Warning: Permanently added '10.128.1.121' (ED25519) to the list of known hosts. 2024/03/20 14:18:43 ignoring optional flag "sandboxArg"="0" 2024/03/20 14:18:43 parsed 1 programs 2024/03/20 14:18:43 executed programs: 0 [ 43.952754][ T2749] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.427044][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.434576][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.465013][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.473484][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.481637][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.489463][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.681188][ T2754] device veth0_vlan entered promiscuous mode [ 44.687905][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.696233][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.704259][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.711880][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.807391][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.858318][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.866669][ T1722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.954508][ T2982] [ 44.956939][ T2982] ============================================ [ 44.963108][ T2982] WARNING: possible recursive locking detected [ 44.969225][ T2982] 5.11.0-syzkaller #0 Not tainted [ 44.974415][ T2982] -------------------------------------------- [ 44.980539][ T2982] syz-executor.0/2982 is trying to acquire lock: [ 44.986837][ T2982] ffff8881170d77b8 (&trie->lock){....}-{2:2}, at: trie_delete_elem+0x3a/0x1f0 [ 44.995964][ T2982] [ 44.995964][ T2982] but task is already holding lock: [ 45.003402][ T2982] ffff8881170d79b8 (&trie->lock){....}-{2:2}, at: trie_update_elem+0x44/0x350 [ 45.012606][ T2982] [ 45.012606][ T2982] other info that might help us debug this: [ 45.020654][ T2982] Possible unsafe locking scenario: [ 45.020654][ T2982] [ 45.028347][ T2982] CPU0 [ 45.031857][ T2982] ---- [ 45.035116][ T2982] lock(&trie->lock); [ 45.039148][ T2982] lock(&trie->lock); [ 45.043177][ T2982] [ 45.043177][ T2982] *** DEADLOCK *** [ 45.043177][ T2982] [ 45.051287][ T2982] May be due to missing lock nesting notation [ 45.051287][ T2982] [ 45.059571][ T2982] 3 locks held by syz-executor.0/2982: [ 45.065091][ T2982] #0: ffffffff82f86d40 (rcu_read_lock){....}-{1:2}, at: bpf_map_update_value.isra.0+0x271/0x460 [ 45.075764][ T2982] #1: ffff8881170d79b8 (&trie->lock){....}-{2:2}, at: trie_update_elem+0x44/0x350 [ 45.085968][ T2982] #2: ffffffff82f86d40 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0x0/0x180 [ 45.095388][ T2982] [ 45.095388][ T2982] stack backtrace: [ 45.101267][ T2982] CPU: 0 PID: 2982 Comm: syz-executor.0 Not tainted 5.11.0-syzkaller #0 [ 45.109551][ T2982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 45.119765][ T2982] Call Trace: [ 45.123035][ T2982] dump_stack+0x77/0x97 [ 45.127222][ T2982] __lock_acquire.cold+0x13a/0x2b9 [ 45.132349][ T2982] lock_acquire+0xbf/0x3b0 [ 45.136909][ T2982] ? trie_delete_elem+0x3a/0x1f0 [ 45.141925][ T2982] ? kvm_sched_clock_read+0x14/0x30 [ 45.147622][ T2982] ? sched_clock+0xf/0x20 [ 45.152121][ T2982] ? sched_clock_cpu+0xc/0xb0 [ 45.156762][ T2982] _raw_spin_lock_irqsave+0x36/0x50 [ 45.162208][ T2982] ? trie_delete_elem+0x3a/0x1f0 [ 45.167114][ T2982] trie_delete_elem+0x3a/0x1f0 [ 45.172017][ T2982] bpf_map_delete_elem+0x21/0x30 [ 45.176921][ T2982] ___bpf_prog_run+0xabd/0x1450 [ 45.181738][ T2982] __bpf_prog_run32+0x34/0x60 [ 45.186466][ T2982] ? bpf_trace_run3+0x170/0x170 [ 45.191287][ T2982] bpf_trace_run4+0x7f/0x180 [ 45.195927][ T2982] __alloc_pages_nodemask+0x28d/0x390 [ 45.201443][ T2982] kmalloc_large_node+0x4c/0xf0 [ 45.206454][ T2982] __kmalloc_node+0x2f3/0x400 [ 45.211459][ T2982] bpf_map_kmalloc_node+0x3d/0x90 [ 45.216759][ T2982] trie_update_elem+0x83/0x350 [ 45.221938][ T2982] bpf_map_update_value.isra.0+0x2c8/0x460 [ 45.227729][ T2982] __do_sys_bpf+0x18a1/0x1f30 [ 45.232380][ T2982] ? lock_acquire+0xbf/0x3b0 [ 45.237199][ T2982] do_syscall_64+0x34/0x50 [ 45.241604][ T2982] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 45.247549][ T2982] RIP: 0033:0x7ff03ce4dda9 [ 45.252019][ T2982] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 45.271932][ T2982] RSP: 002b:00007ff03c9cf0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.280312][ T2982] RAX: ffffffffffffffda RBX: 00007ff03cf7bf80 RCX: 00007ff03ce4dda9 [ 45.288345][ T2982] RDX: 0000000000000020 RSI: 0000000020000940 RDI: 0000000000000002 [ 45.296385][ T2982] RBP: 00007ff03ce9a47a R08: 0000000000000000 R09: 0000000000000000 [ 45.304519][ T2982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.312649][ T2982] R13: 000000000000000b R14: 00007ff03cf7bf80 R15: 00007ffd5c8afbc8 2024/03/20 14:18:48 executed programs: 1104 2024/03/20 14:18:53 executed programs: 2588