./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor625911830 <...> Warning: Permanently added '10.128.0.45' (ED25519) to the list of known hosts. execve("./syz-executor625911830", ["./syz-executor625911830"], 0x7ffe9c496a80 /* 10 vars */) = 0 brk(NULL) = 0x555588b1c000 brk(0x555588b1cd00) = 0x555588b1cd00 arch_prctl(ARCH_SET_FS, 0x555588b1c380) = 0 set_tid_address(0x555588b1c650) = 5829 set_robust_list(0x555588b1c660, 24) = 0 rseq(0x555588b1cca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor625911830", 4096) = 27 getrandom("\x25\x3b\x1a\xa6\xcf\x88\x1c\xde", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555588b1cd00 brk(0x555588b3dd00) = 0x555588b3dd00 brk(0x555588b3e000) = 0x555588b3e000 mprotect(0x7f0065246000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5830 attached , child_tidptr=0x555588b1c650) = 5830 [pid 5830] set_robust_list(0x555588b1c660, 24) = 0 [pid 5830] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5830] getppid() = 0 [pid 5830] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 5830] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 5830] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 5830] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 5830] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 5830] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 5830] unshare(CLONE_NEWNS) = 0 [pid 5830] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 5830] unshare(CLONE_NEWIPC) = 0 [pid 5830] unshare(CLONE_NEWCGROUP) = 0 [pid 5830] unshare(CLONE_NEWUTS) = 0 [pid 5830] unshare(CLONE_SYSVSEM) = 0 [pid 5830] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5830] write(3, "16777216", 8) = 8 [pid 5830] close(3) = 0 [pid 5830] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 5830] write(3, "536870912", 9) = 9 [pid 5830] close(3) = 0 [pid 5830] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5830] write(3, "1024", 4) = 4 [pid 5830] close(3) = 0 [pid 5830] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5830] write(3, "8192", 4) = 4 [pid 5830] close(3) = 0 [pid 5830] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5830] write(3, "1024", 4) = 4 [pid 5830] close(3) = 0 [pid 5830] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 5830] write(3, "1024", 4) = 4 [pid 5830] close(3) = 0 [pid 5830] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 5830] write(3, "1024 1048576 500 1024", 21) = 21 [pid 5830] close(3) = 0 [pid 5830] getpid() = 1 [pid 5830] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<] handle_softirqs+0x128/0x9b0 [ 63.835312][ C1] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00174-ga024e377efed #0 [ 63.845923][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 63.856086][ C1] Call Trace: [ 63.859375][ C1] [ 63.862296][ C1] dump_stack_lvl+0x241/0x360 [ 63.866970][ C1] ? __pfx_dump_stack_lvl+0x10/0x10 [ 63.872164][ C1] ? __pfx__printk+0x10/0x10 [ 63.876753][ C1] ? handle_softirqs+0x128/0x9b0 [ 63.881687][ C1] __might_resched+0x5d4/0x780 [ 63.886439][ C1] ? kasan_save_track+0x51/0x80 [ 63.891279][ C1] ? kasan_save_track+0x3f/0x80 [ 63.896151][ C1] ? handle_softirqs+0x128/0x9b0 [ 63.901122][ C1] ? __pfx___might_resched+0x10/0x10 [ 63.906401][ C1] ? run_ksoftirqd+0xca/0x130 [ 63.911076][ C1] ? kthread+0x2f0/0x390 [ 63.915331][ C1] ? ret_from_fork+0x4b/0x80 [ 63.919940][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 63.924874][ C1] __mutex_lock+0x131/0xee0 [ 63.929383][ C1] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 63.935355][ C1] ? crypto_put_default_null_skcipher+0x18/0x70 [ 63.941623][ C1] ? __pfx___mutex_lock+0x10/0x10 [ 63.946653][ C1] ? aead_release+0x38/0x50 [ 63.951146][ C1] ? kfree+0x196/0x430 [ 63.955208][ C1] ? __phys_addr+0xba/0x170 [ 63.959724][ C1] ? aead_release+0x38/0x50 [ 63.964229][ C1] ? rcu_core+0xa37/0x17a0 [ 63.968663][ C1] crypto_put_default_null_skcipher+0x18/0x70 [ 63.974723][ C1] aead_release+0x3d/0x50 [ 63.979040][ C1] alg_sock_destruct+0x86/0xc0 [ 63.983805][ C1] ? __pfx_alg_sock_destruct+0x10/0x10 [ 63.989268][ C1] __sk_destruct+0x58/0x5f0 [ 63.993792][ C1] ? rcu_core+0xa37/0x17a0 [ 63.998208][ C1] ? __pfx___sk_destruct+0x10/0x10 [ 64.003316][ C1] rcu_core+0xaaa/0x17a0 [ 64.007574][ C1] ? __pfx_rcu_core+0x10/0x10 [ 64.012252][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 64.017445][ C1] ? sched_clock+0x4a/0x70 [ 64.021858][ C1] ? sched_clock_cpu+0x76/0x490 [ 64.026706][ C1] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 64.032696][ C1] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 64.039012][ C1] ? __schedule+0x1858/0x4c30 [ 64.043696][ C1] handle_softirqs+0x2d4/0x9b0 [ 64.048474][ C1] ? run_ksoftirqd+0xca/0x130 [ 64.053162][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 64.058458][ C1] run_ksoftirqd+0xca/0x130 [ 64.062953][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 64.068062][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 64.073166][ C1] smpboot_thread_fn+0x544/0xa30 [ 64.078100][ C1] ? smpboot_thread_fn+0x4e/0xa30 [ 64.083123][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 64.088575][ C1] kthread+0x2f0/0x390 [ 64.092637][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 64.098084][ C1] ? __pfx_kthread+0x10/0x10 [ 64.102688][ C1] ret_from_fork+0x4b/0x80 [ 64.107110][ C1] ? __pfx_kthread+0x10/0x10 [ 64.111693][ C1] ret_from_fork_asm+0x1a/0x30 [ 64.116472][ C1] [ 64.119551][ C1] [ 64.121892][ C1] ============================= [ 64.126736][ C1] [ BUG: Invalid wait context ] [ 64.131675][ C1] 6.13.0-rc3-syzkaller-00174-ga024e377efed #0 Tainted: G W [ 64.140260][ C1] ----------------------------- [ 64.145089][ C1] ksoftirqd/1/24 is trying to lock: [ 64.150281][ C1] ffffffff8f035d88 (crypto_default_null_skcipher_lock){+.+.}-{4:4}, at: crypto_put_default_null_skcipher+0x18/0x70 [ 64.162359][ C1] other info that might help us debug this: [ 64.168226][ C1] context-{3:3} [ 64.171667][ C1] 1 lock held by ksoftirqd/1/24: [ 64.176585][ C1] #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xa37/0x17a0 [ 64.185456][ C1] stack backtrace: [ 64.189159][ C1] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Tainted: G W 6.13.0-rc3-syzkaller-00174-ga024e377efed #0 [ 64.201205][ C1] Tainted: [W]=WARN [ 64.204990][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 64.215028][ C1] Call Trace: [ 64.218292][ C1] [ 64.221208][ C1] dump_stack_lvl+0x241/0x360 [ 64.225883][ C1] ? __pfx_dump_stack_lvl+0x10/0x10 [ 64.231074][ C1] ? __pfx__printk+0x10/0x10 [ 64.235658][ C1] __lock_acquire+0x15a8/0x2100 [ 64.240505][ C1] lock_acquire+0x1ed/0x550 [ 64.245000][ C1] ? crypto_put_default_null_skcipher+0x18/0x70 [ 64.251227][ C1] ? __pfx_lock_acquire+0x10/0x10 [ 64.256238][ C1] ? handle_softirqs+0x128/0x9b0 [ 64.261179][ C1] ? __pfx___might_resched+0x10/0x10 [ 64.266465][ C1] ? run_ksoftirqd+0xca/0x130 [ 64.271133][ C1] ? kthread+0x2f0/0x390 [ 64.275367][ C1] ? ret_from_fork+0x4b/0x80 [ 64.279946][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 64.284870][ C1] __mutex_lock+0x1ac/0xee0 [ 64.289367][ C1] ? crypto_put_default_null_skcipher+0x18/0x70 [ 64.295595][ C1] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 64.301563][ C1] ? crypto_put_default_null_skcipher+0x18/0x70 [ 64.307807][ C1] ? __pfx___mutex_lock+0x10/0x10 [ 64.312848][ C1] ? aead_release+0x38/0x50 [ 64.317344][ C1] ? kfree+0x196/0x430 [ 64.321410][ C1] ? __phys_addr+0xba/0x170 [ 64.325936][ C1] ? aead_release+0x38/0x50 [ 64.330433][ C1] ? rcu_core+0xa37/0x17a0 [ 64.334841][ C1] crypto_put_default_null_skcipher+0x18/0x70 [ 64.340893][ C1] aead_release+0x3d/0x50 [ 64.345206][ C1] alg_sock_destruct+0x86/0xc0 [ 64.349959][ C1] ? __pfx_alg_sock_destruct+0x10/0x10 [ 64.355408][ C1] __sk_destruct+0x58/0x5f0 [ 64.359911][ C1] ? rcu_core+0xa37/0x17a0 [ 64.364323][ C1] ? __pfx___sk_destruct+0x10/0x10 [ 64.369424][ C1] rcu_core+0xaaa/0x17a0 [ 64.373668][ C1] ? __pfx_rcu_core+0x10/0x10 [ 64.378347][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 64.383540][ C1] ? sched_clock+0x4a/0x70 [ 64.387956][ C1] ? sched_clock_cpu+0x76/0x490 [ 64.392818][ C1] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 64.398788][ C1] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 64.405118][ C1] ? __schedule+0x1858/0x4c30 [ 64.409785][ C1] handle_softirqs+0x2d4/0x9b0 [ 64.414544][ C1] ? run_ksoftirqd+0xca/0x130 [ 64.419225][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 64.424510][ C1] run_ksoftirqd+0xca/0x130 [ 64.429016][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 64.434121][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 64.439234][ C1] smpboot_thread_fn+0x544/0xa30 [ 64.444177][ C1] ? smpboot_thread_fn+0x4e/0xa30 [ 64.449223][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 64.454675][ C1] kthread+0x2f0/0x390 [ 64.458732][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 64.464203][ C1] ? __pfx_kthread+0x10/0x10 [ 64.468811][ C1] ret_from_fork+0x4b/0x80 [ 64.473220][ C1] ? __pfx_kthread+0x10/0x10 [ 64.477806][ C1] ret_from_fork_asm+0x1a/0x30 [pid 5830] +++ exited with 1 +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=5830, si_uid=0, si_status=1, si_utime=0, si_stime=9 /* 0.09 s */} --- exit_group(0) = ? +++ exited with 0 +++ [ 64.482559][ C1]