last executing test programs:
2.280901483s ago: executing program 2:
clock_nanosleep(0x0, 0x0, &(0x7f0000000000), 0x0)
2.236422872s ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0', 0x800, 0x0)
2.201327755s ago: executing program 2:
socket$bt_rfcomm(0x1f, 0x1, 0x3)
2.170891285s ago: executing program 2:
syz_open_dev$vim2m(&(0x7f0000000040), 0x0, 0x0)
syz_open_dev$vim2m(&(0x7f0000000080), 0x0, 0x1)
syz_open_dev$vim2m(&(0x7f00000000c0), 0x0, 0x2)
syz_open_dev$vim2m(&(0x7f0000000100), 0x0, 0x800)
syz_open_dev$vim2m(&(0x7f0000000140), 0x1, 0x0)
syz_open_dev$vim2m(&(0x7f0000000180), 0x1, 0x1)
syz_open_dev$vim2m(&(0x7f00000001c0), 0x1, 0x2)
syz_open_dev$vim2m(&(0x7f0000000200), 0x1, 0x800)
syz_open_dev$vim2m(&(0x7f0000000240), 0x2, 0x0)
syz_open_dev$vim2m(&(0x7f0000000280), 0x2, 0x1)
syz_open_dev$vim2m(&(0x7f00000002c0), 0x2, 0x2)
syz_open_dev$vim2m(&(0x7f0000000300), 0x2, 0x800)
syz_open_dev$vim2m(&(0x7f0000000340), 0x3, 0x0)
syz_open_dev$vim2m(&(0x7f0000000380), 0x3, 0x1)
syz_open_dev$vim2m(&(0x7f00000003c0), 0x3, 0x2)
syz_open_dev$vim2m(&(0x7f0000000400), 0x3, 0x800)
syz_open_dev$vim2m(&(0x7f0000000440), 0x4, 0x0)
syz_open_dev$vim2m(&(0x7f0000000480), 0x4, 0x1)
syz_open_dev$vim2m(&(0x7f00000004c0), 0x4, 0x2)
syz_open_dev$vim2m(&(0x7f0000000500), 0x4, 0x800)
2.079923715s ago: executing program 2:
getpgid(0x0)
2.043696538s ago: executing program 2:
pause()
295.148967ms ago: executing program 1:
pread64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
236.72365ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/damon/attrs', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/damon/attrs', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/damon/attrs', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/damon/attrs', 0x800, 0x0)
227.491204ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/platform/vhci_hcd.0/attach', 0x1, 0x0)
214.767443ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot', 0x800, 0x0)
213.017698ms ago: executing program 4:
syslog(0x0, 0x0, 0x0)
204.297163ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem', 0x800, 0x0)
179.468621ms ago: executing program 3:
setpriority(0x0, 0x0, 0x0)
175.782827ms ago: executing program 1:
socket$pppoe(0x18, 0x1, 0x0)
169.423891ms ago: executing program 0:
linkat(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000000), 0x0)
145.940966ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load', 0x2, 0x0)
144.191561ms ago: executing program 1:
socket$inet_smc(0x2b, 0x1, 0x0)
140.865346ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel', 0x2, 0x0)
138.612381ms ago: executing program 0:
fstat(0xffffffffffffffff, &(0x7f0000000000))
117.971516ms ago: executing program 3:
capget(&(0x7f0000000000), &(0x7f0000000000))
107.108532ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls', 0x0, 0x0)
95.249473ms ago: executing program 1:
delete_module(&(0x7f0000000000), 0x0)
92.13824ms ago: executing program 4:
setresuid(0x0, 0x0, 0x0)
65.628399ms ago: executing program 4:
semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000))
57.727096ms ago: executing program 0:
pselect6(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000))
55.845493ms ago: executing program 3:
socket$nl_netfilter(0x10, 0x3, 0xc)
45.53498ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy', 0x0, 0x0)
27.156036ms ago: executing program 4:
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
12.398952ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso', 0x2, 0x0)
0s ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/xen/evtchn', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/xen/evtchn', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/xen/evtchn', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/xen/evtchn', 0x800, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.31' (ED25519) to the list of known hosts.
2024/06/18 13:24:04 fuzzer started
2024/06/18 13:24:04 dialing manager at 10.128.0.169:30007
[ 74.043125][ T29] audit: type=1400 audit(1718717044.631:87): avc: denied { node_bind } for pid=5079 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 74.069740][ T29] audit: type=1400 audit(1718717044.651:88): avc: denied { name_bind } for pid=5079 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[ 74.354932][ T29] audit: type=1400 audit(1718717044.941:89): avc: denied { read } for pid=5079 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 74.378093][ T29] audit: type=1400 audit(1718717044.941:90): avc: denied { open } for pid=5079 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 74.440807][ T29] audit: type=1400 audit(1718717045.011:91): avc: denied { mounton } for pid=5088 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 74.468938][ T5088] cgroup: Unknown subsys name 'net'
[ 74.556018][ T29] audit: type=1400 audit(1718717045.011:92): avc: denied { mount } for pid=5088 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 74.660371][ T29] audit: type=1400 audit(1718717045.071:93): avc: denied { setattr } for pid=5094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 74.709626][ T29] audit: type=1400 audit(1718717045.081:94): avc: denied { mounton } for pid=5095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 74.751242][ T29] audit: type=1400 audit(1718717045.081:95): avc: denied { mount } for pid=5095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 74.779518][ T5112] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 74.781405][ T29] audit: type=1400 audit(1718717045.091:96): avc: denied { unmount } for pid=5088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 74.897642][ T5088] cgroup: Unknown subsys name 'rlimit'
2024/06/18 13:24:06 starting 5 executor processes
[ 76.177261][ T5103] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 79.067169][ T29] kauditd_printk_skb: 64 callbacks suppressed
[ 79.067194][ T29] audit: type=1400 audit(1718717049.651:161): avc: denied { create } for pid=5359 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 79.173557][ T29] audit: type=1400 audit(1718717049.661:162): avc: denied { write } for pid=5361 comm="syz-executor.3" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1
[ 79.231285][ T29] audit: type=1400 audit(1718717049.691:163): avc: denied { create } for pid=5362 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1
[ 79.343768][ T29] audit: type=1400 audit(1718717049.931:164): avc: denied { module_request } for pid=5383 comm="syz-executor.3" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 79.365811][ C0] vkms_vblank_simulate: vblank timer overrun
[ 79.517217][ T29] audit: type=1400 audit(1718717050.101:165): avc: denied { create } for pid=5398 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[ 79.567951][ T29] audit: type=1400 audit(1718717050.121:166): avc: denied { read } for pid=5399 comm="syz-executor.3" name="uinput" dev="devtmpfs" ino=836 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 79.588073][ T5403] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 79.650520][ T29] audit: type=1400 audit(1718717050.121:167): avc: denied { open } for pid=5399 comm="syz-executor.3" path="/dev/uinput" dev="devtmpfs" ino=836 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 79.742214][ T29] audit: type=1400 audit(1718717050.121:168): avc: denied { write } for pid=5399 comm="syz-executor.3" name="uinput" dev="devtmpfs" ino=836 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 79.766737][ C0] vkms_vblank_simulate: vblank timer overrun
[ 79.814658][ T29] audit: type=1400 audit(1718717050.308:169): avc: denied { read } for pid=5413 comm="syz-executor.3" name="mouse0" dev="devtmpfs" ino=839 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[ 79.914382][ T29] audit: type=1400 audit(1718717050.308:170): avc: denied { open } for pid=5413 comm="syz-executor.3" path="/dev/input/mouse0" dev="devtmpfs" ino=839 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[ 81.598150][ T1057]
[ 81.600892][ T1057] =============================
[ 81.605795][ T1057] WARNING: suspicious RCU usage
[ 81.611152][ T1057] 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 Not tainted
[ 81.618735][ T1057] -----------------------------
[ 81.624099][ T1057] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 81.634076][ T1057]
[ 81.634076][ T1057] other info that might help us debug this:
[ 81.634076][ T1057]
[ 81.644476][ T1057]
[ 81.644476][ T1057] rcu_scheduler_active = 2, debug_locks = 1
[ 81.652698][ T1057] 3 locks held by kworker/u8:7/1057:
[ 81.658019][ T1057] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60
[ 81.668637][ T1057] #1: ffffc90004287d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60
[ 81.678844][ T1057] #2: ffffffff8f7371d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0
[ 81.688389][ T1057]
[ 81.688389][ T1057] stack backtrace:
2024/06/18 13:24:12 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 81.694609][ T1057] CPU: 1 PID: 1057 Comm: kworker/u8:7 Not tainted 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0
[ 81.705043][ T1057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 81.715387][ T1057] Workqueue: netns cleanup_net
[ 81.720291][ T1057] Call Trace:
[ 81.723678][ T1057]
[ 81.726667][ T1057] dump_stack_lvl+0x16c/0x1f0
[ 81.731417][ T1057] lockdep_rcu_suspicious+0x20b/0x3b0
[ 81.736829][ T1057] _destroy_all_sets+0x261/0x6d0
[ 81.741803][ T1057] ? __pfx_ip_set_net_exit+0x10/0x10
[ 81.747292][ T1057] ip_set_net_exit+0x26/0x60
[ 81.751929][ T1057] ops_exit_list+0xb0/0x180
[ 81.756556][ T1057] cleanup_net+0x5b7/0xbf0
[ 81.760996][ T1057] ? __pfx_cleanup_net+0x10/0x10
[ 81.765945][ T1057] process_one_work+0x9fb/0x1b60
[ 81.770887][ T1057] ? __pfx_lock_acquire+0x10/0x10
[ 81.775919][ T1057] ? __pfx_process_one_work+0x10/0x10
[ 81.781294][ T1057] ? assign_work+0x1a0/0x250
[ 81.786156][ T1057] worker_thread+0x6c8/0xf70
[ 81.790749][ T1057] ? __pfx_worker_thread+0x10/0x10
[ 81.795859][ T1057] kthread+0x2c1/0x3a0
[ 81.799931][ T1057] ? _raw_spin_unlock_irq+0x23/0x50
[ 81.805314][ T1057] ? __pfx_kthread+0x10/0x10
[ 81.809939][ T1057] ret_from_fork+0x45/0x80
[ 81.814368][ T1057] ? __pfx_kthread+0x10/0x10
[ 81.818983][ T1057] ret_from_fork_asm+0x1a/0x30
[ 81.823760][ T1057]
[ 81.857535][ T1057]
[ 81.859951][ T1057] =============================
[ 81.865248][ T1057] WARNING: suspicious RCU usage
[ 81.870125][ T1057] 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 Not tainted
[ 81.877693][ T1057] -----------------------------
[ 81.882770][ T1057] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 81.892493][ T1057]
[ 81.892493][ T1057] other info that might help us debug this:
[ 81.892493][ T1057]
[ 81.902841][ T1057]
[ 81.902841][ T1057] rcu_scheduler_active = 2, debug_locks = 1
[ 81.911068][ T1057] 3 locks held by kworker/u8:7/1057:
[ 81.916629][ T1057] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60
[ 81.927341][ T1057] #1: ffffc90004287d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60
[ 81.937578][ T1057] #2: ffffffff8f7371d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0
[ 81.947035][ T1057]
[ 81.947035][ T1057] stack backtrace:
[ 81.953210][ T1057] CPU: 0 PID: 1057 Comm: kworker/u8:7 Not tainted 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0
[ 81.963623][ T1057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 81.973739][ T1057] Workqueue: netns cleanup_net
[ 81.978548][ T1057] Call Trace:
[ 81.981846][ T1057]
[ 81.984779][ T1057] dump_stack_lvl+0x16c/0x1f0
[ 81.989495][ T1057] lockdep_rcu_suspicious+0x20b/0x3b0
[ 81.994911][ T1057] _destroy_all_sets+0x4e6/0x6d0
[ 81.999982][ T1057] ? __pfx_ip_set_net_exit+0x10/0x10
[ 82.005388][ T1057] ip_set_net_exit+0x26/0x60
[ 82.009997][ T1057] ops_exit_list+0xb0/0x180
[ 82.014504][ T1057] cleanup_net+0x5b7/0xbf0
[ 82.018924][ T1057] ? __pfx_cleanup_net+0x10/0x10
[ 82.023869][ T1057] process_one_work+0x9fb/0x1b60
[ 82.028814][ T1057] ? __pfx_lock_acquire+0x10/0x10
[ 82.033847][ T1057] ? __pfx_process_one_work+0x10/0x10
[ 82.039220][ T1057] ? assign_work+0x1a0/0x250
[ 82.043817][ T1057] worker_thread+0x6c8/0xf70
[ 82.048410][ T1057] ? __pfx_worker_thread+0x10/0x10
[ 82.053530][ T1057] kthread+0x2c1/0x3a0
[ 82.057689][ T1057] ? _raw_spin_unlock_irq+0x23/0x50
[ 82.062983][ T1057] ? __pfx_kthread+0x10/0x10
[ 82.067662][ T1057] ret_from_fork+0x45/0x80
[ 82.072085][ T1057] ? __pfx_kthread+0x10/0x10
[ 82.076678][ T1057] ret_from_fork_asm+0x1a/0x30
[ 82.081459][ T1057]
[ 82.084511][ C0] vkms_vblank_simulate: vblank timer overrun