last executing test programs: 1.885432256s ago: executing program 4: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) 1.827067178s ago: executing program 4: getrandom(&(0x7f0000000000), 0x0, 0x0) 1.769288439s ago: executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci', 0x2, 0x0) 1.724736414s ago: executing program 4: utime(&(0x7f0000000000), &(0x7f0000000000)) 1.675621691s ago: executing program 4: shmget(0xffffffffffffffff, 0x0, 0x0, 0x0) 1.629229217s ago: executing program 4: pause() 449.292974ms ago: executing program 3: setreuid(0x0, 0x0) 398.597521ms ago: executing program 3: removexattr(&(0x7f0000000000), &(0x7f0000000000)) 352.871026ms ago: executing program 3: syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$mouse(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$mouse(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$mouse(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$mouse(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$mouse(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$mouse(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$mouse(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$mouse(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$mouse(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$mouse(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$mouse(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$mouse(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$mouse(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$mouse(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$mouse(&(0x7f0000000500), 0x4, 0x800) 286.970204ms ago: executing program 3: preadv2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 249.777704ms ago: executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x0) 247.42074ms ago: executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pktcdvd/control', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pktcdvd/control', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/pktcdvd/control', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/pktcdvd/control', 0x800, 0x0) 233.401689ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci', 0x800, 0x0) 223.705211ms ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp', 0x800, 0x0) 212.981073ms ago: executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1', 0x800, 0x0) 210.345059ms ago: executing program 0: linkat(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000000), 0x0) 200.529728ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec', 0x2, 0x0) 183.264349ms ago: executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 171.610567ms ago: executing program 0: stat(&(0x7f0000000000), &(0x7f0000000000)) 146.083526ms ago: executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) 145.304657ms ago: executing program 0: syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$video(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$video(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$video(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$video(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$video(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$video(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$video(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$video(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$video(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$video(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$video(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$video(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$video(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$video(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$video(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$video(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$video(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$video(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$video(&(0x7f0000000500), 0x4, 0x800) 133.842168ms ago: executing program 1: get_robust_list(0x0, &(0x7f0000000000), &(0x7f0000000000)) 108.949105ms ago: executing program 1: getgid() 88.895272ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/revoke-subject', 0x2, 0x0) 73.273931ms ago: executing program 0: socket$phonet(0x23, 0x2, 0x1) 62.990029ms ago: executing program 2: sched_rr_get_interval(0x0, &(0x7f0000000000)) 50.357191ms ago: executing program 1: syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$rtc(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$rtc(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$rtc(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$rtc(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$rtc(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$rtc(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$rtc(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$rtc(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$rtc(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$rtc(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$rtc(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$rtc(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$rtc(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$rtc(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$rtc(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$rtc(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$rtc(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$rtc(&(0x7f0000000500), 0x4, 0x800) 42.674214ms ago: executing program 2: socket$key(0xf, 0x3, 0x2) 35.27638ms ago: executing program 0: faccessat(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 2: gettid() kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.100' (ED25519) to the list of known hosts. 2024/06/18 04:08:20 fuzzer started 2024/06/18 04:08:20 dialing manager at 10.128.0.169:30007 [ 73.469831][ T29] audit: type=1400 audit(1718683700.915:87): avc: denied { node_bind } for pid=5076 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 73.497031][ T29] audit: type=1400 audit(1718683700.935:88): avc: denied { name_bind } for pid=5076 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 73.783015][ T29] audit: type=1400 audit(1718683701.225:89): avc: denied { read } for pid=5076 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.823219][ T29] audit: type=1400 audit(1718683701.225:90): avc: denied { open } for pid=5076 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.831034][ T5084] cgroup: Unknown subsys name 'net' [ 73.916256][ T29] audit: type=1400 audit(1718683701.255:91): avc: denied { mounton } for pid=5084 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.052118][ T29] audit: type=1400 audit(1718683701.255:92): avc: denied { mount } for pid=5084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.134161][ T29] audit: type=1400 audit(1718683701.355:93): avc: denied { unmount } for pid=5084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.157338][ T29] audit: type=1400 audit(1718683701.385:94): avc: denied { setattr } for pid=5096 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.181391][ T29] audit: type=1400 audit(1718683701.395:95): avc: denied { create } for pid=5095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.200819][ T5105] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 74.201997][ T29] audit: type=1400 audit(1718683701.395:96): avc: denied { write } for pid=5095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.284964][ T5084] cgroup: Unknown subsys name 'rlimit' 2024/06/18 04:08:23 starting 5 executor processes [ 75.586330][ T5097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.017970][ T5217] mmap: syz-executor.4 (5217) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 78.718306][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 78.718325][ T29] audit: type=1400 audit(1718683706.153:154): avc: denied { read } for pid=5359 comm="syz-executor.2" name="card0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 78.819469][ T29] audit: type=1400 audit(1718683706.193:155): avc: denied { open } for pid=5359 comm="syz-executor.2" path="/dev/dri/card0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 78.885460][ T29] audit: type=1400 audit(1718683706.193:156): avc: denied { write } for pid=5359 comm="syz-executor.2" name="card0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 78.953015][ T29] audit: type=1400 audit(1718683706.203:157): avc: denied { create } for pid=5363 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 79.009104][ T29] audit: type=1400 audit(1718683706.293:158): avc: denied { create } for pid=5370 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 79.059916][ T29] audit: type=1400 audit(1718683706.443:159): avc: denied { create } for pid=5385 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 79.107408][ T29] audit: type=1400 audit(1718683706.493:160): avc: denied { read } for pid=5388 comm="syz-executor.3" name="ptp0" dev="devtmpfs" ino=1074 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 79.169149][ T29] audit: type=1400 audit(1718683706.493:161): avc: denied { open } for pid=5388 comm="syz-executor.3" path="/dev/ptp0" dev="devtmpfs" ino=1074 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 79.247024][ T29] audit: type=1400 audit(1718683706.493:162): avc: denied { write } for pid=5388 comm="syz-executor.3" name="ptp0" dev="devtmpfs" ino=1074 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 79.289849][ T29] audit: type=1400 audit(1718683706.583:163): avc: denied { create } for pid=5395 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 80.173606][ T5493] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 81.044661][ T11] [ 81.047780][ T11] ============================= [ 81.052799][ T11] WARNING: suspicious RCU usage [ 81.057665][ T11] 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 Not tainted [ 81.064984][ T11] ----------------------------- [ 81.069939][ T11] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 81.079754][ T11] [ 81.079754][ T11] other info that might help us debug this: [ 81.079754][ T11] [ 81.090193][ T11] 2024/06/18 04:08:28 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 81.090193][ T11] rcu_scheduler_active = 2, debug_locks = 1 [ 81.098815][ T11] 3 locks held by kworker/u8:0/11: [ 81.103967][ T11] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60 [ 81.114645][ T11] #1: ffffc90000107d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60 [ 81.124819][ T11] #2: ffffffff8f7371d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0 [ 81.135560][ T11] [ 81.135560][ T11] stack backtrace: [ 81.141546][ T11] CPU: 1 PID: 11 Comm: kworker/u8:0 Not tainted 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 [ 81.151618][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 81.161676][ T11] Workqueue: netns cleanup_net [ 81.166490][ T11] Call Trace: [ 81.169895][ T11] [ 81.172841][ T11] dump_stack_lvl+0x16c/0x1f0 [ 81.178064][ T11] lockdep_rcu_suspicious+0x20b/0x3b0 [ 81.183553][ T11] _destroy_all_sets+0x261/0x6d0 [ 81.188602][ T11] ? __pfx_ip_set_net_exit+0x10/0x10 [ 81.193983][ T11] ip_set_net_exit+0x26/0x60 [ 81.198580][ T11] ops_exit_list+0xb0/0x180 [ 81.203270][ T11] cleanup_net+0x5b7/0xbf0 [ 81.207928][ T11] ? __pfx_cleanup_net+0x10/0x10 [ 81.212887][ T11] process_one_work+0x9fb/0x1b60 [ 81.217834][ T11] ? __pfx_lock_acquire+0x10/0x10 [ 81.222898][ T11] ? __pfx_process_one_work+0x10/0x10 [ 81.228270][ T11] ? assign_work+0x1a0/0x250 [ 81.232873][ T11] worker_thread+0x6c8/0xf70 [ 81.237553][ T11] ? __pfx_worker_thread+0x10/0x10 [ 81.242667][ T11] kthread+0x2c1/0x3a0 [ 81.246834][ T11] ? _raw_spin_unlock_irq+0x23/0x50 [ 81.252050][ T11] ? __pfx_kthread+0x10/0x10 [ 81.256645][ T11] ret_from_fork+0x45/0x80 [ 81.261070][ T11] ? __pfx_kthread+0x10/0x10 [ 81.265697][ T11] ret_from_fork_asm+0x1a/0x30 [ 81.270561][ T11] [ 81.300004][ T11] [ 81.302432][ T11] ============================= [ 81.307302][ T11] WARNING: suspicious RCU usage [ 81.312246][ T11] 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 Not tainted [ 81.319539][ T11] ----------------------------- [ 81.324396][ T11] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 81.334184][ T11] [ 81.334184][ T11] other info that might help us debug this: [ 81.334184][ T11] [ 81.344860][ T11] [ 81.344860][ T11] rcu_scheduler_active = 2, debug_locks = 1 [ 81.353027][ T11] 3 locks held by kworker/u8:0/11: [ 81.358169][ T11] #0: ffff8880162d3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12bf/0x1b60 [ 81.369204][ T11] #1: ffffc90000107d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x957/0x1b60 [ 81.379261][ T11] #2: ffffffff8f7371d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbf0 [ 81.388694][ T11] [ 81.388694][ T11] stack backtrace: [ 81.394596][ T11] CPU: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 [ 81.404695][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 81.414797][ T11] Workqueue: netns cleanup_net [ 81.419601][ T11] Call Trace: [ 81.422904][ T11] [ 81.425863][ T11] dump_stack_lvl+0x16c/0x1f0 [ 81.430579][ T11] lockdep_rcu_suspicious+0x20b/0x3b0 [ 81.435984][ T11] _destroy_all_sets+0x4e6/0x6d0 [ 81.440956][ T11] ? __pfx_ip_set_net_exit+0x10/0x10 [ 81.446283][ T11] ip_set_net_exit+0x26/0x60 [ 81.450913][ T11] ops_exit_list+0xb0/0x180 [ 81.455442][ T11] cleanup_net+0x5b7/0xbf0 [ 81.459893][ T11] ? __pfx_cleanup_net+0x10/0x10 [ 81.464905][ T11] process_one_work+0x9fb/0x1b60 [ 81.469883][ T11] ? __pfx_lock_acquire+0x10/0x10 [ 81.474940][ T11] ? __pfx_process_one_work+0x10/0x10 [ 81.480344][ T11] ? assign_work+0x1a0/0x250 [ 81.485063][ T11] worker_thread+0x6c8/0xf70 [ 81.489685][ T11] ? __pfx_worker_thread+0x10/0x10 [ 81.495008][ T11] kthread+0x2c1/0x3a0 [ 81.499117][ T11] ? _raw_spin_unlock_irq+0x23/0x50 [ 81.504345][ T11] ? __pfx_kthread+0x10/0x10 [ 81.509056][ T11] ret_from_fork+0x45/0x80 [ 81.513504][ T11] ? __pfx_kthread+0x10/0x10 [ 81.518286][ T11] ret_from_fork_asm+0x1a/0x30 [ 81.523260][ T11] [ 81.526372][ C0] vkms_vblank_simulate: vblank timer overrun