last executing test programs:
953.321789ms ago: executing program 0:
syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0)
930.169548ms ago: executing program 4:
socket$vsock_stream(0x28, 0x1, 0x0)
914.66693ms ago: executing program 0:
syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
902.173412ms ago: executing program 4:
socket$inet6_sctp(0xa, 0x1, 0x84)
894.833457ms ago: executing program 3:
socket$can_j1939(0x1d, 0x2, 0x7)
888.853735ms ago: executing program 2:
syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
872.044642ms ago: executing program 0:
socket$can_bcm(0x1d, 0x2, 0x2)
870.209105ms ago: executing program 1:
socket(0x1, 0x1, 0x0)
860.110146ms ago: executing program 4:
epoll_create1(0x0)
854.825922ms ago: executing program 2:
pread64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
849.809468ms ago: executing program 3:
syz_init_net_socket$x25(0x9, 0x5, 0x0)
840.882139ms ago: executing program 1:
socket$caif_stream(0x25, 0x1, 0x0)
831.009692ms ago: executing program 2:
getgid()
828.338296ms ago: executing program 0:
getpid()
810.003187ms ago: executing program 4:
pipe(&(0x7f0000000000))
804.944211ms ago: executing program 3:
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0)
795.637149ms ago: executing program 2:
socket$pptp(0x18, 0x1, 0x2)
794.256419ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cmdline', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cmdline', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cmdline', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/cmdline', 0x800, 0x0)
785.191062ms ago: executing program 0:
socket$l2tp6(0xa, 0x2, 0x73)
784.737944ms ago: executing program 4:
socket$xdp(0x2c, 0x3, 0x0)
775.884222ms ago: executing program 1:
getuid()
768.912342ms ago: executing program 3:
socket$inet_icmp(0x2, 0x2, 0x1)
747.681553ms ago: executing program 0:
syz_init_net_socket$nl_rdma(0x10, 0x3, 0x14)
745.134859ms ago: executing program 1:
syz_init_net_socket$ax25(0x3, 0x2, 0x0)
741.077049ms ago: executing program 3:
socket$inet_mptcp(0x2, 0x1, 0x106)
740.558383ms ago: executing program 4:
socket$vsock_dgram(0x28, 0x2, 0x0)
735.738567ms ago: executing program 2:
socket$inet_smc(0x2b, 0x1, 0x0)
714.573073ms ago: executing program 3:
socket$nl_rdma(0x10, 0x3, 0x14)
706.278806ms ago: executing program 1:
socket$packet(0x11, 0x2, 0x300)
0s ago: executing program 2:
mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.117' (ED25519) to the list of known hosts.
2024/06/14 17:21:14 fuzzer started
2024/06/14 17:21:14 dialing manager at 10.128.0.169:30017
[ 56.364982][ T5091] cgroup: Unknown subsys name 'net'
[ 56.580368][ T5091] cgroup: Unknown subsys name 'rlimit'
2024/06/14 17:21:16 starting 5 executor processes
[ 57.715687][ T5097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 58.599401][ T5187] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 58.693913][ T5199] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 59.904447][ T3902]
[ 59.906990][ T3902] =============================
[ 59.912054][ T3902] WARNING: suspicious RCU usage
[ 59.916929][ T3902] 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0 Not tainted
[ 59.924293][ T3902] -----------------------------
[ 59.929237][ T3902] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 59.938942][ T3902]
[ 59.938942][ T3902] other info that might help us debug this:
[ 59.938942][ T3902]
[ 59.949335][ T3902]
[ 59.949335][ T3902] rcu_scheduler_active = 2, debug_locks = 1
[ 59.957452][ T3902] 3 locks held by kworker/u8:9/3902:
[ 59.962861][ T3902] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 59.973992][ T3902] #1: ffffc9000c27fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 59.984669][ T3902] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 59.994417][ T3902]
