last executing test programs:
255.589016ms ago: executing program 2:
gettid()
227.741394ms ago: executing program 4:
syz_init_net_socket$llc(0x1a, 0x1, 0x0)
220.738262ms ago: executing program 2:
mkdirat(0xffffffffffffffff, &(0x7f0000000000), 0x0)
194.436917ms ago: executing program 2:
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0)
182.841567ms ago: executing program 4:
socket$pptp(0x18, 0x1, 0x2)
175.948217ms ago: executing program 0:
epoll_create(0x0)
170.092128ms ago: executing program 1:
socket$inet(0x2, 0x1, 0x0)
161.780262ms ago: executing program 2:
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
150.862179ms ago: executing program 3:
syz_init_net_socket$nl_rdma(0x10, 0x3, 0x14)
143.686189ms ago: executing program 4:
socket$nl_generic(0x10, 0x3, 0x10)
141.946357ms ago: executing program 0:
pipe(&(0x7f0000000000))
130.949238ms ago: executing program 1:
listen(0xffffffffffffffff, 0x0)
119.161859ms ago: executing program 3:
socket$packet(0x11, 0x2, 0x300)
118.177413ms ago: executing program 2:
epoll_pwait(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000), 0x0)
106.60316ms ago: executing program 4:
socket$can_bcm(0x1d, 0x2, 0x2)
105.798167ms ago: executing program 1:
socket$igmp6(0xa, 0x3, 0x2)
103.948892ms ago: executing program 0:
writev(0xffffffffffffffff, &(0x7f0000000000), 0x0)
85.113107ms ago: executing program 2:
socket$inet_udplite(0x2, 0x2, 0x88)
81.346922ms ago: executing program 0:
socket$inet_dccp(0x2, 0x6, 0x0)
74.189594ms ago: executing program 1:
readv(0xffffffffffffffff, &(0x7f0000000000), 0x0)
72.593736ms ago: executing program 3:
socket$kcm(0x29, 0x2, 0x0)
66.987921ms ago: executing program 4:
socket$rxrpc(0x21, 0x2, 0x0)
59.97293ms ago: executing program 0:
syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
51.848425ms ago: executing program 3:
getuid()
35.81869ms ago: executing program 4:
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
24.009454ms ago: executing program 3:
syz_init_net_socket$netrom(0x6, 0x5, 0x0)
23.275481ms ago: executing program 1:
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
18.526734ms ago: executing program 0:
socket$key(0xf, 0x3, 0x2)
1.167926ms ago: executing program 3:
socket$isdn_base(0x22, 0x3, 0x0)
0s ago: executing program 1:
pwritev(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.45' (ED25519) to the list of known hosts.
2024/06/14 23:14:21 fuzzer started
2024/06/14 23:14:21 dialing manager at 10.128.0.169:30017
[ 58.900669][ T5088] cgroup: Unknown subsys name 'net'
[ 59.135902][ T5088] cgroup: Unknown subsys name 'rlimit'
[ 60.238549][ T5105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/14 23:14:23 starting 5 executor processes
[ 61.489833][ T5231] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 61.677190][ T5258] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 62.312180][ T4481]
[ 62.314798][ T4481] =============================
[ 62.319677][ T4481] WARNING: suspicious RCU usage
[ 62.324881][ T4481] 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0 Not tainted
[ 62.332383][ T4481] -----------------------------
[ 62.337374][ T4481] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 62.347182][ T4481]
[ 62.347182][ T4481] other info that might help us debug this:
[ 62.347182][ T4481]
[ 62.357865][ T4481]
[ 62.357865][ T4481] rcu_scheduler_active = 2, debug_locks = 1
[ 62.366513][ T4481] 3 locks held by kworker/u8:9/4481:
[ 62.371917][ T4481] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 62.383830][ T4481] #1: ffffc9000d177d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 62.394484][ T4481] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 62.404227][ T4481]
[ 62.404227][ T4481] stack backtrace:
[ 62.410245][ T4481] CPU: 1 PID: 4481 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0
[ 62.420615][ T4481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 62.430838][ T4481] Workqueue: netns cleanup_net
[ 62.435753][ T4481] Call Trace:
[ 62.439055][ T4481]
[ 62.442112][ T4481] dump_stack_lvl+0x241/0x360
[ 62.447626][ T4481] ? __pfx_dump_stack_lvl+0x10/0x10
[ 62.452958][ T4481] ? __pfx__printk+0x10/0x10
[ 62.457791][ T4481] lockdep_rcu_suspicious+0x221/0x340
[ 62.463202][ T4481] _destroy_all_sets+0x232/0x5f0
[ 62.468261][ T4481] ip_set_net_exit+0x20/0x50
[ 62.473056][ T4481] cleanup_net+0x802/0xcc0
[ 62.477530][ T4481] ? __pfx_cleanup_net+0x10/0x10
[ 62.482524][ T4481] ? process_scheduled_works+0x945/0x1830
[ 62.488306][ T4481] process_scheduled_works+0xa2c/0x1830
[ 62.493887][ T4481] ? __pfx_process_scheduled_works+0x10/0x10
[ 62.499899][ T4481] ? assign_work+0x364/0x3d0
[ 62.504506][ T4481] worker_thread+0x86d/0xd70
2024/06/14 23:14:25 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 62.509217][ T4481] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 62.515155][ T4481] ? __kthread_parkme+0x169/0x1d0
[ 62.520236][ T4481] ? __pfx_worker_thread+0x10/0x10
[ 62.525359][ T4481] kthread+0x2f0/0x390
[ 62.529434][ T4481] ? __pfx_worker_thread+0x10/0x10
[ 62.534539][ T4481] ? __pfx_kthread+0x10/0x10
[ 62.539126][ T4481] ret_from_fork+0x4b/0x80
[ 62.543538][ T4481] ? __pfx_kthread+0x10/0x10
[ 62.548148][ T4481] ret_from_fork_asm+0x1a/0x30
[ 62.552942][ T4481]
[ 62.625943][ T4481]
[ 62.628338][ T4481] =============================
[ 62.633686][ T4481] WARNING: suspicious RCU usage
[ 62.639281][ T4481] 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0 Not tainted
[ 62.647021][ T4481] -----------------------------
[ 62.652437][ T4481] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 62.662164][ T4481]
[ 62.662164][ T4481] other info that might help us debug this:
[ 62.662164][ T4481]
[ 62.672512][ T4481]
[ 62.672512][ T4481] rcu_scheduler_active = 2, debug_locks = 1
[ 62.680755][ T4481] 3 locks held by kworker/u8:9/4481:
[ 62.686219][ T4481] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 62.697514][ T4481] #1: ffffc9000d177d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 62.708450][ T4481] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 62.718280][ T4481]
[ 62.718280][ T4481] stack backtrace:
[ 62.724319][ T4481] CPU: 1 PID: 4481 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0
[ 62.734580][ T4481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 62.744664][ T4481] Workqueue: netns cleanup_net
[ 62.749468][ T4481] Call Trace:
[ 62.753032][ T4481]
[ 62.756171][ T4481] dump_stack_lvl+0x241/0x360
[ 62.760878][ T4481] ? __pfx_dump_stack_lvl+0x10/0x10
[ 62.766258][ T4481] ? __pfx__printk+0x10/0x10
[ 62.770878][ T4481] lockdep_rcu_suspicious+0x221/0x340
[ 62.776287][ T4481] _destroy_all_sets+0x53f/0x5f0
[ 62.781258][ T4481] ip_set_net_exit+0x20/0x50
[ 62.785870][ T4481] cleanup_net+0x802/0xcc0
[ 62.790330][ T4481] ? __pfx_cleanup_net+0x10/0x10
[ 62.795277][ T4481] ? process_scheduled_works+0x945/0x1830
[ 62.801085][ T4481] process_scheduled_works+0xa2c/0x1830
[ 62.806643][ T4481] ? __pfx_process_scheduled_works+0x10/0x10
[ 62.812658][ T4481] ? assign_work+0x364/0x3d0
[ 62.817297][ T4481] worker_thread+0x86d/0xd70
[ 62.821985][ T4481] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 62.828138][ T4481] ? __kthread_parkme+0x169/0x1d0
[ 62.833192][ T4481] ? __pfx_worker_thread+0x10/0x10
[ 62.838338][ T4481] kthread+0x2f0/0x390
[ 62.842408][ T4481] ? __pfx_worker_thread+0x10/0x10
[ 62.847511][ T4481] ? __pfx_kthread+0x10/0x10
[ 62.852098][ T4481] ret_from_fork+0x4b/0x80
[ 62.856514][ T4481] ? __pfx_kthread+0x10/0x10
[ 62.861114][ T4481] ret_from_fork_asm+0x1a/0x30
[ 62.865995][ T4481]