process 'syz-executor101' launched './file1' with NULL argv: empty string added ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5086 at kernel/signal.c:762 signal_wake_up_state+0xec/0x120 kernel/signal.c:762 Modules linked in: CPU: 0 PID: 5086 Comm: file1 Not tainted 6.9.0-rc4-syzkaller-00266-g977b1ef51866 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:signal_wake_up_state+0xec/0x120 kernel/signal.c:762 Code: 10 e8 a8 ca 39 00 5b 41 5e 41 5f 5d c3 cc cc cc cc e8 98 ca 39 00 48 89 df 5b 41 5e 41 5f 5d e9 da 06 0a 00 e8 85 ca 39 00 90 <0f> 0b 90 eb a3 48 c7 c1 bc 16 a9 8f 80 e1 07 80 c1 03 38 c1 0f 8c RSP: 0018:ffffc9000339f918 EFLAGS: 00010093 RAX: ffffffff815c36db RBX: ffff8880242f0000 RCX: ffff888029cd0000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff815c3674 R09: fffff52000673f04 R10: dffffc0000000000 R11: fffff52000673f04 R12: ffff8880242f0000 R13: ffff888029cd0908 R14: 0000000000000108 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000078da4000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: signal_wake_up include/linux/sched/signal.h:448 [inline] zap_process fs/coredump.c:373 [inline] zap_threads fs/coredump.c:392 [inline] coredump_wait fs/coredump.c:410 [inline] do_coredump+0x8ec/0x2b50 fs/coredump.c:571 get_signal+0x13fa/0x1740 kernel/signal.c:2896 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] irqentry_exit_to_user_mode+0x79/0x280 kernel/entry/common.c:231 exc_page_fault+0x585/0x8e0 arch/x86/mm/fault.c:1566 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 002b:00007ffc413c84f0 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000