./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor469816585 <...> Warning: Permanently added '10.128.1.116' (ED25519) to the list of known hosts. execve("./syz-executor469816585", ["./syz-executor469816585"], 0x7ffe22898e00 /* 10 vars */) = 0 brk(NULL) = 0x5555561de000 brk(0x5555561ded00) = 0x5555561ded00 arch_prctl(ARCH_SET_FS, 0x5555561de380) = 0 set_tid_address(0x5555561de650) = 5083 set_robust_list(0x5555561de660, 24) = 0 rseq(0x5555561deca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor469816585", 4096) = 27 getrandom("\xf1\x54\x79\xe2\x8e\xf9\x91\x4a", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555561ded00 brk(0x5555561ffd00) = 0x5555561ffd00 brk(0x555556200000) = 0x555556200000 mprotect(0x7f98a7397000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 write(1, "executing program\n", 18executing program ) = 18 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_SOCKHASH, key_size=4, value_size=8, max_entries=11, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=20, insns=0x20000280, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="kfree", prog_fd=4}}, 16) = 5 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_CGROUP_SKB, insn_cnt=4, insns=0x20000000, license="syzkaller", log_level=4, log_size=153, log_buf="", kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name=""}, 63) = 6 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_SOCKMAP, key_size=4, value_size=8, max_entries=1, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0}, 55) = 7 close(6) = 0 socketpair(AF_UNIX, SOCK_STREAM, 0, [6, 8]) = 0 bpf(BPF_MAP_UPDATE_ELEM, {map_fd=7, key=0x20002500, value=0x20002540, flags=BPF_ANY}, 32) = 0 bpf(BPF_MAP_UPDATE_ELEM, {map_fd=7, key=0x200000c0, value=0x20001380, flags=BPF_ANY}, 32) = 0 socketpair(AF_UNIX, SOCK_DGRAM, 0, [9, 10]) = 0 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_SOCKHASH, key_size=36, value_size=4, max_entries=2, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 11 [ 59.333695][ T5083] [ 59.336057][ T5083] ====================================================== [ 59.343068][ T5083] WARNING: possible circular locking dependency detected [ 59.350064][ T5083] 6.9.0-rc7-syzkaller-02064-g71ed6c266348 #0 Not tainted [ 59.357073][ T5083] ------------------------------------------------------ [ 59.364126][ T5083] syz-executor469/5083 is trying to acquire lock: [ 59.370528][ T5083] ffff88801ba8c2b0 (&psock->link_lock){+...}-{2:2}, at: sock_hash_update_common+0x624/0xa30 [ 59.380625][ T5083] [ 59.380625][ T5083] but task is already holding lock: [ 59.387970][ T5083] ffff88801a299520 (&htab->buckets[i].lock){+...}-{2:2}, at: sock_hash_update_common+0x20c/0xa30 [ 59.398482][ T5083] [ 59.398482][ T5083] which lock already depends on the new lock. [ 59.398482][ T5083] [ 59.408872][ T5083] [ 59.408872][ T5083] the existing dependency chain (in reverse order) is: [ 59.417880][ T5083] [ 59.417880][ T5083] -> #1 (&htab->buckets[i].lock){+...}-{2:2}: [ 59.426130][ T5083] lock_acquire+0x1ed/0x550 [ 59.431148][ T5083] _raw_spin_lock_bh+0x35/0x50 [ 59.436433][ T5083] sock_hash_delete_elem+0x17c/0x400 [ 59.442244][ T5083] bpf_prog_78b015942f8c5b4e+0x63/0x67 [ 59.448242][ T5083] bpf_trace_run2+0x2ec/0x540 [ 59.453434][ T5083] kfree+0x2bd/0x3b0 [ 59.457836][ T5083] sock_map_unref+0x3ac/0x5e0 [ 59.463017][ T5083] sock_map_update_common+0x4f0/0x5b0 [ 59.468888][ T5083] sock_map_update_elem_sys+0x55f/0x910 [ 59.474932][ T5083] map_update_elem+0x53a/0x6f0 [ 59.480208][ T5083] __sys_bpf+0x76f/0x810 [ 59.484950][ T5083] __x64_sys_bpf+0x7c/0x90 [ 59.489865][ T5083] do_syscall_64+0xf5/0x240 [ 59.494864][ T5083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.501279][ T5083] [ 59.501279][ T5083] -> #0 (&psock->link_lock){+...