./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1988953690 <...> DUID 00:04:53:46:a9:9d:03:7a:46:b2:48:ff:4a:ea:3f:46:f2:43 forked to background, child pid 3186 [ 27.364974][ T3187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.376195][ T3187] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts. execve("./syz-executor1988953690", ["./syz-executor1988953690"], 0x7fff86d65660 /* 10 vars */) = 0 brk(NULL) = 0x55555739e000 brk(0x55555739ec40) = 0x55555739ec40 arch_prctl(ARCH_SET_FS, 0x55555739e300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1988953690", 4096) = 28 brk(0x5555573bfc40) = 0x5555573bfc40 brk(0x5555573c0000) = 0x5555573c0000 mprotect(0x7fad07fb6000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_INET, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_SOCKET, SO_REUSEPORT, [-121], 4) = 0 listen(3, 0) = 0 exit_group(0) = ? syzkaller login: [ 50.973500][ T3608] [ 50.975990][ T3608] ============================= [ 50.980821][ T3608] WARNING: suspicious RCU usage [ 50.985966][ T3608] 6.0.0-rc1-next-20220818-syzkaller #0 Not tainted [ 50.992453][ T3608] ----------------------------- [ 50.997323][ T3608] include/net/sock.h:592 suspicious rcu_dereference_check() usage! [ 51.005239][ T3608] [ 51.005239][ T3608] other info that might help us debug this: [ 51.005239][ T3608] [ 51.015488][ T3608] [ 51.015488][ T3608] rcu_scheduler_active = 2, debug_locks = 1 [ 51.023666][ T3608] 5 locks held by syz-executor198/3608: [ 51.029230][ T3608] #0: ffff888075d9ee10 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 51.039828][ T3608] #1: ffff888078870d30 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_close+0x1e/0xc0 [ 51.048855][ T3608] #2: ffffc9000132c9d0 (&h->lhash2[i].lock){+.+.}-{2:2}, at: inet_unhash+0x345/0x680 [ 51.058465][ T3608] #3: ffffffff8d7beb78 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x22/0x4a0 [ 51.068543][ T3608] #4: ffff888078870fb8 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x26/0x190 [ 51.078679][ T3608] [ 51.078679][ T3608] stack backtrace: [ 51.084586][ T3608] CPU: 0 PID: 3608 Comm: syz-executor198 Not tainted 6.0.0-rc1-next-20220818-syzkaller #0 [ 51.094487][ T3608] syz-executor198[3608] cmdline: a [ 51.100279][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 51.110340][ T3608] Call Trace: [ 51.113626][ T3608] [ 51.116556][ T3608] dump_stack_lvl+0xcd/0x134 [ 51.121149][ T3608] bpf_sk_reuseport_detach+0x156/0x190 [ 51.126606][ T3608] reuseport_detach_sock+0x8c/0x4a0 [ 51.131803][ T3608] reuseport_stop_listen_sock+0x6d/0x500 [ 51.137460][ T3608] inet_unhash+0x3b1/0x680 [ 51.141872][ T3608] tcp_set_state+0x198/0x7e0 [ 51.146468][ T3608] ? tcp_wmem_schedule+0x210/0x210 [ 51.151574][ T3608] ? find_held_lock+0x2d/0x110 [ 51.156330][ T3608] ? tcp_close+0x1e/0xc0 [ 51.160570][ T3608] __tcp_close+0xbfd/0xf50 [ 51.164999][ T3608] tcp_close+0x29/0xc0 [ 51.169064][ T3608] inet_release+0x12e/0x270 [ 51.173576][ T3608] __sock_release+0xcd/0x280 [ 51.178165][ T3608] sock_close+0x18/0x20 [ 51.182311][ T3608] __fput+0x27c/0xa90 [ 51.186291][ T3608] ? __sock_release+0x280/0x280 [ 51.191205][ T3608] task_work_run+0xdd/0x1a0 [ 51.195717][ T3608] do_exit+0xc39/0x2b60 [ 51.199883][ T3608] ? lock_downgrade+0x6e0/0x6e0 [ 51.204735][ T3608] ? do_raw_spin_lock+0x120/0x2a0 [ 51.209754][ T3608] ? mm_update_next_owner+0x7a0/0x7a0 [ 51.215117][ T3608] ? rwlock_bug.part.0+0x90/0x90 [ 51.220048][ T3608] ? _raw_spin_unlock_irq+0x1f/0x40 [ 51.225236][ T3608] ? _raw_spin_unlock_irq+0x1f/0x40 [ 51.230429][ T3608] do_group_exit+0xd0/0x2a0 [ 51.234949][ T3608] __x64_sys_exit_group+0x3a/0x50 [ 51.240000][ T3608] do_syscall_64+0x35/0xb0 [ 51.244416][ T3608] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 51.250312][ T3608] RIP: 0033:0x7fad07f48639 [ 51.254722][ T3608] Code: Unable to access opcode bytes at RIP 0x7fad07f4860f. [ 51.262069][ T3608] RSP: 002b:00007fffa76d3788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 +++ exited with 0 +++ [ 51.270480][ T3608] RAX: ffffffffffffffda RBX: 00