./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3079446394 <...> forked to background, child pid 3185 no interfaces have a carrier [ 26.830497][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.839093][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.87' (ECDSA) to the list of known hosts. execve("./syz-executor3079446394", ["./syz-executor3079446394"], 0x7fff6bcb9c80 /* 10 vars */) = 0 brk(NULL) = 0x55555683c000 brk(0x55555683cc40) = 0x55555683cc40 arch_prctl(ARCH_SET_FS, 0x55555683c300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3079446394", 4096) = 28 brk(0x55555685dc40) = 0x55555685dc40 brk(0x55555685e000) = 0x55555685e000 mprotect(0x7ffbb7138000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, "\xbb\x57\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 714) = 0 sendmmsg(3, [{msg_hdr={msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_controllen=0, msg_flags=0}}], 1, 0) = -1 EDESTADDRREQ (Destination address required) exit_group(0) = ? syzkaller login: [ 49.653232][ T3606] [ 49.655704][ T3606] ============================= [ 49.660537][ T3606] WARNING: suspicious RCU usage [ 49.665418][ T3606] 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 Not tainted [ 49.672179][ T3606] ----------------------------- [ 49.677053][ T3606] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 49.684971][ T3606] [ 49.684971][ T3606] other info that might help us debug this: [ 49.684971][ T3606] [ 49.695263][ T3606] [ 49.695263][ T3606] rcu_scheduler_active = 2, debug_locks = 1 [ 49.703334][ T3606] 4 locks held by syz-executor307/3606: [ 49.708916][ T3606] #0: ffff888071c50810 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 49.719547][ T3606] #1: ffffc900014fb0c8 (&table->hash[i].lock){+...}-{2:2}, at: udp_lib_unhash+0x1d5/0x730 [ 49.729601][ T3606] #2: ffffffff8d7bb7b8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 49.739669][ T3606] #3: ffff888145b40af8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 49.749835][ T3606] [ 49.749835][ T3606] stack backtrace: [ 49.755758][ T3606] CPU: 0 PID: 3606 Comm: syz-executor307 Not tainted 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 [ 49.765902][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 49.775966][ T3606] Call Trace: [ 49.779239][ T3606] [ 49.782164][ T3606] dump_stack_lvl+0xcd/0x134 [ 49.786752][ T3606] bpf_sk_reuseport_detach+0x156/0x190 [ 49.792208][ T3606] reuseport_detach_sock+0x8c/0x4a0 [ 49.797406][ T3606] udp_lib_unhash+0x210/0x730 [ 49.802080][ T3606] ? raw_sendmsg+0x1e84/0x2e50 [ 49.806839][ T3606] ? udp_flush_pending_frames+0xb0/0xb0 [ 49.812410][ T3606] sk_common_release+0xba/0x390 [ 49.817258][ T3606] inet_release+0x12e/0x270 [ 49.821757][ T3606] __sock_release+0xcd/0x280 [ 49.826339][ T3606] sock_close+0x18/0x20 [ 49.830576][ T3606] __fput+0x277/0x9d0 [ 49.834551][ T3606] ? __sock_release+0x280/0x280 [ 49.839410][ T3606] task_work_run+0xdd/0x1a0 [ 49.843907][ T3606] do_exit+0xad5/0x29b0 [ 49.848058][ T3606] ? mm_update_next_owner+0x7a0/0x7a0 [ 49.853420][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 49.858622][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 49.863840][ T3606] do_group_exit+0xd2/0x2f0 [ 49.868340][ T3606] __x64_sys_exit_group+0x3a/0x50 [ 49.873361][ T3606] do_syscall_64+0x35/0xb0 [ 49.877776][ T3606] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 49.883664][ T3606] RIP: 0033:0x7ffbb70ca6a9 [ 49.888071][ T3606] Code: Unable to access opcode bytes at RIP 0x7ffbb70ca67f. [ 49.895421][ T3606] RSP: 002b:00007ffdb96ea5f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 +++ exited with 0 +++ [ 49.9