Warning: Permanently added '10.128.0.84' (ED25519) to the list of known hosts. 2024/02/28 11:18:10 ignoring optional flag "sandboxArg"="0" 2024/02/28 11:18:10 parsed 1 programs 2024/02/28 11:18:10 executed programs: 0 [ 45.918883][ T2568] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.802883][ T2574] veth0_vlan: entered promiscuous mode [ 47.086269][ T2802] [ 47.088825][ T2802] ============================= [ 47.093648][ T2802] WARNING: suspicious RCU usage [ 47.098573][ T2802] 6.8.0-rc5-syzkaller #0 Not tainted [ 47.104174][ T2802] ----------------------------- [ 47.109100][ T2802] net/ipv6/addrconf.c:5317 suspicious rcu_dereference_check() usage! [ 47.117233][ T2802] [ 47.117233][ T2802] other info that might help us debug this: [ 47.117233][ T2802] [ 47.127447][ T2802] [ 47.127447][ T2802] rcu_scheduler_active = 2, debug_locks = 1 [ 47.135485][ T2802] 3 locks held by syz-executor.0/2802: [ 47.140930][ T2802] #0: ffff8881125e2670 (nlk_cb_mutex-ROUTE){+.+.}-{3:3}, at: __netlink_dump_start+0x76/0x2d0 [ 47.151172][ T2802] #1: ffffffff835045f8 (rtnl_mutex){+.+.}-{3:3}, at: netlink_dump+0x1af/0x380 [ 47.160104][ T2802] #2: ffff888112f4d580 (&ndev->lock){++..}-{2:2}, at: in6_dump_addrs+0x3c/0x720 [ 47.169219][ T2802] [ 47.169219][ T2802] stack backtrace: [ 47.175187][ T2802] CPU: 0 PID: 2802 Comm: syz-executor.0 Not tainted 6.8.0-rc5-syzkaller #0 [ 47.183737][ T2802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 47.193761][ T2802] Call Trace: [ 47.197016][ T2802] [ 47.199920][ T2802] dump_stack_lvl+0x8d/0xe0 [ 47.204395][ T2802] lockdep_rcu_suspicious+0x15d/0x1b0 [ 47.209733][ T2802] in6_dump_addrs+0x715/0x720 [ 47.214381][ T2802] inet6_dump_addr+0x61d/0x690 [ 47.219112][ T2802] netlink_dump+0x1bf/0x380 [ 47.223598][ T2802] __netlink_dump_start+0x25b/0x2d0 [ 47.228774][ T2802] rtnetlink_rcv_msg+0x64a/0x690 [ 47.233677][ T2802] ? __pfx_inet6_dump_ifacaddr+0x10/0x10 [ 47.239274][ T2802] ? __pfx_inet6_dump_ifacaddr+0x10/0x10 [ 47.244871][ T2802] ? __lock_acquire+0x4ef/0x2490 [ 47.249778][ T2802] ? __lock_acquire+0x4ef/0x2490 [ 47.254681][ T2802] ? __lock_acquire+0x4ef/0x2490 [ 47.259582][ T2802] ? __netlink_lookup+0x28/0x320 [ 47.264482][ T2802] ? net_generic+0x16/0x140 [ 47.269297][ T2802] ? netlink_deliver_tap+0x22/0x100 [ 47.274461][ T2802] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 47.279886][ T2802] netlink_rcv_skb+0xe0/0x110 [ 47.284533][ T2802] netlink_unicast+0x245/0x330 [ 47.289287][ T2802] netlink_sendmsg+0x3ad/0x450 [ 47.294015][ T2802] __sock_sendmsg+0x8e/0xb0 [ 47.298485][ T2802] ____sys_sendmsg+0x1a7/0x200 [ 47.303213][ T2802] ___sys_sendmsg+0x28f/0x2d0 [ 47.307857][ T2802] __se_sys_sendmsg+0xf7/0x140 [ 47.312694][ T2802] do_syscall_64+0xa7/0x1c0 [ 47.317272][ T2802] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 47.323143][ T2802] RIP: 0033:0x7f66b2eb4da9 [ 47.327530][ T2802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 47.347189][ T2802] RSP: 002b:00007f66b2a360c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 47.355569][ T2802] RAX: ffffffffffffffda RBX: 00007f66b2fe2f80 RCX: 00007f66b2eb4da9 [ 47.363598][ T2802] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 47.371667][ T2802] RBP: 00007f66b2f0147a R08: 0000000000000000 R09: 0000000000000000 [ 47.379702][ T2802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.387639][ T2802] R13: 000000000000000b R14: 00007f66b2fe2f80 R15: 00007ffea91435d8 [ 47.395578][ T2802] 2024/02/28 11:18:15 executed programs: 881 2024/02/28 11:18:20 executed programs: 2103