./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor488946282 <...> Warning: Permanently added '10.128.0.254' (ED25519) to the list of known hosts. execve("./syz-executor488946282", ["./syz-executor488946282"], 0x7ffc19290150 /* 10 vars */) = 0 brk(NULL) = 0x55558bb18000 brk(0x55558bb18d00) = 0x55558bb18d00 arch_prctl(ARCH_SET_FS, 0x55558bb18380) = 0 set_tid_address(0x55558bb18650) = 5077 set_robust_list(0x55558bb18660, 24) = 0 rseq(0x55558bb18ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor488946282", 4096) = 27 getrandom("\x45\xd1\x1a\x1c\x87\x3c\x01\xc5", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558bb18d00 brk(0x55558bb39d00) = 0x55558bb39d00 brk(0x55558bb3a000) = 0x55558bb3a000 mprotect(0x7fface943000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558bb18650) = 5078 ./strace-static-x86_64: Process 5078 attached [pid 5078] set_robust_list(0x55558bb18660, 24) = 0 [pid 5078] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5078] setpgid(0, 0) = 0 [pid 5078] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5078] write(3, "1000", 4) = 4 [pid 5078] close(3) = 0 [pid 5078] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=8, value_size=65537, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 5078] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x20000740, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 5078] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=4}}, 16) = 5 [ 73.957346][ T5072] [ 73.959741][ T5072] ====================================================== [ 73.966764][ T5072] WARNING: possible circular locking dependency detected [ 73.973787][ T5072] 6.8.0-syzkaller-05271-gf99c5f563c17 #0 Not tainted [ 73.980460][ T5072] ------------------------------------------------------ [ 73.987492][ T5072] sshd/5072 is trying to acquire lock: [ 73.992955][ T5072] ffff8880b9529470 (krc.lock){....}-{2:2}, at: kvfree_call_rcu+0x18a/0x790 [ 74.001608][ T5072] [ 74.001608][ T5072] but task is already holding lock: [ 74.008984][ T5072] ffff888029c761f8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x96/0x6a0 [ 74.017879][ T5072] [ 74.017879][ T5072] which lock already depends on the new lock. [ 74.017879][ T5072] [ 74.028338][ T5072] [ 74.028338][ T5072] the existing dependency chain (in reverse order) is: [ 74.037353][ T5072] [ 74.037353][ T5072] -> #2 (&trie->lock){....}-{2:2}: [ 74.044662][ T5072] lock_acquire+0x1e4/0x530 [ 74.049692][ T5072] _raw_spin_lock_irqsave+0xd5/0x120 [ 74.055526][ T5072] trie_delete_elem+0x96/0x6a0 [ 74.060822][ T5072] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 74.066810][ T5072] bpf_trace_run2+0x204/0x420 [ 74.072033][ T5072] enqueue_timer+0x396/0x550 [ 74.077151][ T5072] __mod_timer+0xa0e/0xeb0 [ 74.082103][ T5072] sk_reset_timer+0x23/0xc0 [ 74.087156][ T5072] tcp_event_new_data_sent+0x203/0x360 [ 74.093159][ T5072] tcp_write_xmit+0x1468/0x6100 [ 74.098540][ T5072] __tcp_push_pending_frames+0x9b/0x360 [ 74.104631][ T5072] tcp_sendmsg_locked+0x42cc/0x4d00 [ 74.110358][ T5072] tcp_sendmsg+0x30/0x50 [ 74.115143][ T5072] __sock_sendmsg+0x1a6/0x270 [ 74.120345][ T5072] sock_write_iter+0x2dd/0x400 [ 74.125640][ T5072] vfs_write+0xa84/0xcb0 [ 74.130435][ T5072] ksys_write+0x1a0/0x2c0 [ 74.135316][ T5072] do_syscall_64+0xfb/0x240 [ 74.140360][ T5072] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 74.146816][ T5072] [ 74.146816][ T5072] -> #1 (&base->lock){-.-.