process 'syz-executor381' launched './file0' with NULL argv: empty string added process '/root/file0' started with executable stack ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5089 at kernel/signal.c:762 signal_wake_up_state+0xec/0x120 kernel/signal.c:762 Modules linked in: CPU: 0 PID: 5089 Comm: file0 Not tainted 6.9.0-rc7-syzkaller-00008-gee5b455b0ada #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:signal_wake_up_state+0xec/0x120 kernel/signal.c:762 Code: 10 e8 68 cb 39 00 5b 41 5e 41 5f 5d c3 cc cc cc cc e8 58 cb 39 00 48 89 df 5b 41 5e 41 5f 5d e9 4a 09 0a 00 e8 45 cb 39 00 90 <0f> 0b 90 eb a3 48 c7 c1 7c 2a a9 8f 80 e1 07 80 c1 03 38 c1 0f 8c RSP: 0018:ffffc9000344f918 EFLAGS: 00010093 RAX: ffffffff815c3d3b RBX: ffff88801f755a00 RCX: ffff88801f753c00 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff815c3cd4 R09: fffff52000689f04 R10: dffffc0000000000 R11: fffff52000689f04 R12: ffff88801f755a00 R13: ffff88801f754508 R14: 0000000000000108 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000001f93a000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: signal_wake_up include/linux/sched/signal.h:448 [inline] zap_process fs/coredump.c:373 [inline] zap_threads fs/coredump.c:392 [inline] coredump_wait fs/coredump.c:410 [inline] do_coredump+0x8ec/0x2b50 fs/coredump.c:571 get_signal+0x13fa/0x1740 kernel/signal.c:2896 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] irqentry_exit_to_user_mode+0x79/0x280 kernel/entry/common.c:231 exc_page_fault+0x577/0x8a0 arch/x86/mm/fault.c:1535 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0023:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 002b:00000000ffac5b00 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000