last executing test programs:
896.544321ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/access', 0x2, 0x0)
865.974726ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/irnet', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/irnet', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/irnet', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/irnet', 0x800, 0x0)
844.271279ms ago: executing program 3:
chmod(&(0x7f0000000000), 0x0)
808.926844ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/card0/oss_mixer', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/card0/oss_mixer', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card0/oss_mixer', 0x800, 0x0)
778.593319ms ago: executing program 3:
epoll_wait(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
539.490037ms ago: executing program 2:
mremap(0x0, 0x0, 0x0, 0x0, 0x0)
523.863899ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/unconfined', 0x2, 0x0)
513.21062ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bifrost', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bifrost', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bifrost', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bifrost', 0x800, 0x0)
505.844121ms ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice', 0x800, 0x0)
492.551243ms ago: executing program 4:
splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
488.272444ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy', 0x0, 0x0)
477.430386ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/damon/target_ids', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/damon/target_ids', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/damon/target_ids', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/damon/target_ids', 0x800, 0x0)
453.234399ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/lightnvm/control', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/lightnvm/control', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/lightnvm/control', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/lightnvm/control', 0x800, 0x0)
450.61185ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control', 0x800, 0x0)
442.642911ms ago: executing program 2:
futimesat(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000))
435.190583ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ndctl0', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ndctl0', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ndctl0', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ndctl0', 0x800, 0x0)
422.787144ms ago: executing program 0:
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
413.392336ms ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/kernel/yama/ptrace_scope', 0x2, 0x0)
409.147827ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock', 0x2, 0x0)
385.99567ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sgx_provision', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sgx_provision', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sgx_provision', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sgx_provision', 0x800, 0x0)
385.398751ms ago: executing program 1:
pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
369.763543ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/change-rule', 0x2, 0x0)
369.090973ms ago: executing program 2:
fchdir(0xffffffffffffffff)
359.651044ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member', 0x2, 0x0)
357.294125ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio', 0x800, 0x0)
340.332697ms ago: executing program 1:
rmdir(&(0x7f0000000000))
332.229579ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dri/renderD128', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dri/renderD128', 0x800, 0x0)
327.520179ms ago: executing program 2:
epoll_pwait(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000), 0x0)
309.147882ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf', 0x2, 0x0)
0s ago: executing program 3:
mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.57' (ED25519) to the list of known hosts.
2024/06/18 02:00:29 fuzzer started
2024/06/18 02:00:30 dialing manager at 10.128.0.163:30033
[ 55.640746][ T5079] cgroup: Unknown subsys name 'net'
[ 55.876719][ T5079] cgroup: Unknown subsys name 'rlimit'
[ 57.074108][ T5090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/18 02:00:38 starting 5 executor processes
[ 66.912323][ T1067]
[ 66.914825][ T1067] =============================
[ 66.919684][ T1067] WARNING: suspicious RCU usage
[ 66.924770][ T1067] 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 Not tainted
