====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Not tainted ------------------------------------------------------ napi/wg1-0/7836 is trying to acquire lock: ffff8880b8f29370 (krc.lock){..-.}-{2:2}, at: krc_this_cpu_lock kernel/rcu/tree.c:2959 [inline] ffff8880b8f29370 (krc.lock){..-.}-{2:2}, at: add_ptr_to_bulk_krc_lock kernel/rcu/tree.c:3368 [inline] ffff8880b8f29370 (krc.lock){..-.}-{2:2}, at: kvfree_call_rcu+0x15a/0x780 kernel/rcu/tree.c:3453 but task is already holding lock: ffff8880b8f29598 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x123/0x270 kernel/time/timer.c:999 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&base->lock){-.-.}-{2:2}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xa8/0xf0 kernel/locking/spinlock.c:162 lock_timer_base+0x123/0x270 kernel/time/timer.c:999 __mod_timer+0xf9/0xdb0 kernel/time/timer.c:1080 queue_delayed_work_on+0x12a/0x1e0 kernel/workqueue.c:1987 kvfree_call_rcu+0x541/0x780 kernel/rcu/tree.c:3481 rtnl_register_internal+0x486/0x590 net/core/rtnetlink.c:264 rtnl_register+0x32/0x70 net/core/rtnetlink.c:314 ip_rt_init+0x2ec/0x390 net/ipv4/route.c:3796 ip_init+0xe/0x20 net/ipv4/ip_output.c:1663 inet_init+0x2c1/0x3e0 net/ipv4/af_inet.c:2024 do_one_initcall+0x1fd/0x750 init/main.c:1238 do_initcall_level+0x137/0x1f0 init/main.c:1300 do_initcalls+0x69/0xd0 init/main.c:1316 kernel_init_freeable+0x3d2/0x570 init/main.c:1553 kernel_init+0x1d/0x1c0 init/main.c:1443 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 -> #0 (krc.lock){..-.}-{2:2}: check_prev_add kernel/locking/lockdep.c:3134 [inline] check_prevs_add kernel/locking/lockdep.c:3253 [inline] validate_chain kernel/locking/lockdep.c:3869 [inline] __lock_acquire+0x2ddb/0x7c80 kernel/locking/lockdep.c:5137 lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 krc_this_cpu_lock kernel/rcu/tree.c:2959 [inline] add_ptr_to_bulk_krc_lock kernel/rcu/tree.c:3368 [inline] kvfree_call_rcu+0x15a/0x780 kernel/rcu/tree.c:3453 trie_delete_elem+0x535/0x6a0 kernel/bpf/lpm_trie.c:545 bpf_prog_5186c38a4019a4cb+0x4a/0x4e bpf_dispatcher_nop_func include/linux/bpf.h:1223 [inline] __bpf_prog_run include/linux/filter.h:612 [inline] bpf_prog_run include/linux/filter.h:619 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2322 [inline] bpf_trace_run3+0x1e7/0x400 kernel/trace/bpf_trace.c:2362 __bpf_trace_timer_start+0x14a/0x1b0 include/trace/events/timer.h:53 trace_timer_start include/trace/events/timer.h:53 [inline] enqueue_timer+0x398/0x530 kernel/time/timer.c:609 __mod_timer+0x91e/0xdb0 kernel/time/timer.c:1129 mod_peer_timer+0x17a/0x250 drivers/net/wireguard/timers.c:37 wg_packet_consume_data_done drivers/net/wireguard/receive.c:354 [inline] wg_packet_rx_poll+0xdaa/0x2270 drivers/net/wireguard/receive.c:474 __napi_poll+0xc0/0x460 net/core/dev.c:6612 napi_threaded_poll+0x41d/0x870 net/core/dev.c:6755 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&base->lock); lock(krc.lock); lock(&base->lock); lock(krc.lock); *** DEADLOCK *** 3 locks held by napi/wg1-0/7836: #0: ffffffff8cd2fe80 (rcu_read_lock_bh){....}-{1:2}, at: local_bh_disable include/linux/bottom_half.h:20 [inline] #0: ffffffff8cd2fe80 (rcu_read_lock_bh){....}-{1:2}, at: rcu_read_lock_bh include/linux/rcupdate.h:838 [inline] #0: ffffffff8cd2fe80 (rcu_read_lock_bh){....}-{1:2}, at: mod_peer_timer+0x1f/0x250 drivers/net/wireguard/timers.c:34 #1: ffff8880b8f29598 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x123/0x270 kernel/time/timer.c:999 #2: ffffffff8cd2fe20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline] #2: ffffffff8cd2fe20 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline] #2: ffffffff8cd2fe20 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2321 [inline] #2: ffffffff8cd2fe20 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run3+0xf4/0x400 kernel/trace/bpf_trace.c:2362 stack backtrace: CPU: 1 PID: 7836 Comm: napi/wg1-0 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Call Trace: dump_stack_lvl+0x16c/0x230 lib/dump_stack.c:106 check_noncircular+0x2bd/0x3c0 kernel/locking/lockdep.c:2187 check_prev_add kernel/locking/lockdep.c:3134 [inline] check_prevs_add kernel/locking/lockdep.c:3253 [inline] validate_chain kernel/locking/lockdep.c:3869 [inline] __lock_acquire+0x2ddb/0x7c80 kernel/locking/lockdep.c:5137 lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 krc_this_cpu_lock kernel/rcu/tree.c:2959 [inline] add_ptr_to_bulk_krc_lock kernel/rcu/tree.c:3368 [inline] kvfree_call_rcu+0x15a/0x780 kernel/rcu/tree.c:3453 trie_delete_elem+0x535/0x6a0 kernel/bpf/lpm_trie.c:545 bpf_prog_5186c38a4019a4cb+0x4a/0x4e bpf_dispatcher_nop_func include/linux/bpf.h:1223 [inline] __bpf_prog_run include/linux/filter.h:612 [inline] bpf_prog_run include/linux/filter.h:619 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2322 [inline] bpf_trace_run3+0x1e7/0x400 kernel/trace/bpf_trace.c:2362 __bpf_trace_timer_start+0x14a/0x1b0 include/trace/events/timer.h:53 trace_timer_start include/trace/events/timer.h:53 [inline] enqueue_timer+0x398/0x530 kernel/time/timer.c:609 __mod_timer+0x91e/0xdb0 kernel/time/timer.c:1129 mod_peer_timer+0x17a/0x250 drivers/net/wireguard/timers.c:37 wg_packet_consume_data_done drivers/net/wireguard/receive.c:354 [inline] wg_packet_rx_poll+0xdaa/0x2270 drivers/net/wireguard/receive.c:474 __napi_poll+0xc0/0x460 net/core/dev.c:6612 napi_threaded_poll+0x41d/0x870 net/core/dev.c:6755 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293