./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor977437352 <...> DUID 00:04:f2:2d:62:da:c3:85:a0:c9:3a:ab:4f:1c:2c:dc:65:98 forked to background, child pid 3185 [ 26.243784][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.254413][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.56' (ECDSA) to the list of known hosts. execve("./syz-executor977437352", ["./syz-executor977437352"], 0x7ffc427cec80 /* 10 vars */) = 0 brk(NULL) = 0x555557464000 brk(0x555557464c40) = 0x555557464c40 arch_prctl(ARCH_SET_FS, 0x555557464300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor977437352", 4096) = 27 brk(0x555557485c40) = 0x555557485c40 brk(0x555557486000) = 0x555557486000 mprotect(0x7f26d7a93000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_DCCP, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [30272], 4) = 0 setsockopt(3, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, {len=1, filter=0x20f07000}, 16) = 0 exit_group(0) = ? syzkaller login: [ 42.721832][ T3606] [ 42.724264][ T3606] ============================= [ 42.729126][ T3606] WARNING: suspicious RCU usage [ 42.733954][ T3606] 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 Not tainted [ 42.740719][ T3606] ----------------------------- [ 42.745547][ T3606] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 42.753459][ T3606] [ 42.753459][ T3606] other info that might help us debug this: [ 42.753459][ T3606] [ 42.763707][ T3606] [ 42.763707][ T3606] rcu_scheduler_active = 2, debug_locks = 1 [ 42.771791][ T3606] 3 locks held by syz-executor977/3606: [ 42.777337][ T3606] #0: ffff8880260fe810 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 42.787913][ T3606] #1: ffffffff8d7bb7b8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 42.797970][ T3606] #2: ffff88814aa78db8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 42.808121][ T3606] [ 42.808121][ T3606] stack backtrace: [ 42.814040][ T3606] CPU: 0 PID: 3606 Comm: syz-executor977 Not tainted 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 [ 42.824196][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 42.834252][ T3606] Call Trace: [ 42.837527][ T3606] [ 42.840477][ T3606] dump_stack_lvl+0xcd/0x134 [ 42.845081][ T3606] bpf_sk_reuseport_detach+0x156/0x190 [ 42.850549][ T3606] reuseport_detach_sock+0x8c/0x4a0 [ 42.855749][ T3606] ? mark_held_locks+0x9f/0xe0 [ 42.860522][ T3606] __sk_free+0x130/0x460 [ 42.864780][ T3606] sk_free+0x78/0xa0 [ 42.868679][ T3606] dccp_close+0xa0c/0xd50 [ 42.873019][ T3606] ? dccp_recvmsg+0x9d0/0x9d0 [ 42.877697][ T3606] ? down_write+0xde/0x150 [ 42.882125][ T3606] ? ip_mc_drop_socket+0x16/0x260 [ 42.887152][ T3606] ? locks_remove_file+0x2f7/0x570 [ 42.892279][ T3606] inet_release+0x12e/0x270 [ 42.896788][ T3606] __sock_release+0xcd/0x280 [ 42.901412][ T3606] sock_close+0x18/0x20 [ 42.905572][ T3606] __fput+0x277/0x9d0 [ 42.909555][ T3606] ? __sock_release+0x280/0x280 [ 42.914422][ T3606] task_work_run+0xdd/0x1a0 [ 42.918931][ T3606] do_exit+0xad5/0x29b0 [ 42.923097][ T3606] ? mm_update_next_owner+0x7a0/0x7a0 [ 42.928489][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 42.933695][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 42.938911][ T3606] do_group_exit+0xd2/0x2f0 [ 42.943423][ T3606] __x64_sys_exit_group+0x3a/0x50 [ 42.948456][ T3606] do_syscall_64+0x35/0xb0 [ 42.952907][ T3606] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 42.958806][ T3606] RIP: 0033:0x7f26d7a25699 [ 42.963232][ T3606] Code: Unable to access opcode bytes at RIP 0x7f26d7a2566f. +++ exited with 0 +++ [ 42.970588][ T3606] RSP: