./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2669384300

<...>
Warning: Permanently added '10.128.1.30' (ED25519) to the list of known hosts.
execve("./syz-executor2669384300", ["./syz-executor2669384300"], 0x7ffd880ee350 /* 10 vars */) = 0
brk(NULL)                               = 0x555572c38000
brk(0x555572c38d00)                     = 0x555572c38d00
arch_prctl(ARCH_SET_FS, 0x555572c38380) = 0
set_tid_address(0x555572c38650)         = 5094
set_robust_list(0x555572c38660, 24)     = 0
rseq(0x555572c38ca0, 0x20, 0, 0x53053053) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor2669384300", 4096) = 28
getrandom("\x70\xf5\xfb\xdd\x50\x61\x9e\xe4", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x555572c38d00
brk(0x555572c59d00)                     = 0x555572c59d00
brk(0x555572c5a000)                     = 0x555572c5a000
mprotect(0x7f857cc9e000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5095 attached
 <unfinished ...>
[pid  5095] set_robust_list(0x555572c38660, 24 <unfinished ...>
[pid  5094] <... clone resumed>, child_tidptr=0x555572c38650) = 5095
[pid  5095] <... set_robust_list resumed>) = 0
[pid  5095] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid  5095] setpgid(0, 0)               = 0
[pid  5095] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid  5095] write(3, "1000", 4)         = 4
[pid  5095] close(3)                    = 0
[pid  5095] write(1, "executing program\n", 18executing program
) = 18
[pid  5095] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x20000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=4294966948, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address)
[pid  5095] socketpair(AF_TIPC, SOCK_DGRAM, 0, [3, 4]) = 0
[pid  5095] close(3)                    = 0
[pid  5095] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=7, value_size=65537, max_entries=8, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3
[pid  5095] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x20000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address)
[pid  5095] close(3)                    = 0
[pid  5095] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=7, value_size=3983, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3
[pid  5095] bpf(BPF_MAP_UPDATE_ELEM, {map_fd=3, key=0x20000340, value=0x20000200, flags=BPF_ANY}, 32) = 0
[pid  5095] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x20000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 5
[pid  5095] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=5}}, 16) = 6
syzkaller login: [   74.767439][ T5089] 
[   74.769829][ T5089] ======================================================
[   74.776853][ T5089] WARNING: possible circular locking dependency detected
[   74.783880][ T5089] 6.10.0-rc6-syzkaller-gb3470da314fd #0 Not tainted
[   74.790470][ T5089] ------------------------------------------------------
[   74.797497][ T5089] sshd/5089 is trying to acquire lock:
[   74.802955][ T5089] ffff8880b9429430 (krc.lock){....}-{2:2}, at: kvfree_call_rcu+0x18a/0x790
[   74.811643][ T5089] 
[   74.811643][ T5089] but task is already holding lock:
[   74.819010][ T5089] ffff8880b942a718 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240
[   74.827888][ T5089] 
[   74.827888][ T5089] which lock already depends on the new lock.
[   74.827888][ T5089] 
[   74.838288][ T5089] 
[   74.838288][ T5089] the existing dependency chain (in reverse order) is:
[   74.847322][ T5089] 
[   74.847322][ T5089] -> #1 (&base->lock){-.-.}-{2:2}:
[   74.854625][ T5089]        lock_acquire+0x1ed/0x550
[   74.859652][ T5089]        _raw_spin_lock_irqsave+0xd5/0x120
[   74.865474][ T5089]        lock_timer_base+0x112/0x240
[   74.870761][ T5089]        __mod_timer+0x1ca/0xeb0
[   74.875701][ T5089]        queue_delayed_work_on+0x1ca/0x390
[   74.881509][ T5089]        kvfree_call_rcu+0x47f/0x790
[   74.886796][ T5089]        rtnl_register_internal+0x482/0x590
