last executing test programs:
2.140482261s ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice', 0x800, 0x0)
2.040106935s ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord', 0x800, 0x0)
2.011173819s ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/damon/mk_contexts', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/damon/mk_contexts', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/damon/mk_contexts', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/damon/mk_contexts', 0x800, 0x0)
1.974997685s ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access', 0x2, 0x0)
1.924637157s ago: executing program 2:
syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x1)
syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x2)
syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x800)
syz_open_dev$evdev(&(0x7f0000000140), 0x1, 0x0)
syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x1)
syz_open_dev$evdev(&(0x7f00000001c0), 0x1, 0x2)
syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x800)
syz_open_dev$evdev(&(0x7f0000000240), 0x2, 0x0)
syz_open_dev$evdev(&(0x7f0000000280), 0x2, 0x1)
syz_open_dev$evdev(&(0x7f00000002c0), 0x2, 0x2)
syz_open_dev$evdev(&(0x7f0000000300), 0x2, 0x800)
syz_open_dev$evdev(&(0x7f0000000340), 0x3, 0x0)
syz_open_dev$evdev(&(0x7f0000000380), 0x3, 0x1)
syz_open_dev$evdev(&(0x7f00000003c0), 0x3, 0x2)
syz_open_dev$evdev(&(0x7f0000000400), 0x3, 0x800)
syz_open_dev$evdev(&(0x7f0000000440), 0x4, 0x0)
syz_open_dev$evdev(&(0x7f0000000480), 0x4, 0x1)
syz_open_dev$evdev(&(0x7f00000004c0), 0x4, 0x2)
syz_open_dev$evdev(&(0x7f0000000500), 0x4, 0x800)
1.800969593s ago: executing program 2:
msgrcv(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0)
915.755547ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qrtr-tun', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qrtr-tun', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qrtr-tun', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun', 0x800, 0x0)
884.579528ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer', 0x800, 0x0)
870.654588ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/card0/oss_mixer', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/card0/oss_mixer', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card0/oss_mixer', 0x800, 0x0)
847.519799ms ago: executing program 0:
utime(&(0x7f0000000000), &(0x7f0000000000))
843.799796ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/sync/info', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/sync/info', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/sync/info', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/sync/info', 0x800, 0x0)
835.938454ms ago: executing program 3:
socket$igmp(0x2, 0x3, 0x2)
830.909293ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttynull', 0x800, 0x0)
824.660401ms ago: executing program 0:
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
806.500659ms ago: executing program 1:
capget(&(0x7f0000000000), &(0x7f0000000000))
804.785519ms ago: executing program 3:
migrate_pages(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))
790.703231ms ago: executing program 4:
socket$phonet(0x23, 0x2, 0x1)
788.963237ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu', 0x800, 0x0)
774.529149ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nmem0', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nmem0', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nmem0', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nmem0', 0x800, 0x0)
772.425691ms ago: executing program 3:
rseq(&(0x7f0000000000), 0x0, 0x0, 0x0)
744.020698ms ago: executing program 1:
fremovexattr(0xffffffffffffffff, &(0x7f0000000000))
741.978911ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/kernel/yama/ptrace_scope', 0x2, 0x0)
737.914825ms ago: executing program 3:
utimes(&(0x7f0000000000), &(0x7f0000000000))
735.099957ms ago: executing program 4:
statx(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000))
719.270914ms ago: executing program 3:
syz_init_net_socket$ax25(0x3, 0x2, 0x0)
711.198803ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/damon/attrs', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/damon/attrs', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/damon/attrs', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/damon/attrs', 0x800, 0x0)
709.66078ms ago: executing program 4:
socket$nl_netfilter(0x10, 0x3, 0xc)
630.909836ms ago: executing program 3:
clock_settime(0x0, &(0x7f0000000000))
24.086308ms ago: executing program 1:
mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
0s ago: executing program 0:
mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.85' (ED25519) to the list of known hosts.
2024/06/19 18:43:39 fuzzer started
2024/06/19 18:43:39 dialing manager at 10.128.0.169:30007
[ 66.310469][ T29] audit: type=1400 audit(1718822619.227:87): avc: denied { node_bind } for pid=5076 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 66.331100][ T29] audit: type=1400 audit(1718822619.227:88): avc: denied { name_bind } for pid=5076 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[ 66.610119][ T29] audit: type=1400 audit(1718822619.527:89): avc: denied { read } for pid=5076 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 66.674385][ T29] audit: type=1400 audit(1718822619.527:90): avc: denied { open } for pid=5076 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 66.700317][ T5084] cgroup: Unknown subsys name 'net'
[ 66.774762][ T29] audit: type=1400 audit(1718822619.587:91): avc: denied { mounton } for pid=5084 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 66.823151][ T29] audit: type=1400 audit(1718822619.587:92): avc: denied { mount } for pid=5084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 66.856554][ T29] audit: type=1400 audit(1718822619.657:93): avc: denied { unmount } for pid=5084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 66.939431][ T29] audit: type=1400 audit(1718822619.687:94): avc: denied { mounton } for pid=5097 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 66.982721][ T29] audit: type=1400 audit(1718822619.687:95): avc: denied { mount } for pid=5097 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 67.010666][ T29] audit: type=1400 audit(1718822619.707:96): avc: denied { setattr } for pid=5102 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 67.046830][ T5084] cgroup: Unknown subsys name 'rlimit'
[ 67.087484][ T5113] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
2024/06/19 18:43:41 starting 5 executor processes
[ 68.428807][ T5105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 71.399994][ T29] kauditd_printk_skb: 73 callbacks suppressed
[ 71.400012][ T29] audit: type=1400 audit(1718822624.317:170): avc: denied { create } for pid=5349 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[ 71.635155][ T29] audit: type=1400 audit(1718822624.547:171): avc: denied { write } for pid=5370 comm="syz-executor.0" name="pfkey" dev="proc" ino=4026533279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1
[ 71.658126][ C0] vkms_vblank_simulate: vblank timer overrun
[ 71.747933][ T29] audit: type=1400 audit(1718822624.647:172): avc: denied { create } for pid=5375 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1
[ 71.795242][ T29] audit: type=1400 audit(1718822624.687:173): avc: denied { read } for pid=5382 comm="syz-executor.0" name="vhci" dev="devtmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[ 71.851166][ T29] audit: type=1400 audit(1718822624.687:174): avc: denied { open } for pid=5382 comm="syz-executor.0" path="/dev/vhci" dev="devtmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[ 71.928774][ T29] audit: type=1400 audit(1718822624.687:175): avc: denied { write } for pid=5382 comm="syz-executor.0" name="vhci" dev="devtmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[ 71.934204][ T1244] ieee802154 phy0 wpan0: encryption failed: -22
[ 71.959706][ T1244] ieee802154 phy1 wpan1: encryption failed: -22
[ 72.053261][ T29] audit: type=1400 audit(1718822624.747:176): avc: denied { create } for pid=5387 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[ 72.322644][ T29] audit: type=1400 audit(1718822625.237:177): avc: denied { create } for pid=5436 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 72.473682][ T29] audit: type=1400 audit(1718822625.387:178): avc: denied { create } for pid=5454 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[ 72.555949][ T29] audit: type=1400 audit(1718822625.427:179): avc: denied { read } for pid=5455 comm="syz-executor.4" name="usbmon0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1
[ 73.170368][ T5513] mmap: syz-executor.1 (5513) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst.
