Warning: Permanently added '10.128.0.148' (ED25519) to the list of known hosts. 2024/06/30 05:41:37 ignoring optional flag "sandboxArg"="0" 2024/06/30 05:41:38 parsed 1 programs [ 48.709869][ T3480] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 49.788744][ T3507] veth0_vlan: entered promiscuous mode 2024/06/30 05:41:39 executed programs: 0 [ 50.500554][ T11] veth0_vlan: left promiscuous mode [ 52.694646][ T3753] veth0_vlan: entered promiscuous mode [ 52.774567][ T3748] veth0_vlan: entered promiscuous mode [ 52.795322][ T3751] veth0_vlan: entered promiscuous mode [ 52.814632][ T3746] veth0_vlan: entered promiscuous mode [ 52.928614][ T3752] veth0_vlan: entered promiscuous mode [ 53.764938][ T4691] [ 53.767300][ T4691] ============================================ [ 53.773412][ T4691] WARNING: possible recursive locking detected [ 53.779525][ T4691] 6.9.0-rc1-syzkaller #0 Not tainted [ 53.784819][ T4691] -------------------------------------------- [ 53.791016][ T4691] syz-executor/4691 is trying to acquire lock: [ 53.797388][ T4691] ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 53.807693][ T4691] [ 53.807693][ T4691] but task is already holding lock: [ 53.815284][ T4691] ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 53.825657][ T4691] [ 53.825657][ T4691] other info that might help us debug this: [ 53.833775][ T4691] Possible unsafe locking scenario: [ 53.833775][ T4691] [ 53.841286][ T4691] CPU0 [ 53.844554][ T4691] ---- [ 53.847798][ T4691] lock(lock#9); [ 53.851482][ T4691] lock(lock#9); [ 53.855086][ T4691] [ 53.855086][ T4691] *** DEADLOCK *** [ 53.855086][ T4691] [ 53.863297][ T4691] May be due to missing lock nesting notation [ 53.863297][ T4691] [ 53.871585][ T4691] 5 locks held by syz-executor/4691: [ 53.877178][ T4691] #0: ffff88810c8bf360 (&mm->mmap_lock){++++}-{3:3}, at: lock_mm_and_find_vma+0x25/0x130 [ 53.887030][ T4691] #1: ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 53.897662][ T4691] #2: ffffffff83f8a910 (rcu_read_lock){....}-{1:2}, at: get_mm_memcg_path+0x3d/0x2c0 [ 53.907164][ T4691] #3: ffffffff83f8a910 (rcu_read_lock){....}-{1:2}, at: trace_call_bpf+0x4b/0x3d0 [ 53.916844][ T4691] #4: ffff88810c8bf360 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0xb5/0x360 [ 53.927580][ T4691] [ 53.927580][ T4691] stack backtrace: [ 53.933790][ T4691] CPU: 1 PID: 4691 Comm: syz-executor Not tainted 6.9.0-rc1-syzkaller #0 [ 53.942162][ T4691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 53.952368][ T4691] Call Trace: [ 53.955624][ T4691] [ 53.958614][ T4691] dump_stack_lvl+0xa3/0x100 [ 53.963366][ T4691] __lock_acquire+0x10bf/0x2490 [ 53.968265][ T4691] ? jbd2_write_access_granted+0x27/0x140 [ 53.973958][ T4691] ? look_up_lock_class+0x6a/0xd0 [ 53.978951][ T4691] ? __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 53.985766][ T4691] lock_acquire+0xeb/0x270 [ 53.990318][ T4691] ? __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 53.997128][ T4691] ? __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 54.003938][ T4691] __mmap_lock_do_trace_acquire_returned+0x56/0x200 [ 54.010922][ T4691] ? __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 54.017745][ T4691] stack_map_get_build_id_offset+0x252/0x360 [ 54.023698][ T4691] __bpf_get_stack+0x1d7/0x240 [ 54.028425][ T4691] ___bpf_prog_run+0x5f6/0x2280 [ 54.033415][ T4691] __bpf_prog_run32+0xbb/0xe0 [ 54.038058][ T4691] ? migrate_disable+0x38/0xb0 [ 54.042785][ T4691] ? trace_call_bpf+0x4b/0x3d0 [ 54.047944][ T4691] trace_call_bpf+0x164/0x3d0 [ 54.052580][ T4691] ? trace_call_bpf+0x4b/0x3d0 [ 54.057302][ T4691] perf_trace_run_bpf_submit+0x3b/0xa0 [ 54.062809][ T4691] perf_trace_mmap_lock_acquire_returned+0x141/0x170 [ 54.069877][ T4691] ? __mmap_lock_do_trace_acquire_returned+0x3e/0x200 [ 54.076596][ T4691] __mmap_lock_do_trace_acquire_returned+0x1e1/0x200 [ 54.083227][ T4691] lock_mm_and_find_vma+0xea/0x130 [ 54.088297][ T4691] exc_page_fault+0x1a0/0x730 [ 54.092935][ T4691] asm_exc_page_fault+0x26/0x30 [ 54.097754][ T4691] RIP: 0033:0x7fc4fb3cc9f0 [ 54.102221][ T4691] Code: Unable to access opcode bytes at 0x7fc4fb3cc9c6. [ 54.109209][ T4691] RSP: 002b:00007fffc6e920a8 EFLAGS: 00010202 [ 54.115233][ T4691] RAX: 00007fc4fb3cc9f0 RBX: 0000000000000000 RCX: 00007fc4fa5748a0 [ 54.123174][ T4691] RDX: 0000001b32520000 RSI: 00007fffc6e920c0 RDI: 0000000000000001 [ 54.131282][ T4691] RBP: 00007fffc6e92230 R08: 0000000000000000 R09: 0000000000000000 [ 54.139215][ T4691] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 54.147244][ T4691] R13: 0000000000001388 R14: 00007fffc6e923b0 R15: 00007fffc6e923b0 [ 54.155368][ T4691] 2024/06/30 05:41:44 executed programs: 187 2024/06/30 05:41:49 executed programs: 1252