[   74.892698][ T5089]        rtnl_register+0x36/0x80
[   74.897644][ T5089]        ip_rt_init+0x2bd/0x360
[   74.902505][ T5089]        ip_init+0xe/0x20
[   74.906841][ T5089]        inet_init+0x3d8/0x580
[   74.911604][ T5089]        do_one_initcall+0x248/0x880
[   74.916895][ T5089]        do_initcall_level+0x157/0x210
[   74.922373][ T5089]        do_initcalls+0x3f/0x80
[   74.927235][ T5089]        kernel_init_freeable+0x435/0x5d0
[   74.932961][ T5089]        kernel_init+0x1d/0x2b0
[   74.937822][ T5089]        ret_from_fork+0x4b/0x80
[   74.942770][ T5089]        ret_from_fork_asm+0x1a/0x30
[   74.948072][ T5089] 
[   74.948072][ T5089] -> #0 (krc.lock){....}-{2:2}:
[   74.955134][ T5089]        validate_chain+0x18e0/0x5900
[   74.960511][ T5089]        __lock_acquire+0x1346/0x1fd0
[   74.965888][ T5089]        lock_acquire+0x1ed/0x550
[   74.970928][ T5089]        _raw_spin_lock+0x2e/0x40
[   74.975966][ T5089]        kvfree_call_rcu+0x18a/0x790
[   74.981256][ T5089]        trie_delete_elem+0x546/0x6a0
[   74.986632][ T5089]        bpf_prog_2c29ac5cdc6b1842+0x42/0x46
[   74.992622][ T5089]        bpf_trace_run2+0x2ec/0x540
[   74.997826][ T5089]        enqueue_timer+0x3ce/0x570
[   75.002938][ T5089]        __mod_timer+0x953/0xeb0
[   75.007876][ T5089]        sk_reset_timer+0x23/0xc0
[   75.012906][ T5089]        tcp_event_new_data_sent+0x203/0x360
[   75.018885][ T5089]        tcp_write_xmit+0x18dc/0x6a10
[   75.024265][ T5089]        __tcp_push_pending_frames+0x9b/0x360
[   75.030338][ T5089]        tcp_sendmsg_locked+0x43b1/0x4e10
[   75.036064][ T5089]        tcp_sendmsg+0x30/0x50
[   75.040852][ T5089]        __sock_sendmsg+0x1a6/0x270
[   75.046049][ T5089]        sock_write_iter+0x2dd/0x400
[   75.051334][ T5089]        vfs_write+0xa72/0xc90
[   75.056109][ T5089]        ksys_write+0x1a0/0x2c0
[   75.060983][ T5089]        do_syscall_64+0xf3/0x230
[   75.066010][ T5089]        entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   75.072452][ T5089] 
[   75.072452][ T5089] other info that might help us debug this:
[   75.072452][ T5089] 
[   75.082690][ T5089]  Possible unsafe locking scenario:
[   75.082690][ T5089] 
[   75.090146][ T5089]        CPU0                    CPU1
[   75.095519][ T5089]        ----                    ----
[   75.100891][ T5089]   lock(&base->lock);
[   75.104977][ T5089]                                lock(krc.lock);
[   75.111312][ T5089]                                lock(&base->lock);
[   75.117924][ T5089]   lock(krc.lock);
[   75.121741][ T5089] 
[   75.121741][ T5089]  *** DEADLOCK ***
[   75.121741][ T5089] 
[   75.129910][ T5089] 3 locks held by sshd/5089:
[   75.134500][ T5089]  #0: ffff88807ae6a718 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50
[   75.143664][ T5089]  #1: ffff8880b942a718 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x112/0x240
[   75.152988][ T5089]  #2: ffffffff8e333f20 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x1fc/0x540
[   75.162408][ T5089] 
[   75.162408][ T5089] stack backtrace:
[   75.168323][ T5089] CPU: 0 PID: 5089 Comm: sshd Not tainted 6.10.0-rc6-syzkaller-gb3470da314fd #0
[   75.177369][ T5089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   75.187445][ T5089] Call Trace:
[   75.190835][ T5089]  <TASK>
[   75.193776][ T5089]  dump_stack_lvl+0x241/0x360
[   75.198477][ T5089]  ? __pfx_dump_stack_lvl+0x10/0x10
[   75.203693][ T5089]  ? print_circular_bug+0x130/0x1a0
[   75.208912][ T5089]  check_noncircular+0x36a/0x4a0
[   75.213881][ T5089]  ? __pfx_check_noncircular+0x10/0x10
[   75.219371][ T5089]  ? lockdep_lock+0x123/0x2b0
[   75.224072][ T5089]  ? mark_lock+0x9a/0x350
[   75.228422][ T5089]  validate_chain+0x18e0/0x5900
[   75.233562][ T5089]  ? __pfx_validate_chain+0x10/0x10
[   75.238771][ T5089]  ? stack_depot_save_flags+0x6e4/0x830
[   75.244342][ T5089]  ? do_raw_spin_lock+0x14f/0x370
