./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor131417568 <...> forked to background, child pid 4749 no interfaces have a carrier [ 32.277643][ T4750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.290222][ T4750] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.105' (ED25519) to the list of known hosts. execve("./syz-executor131417568", ["./syz-executor131417568"], 0x7ffd62ad82f0 /* 10 vars */) = 0 brk(NULL) = 0x55557275a000 brk(0x55557275ad00) = 0x55557275ad00 arch_prctl(ARCH_SET_FS, 0x55557275a380) = 0 set_tid_address(0x55557275a650) = 5080 set_robust_list(0x55557275a660, 24) = 0 rseq(0x55557275aca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor131417568", 4096) = 27 getrandom("\xa9\x4c\x3d\x64\x96\x51\xa8\xa0", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557275ad00 brk(0x55557277bd00) = 0x55557277bd00 brk(0x55557277c000) = 0x55557277c000 mprotect(0x7f20e1c26000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_RINGBUF, key_size=0, value_size=0, max_entries=32768, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x20000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SYSCALL, insn_cnt=12, insns=0x20000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=BPF_F_ANY_ALIGNMENT|BPF_F_TEST_STATE_FREQ|BPF_F_SLEEPABLE|0x20, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 syzkaller login: [ 54.242803][ T5080] [ 54.245372][ T5080] ============================= [ 54.250207][ T5080] WARNING: suspicious RCU usage [ 54.255105][ T5080] 6.9.0-rc5-syzkaller-00171-gb2ff42c6d3ab #0 Not tainted [ 54.262129][ T5080] ----------------------------- [ 54.267083][ T5080] kernel/events/callchain.c:161 suspicious rcu_dereference_check() usage! [ 54.275686][ T5080] [ 54.275686][ T5080] other info that might help us debug this: [ 54.275686][ T5080] [ 54.285996][ T5080] [ 54.285996][ T5080] rcu_scheduler_active = 2, debug_locks = 1 [ 54.294111][ T5080] 1 lock held by syz-executor131/5080: [ 54.299566][ T5080] #0: ffffffff8e3351c0 (rcu_read_lock_trace){....}-{0:0}, at: rcu_read_lock_trace+0x38/0x80 [ 54.309829][ T5080] [ 54.309829][ T5080] stack backtrace: [ 54.315772][ T5080] CPU: 0 PID: 5080 Comm: syz-executor131 Not tainted 6.9.0-rc5-syzkaller-00171-gb2ff42c6d3ab #0 [ 54.326217][ T5080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 54.336256][ T5080] Call Trace: [ 54.339521][ T5080] [ 54.342441][ T5080] dump_stack_lvl+0x241/0x360 [ 54.347120][ T5080] ? __pfx_dump_stack_lvl+0x10/0x10 [ 54.352345][ T5080] ? __pfx__printk+0x10/0x10 [ 54.356933][ T5080] lockdep_rcu_suspicious+0x221/0x340 [ 54.362292][ T5080] get_callchain_entry+0x2b4/0x3c0 [ 54.367394][ T5080] get_perf_callchain+0xea/0x840 [ 54.372321][ T5080] ? __pfx_get_perf_callchain+0x10/0x10 [ 54.377864][ T5080] __bpf_get_stack+0x3d4/0x5a0 [ 54.382623][ T5080] ? __pfx___bpf_get_stack+0x10/0x10 [ 54.387896][ T5080] ? __pfx___cant_migrate+0x10/0x10 [ 54.393088][ T5080] bpf_get_stack_raw_tp+0x1a3/0x240 [ 54.398273][ T5080] bpf_prog_b8a90dd1efcc4ad9+0x45/0x49 [ 54.403729][ T5080] bpf_prog_run_pin_on_cpu+0x66/0x150 [ 54.409083][ T5080] bpf_prog_test_run_syscall+0x316/0x4e0 [ 54.414697][ T5080] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 54.420832][ T5080] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 54.426985][ T5080] bpf_prog_test_run+0x33a/0x3b0 [ 54.431910][ T5080] __sys_bpf+0x48d/0x810 [ 54.436139][ T5080] ? __pfx___sys_bpf+0x10/0x10 [ 54.440896][ T5080] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 54.447207][ T5080] ? do_syscall_64+0x102/0x240 [ 54.451959][ T5080] __x64_sys_bpf+0x7c/0x90 [ 54.456358][ T5080] do_syscall_64+0xf5/0x240 [ 54.460846][ T5080] ? clear_bhb_loop+0x35/0x90 [ 54.465505][ T5080] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.471380][ T5080] RIP: 0033:0x7f20e1bb3669 [ 54.475777][ T5080] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.495466][ T5080] RSP: 002b:00007ffeb0553c98 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.503866][ T5080] RAX: ffffffffffffffda RBX: 00007ffeb0553e68 RCX: 00007f20e1bb3669 [ 54.511823][ T5080] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 54.519795][ T5080] RBP: 00007f20e1c26610 R08: 00007ffeb0553e68 R09: 00007ffeb0553e68 [ 54.527749][ T5080] R10: 00007ffeb0553e68 R11: 0000000000000246 R12: 0000000000000001 [ 54.535706][ T5080] R13: 00007ffeb0553e58 R14: 0000000000000001 R15: 0000000000000001 bpf(BPF_PROG_TEST_RUN, {test={prog_fd=4, retval=4294967295, data_size_in=0, data_size_out=0, data_in=NULL, data_out=NULL, repeat=0, duration=0}}, 12) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 54