last executing test programs:
825.622133ms ago: executing program 1:
socket$caif_stream(0x25, 0x1, 0x0)
791.393959ms ago: executing program 4:
syz_init_net_socket$llc(0x1a, 0x1, 0x0)
768.16154ms ago: executing program 0:
socket$nl_generic(0x10, 0x3, 0x10)
765.832945ms ago: executing program 1:
gettid()
765.178349ms ago: executing program 3:
socket$inet_mptcp(0x2, 0x1, 0x106)
751.107538ms ago: executing program 2:
pipe(&(0x7f0000000000))
750.57107ms ago: executing program 4:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
736.502928ms ago: executing program 0:
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
735.177161ms ago: executing program 1:
socket$l2tp(0x2, 0x2, 0x73)
728.717319ms ago: executing program 3:
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
725.762897ms ago: executing program 2:
socket$can_bcm(0x1d, 0x2, 0x2)
713.354813ms ago: executing program 4:
socket$rds(0x15, 0x5, 0x0)
704.894896ms ago: executing program 3:
socket$vsock_stream(0x28, 0x1, 0x0)
692.249434ms ago: executing program 0:
socket$nl_route(0x10, 0x3, 0x0)
689.365305ms ago: executing program 4:
syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
687.922705ms ago: executing program 1:
clock_gettime(0x0, &(0x7f0000000000))
683.803342ms ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp', 0x800, 0x0)
668.24479ms ago: executing program 2:
socket$inet_icmp(0x2, 0x2, 0x1)
663.747146ms ago: executing program 3:
syz_init_net_socket$ax25(0x3, 0x2, 0x0)
659.958911ms ago: executing program 1:
socket$caif_seqpacket(0x25, 0x5, 0x0)
657.366271ms ago: executing program 0:
pwritev(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0)
652.105575ms ago: executing program 4:
syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
626.242267ms ago: executing program 0:
socket$inet_tcp(0x2, 0x1, 0x0)
624.475031ms ago: executing program 2:
getuid()
620.145901ms ago: executing program 4:
socket$inet_dccp(0x2, 0x6, 0x0)
616.394845ms ago: executing program 1:
socket$inet_udplite(0x2, 0x2, 0x88)
602.741645ms ago: executing program 3:
socket$can_j1939(0x1d, 0x2, 0x7)
596.295523ms ago: executing program 2:
socket$inet_udp(0x2, 0x2, 0x0)
595.873179ms ago: executing program 0:
unshare(0x0)
0s ago: executing program 3:
mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.225' (ED25519) to the list of known hosts.
2024/06/19 11:52:29 fuzzer started
2024/06/19 11:52:29 dialing manager at 10.128.0.169:30019
[ 53.290136][ T5095] cgroup: Unknown subsys name 'net'
[ 53.577309][ T5095] cgroup: Unknown subsys name 'rlimit'
2024/06/19 11:52:31 starting 5 executor processes
[ 54.701428][ T5094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 55.478756][ T5183] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 56.109021][ T5272] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 56.826702][ T35]
[ 56.829251][ T35] =============================
[ 56.834292][ T35] WARNING: suspicious RCU usage
[ 56.839156][ T35] 6.10.0-rc3-syzkaller-00711-g9f1f70dd8500 #0 Not tainted
[ 56.846428][ T35] -----------------------------
[ 56.851293][ T35] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 56.861175][ T35]
[ 56.861175][ T35] other info that might help us debug this:
[ 56.861175][ T35]
[ 56.871515][ T35]
[ 56.871515][ T35] rcu_scheduler_active = 2, debug_locks = 1
[ 56.879705][ T35] 3 locks held by kworker/u8:2/35:
[ 56.884920][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 56.895985][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 56.906738][ T35] #2: ffffffff8f5da0d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 56.916293][ T35]
