./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3384582750 <...> DUID 00:04:f2:7f:36:b6:03:80:f9:c3:71:03:f9:5e:f9:cf:ad:4a forked to background, child pid 3185 [ 26.622964][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.633371][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.90' (ECDSA) to the list of known hosts. execve("./syz-executor3384582750", ["./syz-executor3384582750"], 0x7fff9576a330 /* 10 vars */) = 0 brk(NULL) = 0x555555e1c000 brk(0x555555e1cc40) = 0x555555e1cc40 arch_prctl(ARCH_SET_FS, 0x555555e1c300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3384582750", 4096) = 28 brk(0x555555e3dc40) = 0x555555e3dc40 brk(0x555555e3e000) = 0x555555e3e000 mprotect(0x7fda3e7a2000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [-192], 4) = 0 setsockopt(3, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, {len=1, filter=0x20f07000}, 16) = 0 exit_group(0) = ? syzkaller login: [ 49.103782][ T3606] [ 49.106314][ T3606] ============================= [ 49.111146][ T3606] WARNING: suspicious RCU usage [ 49.116022][ T3606] 5.19.0-syzkaller-13966-ged16d19c5f1d #0 Not tainted [ 49.122784][ T3606] ----------------------------- [ 49.127667][ T3606] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 49.135587][ T3606] [ 49.135587][ T3606] other info that might help us debug this: [ 49.135587][ T3606] [ 49.145842][ T3606] [ 49.145842][ T3606] rcu_scheduler_active = 2, debug_locks = 1 [ 49.153930][ T3606] 3 locks held by syz-executor338/3606: [ 49.159654][ T3606] #0: ffff8880746ce210 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 49.170294][ T3606] #1: ffffffff8d7bb4f8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 49.180418][ T3606] #2: ffff88807a780fb8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 49.190589][ T3606] [ 49.190589][ T3606] stack backtrace: [ 49.196520][ T3606] CPU: 1 PID: 3606 Comm: syz-executor338 Not tainted 5.19.0-syzkaller-13966-ged16d19c5f1d #0 [ 49.206687][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 49.216735][ T3606] Call Trace: [ 49.220005][ T3606] [ 49.222938][ T3606] dump_stack_lvl+0xcd/0x134 [ 49.227532][ T3606] bpf_sk_reuseport_detach+0x156/0x190 [ 49.232990][ T3606] reuseport_detach_sock+0x8c/0x4a0 [ 49.238183][ T3606] ? netlink_has_listeners+0x21c/0x3d0 [ 49.243636][ T3606] __sk_free+0x130/0x460 [ 49.247876][ T3606] sk_free+0x78/0xa0 [ 49.251764][ T3606] tcp_close+0x98/0xc0 [ 49.255837][ T3606] inet_release+0x12e/0x270 [ 49.260343][ T3606] __sock_release+0xcd/0x280 [ 49.264923][ T3606] sock_close+0x18/0x20 [ 49.269067][ T3606] __fput+0x277/0x9d0 [ 49.273040][ T3606] ? __sock_release+0x280/0x280 [ 49.278403][ T3606] task_work_run+0xdd/0x1a0 [ 49.282909][ T3606] do_exit+0xad5/0x29b0 [ 49.287058][ T3606] ? mm_update_next_owner+0x7a0/0x7a0 [ 49.292420][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 49.297697][ T3606] ? _raw_spin_unlock_irq+0x1f/0x40 [ 49.302889][ T3606] do_group_exit+0xd2/0x2f0 [ 49.307384][ T3606] __x64_sys_exit_group+0x3a/0x50 [ 49.312394][ T3606] do_syscall_64+0x35/0xb0 [ 49.316806][ T3606] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 49.322690][ T3606] RIP: 0033:0x7fda3e734699 [ 49.327093][ T3606] Code: Unable to access opcode bytes at RIP 0x7fda3e73466f. [ 49.334440][ T3606] RSP: 002b:00007ffd461214f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 49.342843][ T3606] RAX: ffffffffffffffda RBX: 00007fda3e7a8270 RCX: 00007fda3e734699 +++ exited with 0 +++ [ 49.350801][ T3606] RDX: 000000000000003c RSI: