./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3172122280 <...> forked to background, child pid 3185 no interfaces have a carrier [ 27.754487][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.765352][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.2' (ECDSA) to the list of known hosts. execve("./syz-executor3172122280", ["./syz-executor3172122280"], 0x7ffeeab3c140 /* 10 vars */) = 0 brk(NULL) = 0x55555617d000 brk(0x55555617dc40) = 0x55555617dc40 arch_prctl(ARCH_SET_FS, 0x55555617d300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3172122280", 4096) = 28 brk(0x55555619ec40) = 0x55555619ec40 brk(0x55555619f000) = 0x55555619f000 mprotect(0x7f8714df1000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [-121], 4) = 0 listen(3, 0) = 0 exit_group(0) = ? syzkaller login: [ 50.836702][ T3606] [ 50.839221][ T3606] ============================= [ 50.844069][ T3606] WARNING: suspicious RCU usage [ 50.848962][ T3606] 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 Not tainted [ 50.855735][ T3606] ----------------------------- [ 50.860615][ T3606] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 50.868547][ T3606] [ 50.868547][ T3606] other info that might help us debug this: [ 50.868547][ T3606] [ 50.878814][ T3606] [ 50.878814][ T3606] rcu_scheduler_active = 2, debug_locks = 1 [ 50.887039][ T3606] 5 locks held by syz-executor317/3606: [ 50.892635][ T3606] #0: ffff8880742fb810 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 50.903339][ T3606] #1: ffff888078c98130 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_close+0x1e/0xc0 [ 50.912389][ T3606] #2: ffffc90001305460 (&h->lhash2[i].lock){+.+.}-{2:2}, at: inet_unhash+0x345/0x680 [ 50.922024][ T3606] #3: ffffffff8d7bb7b8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 50.932141][ T3606] #4: ffff888078c983b8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 50.942372][ T3606] [ 50.942372][ T3606] stack backtrace: [ 50.948400][ T3606] CPU: 1 PID: 3606 Comm: syz-executor317 Not tainted 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 [ 50.958577][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 50.968757][ T3606] Call Trace: [ 50.972050][ T3606] [ 50.974984][ T3606] dump_stack_lvl+0xcd/0x134 [ 50.979724][ T3606] bpf_sk_reuseport_detach+0x156/0x190 [ 50.985305][ T3606] reuseport_detach_sock+0x8c/0x4a0 [ 50.990657][ T3606] reuseport_stop_listen_sock+0x6d/0x500 [ 50.996314][ T3606] inet_unhash+0x3b1/0x680 [ 51.000741][ T3606] tcp_set_state+0x198/0x7e0 [ 51.005359][ T3606] ? tcp_wmem_schedule+0x210/0x210 [ 51.010515][ T3606] ? find_held_lock+0x2d/0x110 [ 51.015408][ T3606] ? tcp_close+0x1e/0xc0 [ 51.019702][ T3606] __tcp_close+0xbfd/0xf50 [ 51.024163][ T3606] tcp_close+0x29/0xc0 [ 51.028259][ T3606] inet_release+0x12e/0x270 [ 51.032764][ T3606] __sock_release+0xcd/0x280 [ 51.037440][ T3606] sock_close+0x18/0x20 [ 51.041592][ T3606] __fput+0x277/0x9d0 [ 51.045585][ T3606] ? __sock_release+0x280/0x280 [ 51.050455][ T3606] task_work_run+0xdd/0x1a0 [ 51.054977][ T3606] do_exit+0xad5/0x29b0 [ 51.059155][ T3606] ? mm_update_next_owner+0x7a0/0x7a0 [ 51.064567][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 51.069970][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 51.075232][ T3606] do_group_exit+0xd2/0x2f0 [ 51.079768][ T3606] __x64_sys_exit_group+0x3a/0x50 +++ exited with 0 +++ [ 51.084895][ T3606] do_syscall_6