Warning: Permanently added '10.128.1.199' (ED25519) to the list of known hosts. 2024/08/09 07:22:55 ignoring optional flag "sandboxArg"="0" 2024/08/09 07:22:55 parsed 1 programs 2024/08/09 07:22:55 executed programs: 0 [ 44.565209][ T1693] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS [ 44.906734][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.914225][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.934923][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.943147][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.951378][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.959360][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.089965][ T1698] device veth0_vlan entered promiscuous mode [ 45.096326][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.104569][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.112781][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.120147][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.195524][ T1126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.231940][ T1126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.240354][ T1126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.301019][ T1926] [ 45.303573][ T1926] ============================================ [ 45.309862][ T1926] WARNING: possible recursive locking detected [ 45.316085][ T1926] 5.15.164-syzkaller #0 Not tainted [ 45.321246][ T1926] -------------------------------------------- [ 45.327534][ T1926] udevd/1926 is trying to acquire lock: [ 45.333051][ T1926] ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 45.343175][ T1926] [ 45.343175][ T1926] but task is already holding lock: [ 45.350543][ T1926] ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 45.360661][ T1926] [ 45.360661][ T1926] other info that might help us debug this: [ 45.368770][ T1926] Possible unsafe locking scenario: [ 45.368770][ T1926] [ 45.376682][ T1926] CPU0 [ 45.380055][ T1926] ---- [ 45.383427][ T1926] lock(lock#7); [ 45.387927][ T1926] lock(lock#7); [ 45.391839][ T1926] [ 45.391839][ T1926] *** DEADLOCK *** [ 45.391839][ T1926] [ 45.400050][ T1926] May be due to missing lock nesting notation [ 45.400050][ T1926] [ 45.408515][ T1926] 5 locks held by udevd/1926: [ 45.413339][ T1926] #0: ffff8881059f8e28 (&mm->mmap_lock){++++}-{3:3}, at: exc_page_fault+0x142/0x740 [ 45.423403][ T1926] #1: ffff888237d29880 (lock#7){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x0/0x200 [ 45.434409][ T1926] #2: ffffffff82f775e0 (rcu_read_lock){....}-{1:2}, at: get_mm_memcg_path+0x21/0x2f0 [ 45.444311][ T1926] #3: ffffffff82f775e0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0x0/0x180 [ 45.454196][ T1926] #4: ffff8881059f8e28 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0x81/0x270 [ 45.465408][ T1926] [ 45.465408][ T1926] stack backtrace: [ 45.471263][ T1926] CPU: 1 PID: 1926 Comm: udevd Not tainted 5.15.164-syzkaller #0 [ 45.479379][ T1926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 45.489861][ T1926] Call Trace: [ 45.493249][ T1926] [ 45.496246][ T1926] dump_stack_lvl+0x57/0x7d [ 45.501005][ T1926] __lock_acquire.cold+0x130/0x2c5 [ 45.506350][ T1926] lock_acquire+0xbb/0x290 [ 45.510734][ T1926] ? __mmap_lock_do_trace_start_locking+0x1f0/0x1f0 [ 45.517721][ T1926] __mmap_lock_do_trace_acquire_returned+0x4a/0x200 [ 45.524357][ T1926] ? __mmap_lock_do_trace_start_locking+0x1f0/0x1f0 [ 45.530991][ T1926] stack_map_get_build_id_offset+0x21a/0x270 [ 45.537018][ T1926] __bpf_get_stack+0x150/0x260 [ 45.542039][ T1926] bpf_get_stack_raw_tp+0x7b/0xa0 [ 45.547283][ T1926] ___bpf_prog_run+0xddc/0x1ef0 [ 45.552119][ T1926] __bpf_prog_run32+0x31/0x60 [ 45.556841][ T1926] ? bpf_trace_run3+0x180/0x180 [ 45.561918][ T1926] bpf_trace_run4+0x6d/0x180 [ 45.566554][ T1926] __mmap_lock_do_trace_acquire_returned+0x174/0x200 [ 45.573214][ T1926] exc_page_fault+0x2c0/0x740 [ 45.578124][ T1926] asm_exc_page_fault+0x22/0x30 [ 45.583027][ T1926] RIP: 0033:0x7f49237d56e0 [ 45.587498][ T1926] Code: Unable to access opcode bytes at RIP 0x7f49237d56b6. [ 45.594913][ T1926] RSP: 002b:00007ffc861a2af8 EFLAGS: 00010202 [ 45.601025][ T1926] RAX: 0000556ae521a7e0 RBX: 000000000000002c RCX: 00007f49237879a4 [ 45.609218][ T1926] RDX: 00000000fbad2484 RSI: 000000000000002c RDI: 0000556ae3fb072f [ 45.617323][ T1926] RBP: 0000556ae3fb072f R08: 0000000000000004 R09: 0000000000000001 [ 45.625342][ T1926] R10: 00000000000001b6 R11: 0000000000000246 R12: 00007f4923825c20 [ 45.633273][ T1926] R13: 0000556ae521a7e0 R14: 0000000000000001 R15: 0000556ae51c4910 [ 45.641498][ T1926] 2024/08/09 07:23:00 executed programs: 179 2024/08/09 07:23:05 executed programs: 399