Warning: Permanently added '10.128.0.162' (ED25519) to the list of known hosts. executing program syzkaller login: [ 42.096500][ T3499] [ 42.098836][ T3499] ====================================================== [ 42.105830][ T3499] WARNING: possible circular locking dependency detected [ 42.112822][ T3499] 5.15.154-syzkaller #0 Not tainted [ 42.117988][ T3499] ------------------------------------------------------ [ 42.124970][ T3499] syz-executor111/3499 is trying to acquire lock: [ 42.131349][ T3499] ffff888147a1e290 (&psock->link_lock){+...}-{2:2}, at: sock_map_update_common+0x31c/0x5b0 [ 42.141328][ T3499] [ 42.141328][ T3499] but task is already holding lock: [ 42.148746][ T3499] ffff888022579dc0 (&stab->lock){+...}-{2:2}, at: sock_map_update_common+0x1b6/0x5b0 [ 42.158187][ T3499] [ 42.158187][ T3499] which lock already depends on the new lock. [ 42.158187][ T3499] [ 42.168561][ T3499] [ 42.168561][ T3499] the existing dependency chain (in reverse order) is: [ 42.177545][ T3499] [ 42.177545][ T3499] -> #1 (&stab->lock){+...}-{2:2}: [ 42.184812][ T3499] lock_acquire+0x1db/0x4f0 [ 42.189808][ T3499] _raw_spin_lock_bh+0x31/0x40 [ 42.195069][ T3499] sock_map_delete_elem+0x161/0x230 [ 42.200762][ T3499] bpf_prog_9d96c76a008f5a1e+0x5b/0x1e4 [ 42.206798][ T3499] bpf_trace_run2+0x19e/0x340 [ 42.211969][ T3499] __bpf_trace_kfree+0x6e/0x90 [ 42.217227][ T3499] kfree+0x22f/0x270 [ 42.221612][ T3499] sock_map_unref+0x3ac/0x5d0 [ 42.226778][ T3499] sock_hash_delete_elem+0x388/0x400 [ 42.232556][ T3499] map_delete_elem+0x431/0x580 [ 42.237816][ T3499] __sys_bpf+0x311/0x670 [ 42.242549][ T3499] __x64_sys_bpf+0x78/0x90 [ 42.247455][ T3499] do_syscall_64+0x3b/0xb0 [ 42.252361][ T3499] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.258750][ T3499] [ 42.258750][ T3499] -> #0 (&psock->link_lock){+...}-{2:2}: [ 42.266534][ T3499] validate_chain+0x1649/0x5930 [ 42.271879][ T3499] __lock_acquire+0x1295/0x1ff0 [ 42.277222][ T3499] lock_acquire+0x1db/0x4f0 [ 42.282217][ T3499] _raw_spin_lock_bh+0x31/0x40 [ 42.287472][ T3499] sock_map_update_common+0x31c/0x5b0 [ 42.293335][ T3499] sock_map_update_elem_sys+0x440/0x770 [ 42.299375][ T3499] map_update_elem+0x6a0/0x7c0 [ 42.304629][ T3499] __sys_bpf+0x2fd/0x670 [ 42.309360][ T3499] __x64_sys_bpf+0x78/0x90 [ 42.314268][ T3499] do_syscall_64+0x3b/0xb0 [ 42.319177][ T3499] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.325561][ T3499] [ 42.325561][ T3499] other info that might help us debug this: [ 42.325561][ T3499] [ 42.335760][ T3499] Possible unsafe locking scenario: [ 42.335760][ T3499] [ 42.343177][ T3499] CPU0 CPU1 [ 42.348510][ T3499] ---- ---- [ 42.353845][ T3499] lock(&stab->lock); [ 42.357888][ T3499] lock(&psock->link_lock); [ 42.364968][ T3499] lock(&stab->lock); [ 42.371530][ T3499] lock(&psock->link_lock); [ 42.376092][ T3499] [ 42.376092][ T3499] *** DEADLOCK *** [ 42.376092][ T3499] [ 42.384203][ T3499] 3 locks held by syz-executor111/3499: [ 42.389712][ T3499] #0: ffff88801eafa120 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sock_map_update_elem_sys+0x1c8/0x770 [ 42.400111][ T3499] #1: ffffffff8c91fae0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 [ 42.409380][ T3499] #2: ffff888022579dc0 (&stab->lock){+...