Warning: Permanently added '10.128.1.108' (ED25519) to the list of known hosts. 2024/05/21 22:21:29 ignoring optional flag "sandboxArg"="0" 2024/05/21 22:21:29 parsed 1 programs 2024/05/21 22:21:29 executed programs: 0 [ 43.386573][ T1788] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS [ 43.718174][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.725558][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.745705][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.753758][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.761807][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.769886][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.900476][ T1794] device veth0_vlan entered promiscuous mode [ 43.906886][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.915033][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.922947][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.930373][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.002334][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.037207][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.045704][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.103513][ T2023] [ 44.106117][ T2023] ============================================ [ 44.112317][ T2023] WARNING: possible recursive locking detected [ 44.118515][ T2023] 5.15.159-syzkaller #0 Not tainted [ 44.123674][ T2023] -------------------------------------------- [ 44.129794][ T2023] udevd/2023 is trying to acquire lock: [ 44.135385][ T2023] ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 44.145773][ T2023] [ 44.145773][ T2023] but task is already holding lock: [ 44.153185][ T2023] ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 44.163481][ T2023] [ 44.163481][ T2023] other info that might help us debug this: [ 44.171510][ T2023] Possible unsafe locking scenario: [ 44.171510][ T2023] [ 44.178933][ T2023] CPU0 [ 44.182271][ T2023] ---- [ 44.185523][ T2023] lock(lock#7); [ 44.189212][ T2023] lock(lock#7); [ 44.192810][ T2023] [ 44.192810][ T2023] *** DEADLOCK *** [ 44.192810][ T2023] [ 44.201100][ T2023] May be due to missing lock nesting notation [ 44.201100][ T2023] [ 44.209657][ T2023] 5 locks held by udevd/2023: [ 44.214298][ T2023] #0: ffff8881057a2828 (&mm->mmap_lock){++++}-{3:3}, at: exc_page_fault+0x142/0x790 [ 44.223812][ T2023] #1: ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 44.234362][ T2023] #2: ffffffff82f775e0 (rcu_read_lock){....}-{1:2}, at: get_mm_memcg_path+0x21/0x2f0 [ 44.243921][ T2023] #3: ffffffff82f775e0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0x0/0x180 [ 44.253092][ T2023] #4: ffff8881057a2828 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0x81/0x270 [ 44.263823][ T2023] [ 44.263823][ T2023] stack backtrace: [ 44.269676][ T2023] CPU: 1 PID: 2023 Comm: udevd Not tainted 5.15.159-syzkaller #0 [ 44.277353][ T2023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 44.287377][ T2023] Call Trace: [ 44.290807][ T2023] [ 44.293714][ T2023] dump_stack_lvl+0x57/0x7d [ 44.298184][ T2023] __lock_acquire.cold+0x130/0x2c5 [ 44.303257][ T2023] lock_acquire+0xbb/0x290 [ 44.307640][ T2023] ? __mmap_lock_do_trace_start_locking+0x1f0/0x1f0 [ 44.314280][ T2023] __mmap_lock_do_trace_acquire_returned+0x4a/0x200 [ 44.321366][ T2023] ? __mmap_lock_do_trace_start_locking+0x1f0/0x1f0 [ 44.327923][ T2023] stack_map_get_build_id_offset+0x21a/0x270 [ 44.333962][ T2023] __bpf_get_stack+0x150/0x260 [ 44.338689][ T2023] bpf_get_stack_raw_tp+0x7b/0xa0 [ 44.343674][ T2023] ___bpf_prog_run+0xddc/0x1ef0 [ 44.348486][ T2023] __bpf_prog_run32+0x31/0x60 [ 44.353126][ T2023] ? bpf_trace_run3+0x180/0x180 [ 44.357937][ T2023] bpf_trace_run4+0x6d/0x180 [ 44.362490][ T2023] __mmap_lock_do_trace_acquire_returned+0x174/0x200 [ 44.369127][ T2023] exc_page_fault+0x2ce/0x790 [ 44.373775][ T2023] asm_exc_page_fault+0x22/0x30 [ 44.378590][ T2023] RIP: 0033:0x558ed66f47fc [ 44.382982][ T2023] Code: c7 e8 a0 cf 01 00 4c 89 e7 e8 a4 cf 01 00 e8 0b d4 ff ff 89 c3 83 f8 ff 0f 84 3e 06 00 00 85 c0 0f 85 80 06 00 00 49 8b 6d 18 <49> c7 45 18 00 00 00 00 4c 8d 2d 35 c8 03 00 e8 fb fe ff ff 48 8b [ 44.402639][ T2023] RSP: 002b:00007fff96ace5c0 EFLAGS: 00010246 [ 44.408665][ T2023] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007feef31bb098 [ 44.416654][ T2023] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 44.424597][ T2023] RBP: 0000558ed7eb21a0 R08: 0000000000000000 R09: 0000558ed7ea1910 [ 44.432580][ T2023] R10: 00007feef31bb088 R11: 0000000000000246 R12: 0000558ed7eb2ff0 [ 44.440518][ T2023] R13: 0000558ed7ec31f0 R14: 0000000000000000 R15: 0000558ed7ea1910 [ 44.448455][ T2023] 2024/05/21 22:21:34 executed programs: 185 2024/05/21 22:21:39 executed programs: 419