============================= WARNING: suspicious RCU usage syzkaller #0 Not tainted ----------------------------- net/sched/sch_api.c:304 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor/4184: #0: ffffffff8c8af838 (tomoyo_ss){....}-{0:0}, at: rcu_lock_acquire+0x5/0x30 include/linux/rcupdate.h:312 #1: ffffc90000dd0c00 ((&q->perturb_timer)){+.-.}-{0:0}, at: lockdep_copy_map include/linux/lockdep.h:45 [inline] #1: ffffc90000dd0c00 ((&q->perturb_timer)){+.-.}-{0:0}, at: call_timer_fn+0xca/0x540 kernel/time/timer.c:1441 #2: ffff888025da6908 (&sch->q.lock){+.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:364 [inline] #2: ffff888025da6908 (&sch->q.lock){+.-.}-{2:2}, at: sfq_perturbation+0x14d/0x20d0 net/sched/sch_sfq.c:610 #3: ffffffff8c31eaa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 include/linux/rcupdate.h:312 stack backtrace: CPU: 1 PID: 4184 Comm: syz-executor Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106 qdisc_lookup+0xa6/0x650 net/sched/sch_api.c:304 qdisc_tree_reduce_backlog+0x190/0x430 net/sched/sch_api.c:783 sfq_rehash net/sched/sch_sfq.c:598 [inline] sfq_perturbation+0x1f5e/0x20d0 net/sched/sch_sfq.c:613 call_timer_fn+0x17b/0x540 kernel/time/timer.c:1451 expire_timers kernel/time/timer.c:1496 [inline] __run_timers+0x53a/0x7f0 kernel/time/timer.c:1767 handle_softirqs+0x339/0x830 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] invoke_softirq kernel/softirq.c:450 [inline] __irq_exit_rcu+0x13b/0x230 kernel/softirq.c:659 irq_exit_rcu+0x5/0x20 kernel/softirq.c:671 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1108 [inline] sysvec_apic_timer_interrupt+0xa0/0xc0 arch/x86/kernel/apic/apic.c:1108 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676 RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x32/0x60 kernel/kcov.c:206 Code: 14 50 89 7e 65 8b 15 15 50 89 7e 81 e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 35 83 b9 34 16 00 00 00 74 2c 8b 91 10 16 00 00 <83> fa 02 75 21 48 8b 91 18 16 00 00 48 8b 32 48 8d 7e 01 8b 89 14 RSP: 0018:ffffc90002ecf5c8 EFLAGS: 00000246 RAX: ffffffff83a3947d RBX: dffffc0000000000 RCX: ffff88801b9f5940 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 RBP: ffff88807d9c0301 R08: ffff88807d9c033f R09: 1ffff1100fb38067 R10: dffffc0000000000 R11: ffffed100fb38068 R12: 0000000000000054 R13: 0000000000000e10 R14: 0000000000000053 R15: ffff88807d9c0330 tomoyo_check_acl+0x30d/0x3f0 security/tomoyo/domain.c:183 tomoyo_path_permission+0x1b4/0x380 security/tomoyo/file.c:586 tomoyo_check_open_permission+0x275/0x410 security/tomoyo/file.c:777 security_file_open+0x5e/0xa0 security/security.c:1668 do_dentry_open+0x322/0xf80 fs/open.c:813 do_open fs/namei.c:3616 [inline] path_openat+0x26f5/0x2fa0 fs/namei.c:3750 do_filp_open+0x1e2/0x410 fs/namei.c:3777 do_sys_openat2+0x150/0x4b0 fs/open.c:1255 do_sys_open fs/open.c:1271 [inline] __do_sys_openat fs/open.c:1287 [inline] __se_sys_openat fs/open.c:1282 [inline] __x64_sys_openat+0x135/0x160 fs/open.c:1282 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f812e6ac78e Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 RSP: 002b:00007ffdbaefa778 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000055556e276500 RCX: 00007f812e6ac78e RDX: 0000000000000002 RSI: 00007ffdbaefa8c0 RDI: ffffffffffffff9c RBP: 00007ffdbaefa86c R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003e R13: 00000000000927c0 R14: 000000000001c3df R15: 00007ffdbaefa8c0 ---------------- Code disassembly (best guess): 0: 14 50 adc $0x50,%al 2: 89 7e 65 mov %edi,0x65(%rsi) 5: 8b 15 15 50 89 7e mov 0x7e895015(%rip),%edx # 0x7e895020 b: 81 e2 00 01 ff 00 and $0xff0100,%edx 11: 74 11 je 0x24 13: 81 fa 00 01 00 00 cmp $0x100,%edx 19: 75 35 jne 0x50 1b: 83 b9 34 16 00 00 00 cmpl $0x0,0x1634(%rcx) 22: 74 2c je 0x50 24: 8b 91 10 16 00 00 mov 0x1610(%rcx),%edx * 2a: 83 fa 02 cmp $0x2,%edx <-- trapping instruction 2d: 75 21 jne 0x50 2f: 48 8b 91 18 16 00 00 mov 0x1618(%rcx),%rdx 36: 48 8b 32 mov (%rdx),%rsi 39: 48 8d 7e 01 lea 0x1(%rsi),%rdi 3d: 8b .byte 0x8b 3e: 89 .byte 0x89 3f: 14 .byte 0x14