[ 56.916293][ T35] stack backtrace:
[ 56.922268][ T35] CPU: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00711-g9f1f70dd8500 #0
[ 56.932874][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 56.942955][ T35] Workqueue: netns cleanup_net
[ 56.947768][ T35] Call Trace:
[ 56.951071][ T35]
[ 56.954028][ T35] dump_stack_lvl+0x241/0x360
[ 56.958736][ T35] ? __pfx_dump_stack_lvl+0x10/0x10
[ 56.963966][ T35] ? __pfx__printk+0x10/0x10
[ 56.968598][ T35] lockdep_rcu_suspicious+0x221/0x340
2024/06/19 11:52:33 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 56.974009][ T35] _destroy_all_sets+0x232/0x5f0
[ 56.978992][ T35] ip_set_net_exit+0x20/0x50
[ 56.983612][ T35] cleanup_net+0x802/0xcc0
[ 56.988059][ T35] ? __pfx_cleanup_net+0x10/0x10
[ 56.993034][ T35] ? process_scheduled_works+0x945/0x1830
[ 56.998780][ T35] process_scheduled_works+0xa2c/0x1830
[ 57.004387][ T35] ? __pfx_process_scheduled_works+0x10/0x10
[ 57.010407][ T35] ? assign_work+0x364/0x3d0
[ 57.015033][ T35] worker_thread+0x86d/0xd70
[ 57.019662][ T35] ? __kthread_parkme+0x169/0x1d0
[ 57.024716][ T35] ? __pfx_worker_thread+0x10/0x10
[ 57.029845][ T35] kthread+0x2f0/0x390
[ 57.033962][ T35] ? __pfx_worker_thread+0x10/0x10
[ 57.039102][ T35] ? __pfx_kthread+0x10/0x10
[ 57.043733][ T35] ret_from_fork+0x4b/0x80
[ 57.048262][ T35] ? __pfx_kthread+0x10/0x10
[ 57.052875][ T35] ret_from_fork_asm+0x1a/0x30
[ 57.057685][ T35]
[ 57.098904][ T35]
[ 57.101283][ T35] =============================
[ 57.106199][ T35] WARNING: suspicious RCU usage
[ 57.111061][ T35] 6.10.0-rc3-syzkaller-00711-g9f1f70dd8500 #0 Not tainted
[ 57.118263][ T35] -----------------------------
[ 57.123163][ T35] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 57.132843][ T35]
[ 57.132843][ T35] other info that might help us debug this:
[ 57.132843][ T35]
[ 57.143135][ T35]
[ 57.143135][ T35] rcu_scheduler_active = 2, debug_locks = 1
[ 57.151226][ T35] 3 locks held by kworker/u8:2/35:
[ 57.156394][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 57.167385][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 57.178468][ T35] #2: ffffffff8f5da0d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 57.187975][ T35]
[ 57.187975][ T35] stack backtrace:
[ 57.193919][ T35] CPU: 1 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00711-g9f1f70dd8500 #0
[ 57.204000][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 57.214086][ T35] Workqueue: netns cleanup_net
[ 57.218886][ T35] Call Trace:
[ 57.222182][ T35]
[ 57.225215][ T35] dump_stack_lvl+0x241/0x360
[ 57.229924][ T35] ? __pfx_dump_stack_lvl+0x10/0x10
[ 57.235417][ T35] ? __pfx__printk+0x10/0x10
[ 57.240050][ T35] lockdep_rcu_suspicious+0x221/0x340
[ 57.245459][ T35] _destroy_all_sets+0x53f/0x5f0
[ 57.250432][ T35] ip_set_net_exit+0x20/0x50
[ 57.255051][ T35] cleanup_net+0x802/0xcc0
[ 57.259494][ T35] ? __pfx_cleanup_net+0x10/0x10
[ 57.264542][ T35] ? process_scheduled_works+0x945/0x1830
[ 57.270289][ T35] process_scheduled_works+0xa2c/0x1830
[ 57.275979][ T35] ? __pfx_process_scheduled_works+0x10/0x10
[ 57.281997][ T35] ? assign_work+0x364/0x3d0
[ 57.286625][ T35] worker_thread+0x86d/0xd70
[ 57.291252][ T35] ? __kthread_parkme+0x169/0x1d0
[ 57.296303][ T35] ? __pfx_worker_thread+0x10/0x10
[ 57.301439][ T35] kthread+0x2f0/0x390
[ 57.305537][ T35] ? __pfx_worker_thread+0x10/0x10
[ 57.310759][ T35] ? __pfx_kthread+0x10/0x10
[ 57.315381][ T35] ret_from_fork+0x4b/0x80
[ 57.319827][ T35] ? __pfx_kthread+0x10/0x10
[ 57.324450][ T35] ret_from_fork_asm+0x1a/0x30
[ 57.329258][ T35]