}-{2:2}: [ 59.509075][ T5083] validate_chain+0x18cb/0x58e0 [ 59.514440][ T5083] __lock_acquire+0x1346/0x1fd0 [ 59.519962][ T5083] lock_acquire+0x1ed/0x550 [ 59.524961][ T5083] _raw_spin_lock_bh+0x35/0x50 [ 59.530224][ T5083] sock_hash_update_common+0x624/0xa30 [ 59.536191][ T5083] sock_map_update_elem_sys+0x5a4/0x910 [ 59.542237][ T5083] map_update_elem+0x53a/0x6f0 [ 59.547500][ T5083] __sys_bpf+0x76f/0x810 [ 59.552241][ T5083] __x64_sys_bpf+0x7c/0x90 [ 59.557165][ T5083] do_syscall_64+0xf5/0x240 [ 59.562174][ T5083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.568593][ T5083] [ 59.568593][ T5083] other info that might help us debug this: [ 59.568593][ T5083] [ 59.578810][ T5083] Possible unsafe locking scenario: [ 59.578810][ T5083] [ 59.586233][ T5083] CPU0 CPU1 [ 59.591573][ T5083] ---- ---- [ 59.596914][ T5083] lock(&htab->buckets[i].lock); [ 59.601920][ T5083] lock(&psock->link_lock); [ 59.609005][ T5083] lock(&htab->buckets[i].lock); [ 59.616524][ T5083] lock(&psock->link_lock); [ 59.621103][ T5083] [ 59.621103][ T5083] *** DEADLOCK *** [ 59.621103][ T5083] [ 59.629224][ T5083] 3 locks held by syz-executor469/5083: [ 59.634755][ T5083] #0: ffff88807e797258 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sock_map_update_elem_sys+0x1cc/0x910 [ 59.645355][ T5083] #1: ffffffff8e334ea0 (rcu_read_lock){....}-{1:2}, at: sock_map_update_elem_sys+0x1d8/0x910 [ 59.655764][ T5083] #2: ffff88801a299520 (&htab->buckets[i].lock){+...}-{2:2}, at: sock_hash_update_common+0x20c/0xa30 [ 59.666698][ T5083] [ 59.666698][ T5083] stack backtrace: [ 59.672663][ T5083] CPU: 1 PID: 5083 Comm: syz-executor469 Not tainted 6.9.0-rc7-syzkaller-02064-g71ed6c266348 #0 [ 59.683062][ T5083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 59.693096][ T5083] Call Trace: [ 59.696368][ T5083] [ 59.699294][ T5083] dump_stack_lvl+0x241/0x360 [ 59.704038][ T5083] ? __pfx_dump_stack_lvl+0x10/0x10 [ 59.709222][ T5083] ? print_circular_bug+0x130/0x1a0 [ 59.714403][ T5083] check_noncircular+0x36a/0x4a0 [ 59.719323][ T5083] ? mark_lock+0x9a/0x350 [ 59.723631][ T5083] ? __pfx_check_noncircular+0x10/0x10 [ 59.729071][ T5083] ? lockdep_lock+0x123/0x2b0 [ 59.733900][ T5083] ? _find_first_zero_bit+0xd4/0x100 [ 59.739171][ T5083] validate_chain+0x18cb/0x58e0 [ 59.744013][ T5083] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 59.750324][ T5083] ? __pfx_validate_chain+0x10/0x10 [ 59.755501][ T5083] ? _raw_spin_unlock_irqrestore+0x8f/0x140 [ 59.761373][ T5083] ? lockdep_hardirqs_on+0x99/0x150 [ 59.766553][ T5083] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 59.772424][ T5083] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 59.778731][ T5083] ? stack_trace_save+0x118/0x1d0 [ 59.784015][ T5083] ? look_up_lock_class+0x77/0x160 [ 59.789104][ T5083] ? register_lock_class+0x102/0x980 [ 59.794369][ T5083] ? __pfx_register_lock_class+0x10/0x10 [ 59.799976][ T5083] ? __kasan_kmalloc+0x98/0xb0 [ 59.804717][ T5083] ? bpf_map_kmalloc_node+0xd3/0x1c0 [ 59.809982][ T5083] ? sock_hash_update_common+0x415/0xa30 [ 59.815596][ T5083] ? mark_lock+0x9a/0x350 [ 59.819905][ T5083] __lock_acquire+0x1346/0x1fd0 [ 59.824740][ T5083] lock_acquire+0x1ed/0x550 [ 59.829220][ T5083] ? sock_hash_update_common+0x624/0xa30 [ 59.834835][ T5083] ? __pfx_lock_acquire+0x10/0x10 [ 59.839837][ T5083] ? rcu_is_watching+0x15/0xb0 [ 59.844579][ T5083] ? sock_hash_update_common+0x624/0xa30 [ 59.850191][ T5083] ? __pfx___local_bh_disable_ip+0x10/0x10 [ 59.855974][ T5083] ? bpf_map_get_memcg+0x9a/0x4d0 [ 59.860983][ T5083] ? sock_hash_update_common+0x624/0xa30 [ 59.866595][ T5083] _raw_spin_lock_bh+0x35/0x50 [ 59.871340][ T5083] ? sock_hash_update_common+0x624/0xa30 [ 59.876949][ T5083] sock_hash_update_common+0x624/0xa30 [ 59.882390][ T5083] sock_map_update_elem_sys+0x5a4/0x910 [ 59.887914][ T5083] ? __virt_addr_valid+0x183/0x520 [ 59.893008][ T5083] ? sock_map_update_elem_sys+0x1d8/0x910 [ 59.898703][ T5083] ? __pfx_sock_map_update_elem_sys+0x10/0x10 [ 59.904751][ T5083] map_update_elem+0x53a/0x6f0 [ 59.909509][ T5083] __sys_bpf+0x76f/0x810 [ 59.913732][ T5083] ? __pfx___sys_bpf+0x10/0x10 [ 59.918481][ T5083] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 59.924800][ T5083] ? do_syscall_64+0x102/0x240 [ 59.929544][ T5083] __x64_sys_bpf+0x7c/0x90 [ 59.934040][ T5083] do_syscall_64+0xf5/0x240 [ 59.938530][ T5083] ? clear_bhb_loop+0x35/0x90 [ 59.943208][ T5083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.949082][ T5083] RIP: 0033:0x7f98a7323a69 [ 59.953477][ T5083] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 59.973500][ T5083] RSP: 002b:00007ffea2336c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 bpf(BPF_MAP_UPDATE_ELEM, {map_fd=11, key=0x20000040, value=0x20000000, flags=BPF_ANY}, 32) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 59.981909][ T5083] RAX: ffffffffffffffda RBX: 00