last executing test programs:
246.738325ms ago: executing program 4:
socket$packet(0x11, 0x2, 0x300)
219.267633ms ago: executing program 0:
readv(0xffffffffffffffff, &(0x7f0000000000), 0x0)
212.052591ms ago: executing program 4:
socket$bt_rfcomm(0x1f, 0x1, 0x3)
188.61757ms ago: executing program 1:
socket$inet6_tcp(0xa, 0x1, 0x0)
185.518595ms ago: executing program 2:
socket$inet6_mptcp(0xa, 0x1, 0x106)
181.288435ms ago: executing program 3:
gettid()
173.21983ms ago: executing program 0:
socket$can_j1939(0x1d, 0x2, 0x7)
161.749814ms ago: executing program 3:
socket$alg(0x26, 0x5, 0x0)
159.086647ms ago: executing program 4:
syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0)
154.603419ms ago: executing program 2:
socket$bt_hidp(0x1f, 0x3, 0x6)
152.644053ms ago: executing program 1:
socket$igmp(0x2, 0x3, 0x2)
137.090307ms ago: executing program 0:
socket$inet_udp(0x2, 0x2, 0x0)
133.937304ms ago: executing program 3:
socket$inet_dccp(0x2, 0x6, 0x0)
124.755922ms ago: executing program 1:
listen(0xffffffffffffffff, 0x0)
120.391551ms ago: executing program 2:
socket$inet6_dccp(0xa, 0x6, 0x0)
119.269463ms ago: executing program 4:
syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
103.174535ms ago: executing program 3:
socket$inet_mptcp(0x2, 0x1, 0x106)
98.960367ms ago: executing program 1:
pwritev(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0)
94.933737ms ago: executing program 0:
pipe(&(0x7f0000000000))
88.569586ms ago: executing program 2:
socket$netlink(0x10, 0x3, 0x0)
75.105089ms ago: executing program 4:
pselect6(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000))
72.993496ms ago: executing program 3:
pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
59.956187ms ago: executing program 0:
socket$kcm(0x29, 0x2, 0x0)
54.13096ms ago: executing program 1:
splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
49.982219ms ago: executing program 3:
socket$vsock_stream(0x28, 0x1, 0x0)
40.811435ms ago: executing program 4:
socket(0x1e, 0x2, 0x0)
35.774103ms ago: executing program 2:
socket$nl_netfilter(0x10, 0x3, 0xc)
29.117576ms ago: executing program 0:
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
22.12911ms ago: executing program 1:
socket$igmp6(0xa, 0x3, 0x2)
0s ago: executing program 2:
syz_init_net_socket$llc(0x1a, 0x1, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.108' (ED25519) to the list of known hosts.
2024/06/13 17:43:33 fuzzer started
2024/06/13 17:43:33 dialing manager at 10.128.0.169:30017
[ 59.650998][ T5089] cgroup: Unknown subsys name 'net'
[ 59.915042][ T5089] cgroup: Unknown subsys name 'rlimit'
2024/06/13 17:43:35 starting 5 executor processes
[ 61.130248][ T5102] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 61.740962][ T5147] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 62.116728][ T5184] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 63.305520][ T12]
[ 63.308250][ T12] =============================
[ 63.313301][ T12] WARNING: suspicious RCU usage
[ 63.318381][ T12] 6.10.0-rc2-syzkaller-00263-ga9b9741854a9 #0 Not tainted
[ 63.325581][ T12] -----------------------------
[ 63.330460][ T12] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 63.340609][ T12]
[ 63.340609][ T12] other info that might help us debug this:
[ 63.340609][ T12]
[ 63.351784][ T12]
[ 63.351784][ T12] rcu_scheduler_active = 2, debug_locks = 1
[ 63.360382][ T12] 3 locks held by kworker/u8:1/12:
[ 63.365822][ T12] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 63.377103][ T12] #1: ffffc90000117d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 63.387782][ T12] #2: ffffffff8f5dac10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 63.397388][ T12]