[ 59.994417][ T3902] stack backtrace:
[ 60.000409][ T3902] CPU: 0 PID: 3902 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0
[ 60.010676][ T3902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 60.021204][ T3902] Workqueue: netns cleanup_net
[ 60.026289][ T3902] Call Trace:
[ 60.029676][ T3902]
[ 60.032628][ T3902] dump_stack_lvl+0x241/0x360
[ 60.037342][ T3902] ? __pfx_dump_stack_lvl+0x10/0x10
[ 60.042929][ T3902] ? __pfx__printk+0x10/0x10
[ 60.047563][ T3902] lockdep_rcu_suspicious+0x221/0x340
[ 60.053240][ T3902] _destroy_all_sets+0x232/0x5f0
[ 60.058220][ T3902] ip_set_net_exit+0x20/0x50
[ 60.062933][ T3902] cleanup_net+0x802/0xcc0
[ 60.067479][ T3902] ? __pfx_cleanup_net+0x10/0x10
[ 60.072475][ T3902] ? process_scheduled_works+0x945/0x1830
[ 60.078602][ T3902] process_scheduled_works+0xa2c/0x1830
[ 60.084212][ T3902] ? __pfx_process_scheduled_works+0x10/0x10
[ 60.090209][ T3902] ? assign_work+0x364/0x3d0
[ 60.094894][ T3902] worker_thread+0x86d/0xd70
[ 60.099488][ T3902] ? __kthread_parkme+0x169/0x1d0
2024/06/14 17:21:18 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 60.104508][ T3902] ? __pfx_worker_thread+0x10/0x10
[ 60.109699][ T3902] kthread+0x2f0/0x390
[ 60.113776][ T3902] ? __pfx_worker_thread+0x10/0x10
[ 60.118889][ T3902] ? __pfx_kthread+0x10/0x10
[ 60.123470][ T3902] ret_from_fork+0x4b/0x80
[ 60.127887][ T3902] ? __pfx_kthread+0x10/0x10
[ 60.132470][ T3902] ret_from_fork_asm+0x1a/0x30
[ 60.137346][ T3902]
[ 60.183525][ T3902]
[ 60.185963][ T3902] =============================
[ 60.191338][ T3902] WARNING: suspicious RCU usage
[ 60.196220][ T3902] 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0 Not tainted
[ 60.203444][ T3902] -----------------------------
[ 60.208329][ T3902] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 60.217987][ T3902]
[ 60.217987][ T3902] other info that might help us debug this:
[ 60.217987][ T3902]
[ 60.228988][ T3902]
[ 60.228988][ T3902] rcu_scheduler_active = 2, debug_locks = 1
[ 60.237164][ T3902] 3 locks held by kworker/u8:9/3902:
[ 60.242535][ T3902] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 60.254132][ T3902] #1: ffffc9000c27fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 60.265084][ T3902] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 60.275020][ T3902]
[ 60.275020][ T3902] stack backtrace:
[ 60.281438][ T3902] CPU: 1 PID: 3902 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0
[ 60.292318][ T3902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 60.302377][ T3902] Workqueue: netns cleanup_net
[ 60.307171][ T3902] Call Trace:
[ 60.310940][ T3902]
[ 60.313967][ T3902] dump_stack_lvl+0x241/0x360
[ 60.318654][ T3902] ? __pfx_dump_stack_lvl+0x10/0x10
[ 60.324151][ T3902] ? __pfx__printk+0x10/0x10
[ 60.328767][ T3902] lockdep_rcu_suspicious+0x221/0x340
[ 60.334209][ T3902] _destroy_all_sets+0x53f/0x5f0
[ 60.339204][ T3902] ip_set_net_exit+0x20/0x50
[ 60.343978][ T3902] cleanup_net+0x802/0xcc0
[ 60.348406][ T3902] ? __pfx_cleanup_net+0x10/0x10
[ 60.353362][ T3902] ? process_scheduled_works+0x945/0x1830
[ 60.359337][ T3902] process_scheduled_works+0xa2c/0x1830
[ 60.364901][ T3902] ? __pfx_process_scheduled_works+0x10/0x10
[ 60.370880][ T3902] ? assign_work+0x364/0x3d0
[ 60.375583][ T3902] worker_thread+0x86d/0xd70
[ 60.380180][ T3902] ? __kthread_parkme+0x169/0x1d0
[ 60.385401][ T3902] ? __pfx_worker_thread+0x10/0x10
[ 60.390614][ T3902] kthread+0x2f0/0x390
[ 60.394680][ T3902] ? __pfx_worker_thread+0x10/0x10
[ 60.399789][ T3902] ? __pfx_kthread+0x10/0x10
[ 60.404384][ T3902] ret_from_fork+0x4b/0x80
[ 60.408796][ T3902] ? __pfx_kthread+0x10/0x10
[ 60.413380][ T3902] ret_from_fork_asm+0x1a/0x30
[ 60.418161][ T3902]