}-{2:2}: [ 74.154158][ T5072] lock_acquire+0x1e4/0x530 [ 74.159205][ T5072] _raw_spin_lock_irqsave+0xd5/0x120 [ 74.165029][ T5072] lock_timer_base+0x112/0x240 [ 74.170329][ T5072] __mod_timer+0x1ca/0xeb0 [ 74.175277][ T5072] queue_delayed_work_on+0x15a/0x260 [ 74.181098][ T5072] kvfree_call_rcu+0x47f/0x790 [ 74.186390][ T5072] rtnl_register_internal+0x482/0x590 [ 74.192286][ T5072] rtnl_register+0x36/0x80 [ 74.197223][ T5072] ip_rt_init+0x2f5/0x3a0 [ 74.202083][ T5072] ip_init+0xe/0x20 [ 74.206419][ T5072] inet_init+0x3d8/0x580 [ 74.211191][ T5072] do_one_initcall+0x238/0x830 [ 74.216488][ T5072] do_initcall_level+0x157/0x210 [ 74.221953][ T5072] do_initcalls+0x3f/0x80 [ 74.226827][ T5072] kernel_init_freeable+0x435/0x5d0 [ 74.232551][ T5072] kernel_init+0x1d/0x2a0 [ 74.237413][ T5072] ret_from_fork+0x4b/0x80 [ 74.242359][ T5072] ret_from_fork_asm+0x1a/0x30 [ 74.247655][ T5072] [ 74.247655][ T5072] -> #0 (krc.lock){....}-{2:2}: [ 74.254709][ T5072] validate_chain+0x18cb/0x58e0 [ 74.260099][ T5072] __lock_acquire+0x1346/0x1fd0 [ 74.265498][ T5072] lock_acquire+0x1e4/0x530 [ 74.270525][ T5072] _raw_spin_lock+0x2e/0x40 [ 74.275566][ T5072] kvfree_call_rcu+0x18a/0x790 [ 74.280856][ T5072] trie_delete_elem+0x52c/0x6a0 [ 74.286238][ T5072] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 74.292223][ T5072] bpf_trace_run2+0x204/0x420 [ 74.297430][ T5072] enqueue_timer+0x396/0x550 [ 74.302549][ T5072] __mod_timer+0x953/0xeb0 [ 74.307498][ T5072] sk_reset_timer+0x23/0xc0 [ 74.312551][ T5072] tcp_schedule_loss_probe+0x419/0x560 [ 74.318542][ T5072] tcp_write_xmit+0x3682/0x6100 [ 74.323943][ T5072] __tcp_push_pending_frames+0x9b/0x360 [ 74.330026][ T5072] tcp_sendmsg_locked+0x42cc/0x4d00 [ 74.335753][ T5072] tcp_sendmsg+0x30/0x50 [ 74.340536][ T5072] __sock_sendmsg+0x1a6/0x270 [ 74.345749][ T5072] sock_write_iter+0x2dd/0x400 [ 74.351050][ T5072] vfs_write+0xa84/0xcb0 [ 74.355827][ T5072] ksys_write+0x1a0/0x2c0 [ 74.360690][ T5072] do_syscall_64+0xfb/0x240 [ 74.365732][ T5072] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 74.372175][ T5072] [ 74.372175][ T5072] other info that might help us debug this: [ 74.372175][ T5072] [ 74.382409][ T5072] Chain exists of: [ 74.382409][ T5072] krc.lock --> &base->lock --> &trie->lock [ 74.382409][ T5072] [ 74.394158][ T5072] Possible unsafe locking scenario: [ 74.394158][ T5072] [ 74.401626][ T5072] CPU0 CPU1 [ 74.407010][ T5072] ---- ---- [ 74.412382][ T5072] lock(&trie->lock); [ 74.416461][ T5072] lock(&base->lock); [ 74.423082][ T5072] lock(&trie->lock); [ 74.429690][ T5072] lock(krc.lock); [ 74.433522][ T5072] [ 74.433522][ T5072] *** DEADLOCK *** [ 74.433522][ T5072] [ 74.441670][ T5072] 4 locks held by sshd/5072: [ 74.446259][ T5072] #0: ffff88802c622718 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50 [ 74.455413][ T5072] #1: ffff8880b952a758 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240 [ 74.464744][ T5072] #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x114/0x420 [ 74.474157][ T5072] #3: ffff888029c761f8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x96/0x6a0 [ 74.483506][ T5072] [ 74.483506][ T5072] stack backtrace: [ 74.489405][ T5072] CPU: 1 PID: 5072 Comm: sshd Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0 [ 74.498519][ T5072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 74.508582][ T5072] Call Trace: [ 74.511880][ T5072] [ 74.514816][ T5072] dump_stack_lvl+0x1e7/0x2e0 [ 74.519512][ T5072] ? __pfx_dump_stack_lvl+0x10/0x10 [ 74.524728][ T5072] ? print_circular_bug+0x130/0x1a0 [ 74.529955][ T5072] check_noncircular+0x36a/0x4a0 [ 74.534938][ T5072] ? __pfx_check_noncircular+0x10/0x10 [ 74.540420][ T5072] ? lockdep_lock+0x123/0x2b0 [ 74.545114][ T5072] ? __virt_addr_valid+0x183/0x520 [ 74.550243][ T5072] ? __pfx_validate_chain+0x10/0x10 [ 74.555454][ T5072] ? _find_first_zero_bit+0xd4/0x100 [ 74.560758][ T5072] validate_chain+0x18cb/0x58e0 [ 74.565631][ T5072] ? __pfx_validate_chain+0x10/0x10 [ 74.570847][ T5072] ? __pfx_validate_chain+0x10/0x10 [ 74.576056][ T5072] ? mark_lock+0x9a/0x350 [ 74.580401][ T5072] ? __lock_acquire+0x1346/0x1fd0 [ 74.585439][ T5072] ? mark_lock+0x9a/0x350 [ 74.589781][ T5072] ? mark_lock+0x9a/0x350 [ 74.594147][ T5072] __lock_acquire+0x1346/0x1fd0 [ 74.599039][ T5072] lock_acquire+0x1e4/0x530 [ 74.603565][ T5072] ? kvfree_call_rcu+0x18a/0x790 [ 74.608526][ T5072] ? __pfx_lock_acquire+0x10/0x10 [ 74.613558][ T5072] ? debug_object_active_state+0x239/0x360 [ 74.619546][ T5072] ? __pfx_debug_object_active_state+0x10/0x10 [ 74.625711][ T5072] ? __virt_addr_valid+0x183/0x520 [ 74.630837][ T5072] ? __virt_addr_valid+0x183/0x520 [ 74.635966][ T5072] ? __virt_addr_valid+0x44e/0x520 [ 74.641097][ T5072] ? __phys_addr+0xba/0x170 [ 74.645624][ T5072] _raw_spin_lock+0x2e/0x40 [ 74.650140][ T5072] ? kvfree_call_rcu+0x18a/0x790 [ 74.655092][ T5072] kvfree_call_rcu+0x18a/0x790 [ 74.659863][ T5072] ? _raw_spin_lock_irqsave+0xe1/0x120 [ 74.665333][ T5072] ? __pfx_kvfree_call_rcu+0x10/0x10 [ 74.670625][ T5072] ? longest_prefix_match+0x33d/0x670 [ 74.676018][ T5072] trie_delete_elem+0x52c/0x6a0 [ 74.680897][ T5072] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 74.686449][ T5072] bpf_trace_run2+0x204/0x420 [ 74.691140][ T5072] ? bpf_trace_run2+0x114/0x420 [ 74.696004][ T5072] ? __pfx_bpf_trace_run2+0x10/0x10 [ 74.701209][ T5072] ? __pfx_debug_object_activate+0x10/0x10 [ 74.707030][ T5072] enqueue_timer+0x396/0x550 [ 74.711632][ T5072] __mod_timer+0x953/0xeb0 [ 74.716075][ T5072] ? __pfx___mod_timer+0x10/0x10 [ 74.721034][ T5072] ? __asan_memset+0x23/0x50 [ 74.725633][ T5072] sk_reset_timer+0x23/0xc0 [ 74.730152][ T5072] tcp_schedule_loss_probe+0x419/0x560 [ 74.735626][ T5072] tcp_write_xmit+0x3682/0x6100 [ 74.740512][ T5072] __tcp_push_pending_frames+0x9b/0x360 [ 74.746084][ T5072] tcp_sendmsg_locked+0x42cc/0x4d00 [ 74.751318][ T5072] ? __pfx_tcp_sendmsg_locked+0x10/0x10 [ 74.756873][ T5072] ? __local_bh_enable_ip+0x168/0x200 [ 74.762254][ T5072] ? do_raw_spin_unlock+0x13c/0x8b0 [ 74.767471][ T5072] tcp_sendmsg+0x30/0x50 [ 74.771731][ T5072] __sock_sendmsg+0x1a6/0x270 [ 74.776415][ T5072] sock_write_iter+0x2dd/0x400 [ 74.781196][ T5072] ? __pfx_sock_write_iter+0x10/0x10 [ 74.786504][ T5072] ? bpf_lsm_file_permission+0x9/0x10 [ 74.791883][ T5072] ? security_file_permission+0x7f/0xa0 [ 74.797442][ T5072] vfs_write+0xa84/0xcb0 [ 74.801700][ T5072] ? __pfx_vfs_write+0x10/0x10 [ 74.806471][ T5072] ? __set_current_blocked+0x310/0x380 [ 74.812029][ T5072] ? __might_fault+0xc6/0x120 [ 74.816716][ T5072] ? __fdget_pos+0x1a2/0x320 [ 74.821337][ T5072] ksys_write+0x1a0/0x2c0 [ 74.825682][ T5072] ? __pfx_ksys_write+0x10/0x10 [ 74.830541][ T5072] ? do_syscall_64+0x10a/0x240 [ 74.835319][ T5072] ? do_syscall_64+0xb6/0x240 [ 74.840010][ T5072] do_syscall_64+0xfb/0x240 [ 74.844528][ T5072] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 74.850440][ T5072] RIP: 0033:0x7f04bbf16bf2 [ 74.854863][ T5072] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83 [ 74.874476][ T5072] RSP: 002b:00007ffc0fce3978 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 74.882900][ T5072] RAX: ffffffffffffffda RBX: 000000000000008c RCX: 00007f04bbf16bf2 [ 74.890879][ T5072] RDX: 000000000000008c RSI: 0000556ed4187960 RDI: 0000000000000004 [ 74.898854][ T5072] RBP: 0000556ed4190280 R08: 0000000000000000 R09: 0000000000000000 [ 74.906833][ T5072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000556eb3150aa4 [ 74.914811][ T5072] R13: 0000000000000049 R14: 0000556eb31513e8 R15: 00007ffc0fce39e8 [ 74.922797][ T5072]