Warning: Permanently added '10.128.0.201' (ED25519) to the list of known hosts. 2024/07/02 09:36:56 ignoring optional flag "sandboxArg"="0" 2024/07/02 09:36:57 parsed 1 programs 2024/07/02 09:36:57 executed programs: 0 [ 43.683336][ T1692] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS [ 44.047944][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.055421][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.078047][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.086584][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.094818][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.102719][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.242163][ T1698] device veth0_vlan entered promiscuous mode [ 44.248761][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.257077][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.265153][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.272523][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.344872][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.384720][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.393261][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.458499][ T1926] [ 44.460828][ T1926] ============================================ [ 44.466939][ T1926] WARNING: possible recursive locking detected [ 44.473059][ T1926] 5.15.161-syzkaller #0 Not tainted [ 44.478245][ T1926] -------------------------------------------- [ 44.484641][ T1926] udevd/1926 is trying to acquire lock: [ 44.490170][ T1926] ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 44.500320][ T1926] [ 44.500320][ T1926] but task is already holding lock: [ 44.507645][ T1926] ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 44.518337][ T1926] [ 44.518337][ T1926] other info that might help us debug this: [ 44.526488][ T1926] Possible unsafe locking scenario: [ 44.526488][ T1926] [ 44.534204][ T1926] CPU0 [ 44.537470][ T1926] ---- [ 44.540727][ T1926] lock(lock#7); [ 44.544516][ T1926] lock(lock#7); [ 44.548124][ T1926] [ 44.548124][ T1926] *** DEADLOCK *** [ 44.548124][ T1926] [ 44.556660][ T1926] May be due to missing lock nesting notation [ 44.556660][ T1926] [ 44.565309][ T1926] 5 locks held by udevd/1926: [ 44.570051][ T1926] #0: ffff88810f36d5a8 (&mm->mmap_lock){++++}-{3:3}, at: exc_page_fault+0x142/0x740 [ 44.579486][ T1926] #1: ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 44.590180][ T1926] #2: ffffffff82f775e0 (rcu_read_lock){....}-{1:2}, at: get_mm_memcg_path+0x21/0x2f0 [ 44.599981][ T1926] #3: ffffffff82f775e0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0x0/0x180 [ 44.609150][ T1926] #4: ffff88810f36d5a8 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0x81/0x270 [ 44.620573][ T1926] [ 44.620573][ T1926] stack backtrace: [ 44.626527][ T1926] CPU: 1 PID: 1926 Comm: udevd Not tainted 5.15.161-syzkaller #0 [ 44.634299][ T1926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 44.644679][ T1926] Call Trace: [ 44.648142][ T1926] [ 44.651053][ T1926] dump_stack_lvl+0x57/0x7d [ 44.655525][ T1926] __lock_acquire.cold+0x130/0x2c5 [ 44.660603][ T1926] lock_acquire+0xbb/0x290 [ 44.665250][ T1926] ? __mmap_lock_do_trace_start_locking+0x1f0/0x1f0 [ 44.671837][ T1926] __mmap_lock_do_trace_acquire_returned+0x4a/0x200 [ 44.678583][ T1926] ? __mmap_lock_do_trace_start_locking+0x1f0/0x1f0 [ 44.685227][ T1926] stack_map_get_build_id_offset+0x21a/0x270 [ 44.691371][ T1926] __bpf_get_stack+0x150/0x260 [ 44.696121][ T1926] bpf_get_stack_raw_tp+0x7b/0xa0 [ 44.701200][ T1926] ___bpf_prog_run+0xddc/0x1ef0 [ 44.706135][ T1926] __bpf_prog_run32+0x31/0x60 [ 44.710774][ T1926] ? bpf_trace_run3+0x180/0x180 [ 44.715585][ T1926] bpf_trace_run4+0x6d/0x180 [ 44.720364][ T1926] __mmap_lock_do_trace_acquire_returned+0x174/0x200 [ 44.727182][ T1926] exc_page_fault+0x2c0/0x740 [ 44.731831][ T1926] asm_exc_page_fault+0x22/0x30 [ 44.736652][ T1926] RIP: 0033:0x7f7b6b5cd6e0 [ 44.741131][ T1926] Code: Unable to access opcode bytes at RIP 0x7f7b6b5cd6b6. [ 44.748456][ T1926] RSP: 002b:00007ffde364d0a8 EFLAGS: 00010202 [ 44.754490][ T1926] RAX: 000055abe3378520 RBX: 000000000000002c RCX: 00007f7b6b57f9a4 [ 44.762772][ T1926] RDX: 00000000fbad2484 RSI: 000000000000002c RDI: 000055abe135072f [ 44.770719][ T1926] RBP: 000055abe135072f R08: 0000000000000004 R09: 0000000000000001 [ 44.778660][ T1926] R10: 00000000000001b6 R11: 0000000000000246 R12: 00007f7b6b61dc20 [ 44.786696][ T1926] R13: 000055abe3378520 R14: 0000000000000001 R15: 000055abe3354910 [ 44.794633][ T1926] 2024/07/02 09:37:02 executed programs: 173 2024/07/02 09:37:07 executed programs: 397