[ 65.374394][ T10] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.1.32' (ED25519) to the list of known hosts. 2024/11/05 07:17:12 ignoring optional flag "sandboxArg"="0" 2024/11/05 07:17:12 parsed 1 programs [ 69.657085][ T3918] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.111843][ T3935] veth0_vlan: entered promiscuous mode [ 71.389539][ T2835] veth0_vlan: left promiscuous mode 2024/11/05 07:17:15 executed programs: 0 [ 72.420123][ T4149] veth0_vlan: entered promiscuous mode [ 72.907571][ T4149] [ 72.909918][ T4149] ============================= [ 72.914735][ T4149] [ BUG: Invalid wait context ] [ 72.919559][ T4149] 6.12.0-rc2-syzkaller #0 Not tainted [ 72.924900][ T4149] ----------------------------- [ 72.929725][ T4149] syz-executor/4149 is trying to lock: [ 72.935148][ T4149] ffffffff84042300 (kernfs_rename_lock){....}-{3:3}, at: kernfs_path_from_node+0x38/0x3c0 [ 72.945006][ T4149] other info that might help us debug this: [ 72.950872][ T4149] context-{5:5} [ 72.954308][ T4149] 3 locks held by syz-executor/4149: [ 72.959552][ T4149] #0: ffff888237d320d8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x1f/0x70 [ 72.969322][ T4149] #1: ffffffff83ff0910 (rcu_read_lock){....}-{1:3}, at: bpf_trace_run2+0x8d/0x200 [ 72.978569][ T4149] #2: ffff8881149a5918 (&mm->mmap_lock){++++}-{4:4}, at: stack_map_get_build_id_offset+0xb2/0x350 [ 72.989204][ T4149] stack backtrace: [ 72.992899][ T4149] CPU: 1 UID: 0 PID: 4149 Comm: syz-executor Not tainted 6.12.0-rc2-syzkaller #0 [ 73.001972][ T4149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 73.012005][ T4149] Call Trace: [ 73.015261][ T4149] [ 73.018165][ T4149] dump_stack_lvl+0xa3/0x100 [ 73.023069][ T4149] __lock_acquire+0xc89/0x2570 [ 73.027801][ T4149] ? __lock_acquire+0x4e1/0x2570 [ 73.032709][ T4149] ? look_up_lock_class+0x6a/0xe0 [ 73.037705][ T4149] ? kernfs_path_from_node+0x38/0x3c0 [ 73.043045][ T4149] lock_acquire+0xeb/0x270 [ 73.047515][ T4149] ? kernfs_path_from_node+0x38/0x3c0 [ 73.052950][ T4149] ? percpu_ref_tryget+0x12/0x120 [ 73.057951][ T4149] _raw_read_lock_irqsave+0x69/0xa0 [ 73.063127][ T4149] ? kernfs_path_from_node+0x38/0x3c0 [ 73.068469][ T4149] kernfs_path_from_node+0x38/0x3c0 [ 73.073634][ T4149] get_mm_memcg_path+0x49/0x170 [ 73.078460][ T4149] __mmap_lock_do_trace_acquire_returned+0x51/0xf0 [ 73.084927][ T4149] ? down_read_trylock+0xc5/0xf0 [ 73.089829][ T4149] stack_map_get_build_id_offset+0x263/0x350 [ 73.095775][ T4149] __bpf_get_stack+0x3ff/0x450 [ 73.100591][ T4149] bpf_get_stack+0x18/0x30 [ 73.104974][ T4149] bpf_get_stack_raw_tp+0xa7/0xc0 [ 73.109963][ T4149] ? bpf_trace_run2+0x8d/0x200 [ 73.114690][ T4149] ___bpf_prog_run+0x5f6/0x2280 [ 73.119509][ T4149] ? bpf_trace_run2+0x8d/0x200 [ 73.124336][ T4149] __bpf_prog_run32+0xbb/0xe0 [ 73.128977][ T4149] ? bpf_trace_run2+0x8d/0x200 [ 73.133703][ T4149] bpf_trace_run2+0x106/0x200 [ 73.138344][ T4149] switch_mm_irqs_off+0x541/0x630 [ 73.143334][ T4149] __schedule+0x602/0xb90 [ 73.147627][ T4149] ? schedule+0x21/0x140 [ 73.151831][ T4149] schedule+0xac/0x140 [ 73.155860][ T4149] do_nanosleep+0x4d/0x130 [ 73.160245][ T4149] ? _raw_spin_unlock_irqrestore+0x6c/0xb0 [ 73.166013][ T4149] hrtimer_nanosleep+0x18d/0x210 [ 73.171346][ T4149] ? __pfx_hrtimer_wakeup+0x10/0x10 [ 73.176511][ T4149] __se_sys_clock_nanosleep+0xf2/0x160 [ 73.182085][ T4149] do_syscall_64+0xa0/0x1b0 [ 73.186548][ T4149] ? clear_bhb_loop+0x35/0x90 [ 73.191186][ T4149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.197054][ T4149] RIP: 0033:0x7f63cefb07c3 [ 73.201437][ T4149] Code: Unable to access opcode bytes at 0x7f63cefb0799. [ 73.208439][ T4149] RSP: 002b:00007fffc9a11c28 EFLAGS: 00000202 ORIG_RAX: 00000000000000e6 [ 73.216817][ T4149] RAX: ffffffffffffffda RBX: 000000000000001c RCX: 00007f63cefb07c3 [ 73.224942][ T4149] RDX: 00007fffc9a11c40 RSI: 0000000000000000 RDI: 0000000000000000 [ 73.233052][ T4149] RBP: 00007fffc9a11c9c R08: 00000000338618b4 R09: 7fffffffffffffff [ 73.241075][ T4149] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 73.249036][ T4149] R13: 0000000000011ca0 R14: 0000000000011c96 R15: 00007fffc9a11cf0 [ 73.257025][ T4149] 2024/11/05 07:17:20 executed programs: 178 2024/11/05 07:17:26 executed programs: 420