}-{2:2}, at: sock_map_update_common+0x1b6/0x5b0 [ 42.419264][ T3499] [ 42.419264][ T3499] stack backtrace: [ 42.425123][ T3499] CPU: 0 PID: 3499 Comm: syz-executor111 Not tainted 5.15.154-syzkaller #0 [ 42.433678][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 42.443706][ T3499] Call Trace: [ 42.446960][ T3499] [ 42.449867][ T3499] dump_stack_lvl+0x1e3/0x2d0 [ 42.454518][ T3499] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 42.460126][ T3499] ? print_circular_bug+0x12b/0x1a0 [ 42.465302][ T3499] check_noncircular+0x2f8/0x3b0 [ 42.470226][ T3499] ? add_chain_block+0x850/0x850 [ 42.475146][ T3499] ? lockdep_lock+0x11f/0x2a0 [ 42.479804][ T3499] validate_chain+0x1649/0x5930 [ 42.484631][ T3499] ? reacquire_held_locks+0x660/0x660 [ 42.489987][ T3499] ? mark_lock+0x29b/0x340 [ 42.494376][ T3499] ? look_up_lock_class+0x77/0x120 [ 42.499461][ T3499] ? register_lock_class+0x100/0x9a0 [ 42.504717][ T3499] ? is_dynamic_key+0x1f0/0x1f0 [ 42.509541][ T3499] ? mark_lock+0x98/0x340 [ 42.513840][ T3499] __lock_acquire+0x1295/0x1ff0 [ 42.518676][ T3499] lock_acquire+0x1db/0x4f0 [ 42.523157][ T3499] ? sock_map_update_common+0x31c/0x5b0 [ 42.528676][ T3499] ? _local_bh_enable+0xa0/0xa0 [ 42.533501][ T3499] ? read_lock_is_recursive+0x10/0x10 [ 42.538847][ T3499] ? sock_map_update_common+0x31c/0x5b0 [ 42.544362][ T3499] ? __bpf_trace_softirq+0x10/0x10 [ 42.549443][ T3499] ? __rwlock_init+0x140/0x140 [ 42.554180][ T3499] ? sock_map_update_common+0x31c/0x5b0 [ 42.559699][ T3499] _raw_spin_lock_bh+0x31/0x40 [ 42.564438][ T3499] ? sock_map_update_common+0x31c/0x5b0 [ 42.569962][ T3499] sock_map_update_common+0x31c/0x5b0 [ 42.575310][ T3499] sock_map_update_elem_sys+0x440/0x770 [ 42.580832][ T3499] ? sock_map_prog_detach+0x290/0x290 [ 42.586190][ T3499] map_update_elem+0x6a0/0x7c0 [ 42.590935][ T3499] __sys_bpf+0x2fd/0x670 [ 42.595164][ T3499] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.600513][ T3499] ? syscall_enter_from_user_mode+0x2e/0x240 [ 42.606465][ T3499] ? lockdep_hardirqs_on+0x94/0x130 [ 42.611637][ T3499] __x64_sys_bpf+0x78/0x90 [ 42.616044][ T3499] do_syscall_64+0x3b/0xb0 [ 42.620431][ T3499] ? clear_bhb_loop+0x15/0x70 [ 42.625081][ T3499] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.630950][ T3499] RIP: 0033:0x7f1677352a29 [ 42.635351][ T3499] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 42.654930][ T3499] RSP: 002b:00007ffff84eabb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.663316][ T3499] RAX: ffffffffffffffda RBX: 00007ffff84ead88 RCX: 00007f1677352a29 [ 42.671263][ T3499] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000002 [ 42.679208][ T3499] RBP: 00007f16773c6610 R08: 00007ffff84ead88 R09: 00007ffff84ead88 [ 42.687158][ T3499] R10: 00007ffff84ead88 R11: 0000000000000246 R12: 0000000000000001 [ 42.695103][ T3499] R13: 00007ffff84ead78 R