last executing test programs: 2.140482261s ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice', 0x800, 0x0) 2.040106935s ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord', 0x800, 0x0) 2.011173819s ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/damon/mk_contexts', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/damon/mk_contexts', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/damon/mk_contexts', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/damon/mk_contexts', 0x800, 0x0) 1.974997685s ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access', 0x2, 0x0) 1.924637157s ago: executing program 2: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$evdev(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$evdev(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$evdev(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$evdev(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$evdev(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$evdev(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$evdev(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$evdev(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$evdev(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$evdev(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$evdev(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$evdev(&(0x7f0000000500), 0x4, 0x800) 1.800969593s ago: executing program 2: msgrcv(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0) 915.755547ms ago: executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qrtr-tun', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qrtr-tun', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qrtr-tun', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun', 0x800, 0x0) 884.579528ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer', 0x800, 0x0) 870.654588ms ago: executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/card0/oss_mixer', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/card0/oss_mixer', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card0/oss_mixer', 0x800, 0x0) 847.519799ms ago: executing program 0: utime(&(0x7f0000000000), &(0x7f0000000000)) 843.799796ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/sync/info', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/sync/info', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/sync/info', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/sync/info', 0x800, 0x0) 835.938454ms ago: executing program 3: socket$igmp(0x2, 0x3, 0x2) 830.909293ms ago: executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttynull', 0x800, 0x0) 824.660401ms ago: executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 806.500659ms ago: executing program 1: capget(&(0x7f0000000000), &(0x7f0000000000)) 804.785519ms ago: executing program 3: migrate_pages(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 790.703231ms ago: executing program 4: socket$phonet(0x23, 0x2, 0x1) 788.963237ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu', 0x800, 0x0) 774.529149ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nmem0', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nmem0', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nmem0', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nmem0', 0x800, 0x0) 772.425691ms ago: executing program 3: rseq(&(0x7f0000000000), 0x0, 0x0, 0x0) 744.020698ms ago: executing program 1: fremovexattr(0xffffffffffffffff, &(0x7f0000000000)) 741.978911ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/kernel/yama/ptrace_scope', 0x2, 0x0) 737.914825ms ago: executing program 3: utimes(&(0x7f0000000000), &(0x7f0000000000)) 735.099957ms ago: executing program 4: statx(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000)) 719.270914ms ago: executing program 3: syz_init_net_socket$ax25(0x3, 0x2, 0x0) 711.198803ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/damon/attrs', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/damon/attrs', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/damon/attrs', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/damon/attrs', 0x800, 0x0) 709.66078ms ago: executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) 630.909836ms ago: executing program 3: clock_settime(0x0, &(0x7f0000000000)) 24.086308ms ago: executing program 1: mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 0s ago: executing program 0: mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.85' (ED25519) to the list of known hosts. 2024/06/19 18:43:39 fuzzer started 2024/06/19 18:43:39 dialing manager at 10.128.0.169:30007 [ 66.310469][ T29] audit: type=1400 audit(1718822619.227:87): avc: denied { node_bind } for pid=5076 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 66.331100][ T29] audit: type=1400 audit(1718822619.227:88): avc: denied { name_bind } for pid=5076 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.610119][ T29] audit: type=1400 audit(1718822619.527:89): avc: denied { read } for pid=5076 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.674385][ T29] audit: type=1400 audit(1718822619.527:90): avc: denied { open } for pid=5076 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.700317][ T5084] cgroup: Unknown subsys name 'net' [ 66.774762][ T29] audit: type=1400 audit(1718822619.587:91): avc: denied { mounton } for pid=5084 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.823151][ T29] audit: type=1400 audit(1718822619.587:92): avc: denied { mount } for pid=5084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.856554][ T29] audit: type=1400 audit(1718822619.657:93): avc: denied { unmount } for pid=5084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.939431][ T29] audit: type=1400 audit(1718822619.687:94): avc: denied { mounton } for pid=5097 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.982721][ T29] audit: type=1400 audit(1718822619.687:95): avc: denied { mount } for pid=5097 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.010666][ T29] audit: type=1400 audit(1718822619.707:96): avc: denied { setattr } for pid=5102 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.046830][ T5084] cgroup: Unknown subsys name 'rlimit' [ 67.087484][ T5113] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). 