./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2092635210 <...> DUID 00:04:5a:7a:52:ad:4b:e5:ff:c1:d1:3d:bd:97:7e:8a:4f:1f forked to background, child pid 3185 [ 26.454530][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.465255][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts. execve("./syz-executor2092635210", ["./syz-executor2092635210"], 0x7ffda5ba3b80 /* 10 vars */) = 0 brk(NULL) = 0x555557074000 brk(0x555557074c40) = 0x555557074c40 arch_prctl(ARCH_SET_FS, 0x555557074300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor2092635210", 4096) = 28 brk(0x555557095c40) = 0x555557095c40 brk(0x555557096000) = 0x555557096000 mprotect(0x7fc39ff2a000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [-192], 4) = 0 setsockopt(3, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, {len=1, filter=0x20f07000}, 16) = 0 exit_group(0) = ? syzkaller login: [ 43.538391][ T3614] [ 43.540847][ T3614] ============================= [ 43.545677][ T3614] WARNING: suspicious RCU usage [ 43.550505][ T3614] 6.0.0-rc1-syzkaller-00066-g3b06a2755758 #0 Not tainted [ 43.557562][ T3614] ----------------------------- [ 43.562444][ T3614] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 43.570352][ T3614] [ 43.570352][ T3614] other info that might help us debug this: [ 43.570352][ T3614] [ 43.580645][ T3614] [ 43.580645][ T3614] rcu_scheduler_active = 2, debug_locks = 1 [ 43.588726][ T3614] 3 locks held by syz-executor209/3614: [ 43.594349][ T3614] #0: ffff888075b13210 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 43.604971][ T3614] #1: ffffffff8d7bc038 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 43.615019][ T3614] #2: ffff88807a3703b8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 43.625186][ T3614] [ 43.625186][ T3614] stack backtrace: [ 43.631115][ T3614] CPU: 1 PID: 3614 Comm: syz-executor209 Not tainted 6.0.0-rc1-syzkaller-00066-g3b06a2755758 #0 [ 43.641535][ T3614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 43.651585][ T3614] Call Trace: [ 43.654854][ T3614] [ 43.657786][ T3614] dump_stack_lvl+0xcd/0x134 [ 43.662375][ T3614] bpf_sk_reuseport_detach+0x156/0x190 [ 43.667834][ T3614] reuseport_detach_sock+0x8c/0x4a0 [ 43.673089][ T3614] ? netlink_has_listeners+0x21c/0x3d0 [ 43.678566][ T3614] __sk_free+0x130/0x460 [ 43.682806][ T3614] sk_free+0x78/0xa0 [ 43.686712][ T3614] tcp_close+0x98/0xc0 [ 43.690785][ T3614] inet_release+0x12e/0x270 [ 43.695304][ T3614] __sock_release+0xcd/0x280 [ 43.699906][ T3614] sock_close+0x18/0x20 [ 43.704069][ T3614] __fput+0x277/0x9d0 [ 43.708580][ T3614] ? __sock_release+0x280/0x280 [ 43.713445][ T3614] task_work_run+0xdd/0x1a0 [ 43.717961][ T3614] do_exit+0xad5/0x29b0 [ 43.722152][ T3614] ? mm_update_next_owner+0x7a0/0x7a0 [ 43.727532][ T3614] ? _raw_spin_unlock_irq+0x1f/0x40 [ 43.732742][ T3614] ? _raw_spin_unlock_irq+0x1f/0x40 [ 43.737959][ T3614] do_group_exit+0xd2/0x2f0 [ 43.742473][ T3614] __x64_sys_exit_group+0x3a/0x50 [ 43.747514][ T3614] do_syscall_64+0x35/0xb0 [ 43.751943][ T3614] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.757842][ T3614] RIP: 0033:0x7fc39febc699 [ 43.762267][ T3614] Code: Unable to access opcode bytes at RIP 0x7fc39febc66f. [ 43.769629][ T3614] RSP: 002b:00007ffc16dfa4d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 43.778050][ T3614] RAX: ffffffffffffffda RBX: 00007fc39ff30270 RCX: 00007fc39febc699 +++ exited with 0 +++ [ 43.786025][ T3614] RDX: 00000000000000