./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2174835900 <...> Warning: Permanently added '10.128.0.106' (ED25519) to the list of known hosts. execve("./syz-executor2174835900", ["./syz-executor2174835900"], 0x7ffd4c4e8330 /* 10 vars */) = 0 brk(NULL) = 0x55556493b000 brk(0x55556493bd00) = 0x55556493bd00 arch_prctl(ARCH_SET_FS, 0x55556493b380) = 0 set_tid_address(0x55556493b650) = 5072 set_robust_list(0x55556493b660, 24) = 0 rseq(0x55556493bca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2174835900", 4096) = 28 getrandom("\x3f\x66\xc5\x9f\xaa\xe8\x50\x5e", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556493bd00 brk(0x55556495cd00) = 0x55556495cd00 brk(0x55556495d000) = 0x55556495d000 mprotect(0x7f93348d1000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=2, max_entries=4, map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE, inner_map_fd=-1, numa_node=0, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x20000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="mm_page_alloc", prog_fd=4}}, 16) = 5 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=9, value_size=65537, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 6 [ 54.260855][ T5072] [ 54.263216][ T5072] ============================================ [ 54.269341][ T5072] WARNING: possible recursive locking detected [ 54.275461][ T5072] 6.8.0-syzkaller-05242-g32fa4366cc4d #0 Not tainted [ 54.282104][ T5072] -------------------------------------------- [ 54.288225][ T5072] syz-executor217/5072 is trying to acquire lock: [ 54.294609][ T5072] ffff88802a0fd9f8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x96/0x6a0 [ 54.303492][ T5072] [ 54.303492][ T5072] but task is already holding lock: [ 54.310831][ T5072] ffff88802a0fc9f8 (&trie->lock){....}-{2:2}, at: trie_update_elem+0xcb/0xc10 [ 54.319677][ T5072] [ 54.319677][ T5072] other info that might help us debug this: [ 54.327711][ T5072] Possible unsafe locking scenario: [ 54.327711][ T5072] [ 54.335137][ T5072] CPU0 [ 54.338391][ T5072] ---- [ 54.341648][ T5072] lock(&trie->lock); [ 54.345691][ T5072] lock(&trie->lock); [ 54.349734][ T5072] [ 54.349734][ T5072] *** DEADLOCK *** [ 54.349734][ T5072] [ 54.357854][ T5072] May be due to missing lock nesting notation [ 54.357854][ T5072] [ 54.366144][ T5072] 3 locks held by syz-executor217/5072: [ 54.371660][ T5072] #0: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: bpf_map_update_value+0x3c4/0x540 [ 54.381548][ T5072] #1: ffff88802a0fc9f8 (&trie->lock){....}-{2:2}, at: trie_update_elem+0xcb/0xc10 [ 54.390824][ T5072] #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0x16e/0x490 [ 54.400186][ T5072] [ 54.400186][ T5072] stack backtrace: [ 54.406045][ T5072] CPU: 0 PID: 5072 Comm: syz-executor217 Not tainted 6.8.0-syzkaller-05242-g32fa4366cc4d #0 [ 54.416079][ T5072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 54.426109][ T5072] Call Trace: [ 54.429388][ T5072] [ 54.432298][ T5072] dump_stack_lvl+0x1e7/0x2e0 [ 54.436963][ T5072] ? __pfx_dump_stack_lvl+0x10/0x10 [ 54.442151][ T5072] ? print_deadlock_bug+0x479/0x620 [ 54.447326][ T5072] ? _find_first_zero_bit+0xd4/0x100 [ 54.452589][ T5072] validate_chain+0x15c1/0x58e0 [ 54.457426][ T5072] ? __pfx_validate_chain+0x10/0x10 [ 54.462600][ T5072] ? stack_depot_save_flags+0x37d/0x860 [ 54.468133][ T5072] ? do_raw_spin_lock+0x14f/0x370 [ 54.473133][ T5072] ? __pfx_lock_release+0x10/0x10 [ 54.478135][ T5072] ? mark_lock+0x9a/0x350 [ 54.482444][ T5072] ? mark_lock+0x9a/0x350 [ 54.486750][ T5072] ? __lock_acquire+0x1346/0x1fd0 [ 54.491755][ T5072] ? __pfx_validate_chain+0x10/0x10 [ 54.496941][ T5072] ? mark_lock+0x9a/0x350 [ 54.501244][ T5072] __lock_acquire+0x1346/0x1fd0 [ 54.506072][ T5072] lock_acquire+0x1e4/0x530 [ 54.510548][ T5072] ? trie_delete_elem+0x96/0x6a0 [ 54.515462][ T5072] ? __pfx_lock_acquire+0x10/0x10 [ 54.520472][ T5072] ? __lock_acquire+0x1346/0x1fd0 [ 54.525473][ T5072] _raw_spin_lock_irqsave+0xd5/0x120 [ 54.530736][ T5072] ? trie_delete_elem+0x96/0x6a0 [ 54.535648][ T5072] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 54.541514][ T5072] ? __pfx_lock_acquire+0x10/0x10 [ 54.546513][ T5072] trie_delete_elem+0x96/0x6a0 [ 54.551252][ T5072] ? __pfx___cant_migrate+0x10/0x10 [ 54.556428][ T5072] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 54.561861][ T5072] ? bpf_trace_run4+0x16e/0x490 [ 54.566689][ T5072] bpf_trace_run4+0x25a/0x490 [ 54.571340][ T5072] ? __pfx_bpf_trace_run4+0x10/0x10 [ 54.576512][ T5072] ? prepare_alloc_pages+0x1da/0x5b0 [ 54.581779][ T5072] __alloc_pages+0x657/0x680 [ 54.586350][ T5072] ? __pfx___alloc_pages+0x10/0x10 [ 54.591440][ T5072] ? do_raw_spin_lock+0x14f/0x370 [ 54.596439][ T5072] ? __lock_acquire+0x1346/0x1fd0 [ 54.601439][ T5072] __kmalloc_large_node+0x91/0x1f0 [ 54.606529][ T5072] __kmalloc_node+0x33c/0x4e0 [ 54.611183][ T5072] ? bpf_map_kmalloc_node+0xd3/0x1c0 [ 54.616442][ T5072] ? bpf_map_get_memcg+0x9a/0x4d0 [ 54.621444][ T5072] bpf_map_kmalloc_node+0xd3/0x1c0 [ 54.626529][ T5072] trie_update_elem+0x1d3/0xc10 [ 54.631372][ T5072] bpf_map_update_value+0x4d3/0x540 [ 54.636548][ T5072] map_update_elem+0x53a/0x6f0 [ 54.641290][ T5072] __sys_bpf+0x76f/0x810 [ 54.645511][ T5072] ? __pfx___sys_bpf+0x10/0x10 [ 54.650258][ T5072] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 54.656569][ T5072] ? do_syscall_64+0x10a/0x240 [ 54.661322][ T5072] __x64_sys_bpf+0x7c/0x90 [ 54.665722][ T5072] do_syscall_64+0xfb/0x240 [ 54.670212][ T5072] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 54.676095][ T5072] RIP: 0033:0x7f933485e7a9 [ 54.680493][ T5072] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.700079][ T5072] RSP: 002b:00007ffc8852b528 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 bpf(BPF_MAP_UPDATE_ELEM, {map_fd=6, key=0x200008c0, value=0x20000900, flags=BPF_ANY}, 32) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 54.708475][ T5072] RAX: ffffffffffffffda RBX: