./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2092635210

<...>
DUID 00:04:5a:7a:52:ad:4b:e5:ff:c1:d1:3d:bd:97:7e:8a:4f:1f
forked to background, child pid 3185
[   26.454530][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0
[   26.465255][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK

syzkaller
Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts.
execve("./syz-executor2092635210", ["./syz-executor2092635210"], 0x7ffda5ba3b80 /* 10 vars */) = 0
brk(NULL)                               = 0x555557074000
brk(0x555557074c40)                     = 0x555557074c40
arch_prctl(ARCH_SET_FS, 0x555557074300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor2092635210", 4096) = 28
brk(0x555557095c40)                     = 0x555557095c40
brk(0x555557096000)                     = 0x555557096000
mprotect(0x7fc39ff2a000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
socket(AF_INET, SOCK_STREAM, IPPROTO_IP) = 3
setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [-192], 4) = 0
setsockopt(3, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, {len=1, filter=0x20f07000}, 16) = 0
exit_group(0)                           = ?
syzkaller login: [   43.538391][ T3614] 
[   43.540847][ T3614] =============================
[   43.545677][ T3614] WARNING: suspicious RCU usage
[   43.550505][ T3614] 6.0.0-rc1-syzkaller-00066-g3b06a2755758 #0 Not tainted
[   43.557562][ T3614] -----------------------------
[   43.562444][ T3614] include/net/sock.h:592 suspicious rcu_dereference_check() usage!
[   43.570352][ T3614] 
[   43.570352][ T3614] other info that might help us debug this:
[   43.570352][ T3614] 
[   43.580645][ T3614] 
[   43.580645][ T3614] rcu_scheduler_active = 2, debug_locks = 1
[   43.588726][ T3614] 3 locks held by syz-executor209/3614:
[   43.594349][ T3614]  #0: ffff888075b13210 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280
[   43.604971][ T3614]  #1: ffffffff8d7bc038 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0
[   43.615019][ T3614]  #2: ffff88807a3703b8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190
[   43.625186][ T3614] 
[   43.625186][ T3614] stack backtrace:
[   43.631115][ T3614] CPU: 1 PID: 3614 Comm: syz-executor209 Not tainted 6.0.0-rc1-syzkaller-00066-g3b06a2755758 #0
[   43.641535][ T3614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
[   43.651585][ T3614] Call Trace:
[   43.654854][ T3614]  <TASK>
[   43.657786][ T3614]  dump_stack_lvl+0xcd/0x134
[   43.662375][ T3614]  bpf_sk_reuseport_detach+0x156/0x190
[   43.667834][ T3614]  reuseport_detach_sock+0x8c/0x4a0
[   43.673089][ T3614]  ? netlink_has_listeners+0x21c/0x3d0
[   43.678566][ T3614]  __sk_free+0x130/0x460
[   43.682806][ T3614]  sk_free+0x78/0xa0
[   43.686712][ T3614]  tcp_close+0x98/0xc0
[   43.690785][ T3614]  inet_release+0x12e/0x270
[   43.695304][ T3614]  __sock_release+0xcd/0x280
[   43.699906][ T3614]  sock_close+0x18/0x20
[   43.704069][ T3614]  __fput+0x277/0x9d0
[   43.708580][ T3614]  ? __sock_release+0x280/0x280
[   43.713445][ T3614]  task_work_run+0xdd/0x1a0
[   43.717961][ T3614]  do_exit+0xad5/0x29b0
[   43.722152][ T3614]  ? mm_update_next_owner+0x7a0/0x7a0
[   43.727532][ T3614]  ? _raw_spin_unlock_irq+0x1f/0x40
[   43.732742][ T3614]  ? _raw_spin_unlock_irq+0x1f/0x40
[   43.737959][ T3614]  do_group_exit+0xd2/0x2f0
[   43.742473][ T3614]  __x64_sys_exit_group+0x3a/0x50
[   43.747514][ T3614]  do_syscall_64+0x35/0xb0
[   43.751943][ T3614]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   43.757842][ T3614] RIP: 0033:0x7fc39febc699
[   43.762267][ T3614] Code: Unable to access opcode bytes at RIP 0x7fc39febc66f.
[   43.769629][ T3614] RSP: 002b:00007ffc16dfa4d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[   43.778050][ T3614] RAX: ffffffffffffffda RBX: 00007fc39ff30270 RCX: 00007fc39febc699
+++ exited with 0 +++
[   43.786025][ T3614] RDX: 00000000000000