last executing test programs:
496.484753ms ago: executing program 0:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
408.923857ms ago: executing program 1:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
398.769708ms ago: executing program 2:
read(0xffffffffffffffff, &(0x7f0000000000), 0x0)
121.212941ms ago: executing program 2:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)
71.260969ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
0s ago: executing program 1:
recvfrom(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.236' (ED25519) to the list of known hosts.
2024/06/17 05:31:09 fuzzer started
2024/06/17 05:31:09 dialing manager at 10.128.0.163:30035
syzkaller login: [ 56.253621][ T5092] cgroup: Unknown subsys name 'net'
[ 56.530512][ T5092] cgroup: Unknown subsys name 'rlimit'
[ 57.649085][ T5103] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/17 05:31:16 starting 3 executor processes
[ 63.753202][ T51]
[ 63.755862][ T51] =============================
[ 63.760827][ T51] WARNING: suspicious RCU usage
[ 63.765698][ T51] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 63.772947][ T51] -----------------------------
[ 63.778158][ T51] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 63.788265][ T51]
[ 63.788265][ T51] other info that might help us debug this:
[ 63.788265][ T51]
[ 63.798819][ T51]
[ 63.798819][ T51] rcu_scheduler_active = 2, debug_locks = 1
[ 63.807261][ T51] 3 locks held by kworker/u8:3/51:
[ 63.812505][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 63.823634][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 63.834349][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 63.844191][ T51]
[ 63.844191][ T51] stack backtrace:
[ 63.850616][ T51] CPU: 0 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 63.860720][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 63.870915][ T51] Workqueue: netns cleanup_net
[ 63.876007][ T51] Call Trace:
[ 63.879316][ T51]
[ 63.882276][ T51] dump_stack_lvl+0x241/0x360
[ 63.886998][ T51] ? __pfx_dump_stack_lvl+0x10/0x10
[ 63.892229][ T51] ? __pfx__printk+0x10/0x10
[ 63.896916][ T51] lockdep_rcu_suspicious+0x221/0x340
[ 63.902332][ T51] _destroy_all_sets+0x232/0x5f0
[ 63.907392][ T51] ip_set_net_exit+0x20/0x50
[ 63.912009][ T51] cleanup_net+0x802/0xcc0
[ 63.916463][ T51] ? __pfx_cleanup_net+0x10/0x10
[ 63.921412][ T51] ? process_scheduled_works+0x945/0x1830
[ 63.927124][ T51] process_scheduled_works+0xa2c/0x1830
[ 63.932679][ T51] ? __pfx_process_scheduled_works+0x10/0x10
[ 63.938681][ T51] ? assign_work+0x364/0x3d0
[ 63.943294][ T51] worker_thread+0x86d/0xd70
[ 63.948068][ T51] ? _raw_spin_unlock_irqrestore+0xdd/0x140
2024/06/17 05:31:17 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 63.953971][ T51] ? __kthread_parkme+0x169/0x1d0
[ 63.959085][ T51] ? __pfx_worker_thread+0x10/0x10
[ 63.964320][ T51] kthread+0x2f0/0x390
[ 63.968416][ T51] ? __pfx_worker_thread+0x10/0x10
[ 63.973549][ T51] ? __pfx_kthread+0x10/0x10
[ 63.978161][ T51] ret_from_fork+0x4b/0x80
[ 63.982600][ T51] ? __pfx_kthread+0x10/0x10
[ 63.987215][ T51] ret_from_fork_asm+0x1a/0x30
[ 63.992022][ T51]
[ 63.999190][ T51]
[ 64.001556][ T51] =============================
[ 64.006436][ T51] WARNING: suspicious RCU usage
[ 64.011712][ T51] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 64.018892][ T51] -----------------------------
[ 64.023747][ T51] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 64.033434][ T51]
[ 64.033434][ T51] other info that might help us debug this:
[ 64.033434][ T51]
[ 64.043757][ T51]
[ 64.043757][ T51] rcu_scheduler_active = 2, debug_locks = 1
[ 64.052024][ T51] 3 locks held by kworker/u8:3/51:
[ 64.057162][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 64.068490][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 64.079124][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 64.088834][ T51]
[ 64.088834][ T51] stack backtrace:
[ 64.094839][ T51] CPU: 1 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 64.104926][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 64.115012][ T51] Workqueue: netns cleanup_net
[ 64.119807][ T51] Call Trace:
[ 64.123095][ T51]
[ 64.126051][ T51] dump_stack_lvl+0x241/0x360
[ 64.130761][ T51] ? __pfx_dump_stack_lvl+0x10/0x10
[ 64.135981][ T51] ? __pfx__printk+0x10/0x10
[ 64.140719][ T51] lockdep_rcu_suspicious+0x221/0x340
[ 64.146132][ T51] _destroy_all_sets+0x53f/0x5f0
[ 64.151129][ T51] ip_set_net_exit+0x20/0x50
[ 64.155756][ T51] cleanup_net+0x802/0xcc0
[ 64.160212][ T51] ? __pfx_cleanup_net+0x10/0x10
[ 64.165264][ T51] ? process_scheduled_works+0x945/0x1830
[ 64.171069][ T51] process_scheduled_works+0xa2c/0x1830
[ 64.177165][ T51] ? __pfx_process_scheduled_works+0x10/0x10
[ 64.183146][ T51] ? assign_work+0x364/0x3d0
[ 64.187822][ T51] worker_thread+0x86d/0xd70
[ 64.192416][ T51] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 64.198307][ T51] ? __kthread_parkme+0x169/0x1d0
[ 64.203324][ T51]