./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2011974144 <...> Warning: Permanently added '10.128.10.29' (ED25519) to the list of known hosts. execve("./syz-executor2011974144", ["./syz-executor2011974144"], 0x7ffefe816e80 /* 10 vars */) = 0 brk(NULL) = 0x5555760f7000 brk(0x5555760f7d00) = 0x5555760f7d00 arch_prctl(ARCH_SET_FS, 0x5555760f7380) = 0 set_tid_address(0x5555760f7650) = 5836 set_robust_list(0x5555760f7660, 24) = 0 rseq(0x5555760f7ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2011974144", 4096) = 28 getrandom("\x6c\x6f\x03\x23\x8d\xb4\xcf\x50", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555760f7d00 brk(0x555576118d00) = 0x555576118d00 brk(0x555576119000) = 0x555576119000 mprotect(0x7fa040aa5000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=864, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=5836}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1d\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x30\x00\x00\x00\xe8\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 864 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5836}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5836}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5836}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5836}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5836}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5836}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4executing program ) = 0 write(1, "executing program\n", 18) = 18 ioctl(-1, TUNSETIFF, 0x200000c0) = -1 EBADF (Bad file descriptor) socketpair(AF_UNIX, SOCK_SEQPACKET, 0, [3, 4]) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_controllen=0, msg_flags=0}, MSG_PROBE|MSG_EOR|MSG_MORE) = 0 recvmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_controllen=0, msg_flags=0}, 0) = 0 socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDPLITE) = 5 openat(AT_FDCWD, "cgroup.controllers", O_WRONLY|O_CREAT|O_EXCL|O_TRUNC|O_APPEND|FASYNC|0x20, 000) = 6 setsockopt(5, SOL_SOCKET, SO_BINDTOIFINDEX, [6], 4) = 0 [ 78.212857][ T5836] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 78.247866][ T5836] [ 78.250427][ T5836] ============================= [ 78.255305][ T5836] WARNING: suspicious RCU usage [ 78.260284][ T5836] 6.13.0-rc2-syzkaller-00424-gbc6a5efe3dcd #0 Not tainted [ 78.267481][ T5836] ----------------------------- [ 78.272330][ T5836] net/ethtool/common.c:873 suspicious rcu_dereference_protected() usage! [ 78.281108][ T5836] [ 78.281108][ T5836] other info that might help us debug this: [ 78.281108][ T5836] [ 78.291412][ T5836] [ 78.291412][ T5836] rcu_scheduler_active = 2, debug_locks = 1 [ 78.299742][ T5836] 1 lock held by syz-executor201/5836: [ 78.305225][ T5836] #0: ffff8880322b8258 (sk_lock-AF_INET6){+.+.}-{0:0}, at: sk_setsockopt+0xf0f/0x33b0 [ 78.315047][ T5836] [ 78.315047][ T5836] stack backtrace: [ 78.321180][ T5836] CPU: 1 UID: 0 PID: 5836 Comm: syz-executor201 Not tainted 6.13.0-rc2-syzkaller-00424-gbc6a5efe3dcd #0 [ 78.332291][ T5836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 78.342353][ T5836] Call Trace: [ 78.345633][ T5836] [ 78.348688][ T5836] dump_stack_lvl+0x241/0x360 [ 78.353421][ T5836] ? __pfx_dump_stack_lvl+0x10/0x10 [ 78.358634][ T5836] ? __pfx__printk+0x10/0x10 [ 78.363238][ T5836] lockdep_rcu_suspicious+0x226/0x340 [ 78.368616][ T5836] __ethtool_get_ts_info+0x97/0x410 [ 78.373843][ T5836] ethtool_get_phc_vclocks+0xa1/0x160 [ 78.379222][ T5836] ? __pfx_ethtool_get_phc_vclocks+0x10/0x10 [ 78.385201][ T5836] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 78.391188][ T5836] ? dev_get_by_index+0x23/0x2d0 [ 78.396133][ T5836] sock_set_timestamping+0x3e2/0xab0 [ 78.401421][ T5836] ? __pfx_sock_set_timestamping+0x10/0x10 [ 78.407245][ T5836] sk_setsockopt+0x2150/0x33b0 [ 78.412017][ T5836] ? __pfx_sk_setsockopt+0x10/0x10 [ 78.417140][ T5836] ? __pfx___might_resched+0x10/0x10 [ 78.422454][ T5836] ? do_raw_spin_lock+0x14f/0x370 [ 78.427484][ T5836] udp_lib_setsockopt+0x11d/0xc10 [ 78.432520][ T5836] ? __pfx_udp_lib_setsockopt+0x10/0x10 [ 78.438073][ T5836] ? __pfx_aa_sk_perm+0x10/0x10 [ 78.442944][ T5836] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 78.448943][ T5836] udpv6_setsockopt+0x73/0xb0 [ 78.453725][ T5836] ? __pfx_udp_v6_push_pending_frames+0x10/0x10 [ 78.460019][ T5836] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 78.465933][ T5836] do_sock_setsockopt+0x3af/0x720 [ 78.470976][ T5836] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 78.476531][ T5836] ? ptrace_notify+0x279/0x380 [ 78.481323][ T5836] __x64_sys_setsockopt+0x1ee/0x280 [ 78.486540][ T5836] do_syscall_64+0xf3/0x230 [ 78.491065][ T5836] ? clear_bhb_loop+0x35/0x90 [ 78.495757][ T5836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.501664][ T5836] RIP: 0033:0x7fa040a35469 [ 78.506121][ T5836] Code: 48 83 c4 28 c3 e8 c7 1b 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 78.525755][ T5836] RSP: 002b:00007ffc3978e4f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 78.534195][ T5836] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fa040a35469 [ 78.542183][ T5836] RDX: 0000000000000041 RSI: 0000000000000001 RDI: 0000000000000005 [ 78.550282][ T5836] RBP: 00007fa040aab300 R08: 0000000000000004 R09: 00007ffc3978e530 setsockopt(5, SOL_SOCKET, SO_TIMESTAMPING_NEW, [32768], 4) = -1 EINVAL (Invalid argument) exit_group(0) = ? +++ exited with 0 +++ [ 78.558257][ T5836] R10: 0000000020000040 R11: 0000000000000246 R12: