 77.285979][ T5230] ? clear_bhb_loop+0x35/0x90 [ 77.290754][ T5230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.296932][ T5230] RIP: 0033:0x7faa99516bf2 [ 77.301444][ T5230] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83 [ 77.321235][ T5230] RSP: 002b:00007ffe707c3688 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 77.329683][ T5230] RAX: ffffffffffffffda RBX: 000000000000002c RCX: 00007faa99516bf2 [ 77.337657][ T5230] RDX: 000000000000002c RSI: 000055928c879960 RDI: 0000000000000004 [ 77.345629][ T5230] RBP: 000055928c887220 R08: 0000000000000000 R09: 0000000000000000 [ 77.353610][ T5230] R10: 0000000000000000 R11: 0000000000000246 R12: 000055925f972aa4 [ 77.361849][ T5230] R13: 000000000000004c R14: 000055925f9733e8 R15: 00007ffe707c36f8 [ 77.370011][ T5230]