last executing test programs:
241.032489ms ago: executing program 2:
socket$key(0xf, 0x3, 0x2)
195.018548ms ago: executing program 0:
socket(0x1, 0x1, 0x0)
185.033085ms ago: executing program 3:
socket$igmp6(0xa, 0x3, 0x2)
184.12335ms ago: executing program 2:
socket$bt_hidp(0x1f, 0x3, 0x6)
183.49826ms ago: executing program 4:
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0)
169.692087ms ago: executing program 1:
splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
155.904303ms ago: executing program 0:
socket$phonet_pipe(0x23, 0x5, 0x2)
153.574587ms ago: executing program 2:
epoll_create1(0x0)
149.552959ms ago: executing program 4:
socket$vsock_stream(0x28, 0x1, 0x0)
148.376643ms ago: executing program 3:
socket$inet_tcp(0x2, 0x1, 0x0)
135.003934ms ago: executing program 1:
socket$pptp(0x18, 0x1, 0x2)
121.676103ms ago: executing program 2:
socket$l2tp(0x2, 0x2, 0x73)
120.228694ms ago: executing program 4:
gettid()
117.484799ms ago: executing program 3:
syz_init_net_socket$nl_rdma(0x10, 0x3, 0x14)
103.328955ms ago: executing program 0:
getuid()
95.025032ms ago: executing program 1:
socket$nl_sock_diag(0x10, 0x3, 0x4)
91.873293ms ago: executing program 2:
socket$nl_xfrm(0x10, 0x3, 0x6)
89.125422ms ago: executing program 4:
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
81.820402ms ago: executing program 3:
syz_init_net_socket$x25(0x9, 0x5, 0x0)
72.257235ms ago: executing program 0:
socket$inet_dccp(0x2, 0x6, 0x0)
66.479873ms ago: executing program 1:
socket$inet6_tcp(0xa, 0x1, 0x0)
58.719842ms ago: executing program 3:
socket$qrtr(0x2a, 0x2, 0x0)
51.19538ms ago: executing program 2:
socket$inet6_udplite(0xa, 0x2, 0x88)
49.341176ms ago: executing program 4:
socket$rds(0x15, 0x5, 0x0)
42.616879ms ago: executing program 1:
socket$alg(0x26, 0x5, 0x0)
39.513608ms ago: executing program 0:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
28.206223ms ago: executing program 3:
socket$pppoe(0x18, 0x1, 0x0)
11.726368ms ago: executing program 4:
socket$caif_stream(0x25, 0x1, 0x0)
419.005µs ago: executing program 1:
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
0s ago: executing program 0:
socket$nl_route(0x10, 0x3, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.123' (ED25519) to the list of known hosts.
2024/06/17 10:55:18 fuzzer started
2024/06/17 10:55:18 dialing manager at 10.128.0.169:30019
[ 58.612942][ T5094] cgroup: Unknown subsys name 'net'
[ 58.921954][ T5094] cgroup: Unknown subsys name 'rlimit'
2024/06/17 10:55:20 starting 5 executor processes
[ 59.996733][ T5101] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 60.008989][ T5101] syz-executor (5101) used greatest stack depth: 18832 bytes left
[ 60.995550][ T5211] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 61.410777][ T5269] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 62.262363][ T35]
[ 62.264772][ T35] =============================
[ 62.270014][ T35] WARNING: suspicious RCU usage
[ 62.275049][ T35] 6.10.0-rc3-syzkaller-00691-g69776921e82d #0 Not tainted
[ 62.282466][ T35] -----------------------------
[ 62.287342][ T35] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 62.297203][ T35]
[ 62.297203][ T35] other info that might help us debug this:
[ 62.297203][ T35]
[ 62.307626][ T35]
[ 62.307626][ T35] rcu_scheduler_active = 2, debug_locks = 1
[ 62.315772][ T35] 3 locks held by kworker/u8:2/35:
[ 62.320967][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 62.331999][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 62.342660][ T35] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 62.352180][ T35]
[ 62.352180][ T35] stack backtrace:
[ 62.358102][ T35] CPU: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00691-g69776921e82d #0
[ 62.368501][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 62.378581][ T35] Workqueue: netns cleanup_net
[ 62.383484][ T35] Call Trace:
[ 62.386786][ T35]
[ 62.389734][ T35] dump_stack_lvl+0x241/0x360
[ 62.394445][ T35] ? __pfx_dump_stack_lvl+0x10/0x10
[ 62.399762][ T35] ? __pfx__printk+0x10/0x10
[ 62.404747][ T35] lockdep_rcu_suspicious+0x221/0x340
[ 62.410253][ T35] _destroy_all_sets+0x232/0x5f0
[ 62.415242][ T35] ip_set_net_exit+0x20/0x50
[ 62.419862][ T35] cleanup_net+0x802/0xcc0
[ 62.424320][ T35] ? __pfx_cleanup_net+0x10/0x10
[ 62.429475][ T35] ? process_scheduled_works+0x945/0x1830
[ 62.435225][ T35] process_scheduled_works+0xa2c/0x1830
[ 62.440828][ T35] ? __pfx_process_scheduled_works+0x10/0x10
[ 62.446856][ T35] ? assign_work+0x364/0x3d0
[ 62.451571][ T35] worker_thread+0x86d/0xd70
[ 62.456199][ T35] ? _raw_spin_unlock_irqrestore+0xdd/0x140
2024/06/17 10:55:22 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 62.462123][ T35] ? __kthread_parkme+0x169/0x1d0
[ 62.467161][ T35] ? __pfx_worker_thread+0x10/0x10
[ 62.472263][ T35] kthread+0x2f0/0x390
[ 62.476328][ T35] ? __pfx_worker_thread+0x10/0x10
[ 62.481427][ T35] ? __pfx_kthread+0x10/0x10
[ 62.486095][ T35] ret_from_fork+0x4b/0x80
[ 62.490599][ T35] ? __pfx_kthread+0x10/0x10
[ 62.495185][ T35] ret_from_fork_asm+0x1a/0x30
[ 62.499960][ T35]
[ 62.520489][ T5282] workqueue: Failed to create a rescuer kthread for wq "bond0": -EINTR
[ 62.574101][ T35]
[ 62.585009][ T35] =============================
[ 62.590212][ T35] WARNING: suspicious RCU usage
[ 62.595071][ T35] 6.10.0-rc3-syzkaller-00691-g69776921e82d #0 Not tainted
[ 62.602539][ T35] -----------------------------
[ 62.607404][ T35] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 62.617445][ T35]
[ 62.617445][ T35] other info that might help us debug this:
[ 62.617445][ T35]
[ 62.628298][ T35]
[ 62.628298][ T35] rcu_scheduler_active = 2, debug_locks = 1
[ 62.636669][ T35] 3 locks held by kworker/u8:2/35:
[ 62.642292][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 62.653726][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 62.664984][ T35] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 62.674830][ T35]
[ 62.674830][ T35] stack backtrace:
[ 62.680898][ T35] CPU: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00691-g69776921e82d #0
[ 62.690981][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 62.701144][ T35] Workqueue: netns cleanup_net
[ 62.705937][ T35] Call Trace:
[ 62.709224][ T35]
[ 62.712174][ T35] dump_stack_lvl+0x241/0x360
[ 62.716965][ T35] ? __pfx_dump_stack_lvl+0x10/0x10
[ 62.722443][ T35] ? __pfx