./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1770397748 <...> DUID 00:04:f2:2d:62:da:c3:85:a0:c9:3a:ab:4f:1c:2c:dc:65:98 forked to background, child pid 3183 [ 27.138272][ T3184] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.148404][ T3184] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.84' (ECDSA) to the list of known hosts. execve("./syz-executor1770397748", ["./syz-executor1770397748"], 0x7ffd7f6f5440 /* 10 vars */) = 0 brk(NULL) = 0x555555fab000 brk(0x555555fabc40) = 0x555555fabc40 arch_prctl(ARCH_SET_FS, 0x555555fab300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1770397748", 4096) = 28 brk(0x555555fccc40) = 0x555555fccc40 brk(0x555555fcd000) = 0x555555fcd000 mprotect(0x7f3f6d1e5000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [-192], 4) = 0 setsockopt(3, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, {len=1, filter=0x20f07000}, 16) = 0 exit_group(0) = ? syzkaller login: [ 49.427313][ T3605] [ 49.429765][ T3605] ============================= [ 49.434641][ T3605] WARNING: suspicious RCU usage [ 49.439486][ T3605] 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 Not tainted [ 49.446271][ T3605] ----------------------------- [ 49.451115][ T3605] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 49.459088][ T3605] [ 49.459088][ T3605] other info that might help us debug this: [ 49.459088][ T3605] [ 49.469499][ T3605] [ 49.469499][ T3605] rcu_scheduler_active = 2, debug_locks = 1 [ 49.477608][ T3605] 3 locks held by syz-executor177/3605: [ 49.483161][ T3605] #0: ffff888074c90810 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 49.494185][ T3605] #1: ffffffff8d7bb7b8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 49.504300][ T3605] #2: ffff88807a7503b8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 49.514481][ T3605] [ 49.514481][ T3605] stack backtrace: [ 49.520388][ T3605] CPU: 0 PID: 3605 Comm: syz-executor177 Not tainted 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 [ 49.530629][ T3605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 49.540681][ T3605] Call Trace: [ 49.543961][ T3605] [ 49.546889][ T3605] dump_stack_lvl+0xcd/0x134 [ 49.551488][ T3605] bpf_sk_reuseport_detach+0x156/0x190 [ 49.556958][ T3605] reuseport_detach_sock+0x8c/0x4a0 [ 49.562168][ T3605] ? netlink_has_listeners+0x21c/0x3d0 [ 49.567631][ T3605] __sk_free+0x130/0x460 [ 49.571879][ T3605] sk_free+0x78/0xa0 [ 49.575778][ T3605] tcp_close+0x98/0xc0 [ 49.579850][ T3605] inet_release+0x12e/0x270 [ 49.584356][ T3605] __sock_release+0xcd/0x280 [ 49.588948][ T3605] sock_close+0x18/0x20 [ 49.593109][ T3605] __fput+0x277/0x9d0 [ 49.597110][ T3605] ? __sock_release+0x280/0x280 [ 49.601974][ T3605] task_work_run+0xdd/0x1a0 [ 49.606488][ T3605] do_exit+0xad5/0x29b0 [ 49.610654][ T3605] ? mm_update_next_owner+0x7a0/0x7a0 [ 49.616286][ T3605] ? _raw_spin_unlock_irq+0x1f/0x40 [ 49.621490][ T3605] ? _raw_spin_unlock_irq+0x1f/0x40 [ 49.626696][ T3605] do_group_exit+0xd2/0x2f0 [ 49.631214][ T3605] __x64_sys_exit_group+0x3a/0x50 [ 49.636248][ T3605] do_syscall_64+0x35/0xb0 [ 49.640667][ T3605] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 49.646566][ T3605] RIP: 0033:0x7f3f6d177699 [ 49.650979][ T3605] Code: Unable to access opcode bytes at RIP 0x7f3f6d17766f. [ 49.658345][ T3605] RSP: 002b:00007fff5990cf28 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 49.666771][ T3605] RAX: ffffffffffffffda RBX: 00007f3f6d1eb270 RCX: 00007f3f6d177699 +++ exited with 0 +++ [ 49.674750][ T3605] RDX: 0000000000000