------------[ cut here ]------------ DEBUG_LOCKS_WARN_ON(1) WARNING: CPU: 1 PID: 18837 at kernel/locking/lockdep.c:232 hlock_class kernel/locking/lockdep.c:232 [inline] WARNING: CPU: 1 PID: 18837 at kernel/locking/lockdep.c:232 check_wait_context kernel/locking/lockdep.c:4850 [inline] WARNING: CPU: 1 PID: 18837 at kernel/locking/lockdep.c:232 __lock_acquire+0x564/0x2100 kernel/locking/lockdep.c:5176 Modules linked in: CPU: 1 UID: 0 PID: 18837 Comm: syz-executor Not tainted 6.13.0-rc2-syzkaller-00382-gdccbe2047a5b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 RIP: 0010:hlock_class kernel/locking/lockdep.c:232 [inline] RIP: 0010:check_wait_context kernel/locking/lockdep.c:4850 [inline] RIP: 0010:__lock_acquire+0x564/0x2100 kernel/locking/lockdep.c:5176 Code: 00 00 83 3d e1 f1 9e 0e 00 75 23 90 48 c7 c7 00 96 0a 8c 48 c7 c6 00 99 0a 8c e8 67 5d e5 ff 48 ba 00 00 00 00 00 fc ff df 90 <0f> 0b 90 90 90 31 db 48 81 c3 c4 00 00 00 48 89 d8 48 c1 e8 03 0f RSP: 0018:ffffc90003bc6d90 EFLAGS: 00010046 RAX: a10f4e6784dfe800 RBX: 00000000000019d8 RCX: ffff88802577bc00 RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00000000000c19d8 R08: ffffffff81601a42 R09: 1ffff110170e519a R10: dffffc0000000000 R11: ffffed10170e519b R12: ffff88802577c6c4 R13: 000000000000000a R14: 1ffff11004aef8ea R15: ffff88802577c750 FS: 000055555bb9b500(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002001d000 CR3: 00000000605ae000 CR4: 0000000000350ef0 Call Trace: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:606 raw_spin_rq_lock kernel/sched/sched.h:1523 [inline] rq_lock kernel/sched/sched.h:1822 [inline] __schedule+0x35a/0x4c30 kernel/sched/core.c:6680 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:should_resched arch/x86/include/asm/preempt.h:103 [inline] RIP: 0010:unwind_next_frame+0x18e6/0x22d0 arch/x86/kernel/unwind_orc.c:672 Code: 00 00 80 3d f5 8e e2 0c 01 75 40 80 3d 72 d0 ce 11 00 75 37 c6 05 69 d0 ce 11 01 e9 21 fa ff ff bf 01 00 00 00 e8 fa c0 21 00 <65> 8b 0d 9b 14 b8 7e b0 01 85 c9 75 73 e8 18 86 be ff eb 6c 80 3d RSP: 0018:ffffc90003bc73d0 EFLAGS: 00000297 RAX: 0000000080000001 RBX: ffffc90003bc74b0 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: ffffc90003bc0000 RDI: 0000000000000001 RBP: ffffc90003bc74a0 R08: ffffc90003bc7b20 R09: ffffc90003bc74f0 R10: dffffc0000000000 R11: fffff52000778ea0 R12: dffffc0000000000 R13: ffffc90003bc74a0 R14: ffffc90003bc0000 R15: ffffc90003bc7b30 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] dropmon_net_event+0x220/0x2a0 net/core/drop_monitor.c:1586 notifier_call_chain+0x1a7/0x3f0 kernel/notifier.c:85 call_netdevice_notifiers_extack net/core/dev.c:2034 [inline] call_netdevice_notifiers net/core/dev.c:2048 [inline] register_netdevice+0x167f/0x1b00 net/core/dev.c:10632 register_netdev+0x3b/0x50 net/core/dev.c:10736 ip6_tnl_init_net+0x236/0x310 net/ipv6/ip6_tunnel.c:2270 ops_init+0x320/0x590 net/core/net_namespace.c:138 setup_net+0x287/0x9e0 net/core/net_namespace.c:362 copy_net_ns+0x33f/0x570 net/core/net_namespace.c:516 create_new_namespaces+0x425/0x7b0 kernel/nsproxy.c:110 unshare_nsproxy_namespaces+0x124/0x180 kernel/nsproxy.c:228 ksys_unshare+0x57d/0xa70 kernel/fork.c:3334 __do_sys_unshare kernel/fork.c:3405 [inline] __se_sys_unshare kernel/fork.c:3403 [inline] __x64_sys_unshare+0x38/0x40 kernel/fork.c:3403 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7991b87517 Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff03994968 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 00007f7991d75f40 RCX: 00007f7991b87517 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f7991d76738 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 80 3d f5 8e e2 0c 01 cmpb $0x1,0xce28ef5(%rip) # 0xce28efe 9: 75 40 jne 0x4b b: 80 3d 72 d0 ce 11 00 cmpb $0x0,0x11ced072(%rip) # 0x11ced084 12: 75 37 jne 0x4b 14: c6 05 69 d0 ce 11 01 movb $0x1,0x11ced069(%rip) # 0x11ced084 1b: e9 21 fa ff ff jmp 0xfffffa41 20: bf 01 00 00 00 mov $0x1,%edi 25: e8 fa c0 21 00 call 0x21c124 * 2a: 65 8b 0d 9b 14 b8 7e mov %gs:0x7eb8149b(%rip),%ecx # 0x7eb814cc <-- trapping instruction 31: b0 01 mov $0x1,%al 33: 85 c9 test %ecx,%ecx 35: 75 73 jne 0xaa 37: e8 18 86 be ff call 0xffbe8654 3c: eb 6c jmp 0xaa 3e: 80 .byte 0x80 3f: 3d .byte 0x3d