2024/06/19 18:43:41 starting 5 executor processes [ 68.428807][ T5105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.399994][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 71.400012][ T29] audit: type=1400 audit(1718822624.317:170): avc: denied { create } for pid=5349 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 71.635155][ T29] audit: type=1400 audit(1718822624.547:171): avc: denied { write } for pid=5370 comm="syz-executor.0" name="pfkey" dev="proc" ino=4026533279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 71.658126][ C0] vkms_vblank_simulate: vblank timer overrun [ 71.747933][ T29] audit: type=1400 audit(1718822624.647:172): avc: denied { create } for pid=5375 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 71.795242][ T29] audit: type=1400 audit(1718822624.687:173): avc: denied { read } for pid=5382 comm="syz-executor.0" name="vhci" dev="devtmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 71.851166][ T29] audit: type=1400 audit(1718822624.687:174): avc: denied { open } for pid=5382 comm="syz-executor.0" path="/dev/vhci" dev="devtmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 71.928774][ T29] audit: type=1400 audit(1718822624.687:175): avc: denied { write } for pid=5382 comm="syz-executor.0" name="vhci" dev="devtmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 71.934204][ T1244] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.959706][ T1244] ieee802154 phy1 wpan1: encryption failed: -22 [ 72.053261][ T29] audit: type=1400 audit(1718822624.747:176): avc: denied { create } for pid=5387 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 72.322644][ T29] audit: type=1400 audit(1718822625.237:177): avc: denied { create } for pid=5436 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 72.473682][ T29] audit: type=1400 audit(1718822625.387:178): avc: denied { create } for pid=5454 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 72.555949][ T29] audit: type=1400 audit(1718822625.427:179): avc: denied { read } for pid=5455 comm="syz-executor.4" name="usbmon0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 73.170368][ T5513] mmap: syz-executor.1 (5513) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 73.789584][ T5579] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 74.874530][ T12] [ 74.877518][ T12] ============================= [ 74.882414][ T12] WARNING: suspicious RCU usage [ 74.887330][ T12] 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 Not tainted [ 74.894452][ T12] ----------------------------- [ 74.899393][ T12] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 74.909099][ T12] [ 74.909099][ T12] other info that might help us debug this: [ 74.909099][ T12] [ 74.919430][ T12] 2024/06/19 18:43:47 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 74.919430][ T12] rcu_scheduler_active = 2, debug_locks = 1 [ 74.927575][ T12] 3 locks held by kworker/u8:1/12: [ 74.932721][ T12] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60 [ 74.943612][ T12] #1: ffffc90000117d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60 [ 74.954611][ T12] #2: ffffffff8f733210 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0 [ 74.964464][ T12] [ 74.964464][ T12] stack backtrace: [ 74.970602][ T12] CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 74.980684][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 74.990734][ T12] Workqueue: netns cleanup_net [ 74.995505][ T12] Call Trace: [ 74.998773][ T12] [ 75.001701][ T12] dump_stack_lvl+0x16c/0x1f0 [ 75.006389][ T12] lockdep_rcu_suspicious+0x20b/0x3b0 [ 75.011762][ T12] _destroy_all_sets+0x261/0x6d0 [ 75.016702][ T12] ? __pfx_ip_set_net_exit+0x10/0x10 [ 75.021979][ T12] ip_set_net_exit+0x26/0x60 [ 75.026561][ T12] ops_exit_list+0xb0/0x180 [ 75.031062][ T12] cleanup_net+0x5b7/0xbf0 [ 75.035474][ T12] ? __pfx_cleanup_net+0x10/0x10 [ 75.040412][ T12] process_one_work+0x9fb/0x1b60 [ 75.045345][ T12] ? __pfx_lock_acquire+0x10/0x10 [ 75.050370][ T12] ? __pfx_process_one_work+0x10/0x10 [ 75.055734][ T12] ? assign_work+0x1a0/0x250 [ 75.060326][ T12] worker_thread+0x6c8/0xf70 [ 75.064915][ T12] ? __pfx_worker_thread+0x10/0x10 [ 75.070018][ T12] kthread+0x2c1/0x3a0 [ 75.074084][ T12] ? _raw_spin_unlock_irq+0x23/0x50 [ 75.079275][ T12] ? __pfx_kthread+0x10/0x10 [ 75.083859][ T12] ret_from_fork+0x45/0x80 [ 75.088364][ T12] ? __pfx_kthread+0x10/0x10 [ 75.092957][ T12] ret_from_fork_asm+0x1a/0x30 [ 75.097808][ T12] [ 75.139298][ T12] [ 75.141664][ T12] ============================= [ 75.146638][ T12] WARNING: suspicious RCU usage [ 75.151526][ T12] 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 Not tainted [ 75.158718][ T12] ----------------------------- [ 75.163575][ T12] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 75.173388][ T12] [ 75.173388][ T12] other info that might help us debug this: [ 75.173388][ T12] [ 75.183666][ T12] [ 75.183666][ T12] rcu_scheduler_active = 2, debug_locks = 1 [ 75.191820][ T12] 3 locks held by kworker/u8:1/12: [ 75.196979][ T12] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60 [ 75.207449][ T12] #1: ffffc90000117d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60 [ 75.217460][ T12] #2: ffffffff8f733210 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0 [ 75.226996][ T12] [ 75.226996][ T12] stack backtrace: [ 75.232902][ T12] CPU: 0 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 75.242969][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 75.253362][ T12] Workqueue: netns cleanup_net [ 75.258132][ T12] Call Trace: [ 75.261400][ T12] [ 75.264323][ T12] dump_stack_lvl+0x16c/0x1f0 [ 75.268996][ T12] lockdep_rcu_suspicious+0x20b/0x3b0 [ 75.274384][ T12] _destroy_all_sets+0x4e6/0x6d0 [ 75.279324][ T12] ? __pfx_ip_set_net_exit+0x10/0x10 [ 75.284599][ T12] ip_set_net_exit+0x26/0x60 [ 75.289181][ T12] ops_exit_list+0xb0/0x180 [ 75.293680][ T12] cleanup_net+0x5b7/0xbf0 [ 75.298095][ T12] ? __pfx_cleanup_net+0x10/0x10 [ 75.303032][ T12] process_one_work+0x9fb/0x1b60 [ 75.307967][ T12] ? __pfx_lock_acquire+0x10/0x10 [ 75.313000][ T12] ? __pfx_process_one_work+0x10/0x10 [ 75.318363][ T12] ? assign_work+0x1a0/0x250 [ 75.322954][ T12] worker_thread+0x6c8/0xf70 [ 75.327538][ T12] ? __pfx_worker_thread+0x10/0x10 [ 75.332642][ T12] kthread+0x2c1/0x3a0 [ 75.336708][ T12] ? _raw_spin_unlock_irq+0x23/0x50 [ 75.341904][ T12] ? __pfx_kthread+0x10/0x10 [ 75.346487][ T12] ret_from_fork+0x45/0x80 [ 75.350907][ T12] ? __pfx_kthread+0x10/0x10 [ 75.355492][ T12] ret_from_fork_asm+0x1a/0x30 [ 75.360260][ T12] [ 75.363300][ C0] vkms_vblank_simulate: vblank timer overrun