./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3633723865 <...> no interfaces have a carrier [ 28.023020][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.036209][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: [ 28.270363][ T3270] ssh-keygen (3270) used greatest stack depth: 22792 bytes left OK syzkaller Warning: Permanently added '10.128.1.103' (ECDSA) to the list of known hosts. execve("./syz-executor3633723865", ["./syz-executor3633723865"], 0x7ffcd3bc5440 /* 10 vars */) = 0 brk(NULL) = 0x555556ac9000 brk(0x555556ac9c40) = 0x555556ac9c40 arch_prctl(ARCH_SET_FS, 0x555556ac9300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3633723865", 4096) = 28 brk(0x555556aeac40) = 0x555556aeac40 brk(0x555556aeb000) = 0x555556aeb000 mprotect(0x7fa834abe000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [-121], 4) = 0 listen(3, 0) = 0 exit_group(0) = ? syzkaller login: [ 49.849406][ T3606] [ 49.851859][ T3606] ============================= [ 49.856752][ T3606] WARNING: suspicious RCU usage [ 49.861620][ T3606] 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 Not tainted [ 49.868420][ T3606] ----------------------------- [ 49.873275][ T3606] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 49.881205][ T3606] [ 49.881205][ T3606] other info that might help us debug this: [ 49.881205][ T3606] [ 49.891467][ T3606] [ 49.891467][ T3606] rcu_scheduler_active = 2, debug_locks = 1 [ 49.899583][ T3606] 5 locks held by syz-executor363/3606: [ 49.905177][ T3606] #0: ffff8880751b2c10 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 49.915758][ T3606] #1: ffff888016f38d30 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_close+0x1e/0xc0 [ 49.924750][ T3606] #2: ffffc90001342ba0 (&h->lhash2[i].lock){+.+.}-{2:2}, at: inet_unhash+0x345/0x680 [ 49.934367][ T3606] #3: ffffffff8d7bb7b8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 49.944430][ T3606] #4: ffff888016f38fb8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 49.954569][ T3606] [ 49.954569][ T3606] stack backtrace: [ 49.960482][ T3606] CPU: 0 PID: 3606 Comm: syz-executor363 Not tainted 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 [ 49.970622][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 49.980666][ T3606] Call Trace: [ 49.983935][ T3606] [ 49.986862][ T3606] dump_stack_lvl+0xcd/0x134 [ 49.991460][ T3606] bpf_sk_reuseport_detach+0x156/0x190 [ 49.996912][ T3606] reuseport_detach_sock+0x8c/0x4a0 [ 50.002104][ T3606] reuseport_stop_listen_sock+0x6d/0x500 [ 50.007817][ T3606] inet_unhash+0x3b1/0x680 [ 50.012236][ T3606] tcp_set_state+0x198/0x7e0 [ 50.016831][ T3606] ? tcp_wmem_schedule+0x210/0x210 [ 50.021933][ T3606] ? find_held_lock+0x2d/0x110 [ 50.026687][ T3606] ? tcp_close+0x1e/0xc0 [ 50.030936][ T3606] __tcp_close+0xbfd/0xf50 [ 50.035372][ T3606] tcp_close+0x29/0xc0 [ 50.039430][ T3606] inet_release+0x12e/0x270 [ 50.043928][ T3606] __sock_release+0xcd/0x280 [ 50.048519][ T3606] sock_close+0x18/0x20 [ 50.052672][ T3606] __fput+0x277/0x9d0 [ 50.056647][ T3606] ? __sock_release+0x280/0x280 [ 50.061499][ T3606] task_work_run+0xdd/0x1a0 [ 50.066003][ T3606] do_exit+0xad5/0x29b0 [ 50.070154][ T3606] ? mm_update_next_owner+0x7a0/0x7a0 [ 50.075513][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 50.080704][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 50.085913][ T3606] do_group_exit+0xd2/0x2f0 [ 50.090409][ T3606] __x64_sys_exit_group+0x3a/0x50 [ 50.095422][ T3606] do_syscall_64+0x35/0xb0 [ 50.099828][ T3606] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 50.105715][ T3606] RIP: 0033:0x7fa834a50639 [ 50.110118][ T3606] Code: Unable to access opcode bytes at RIP 0x7fa834a5060f. [ 50.117489][ T3606] RSP: 002b:00007fff44cfb4c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 50.125887][ T3606] RAX: ffffffffffffffda RBX: 00007fa834ac4270 RCX: 00007fa834a50639 [ 50.133844][ T3606] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 50.141813][ T3606] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000000 +++ exited with 0 +++ [ 50.14977