[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.158' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 81.237833][ T8428] [ 81.240511][ T8428] ============================= [ 81.245550][ T8428] WARNING: suspicious RCU usage [ 81.251448][ T8428] 5.12.0-rc6-syzkaller #0 Not tainted [ 81.257636][ T8428] ----------------------------- [ 81.263699][ T8428] include/linux/skmsg.h:286 suspicious rcu_dereference_check() usage! [ 81.272569][ T8428] [ 81.272569][ T8428] other info that might help us debug this: [ 81.272569][ T8428] [ 81.283148][ T8428] [ 81.283148][ T8428] rcu_scheduler_active = 2, debug_locks = 1 [ 81.291310][ T8428] 1 lock held by syz-executor430/8428: [ 81.296804][ T8428] #0: ffff88802dd583c8 (clock-AF_INET){++..}-{2:2}, at: sk_psock_drop+0x2a/0x3d0 [ 81.306310][ T8428] [ 81.306310][ T8428] stack backtrace: [ 81.312675][ T8428] CPU: 1 PID: 8428 Comm: syz-executor430 Not tainted 5.12.0-rc6-syzkaller #0 [ 81.321638][ T8428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.332478][ T8428] Call Trace: [ 81.335935][ T8428] dump_stack+0x141/0x1d7 [ 81.340456][ T8428] tcp_bpf_update_proto+0x5d3/0x6c0 [ 81.345747][ T8428] ? tcp_bpf_stream_read+0x270/0x270 [ 81.351054][ T8428] sk_psock_drop+0x68/0x3d0 [ 81.355655][ T8428] tcp_bpf_recvmsg+0x42d/0x480 [ 81.360434][ T8428] ? tcp_bpf_sendpage+0x8d0/0x8d0 [ 81.365546][ T8428] ? aa_sk_perm+0x31b/0xab0 [ 81.370332][ T8428] inet_recvmsg+0x11b/0x5d0 [ 81.374861][ T8428] ? inet_sendpage+0x140/0x140 [ 81.379630][ T8428] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 81.386222][ T8428] ? security_socket_recvmsg+0x8f/0xc0 [ 81.391680][ T8428] ? inet_sendpage+0x140/0x140 [ 81.396601][ T8428] ____sys_recvmsg+0x2c4/0x600 [ 81.401394][ T8428] ? move_addr_to_kernel.part.0+0x110/0x110 [ 81.407395][ T8428] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 81.413738][ T8428] ? __import_iovec+0x293/0x500 [ 81.418595][ T8428] ? import_iovec+0x10c/0x150 [ 81.423373][ T8428] ___sys_recvmsg+0x127/0x200 [ 81.428066][ T8428] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 81.433792][ T8428] ? __fget_files+0x266/0x3d0 [ 81.438471][ T8428] ? lock_downgrade+0x6e0/0x6e0 [ 81.443353][ T8428] ? __fget_files+0x288/0x3d0 [ 81.448050][ T8428] ? __fget_light+0xea/0x280 [ 81.452639][ T8428] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 81.458899][ T8428] do_recvmmsg+0x24d/0x6d0 [ 81.463348][ T8428] ? ___sys_recvmsg+0x200/0x200 [ 81.468196][ T8428] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 81.474263][ T8428] ? __do_sys_bpf+0x454/0x4f40 [ 81.479043][ T8428] ? __context_tracking_exit+0xb8/0xe0 [ 81.484600][ T8428] ? lock_downgrade+0x6e0/0x6e0 [ 81.489685][ T8428] __x64_sys_recvmmsg+0x20b/0x260 [ 81.494741][ T8428] ? __do_sys_socketcall+0x590/0x590 [ 81.500214][ T8428] ? syscall_enter_from_user_mode+0x27/0x70 [ 81.506199][ T8428] do_syscall_64+0x2d/0x70 [ 81.510616][ T8428] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.516596][ T8428] RIP: 0033:0x4468e9 executing program [ 81.520489][ T8428] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 81.540091][ T8428] RSP: 002b:00007fa0f97ef318 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 81.548595][ T8428] RAX: ffffffffffffffda RBX: 00000000004cb4e8 RCX: 00000000004468e9 [ 81.556929][ T8428] RDX: 0000000000000422 RSI: 0000000020000540 RDI: 0000000000000004 [ 81.565008][ T8428] RBP: 00000000004cb4e0 R08: 0000000000000000 R09: 0000000000000000 [ 81.573180][ T8428] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000049b270 [ 81.581155][ T8428] R13: 00007ffd2e475fff R14: 00007fa0f97ef400 R15: 0000000000022000 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program