[ 66.932345][ T1067] -----------------------------
[ 66.937219][ T1067] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 66.947141][ T1067]
[ 66.947141][ T1067] other info that might help us debug this:
[ 66.947141][ T1067]
[ 66.957457][ T1067]
2024/06/18 02:00:41 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 66.957457][ T1067] rcu_scheduler_active = 2, debug_locks = 1
[ 66.965764][ T1067] 3 locks held by kworker/u8:7/1067:
[ 66.971135][ T1067] #0: ffff888015ed3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 66.982369][ T1067] #1: ffffc90004057d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 66.993137][ T1067] #2: ffffffff8f5c9290 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 67.002658][ T1067]
[ 67.002658][ T1067] stack backtrace:
[ 67.008572][ T1067] CPU: 1 PID: 1067 Comm: kworker/u8:7 Not tainted 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0
[ 67.018833][ T1067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 67.028907][ T1067] Workqueue: netns cleanup_net
[ 67.033718][ T1067] Call Trace:
[ 67.037009][ T1067]
[ 67.040042][ T1067] dump_stack_lvl+0x241/0x360
[ 67.044748][ T1067] ? __pfx_dump_stack_lvl+0x10/0x10
[ 67.049977][ T1067] ? __pfx__printk+0x10/0x10
[ 67.054610][ T1067] lockdep_rcu_suspicious+0x221/0x340
[ 67.060008][ T1067] _destroy_all_sets+0x232/0x5f0
[ 67.064969][ T1067] ip_set_net_exit+0x20/0x50
[ 67.069558][ T1067] cleanup_net+0x802/0xcc0
[ 67.073976][ T1067] ? __pfx_cleanup_net+0x10/0x10
[ 67.078915][ T1067] ? process_scheduled_works+0x945/0x1830
[ 67.084624][ T1067] process_scheduled_works+0xa2c/0x1830
[ 67.090179][ T1067] ? __pfx_process_scheduled_works+0x10/0x10
[ 67.096154][ T1067] ? assign_work+0x364/0x3d0
[ 67.100739][ T1067] worker_thread+0x86d/0xd70
[ 67.105327][ T1067] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 67.111217][ T1067] ? __kthread_parkme+0x169/0x1d0
[ 67.116234][ T1067] ? __pfx_worker_thread+0x10/0x10
[ 67.121336][ T1067] kthread+0x2f0/0x390
[ 67.125398][ T1067] ? __pfx_worker_thread+0x10/0x10
[ 67.130502][ T1067] ? __pfx_kthread+0x10/0x10
[ 67.135084][ T1067] ret_from_fork+0x4b/0x80
[ 67.139498][ T1067] ? __pfx_kthread+0x10/0x10
[ 67.144169][ T1067] ret_from_fork_asm+0x1a/0x30
[ 67.148938][ T1067]
[ 67.294929][ T1067]
[ 67.297307][ T1067] =============================
[ 67.302318][ T1067] WARNING: suspicious RCU usage
[ 67.307173][ T1067] 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 Not tainted
[ 67.314398][ T1067] -----------------------------
[ 67.319266][ T1067] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 67.328998][ T1067]
[ 67.328998][ T1067] other info that might help us debug this:
[ 67.328998][ T1067]
[ 67.339369][ T1067]
[ 67.339369][ T1067] rcu_scheduler_active = 2, debug_locks = 1
[ 67.347738][ T1067] 3 locks held by kworker/u8:7/1067:
[ 67.353326][ T1067] #0: ffff888015ed3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 67.364704][ T1067] #1: ffffc90004057d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 67.375778][ T1067] #2: ffffffff8f5c9290 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 67.385690][ T1067]
[ 67.385690][ T1067] stack backtrace:
[ 67.392053][ T1067] CPU: 0 PID: 1067 Comm: kworker/u8:7 Not tainted 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0
[ 67.402408][ T1067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 67.412525][ T1067] Workqueue: netns cleanup_net
[ 67.417331][ T1067] Call Trace:
[ 67.420638][ T1067]
[ 67.423586][ T1067] dump_stack_lvl+0x241/0x360
[ 67.428298][ T1067] ? __pfx_dump_stack_lvl+0x10/0x10
[ 67.433529][ T1067] ? __pfx__printk+0x10/0x10
[ 67.438156][ T1067] lockdep_rcu_suspicious+0x221/0x340
[ 67.443565][ T1067] _destroy_all_sets+0x53f/0x5f0
[ 67.448543][ T1067] ip_set_net_exit+0x20/0x50
[ 67.453164][ T1067] cleanup_net+0x802/0xcc0
[ 67.457612][ T1067] ? __pfx_cleanup_net+0x10/0x10
[ 67.462678][ T1067] ? process_scheduled_works+0x945/0x1830
[ 67.468418][ T1067] process_scheduled_works+0xa2c/0x1830
[ 67.474019][ T1067] ? __pfx_process_scheduled_works+0x10/0x10
[ 67.480031][ T1067] ? assign_work+0x364/0x3d0
[ 67.484649][ T1067] worker_thread+0x86d/0xd70
[ 67.489267][ T1067] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 67.495195][ T1067] ? __kthread_parkme+0x169/0x1d0
[ 67.500253][ T1067] ? __pfx_worker_thread+0x10/0x10
[ 67.505400][ T1067] kthread+0x2f0/0x390
[ 67.509555][ T1067] ? __pfx_worker_thread+0x10/0x10
[ 67.514664][ T1067] ? __pfx_kthread+0x10/0x10
[ 67.519245][ T1067] ret_from_fork+0x4b/0x80
[ 67.523673][ T1067] ? __pfx_kthread+0x10/0x10
[ 67.528272][ T1067] ret_from_fork_asm+0x1a/0x30
[ 67.533051][ T1067]