[   75.249379][ T5089]  ? __pfx_lock_release+0x10/0x10
[   75.254430][ T5089]  ? do_raw_spin_unlock+0x13c/0x8b0
[   75.259642][ T5089]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   75.265539][ T5089]  ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[   75.271877][ T5089]  ? stack_trace_save+0x118/0x1d0
[   75.276922][ T5089]  ? mark_lock+0x9a/0x350
[   75.281259][ T5089]  __lock_acquire+0x1346/0x1fd0
[   75.286137][ T5089]  lock_acquire+0x1ed/0x550
[   75.290669][ T5089]  ? kvfree_call_rcu+0x18a/0x790
[   75.295632][ T5089]  ? __pfx_lock_acquire+0x10/0x10
[   75.300680][ T5089]  ? __phys_addr+0xba/0x170
[   75.305210][ T5089]  _raw_spin_lock+0x2e/0x40
[   75.309747][ T5089]  ? kvfree_call_rcu+0x18a/0x790
[   75.314692][ T5089]  kvfree_call_rcu+0x18a/0x790
[   75.319483][ T5089]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   75.325382][ T5089]  ? __pfx_kvfree_call_rcu+0x10/0x10
[   75.330778][ T5089]  ? longest_prefix_match+0x49f/0x650
[   75.336159][ T5089]  trie_delete_elem+0x546/0x6a0
[   75.341041][ T5089]  ? bpf_trace_run2+0x1fc/0x540
[   75.345904][ T5089]  bpf_prog_2c29ac5cdc6b1842+0x42/0x46
[   75.351404][ T5089]  bpf_trace_run2+0x2ec/0x540
[   75.356095][ T5089]  ? __pfx_bpf_trace_run2+0x10/0x10
[   75.361305][ T5089]  ? __pfx_debug_object_activate+0x10/0x10
[   75.367117][ T5089]  ? __tcp_transmit_skb+0x21e8/0x3b30
[   75.372491][ T5089]  enqueue_timer+0x3ce/0x570
[   75.377105][ T5089]  __mod_timer+0x953/0xeb0
[   75.381523][ T5089]  ? __pfx___mod_timer+0x10/0x10
[   75.386460][ T5089]  ? __pfx_seqcount_lockdep_reader_access+0x10/0x10
[   75.393063][ T5089]  ? ktime_get+0x3c/0xb0
[   75.397315][ T5089]  ? __asan_memset+0x23/0x50
[   75.401913][ T5089]  sk_reset_timer+0x23/0xc0
[   75.406420][ T5089]  tcp_event_new_data_sent+0x203/0x360
[   75.411885][ T5089]  tcp_write_xmit+0x18dc/0x6a10
[   75.416757][ T5089]  ? __virt_addr_valid+0x183/0x520
[   75.421876][ T5089]  ? __alloc_skb+0x2d5/0x440
[   75.426481][ T5089]  __tcp_push_pending_frames+0x9b/0x360
[   75.432035][ T5089]  tcp_sendmsg_locked+0x43b1/0x4e10
[   75.437260][ T5089]  ? __pfx_tcp_sendmsg_locked+0x10/0x10
[   75.442810][ T5089]  ? __local_bh_enable_ip+0x168/0x200
[   75.448194][ T5089]  ? do_raw_spin_unlock+0x13c/0x8b0
[   75.453404][ T5089]  tcp_sendmsg+0x30/0x50
[   75.457653][ T5089]  __sock_sendmsg+0x1a6/0x270
[   75.462360][ T5089]  sock_write_iter+0x2dd/0x400
[   75.467132][ T5089]  ? __pfx_sock_write_iter+0x10/0x10
[   75.472422][ T5089]  ? bpf_lsm_file_permission+0x9/0x10
[   75.477795][ T5089]  ? security_file_permission+0x7f/0xa0
[   75.483366][ T5089]  vfs_write+0xa72/0xc90
[   75.487612][ T5089]  ? __pfx_sock_write_iter+0x10/0x10
[   75.492900][ T5089]  ? __pfx_vfs_write+0x10/0x10
[   75.497669][ T5089]  ? __set_current_blocked+0x310/0x380
[   75.503133][ T5089]  ? __might_fault+0xc6/0x120
[   75.507818][ T5089]  ksys_write+0x1a0/0x2c0
[   75.512158][ T5089]  ? __pfx_ksys_write+0x10/0x10
[   75.517013][ T5089]  ? do_syscall_64+0x100/0x230
[   75.521781][ T5089]  ? do_syscall_64+0xb6/0x230
[   75.526465][ T5089]  do_syscall_64+0xf3/0x230
[   75.530975][ T5089]  ? clear_bhb_loop+0x35/0x90
[   75.535660][ T5089]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   75.541571][ T5089] RIP: 0033:0x7f02a5716bf2
[   75.546012][ T5089] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83
[   75.565629][ T5089] RSP: 002b:00007ffdfdf9c778 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   75.574043][ T5089] RAX: ffffffffffffffda RBX: 000000000000002c RCX: 00007f02a5716bf2
[   75.582013][ T5089] RDX: 000000000000002c RSI: 000055b4346c9960 RDI: 0000000000000004
[   75.589980][ T5089] RBP: 000055b4346d7220 R08: 0000000000000000 R09: 0000000000000000
[   75.597944][ T5089] R10: 0000000000000000 R11: 0000000000000246 R12: 000055b42003faa4
[   75.605914][ T5089] R13: 000000000000004a R14: 000055b4200403e8 R15: 00007ffdfdf9c7e8
[   75.613892][ T5089]  </TASK>