./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor704840627

<...>
no interfaces have a carrier
forked to background, child pid 3185
[   26.065485][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0
[   26.078268][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK

syzkaller
Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts.
execve("./syz-executor704840627", ["./syz-executor704840627"], 0x7ffdda8282a0 /* 10 vars */) = 0
brk(NULL)                               = 0x555555e8c000
brk(0x555555e8cc40)                     = 0x555555e8cc40
arch_prctl(ARCH_SET_FS, 0x555555e8c300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor704840627", 4096) = 27
brk(0x555555eadc40)                     = 0x555555eadc40
brk(0x555555eae000)                     = 0x555555eae000
mprotect(0x7f72b01e6000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3
setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [6], 4) = 0
bind(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::ffff:255.255.255.255", &sin6_addr), sin6_scope_id=0}, 28) = 0
exit_group(0)                           = ?
syzkaller login: [   44.001740][ T3606] 
[   44.004184][ T3606] =============================
[   44.009017][ T3606] WARNING: suspicious RCU usage
[   44.013925][ T3606] 5.19.0-syzkaller-11980-ge34cfee65ec8 #0 Not tainted
[   44.020729][ T3606] -----------------------------
[   44.025564][ T3606] include/net/sock.h:592 suspicious rcu_dereference_check() usage!
[   44.033482][ T3606] 
[   44.033482][ T3606] other info that might help us debug this:
[   44.033482][ T3606] 
[   44.043743][ T3606] 
[   44.043743][ T3606] rcu_scheduler_active = 2, debug_locks = 1
[   44.051863][ T3606] 4 locks held by syz-executor704/3606:
[   44.057417][ T3606]  #0: ffff888073d65010 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280
[   44.068011][ T3606]  #1: ffffc900014fb3e8 (&table->hash[i].lock){+...}-{2:2}, at: udp_lib_unhash+0x1d5/0x730
[   44.078078][ T3606]  #2: ffffffff8d7bb7b8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0
[   44.088128][ T3606]  #3: ffff88814b0ab3b8 (clock-AF_INET6){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190
[   44.098393][ T3606] 
[   44.098393][ T3606] stack backtrace:
[   44.104312][ T3606] CPU: 0 PID: 3606 Comm: syz-executor704 Not tainted 5.19.0-syzkaller-11980-ge34cfee65ec8 #0
[   44.114483][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
[   44.124577][ T3606] Call Trace:
[   44.127857][ T3606]  <TASK>
[   44.130795][ T3606]  dump_stack_lvl+0xcd/0x134
[   44.135399][ T3606]  bpf_sk_reuseport_detach+0x156/0x190
[   44.140853][ T3606]  reuseport_detach_sock+0x8c/0x4a0
[   44.146047][ T3606]  udp_lib_unhash+0x210/0x730
[   44.150721][ T3606]  ? udpv6_pre_connect+0x180/0x180
[   44.155826][ T3606]  sk_common_release+0xba/0x390
[   44.160683][ T3606]  inet_release+0x12e/0x270
[   44.165194][ T3606]  inet6_release+0x4c/0x70
[   44.169603][ T3606]  __sock_release+0xcd/0x280
[   44.174185][ T3606]  sock_close+0x18/0x20
[   44.178332][ T3606]  __fput+0x277/0x9d0
[   44.182325][ T3606]  ? __sock_release+0x280/0x280
[   44.187180][ T3606]  task_work_run+0xdd/0x1a0
[   44.191677][ T3606]  do_exit+0xad5/0x29b0
[   44.195842][ T3606]  ? mm_update_next_owner+0x7a0/0x7a0
[   44.201202][ T3606]  ? _raw_spin_unlock_irq+0x1f/0x40
[   44.206480][ T3606]  ? _raw_spin_unlock_irq+0x1f/0x40
[   44.211674][ T3606]  do_group_exit+0xd2/0x2f0
[   44.216171][ T3606]  __x64_sys_exit_group+0x3a/0x50
[   44.221187][ T3606]  do_syscall_64+0x35/0xb0
[   44.225596][ T3606]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   44.231481][ T3606] RIP: 0033:0x7f72b0178699
[   44.235905][ T3606] Code: Unable to access opcode bytes at RIP 0x7f72b017866f.
[   44.243253][ T3606] RSP: 002b:00007ffe51c86fb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
+++ exited with 0 +++
[   44.251652]