[ 73.789584][ T5579] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 74.874530][ T12]
[ 74.877518][ T12] =============================
[ 74.882414][ T12] WARNING: suspicious RCU usage
[ 74.887330][ T12] 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 Not tainted
[ 74.894452][ T12] -----------------------------
[ 74.899393][ T12] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 74.909099][ T12]
[ 74.909099][ T12] other info that might help us debug this:
[ 74.909099][ T12]
[ 74.919430][ T12]
2024/06/19 18:43:47 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 74.919430][ T12] rcu_scheduler_active = 2, debug_locks = 1
[ 74.927575][ T12] 3 locks held by kworker/u8:1/12:
[ 74.932721][ T12] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60
[ 74.943612][ T12] #1: ffffc90000117d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60
[ 74.954611][ T12] #2: ffffffff8f733210 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0
[ 74.964464][ T12]
[ 74.964464][ T12] stack backtrace:
[ 74.970602][ T12] CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0
[ 74.980684][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 74.990734][ T12] Workqueue: netns cleanup_net
[ 74.995505][ T12] Call Trace:
[ 74.998773][ T12]
[ 75.001701][ T12] dump_stack_lvl+0x16c/0x1f0
[ 75.006389][ T12] lockdep_rcu_suspicious+0x20b/0x3b0
[ 75.011762][ T12] _destroy_all_sets+0x261/0x6d0
[ 75.016702][ T12] ? __pfx_ip_set_net_exit+0x10/0x10
[ 75.021979][ T12] ip_set_net_exit+0x26/0x60
[ 75.026561][ T12] ops_exit_list+0xb0/0x180
[ 75.031062][ T12] cleanup_net+0x5b7/0xbf0
[ 75.035474][ T12] ? __pfx_cleanup_net+0x10/0x10
[ 75.040412][ T12] process_one_work+0x9fb/0x1b60
[ 75.045345][ T12] ? __pfx_lock_acquire+0x10/0x10
[ 75.050370][ T12] ? __pfx_process_one_work+0x10/0x10
[ 75.055734][ T12] ? assign_work+0x1a0/0x250
[ 75.060326][ T12] worker_thread+0x6c8/0xf70
[ 75.064915][ T12] ? __pfx_worker_thread+0x10/0x10
[ 75.070018][ T12] kthread+0x2c1/0x3a0
[ 75.074084][ T12] ? _raw_spin_unlock_irq+0x23/0x50
[ 75.079275][ T12] ? __pfx_kthread+0x10/0x10
[ 75.083859][ T12] ret_from_fork+0x45/0x80
[ 75.088364][ T12] ? __pfx_kthread+0x10/0x10
[ 75.092957][ T12] ret_from_fork_asm+0x1a/0x30
[ 75.097808][ T12]
[ 75.139298][ T12]
[ 75.141664][ T12] =============================
[ 75.146638][ T12] WARNING: suspicious RCU usage
[ 75.151526][ T12] 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 Not tainted
[ 75.158718][ T12] -----------------------------
[ 75.163575][ T12] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 75.173388][ T12]
[ 75.173388][ T12] other info that might help us debug this:
[ 75.173388][ T12]
[ 75.183666][ T12]
[ 75.183666][ T12] rcu_scheduler_active = 2, debug_locks = 1
[ 75.191820][ T12] 3 locks held by kworker/u8:1/12:
[ 75.196979][ T12] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60
[ 75.207449][ T12] #1: ffffc90000117d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60
[ 75.217460][ T12] #2: ffffffff8f733210 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0
[ 75.226996][ T12]
[ 75.226996][ T12] stack backtrace:
[ 75.232902][ T12] CPU: 0 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0
[ 75.242969][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 75.253362][ T12] Workqueue: netns cleanup_net
[ 75.258132][ T12] Call Trace:
[ 75.261400][ T12]
[ 75.264323][ T12] dump_stack_lvl+0x16c/0x1f0
[ 75.268996][ T12] lockdep_rcu_suspicious+0x20b/0x3b0
[ 75.274384][ T12] _destroy_all_sets+0x4e6/0x6d0
[ 75.279324][ T12] ? __pfx_ip_set_net_exit+0x10/0x10
[ 75.284599][ T12] ip_set_net_exit+0x26/0x60
[ 75.289181][ T12] ops_exit_list+0xb0/0x180
[ 75.293680][ T12] cleanup_net+0x5b7/0xbf0
[ 75.298095][ T12] ? __pfx_cleanup_net+0x10/0x10
[ 75.303032][ T12] process_one_work+0x9fb/0x1b60
[ 75.307967][ T12] ? __pfx_lock_acquire+0x10/0x10
[ 75.313000][ T12] ? __pfx_process_one_work+0x10/0x10
[ 75.318363][ T12] ? assign_work+0x1a0/0x250
[ 75.322954][ T12] worker_thread+0x6c8/0xf70
[ 75.327538][ T12] ? __pfx_worker_thread+0x10/0x10
[ 75.332642][ T12] kthread+0x2c1/0x3a0
[ 75.336708][ T12] ? _raw_spin_unlock_irq+0x23/0x50
[ 75.341904][ T12] ? __pfx_kthread+0x10/0x10
[ 75.346487][ T12] ret_from_fork+0x45/0x80
[ 75.350907][ T12] ? __pfx_kthread+0x10/0x10
[ 75.355492][ T12] ret_from_fork_asm+0x1a/0x30
[ 75.360260][ T12]
[ 75.363300][ C0] vkms_vblank_simulate: vblank timer overrun