[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.158' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 73.099851][ T8417] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program executing program executing program [ 74.162410][ T8454] [ 74.164997][ T8454] ============================= [ 74.169846][ T8454] WARNING: suspicious RCU usage [ 74.174785][ T8454] 5.12.0-rc4-syzkaller #0 Not tainted [ 74.180176][ T8454] ----------------------------- [ 74.185090][ T8454] include/linux/skmsg.h:286 suspicious rcu_dereference_check() usage! [ 74.193329][ T8454] [ 74.193329][ T8454] other info that might help us debug this: [ 74.193329][ T8454] [ 74.203809][ T8454] [ 74.203809][ T8454] rcu_scheduler_active = 2, debug_locks = 1 [ 74.211956][ T8454] 1 lock held by syz-executor383/8454: [ 74.217470][ T8454] #0: ffff888013a99b48 (clock-AF_INET){++..}-{2:2}, at: sk_psock_drop+0x2c/0x460 [ 74.226832][ T8454] [ 74.226832][ T8454] stack backtrace: [ 74.232722][ T8454] CPU: 1 PID: 8454 Comm: syz-executor383 Not tainted 5.12.0-rc4-syzkaller #0 [ 74.241481][ T8454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.251533][ T8454] Call Trace: [ 74.254809][ T8454] dump_stack+0x141/0x1d7 [ 74.259147][ T8454] tcp_bpf_update_proto+0x530/0x5f0 [ 74.264440][ T8454] ? tcp_bpf_stream_read+0x270/0x270 [ 74.269717][ T8454] sk_psock_drop+0xdf/0x460 [ 74.274213][ T8454] tcp_bpf_recvmsg+0x42d/0x480 [ 74.279031][ T8454] ? tcp_bpf_sendpage+0x8d0/0x8d0 [ 74.284069][ T8454] ? aa_sk_perm+0x31b/0xab0 [ 74.288576][ T8454] inet_recvmsg+0x11b/0x5d0 [ 74.293078][ T8454] ? inet_sendpage+0x140/0x140 [ 74.297848][ T8454] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.304096][ T8454] ? security_socket_recvmsg+0x8f/0xc0 [ 74.309558][ T8454] ? inet_sendpage+0x140/0x140 [ 74.314322][ T8454] ____sys_recvmsg+0x2c4/0x600 [ 74.319099][ T8454] ? move_addr_to_kernel.part.0+0x110/0x110 [ 74.324991][ T8454] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.331226][ T8454] ? __import_iovec+0x293/0x500 [ 74.336095][ T8454] ? import_iovec+0x10c/0x150 [ 74.340771][ T8454] ___sys_recvmsg+0x127/0x200 [ 74.345439][ T8454] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 74.351064][ T8454] ? __fget_files+0x266/0x3d0 [ 74.355752][ T8454] ? lock_downgrade+0x6e0/0x6e0 [ 74.360621][ T8454] ? __fget_files+0x288/0x3d0 [ 74.365296][ T8454] ? __fget_light+0xea/0x280 [ 74.369885][ T8454] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 74.376124][ T8454] do_recvmmsg+0x24d/0x6d0 [ 74.380541][ T8454] ? ___sys_recvmsg+0x200/0x200 [ 74.385385][ T8454] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.391371][ T8454] ? __do_sys_bpf+0x454/0x4f40 [ 74.396143][ T8454] ? __context_tracking_exit+0xb8/0xe0 [ 74.401596][ T8454] ? lock_downgrade+0x6e0/0x6e0 [ 74.406457][ T8454] __x64_sys_recvmmsg+0x20b/0x260 [ 74.411475][ T8454] ? __do_sys_socketcall+0x590/0x590 [ 74.416765][ T8454] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.422665][ T8454] do_syscall_64+0x2d/0x70 [ 74.427076][ T8454] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.432965][ T8454] RIP: 0033:0x4468e9 [ 74.436850][ T8454] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 executing program [ 74.456563][ T8454] RSP: 002b:00007f010b0cc318 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 74.464973][ T8454] RAX: ffffffffffffffda RBX: 00000000004cb4e8 RCX: 00000000004468e9 [ 74.472935][ T8454] RDX: 0000000000000422 RSI: 0000000020000540 RDI: 0000000000000004 [ 74.480897][ T8454] RBP: 00000000004cb4e0 R08: 0000000000000000 R09: 0000000000000000 [ 74.488859][ T8454] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000049b270 [ 74.496820][ T8454] R13: 00007ffe3829a5bf R14: 00007f010b0cc400 R15: 0000000000022000 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program