./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4190156971 <...> Warning: Permanently added '10.128.0.113' (ED25519) to the list of known hosts. execve("./syz-executor4190156971", ["./syz-executor4190156971"], 0x7fff8d0518b0 /* 10 vars */) = 0 brk(NULL) = 0x55557b2eb000 brk(0x55557b2ebe00) = 0x55557b2ebe00 arch_prctl(ARCH_SET_FS, 0x55557b2eb480) = 0 set_tid_address(0x55557b2eb750) = 5824 set_robust_list(0x55557b2eb760, 24) = 0 rseq(0x55557b2ebda0, 0x20, 0, 0x53053053) = 0 [ 68.394398][ T30] audit: type=1400 audit(1753994490.574:62): avc: denied { write } for pid=5821 comm="strace-static-x" path="pipe:[4598]" dev="pipefs" ino=4598 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4190156971", 4096) = 28 getrandom("\x43\x80\x0c\x4b\x23\xce\x73\xd4", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557b2ebe00 brk(0x55557b30ce00) = 0x55557b30ce00 brk(0x55557b30d000) = 0x55557b30d000 mprotect(0x7f1cc61dd000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 [ 68.525350][ T30] audit: type=1400 audit(1753994490.704:63): avc: denied { execmem } for pid=5824 comm="syz-executor419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 68.547528][ T30] audit: type=1400 audit(1753994490.734:64): avc: denied { create } for pid=5824 comm="syz-executor419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=864, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=5824}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1d\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x30\x00\x00\x00\xe8\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 864 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5824}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5824}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5824}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5824}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 [ 68.580855][ T30] audit: type=1400 audit(1753994490.764:65): avc: denied { write } for pid=5824 comm="syz-executor419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.601509][ T30] audit: type=1400 audit(1753994490.764:66): avc: denied { read } for pid=5824 comm="syz-executor419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5824}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5824}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4) = 0 rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGSEGV, {sa_handler=0x7f1cc6133f90, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f1cc613b330}, NULL, 8) = 0 rt_sigaction(SIGBUS, {sa_handler=0x7f1cc6133f90, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f1cc613b330}, NULL, 8) = 0 mkdir("./syzkaller.JsCUix", 0700) = 0 chmod("./syzkaller.JsCUix", 0777) = 0 chdir("./syzkaller.JsCUix") = 0 executing program write(1, "executing program\n", 18) = 18 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_RINGBUF, key_size=0, value_size=0, max_entries=32768, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [ 68.656189][ T30] audit: type=1400 audit(1753994490.834:67): avc: denied { read } for pid=5491 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SYSCALL, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=BPF_F_ANY_ALIGNMENT|BPF_F_TEST_RND_HI32|BPF_F_TEST_STATE_FREQ|BPF_F_SLEEPABLE|0x20, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [ 68.694573][ T30] audit: type=1400 audit(1753994490.874:68): avc: denied { map_create } for pid=5824 comm="syz-executor419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 68.714292][ T30] audit: type=1400 audit(1753994490.874:69): avc: denied { map_read map_write } for pid=5824 comm="syz-executor419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 68.734411][ T30] audit: type=1400 audit(1753994490.894:70): avc: denied { prog_load } for pid=5824 comm="syz-executor419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 68.735370][ T5824] [ 68.753711][ T30] audit: type=1400 audit(1753994490.894:71): avc: denied { bpf } for pid=5824 comm="syz-executor419" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 68.777310][ T5824] ============================= [ 68.782358][ T5824] WARNING: suspicious RCU usage [ 68.787184][ T5824] 6.16.0-syzkaller-08685-g260f6f4fda93 #0 Not tainted [ 68.793969][ T5824] ----------------------------- bpf(BPF_PROG_TEST_RUN, {test={prog_fd=4, retval=4294967295, data_size_in=0, data_size_out=0, data_in=NULL, data_out=NULL, repeat=0, duration=0}}, 12) = 0 exit_group(0) = ? [ 68.798798][ T5824] kernel/events/callchain.c:163 suspicious rcu_dereference_check() usage! [ 68.807324][ T5824] [ 68.807324][ T5824] other info that might help us debug this: [ 68.807324][ T5824] [ 68.817580][ T5824] [ 68.817580][ T5824] rcu_scheduler_active = 2, debug_locks = 1 [ 68.825669][ T5824] 1 lock held by syz-executor419/5824: [ 68.831144][ T5824] #0: ffffffff8e5c06e0 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x344/0x780 [ 68.842077][ T5824] [ 68.842077][ T5824] stack backtrace: [ 68.847952][ T5824] CPU: 1 UID: 0 PID: 5824 Comm: syz-executor419 Not tainted 6.16.0-syzkaller-08685-g260f6f4fda93 #0 PREEMPT(full) [ 68.847968][ T5824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 68.847974][ T5824] Call Trace: [ 68.847979][ T5824] [ 68.847983][ T5824] dump_stack_lvl+0x16c/0x1f0 [ 68.848005][ T5824] lockdep_rcu_suspicious+0x166/0x260 [ 68.848023][ T5824] get_callchain_entry+0x278/0x3f0 [ 68.848043][ T5824] get_perf_callchain+0xdb/0x760 [ 68.848061][ T5824] ? __pfx_get_perf_callchain+0x10/0x10 [ 68.848081][ T5824] ? __lock_acquire+0xb8a/0x1c90 [ 68.848099][ T5824] __bpf_get_stack+0x4f5/0xa10 [ 68.848120][ T5824] ? __pfx___bpf_get_stack+0x10/0x10 [ 68.848138][ T5824] ? __lock_acquire+0xb8a/0x1c90 [ 68.848165][ T5824] bpf_get_stack+0x32/0x40 [ 68.848183][ T5824] bpf_get_stack_raw_tp+0x1dd/0x280 [ 68.848197][ T5824] bpf_prog_d43750871481577d+0x46/0x4e [ 68.848207][ T5824] bpf_prog_test_run_syscall+0x3ad/0x780 [ 68.848227][ T5824] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 68.848245][ T5824] ? fdget+0x176/0x210 [ 68.848256][ T5824] ? __bpf_prog_get+0x97/0x2a0 [ 68.848267][ T5824] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 68.848288][ T5824] __sys_bpf+0x104d/0x4de0 [ 68.848305][ T5824] ? __pfx___sys_bpf+0x10/0x10 [ 68.848318][ T5824] ? do_raw_spin_lock+0x12c/0x2b0 [ 68.848329][ T5824] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 68.848344][ T5824] ? ptrace_stop.part.0+0x732/0x950 [ 68.848365][ T5824] ? rcu_is_watching+0x12/0xc0 [ 68.848378][ T5824] ? _raw_spin_unlock_irq+0x23/0x50 [ 68.848394][ T5824] ? lockdep_hardirqs_on+0x7c/0x110 [ 68.848412][ T5824] __x64_sys_bpf+0x78/0xc0 [ 68.848427][ T5824] do_syscall_64+0xcd/0x4c0 [ 68.848438][ T5824] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.848450][ T5824] RIP: 0033:0x7f1cc616bc39 [ 68.848459][ T5824] Code: d8 5b c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 68.848470][ T5824] RSP: 002b:00007ffdecebddf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 +++ exited with 0 +++ [ 68.848480][ T5824] RAX: ffffffffffffffda RBX: 0000000000000000 RC