[ 63.397388][ T12] stack backtrace:
2024/06/13 17:43:37 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 63.403325][ T12] CPU: 0 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00263-ga9b9741854a9 #0
[ 63.413421][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 63.424118][ T12] Workqueue: netns cleanup_net
[ 63.428943][ T12] Call Trace:
[ 63.432253][ T12]
[ 63.435208][ T12] dump_stack_lvl+0x241/0x360
[ 63.439971][ T12] ? __pfx_dump_stack_lvl+0x10/0x10
[ 63.445210][ T12] ? __pfx__printk+0x10/0x10
[ 63.449909][ T12] lockdep_rcu_suspicious+0x221/0x340
[ 63.455287][ T12] _destroy_all_sets+0x232/0x5f0
[ 63.460700][ T12] ip_set_net_exit+0x20/0x50
[ 63.465475][ T12] cleanup_net+0x802/0xcc0
[ 63.470186][ T12] ? __pfx_cleanup_net+0x10/0x10
[ 63.475136][ T12] ? process_scheduled_works+0x945/0x1830
[ 63.480886][ T12] process_scheduled_works+0xa2c/0x1830
[ 63.486539][ T12] ? __pfx_process_scheduled_works+0x10/0x10
[ 63.492716][ T12] ? assign_work+0x364/0x3d0
[ 63.497310][ T12] worker_thread+0x86d/0xd70
[ 63.501908][ T12] ? __kthread_parkme+0x169/0x1d0
[ 63.506935][ T12] ? __pfx_worker_thread+0x10/0x10
[ 63.512041][ T12] kthread+0x2f0/0x390
[ 63.516235][ T12] ? __pfx_worker_thread+0x10/0x10
[ 63.521338][ T12] ? __pfx_kthread+0x10/0x10
[ 63.526012][ T12] ret_from_fork+0x4b/0x80
[ 63.530639][ T12] ? __pfx_kthread+0x10/0x10
[ 63.535520][ T12] ret_from_fork_asm+0x1a/0x30
[ 63.540332][ T12]
[ 63.545265][ T12]
[ 63.547642][ T12] =============================
[ 63.552675][ T12] WARNING: suspicious RCU usage
[ 63.557658][ T12] 6.10.0-rc2-syzkaller-00263-ga9b9741854a9 #0 Not tainted
[ 63.565043][ T12] -----------------------------
[ 63.569919][ T12] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 63.579773][ T12]
[ 63.579773][ T12] other info that might help us debug this:
[ 63.579773][ T12]
[ 63.590114][ T12]
[ 63.590114][ T12] rcu_scheduler_active = 2, debug_locks = 1
[ 63.598387][ T12] 3 locks held by kworker/u8:1/12:
[ 63.603516][ T12] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 63.614720][ T12] #1: ffffc90000117d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 63.625458][ T12] #2: ffffffff8f5dac10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 63.635153][ T12]
[ 63.635153][ T12] stack backtrace:
[ 63.641288][ T12] CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00263-ga9b9741854a9 #0
[ 63.652006][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 63.662064][ T12] Workqueue: netns cleanup_net
[ 63.666843][ T12] Call Trace:
[ 63.670125][ T12]
[ 63.673058][ T12] dump_stack_lvl+0x241/0x360
[ 63.677915][ T12] ? __pfx_dump_stack_lvl+0x10/0x10
[ 63.683133][ T12] ? __pfx__printk+0x10/0x10
[ 63.687822][ T12] lockdep_rcu_suspicious+0x221/0x340
[ 63.693564][ T12] _destroy_all_sets+0x53f/0x5f0
[ 63.698508][ T12] ip_set_net_exit+0x20/0x50
[ 63.703268][ T12] cleanup_net+0x802/0xcc0
[ 63.708126][ T12] ? __pfx_cleanup_net+0x10/0x10
[ 63.713071][ T12] ? process_scheduled_works+0x945/0x1830
[ 63.718871][ T12] process_scheduled_works+0xa2c/0x1830
[ 63.724432][ T12] ? __pfx_process_scheduled_works+0x10/0x10
[ 63.730516][ T12] ? assign_work+0x364/0x3d0
[ 63.735129][ T12] worker_thread+0x86d/0xd70
[ 63.739904][ T12] ? __kthread_parkme+0x169/0x1d0
[ 63.745023][ T12] ? __pfx_worker_thread+0x10/0x10
[ 63.750126][ T12] kthread+0x2f0/0x390
[ 63.754270][ T12] ? __pfx_worker_thread+0x10/0x10
[ 63.760161][ T12] ? __pfx_kthread+0x10/0x10
[ 63.764920][ T12] ret_from_fork+0x4b/0x80
[ 63.769336][ T12] ? __pfx_kthread+0x10/0x10
[ 63.774286][ T12] ret_from_fork_asm+0x1a/0x30
[ 63.779075][ T12]