last executing test programs:
412.722523ms ago: executing program 3:
futimesat(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000))
398.002546ms ago: executing program 3:
open_tree(0xffffffffffffffff, &(0x7f0000000000), 0x0)
379.615079ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control', 0x800, 0x0)
324.827818ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/lightnvm/control', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/lightnvm/control', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/lightnvm/control', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/lightnvm/control', 0x800, 0x0)
302.315401ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0', 0x800, 0x0)
272.562576ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice', 0x800, 0x0)
258.922388ms ago: executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/adsp1', 0x800, 0x0)
231.192933ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/img-rogue', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/img-rogue', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/img-rogue', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/img-rogue', 0x800, 0x0)
213.499506ms ago: executing program 2:
mremap(0x0, 0x0, 0x0, 0x0, 0x0)
208.154226ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cdrom', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cdrom', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cdrom', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cdrom', 0x800, 0x0)
191.760969ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cdrom1', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cdrom1', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cdrom1', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cdrom1', 0x800, 0x0)
182.706171ms ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans', 0x1, 0x0)
167.736963ms ago: executing program 0:
pselect6(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000))
163.316004ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/netlabel', 0x2, 0x0)
160.329974ms ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/revoke-subject', 0x2, 0x0)
142.420907ms ago: executing program 4:
chroot(&(0x7f0000000000))
130.701459ms ago: executing program 1:
poll(&(0x7f0000000000), 0x0, 0x0)
130.275819ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3', 0x800, 0x0)
123.69298ms ago: executing program 4:
lstat(&(0x7f0000000000), &(0x7f0000000000))
120.464711ms ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/load', 0x2, 0x0)
110.462452ms ago: executing program 4:
epoll_create1(0x0)
100.233414ms ago: executing program 1:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey', 0x800, 0x0)
82.669907ms ago: executing program 2:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable', 0x2, 0x0)
77.397907ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun', 0x800, 0x0)
74.301608ms ago: executing program 4:
pivot_root(&(0x7f0000000000), &(0x7f0000000000))
63.0333ms ago: executing program 1:
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0)
61.04999ms ago: executing program 2:
ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0)
48.883612ms ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy', 0x0, 0x0)
45.524713ms ago: executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37', 0x2, 0x0)
0s ago: executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs', 0x1, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs', 0x2, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs', 0x800, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.222' (ED25519) to the list of known hosts.
2024/06/19 03:43:43 fuzzer started
2024/06/19 03:43:44 dialing manager at 10.128.0.163:30033
[ 58.196082][ T5078] cgroup: Unknown subsys name 'net'
[ 58.471127][ T5078] cgroup: Unknown subsys name 'rlimit'
[ 59.581053][ T5081] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/19 03:43:51 starting 5 executor processes
[ 68.471531][ T2846]
[ 68.474036][ T2846] =============================
[ 68.478997][ T2846] WARNING: suspicious RCU usage
[ 68.483896][ T2846] 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0 Not tainted
[ 68.491194][ T2846] -----------------------------
[ 68.496237][ T2846] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 68.505961][ T2846]
[ 68.505961][ T2846] other info that might help us debug this:
[ 68.505961][ T2846]
[ 68.516245][ T2846]
[ 68.516245][ T2846] rcu_scheduler_active = 2, debug_locks = 1
[ 68.524553][ T2846] 3 locks held by kworker/u8:10/2846:
[ 68.530030][ T2846] #0: ffff888015ed3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 68.541039][ T2846] #1: ffffc90009af7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 68.551699][ T2846] #2: ffffffff8f5c7c10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 68.561219][ T2846]
[ 68.561219][ T2846] stack backtrace:
2024/06/19 03:43:54 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 68.567467][ T2846] CPU: 1 PID: 2846 Comm: kworker/u8:10 Not tainted 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0
[ 68.577904][ T2846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 68.587987][ T2846] Workqueue: netns cleanup_net
[ 68.592807][ T2846] Call Trace:
[ 68.596111][ T2846]
[ 68.599058][ T2846] dump_stack_lvl+0x241/0x360
[ 68.603782][ T2846] ? __pfx_dump_stack_lvl+0x10/0x10
[ 68.609102][ T2846] ? __pfx__printk+0x10/0x10
[ 68.613833][ T2846] lockdep_rcu_suspicious+0x221/0x340
[ 68.619253][ T2846] _destroy_all_sets+0x232/0x5f0
[ 68.624204][ T2846] ip_set_net_exit+0x20/0x50
[ 68.628801][ T2846] cleanup_net+0x802/0xcc0
[ 68.633224][ T2846] ? __pfx_cleanup_net+0x10/0x10
[ 68.638169][ T2846] ? process_scheduled_works+0x945/0x1830
[ 68.643899][ T2846] process_scheduled_works+0xa2c/0x1830
[ 68.649456][ T2846] ? __pfx_process_scheduled_works+0x10/0x10
[ 68.655529][ T2846] ? assign_work+0x364/0x3d0
[ 68.660157][ T2846] worker_thread+0x86d/0xd70
[ 68.664747][ T2846] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 68.670651][ T2846] ? __kthread_parkme+0x169/0x1d0
[ 68.675675][ T2846] ? __pfx_worker_thread+0x10/0x10
[ 68.680864][ T2846] kthread+0x2f0/0x390
[ 68.684927][ T2846] ? __pfx_worker_thread+0x10/0x10
[ 68.690051][ T2846] ? __pfx_kthread+0x10/0x10
[ 68.694651][ T2846] ret_from_fork+0x4b/0x80
[ 68.699072][ T2846] ? __pfx_kthread+0x10/0x10
[ 68.703922][ T2846] ret_from_fork_asm+0x1a/0x30
[ 68.708700][ T2846]
[ 68.712525][ T2846]
[ 68.714887][ T2846] =============================
[ 68.719818][ T2846] WARNING: suspicious RCU usage
[ 68.724679][ T2846] 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0 Not tainted
[ 68.731953][ T2846] -----------------------------
[ 68.737061][ T2846] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 68.746751][ T2846]
[ 68.746751][ T2846] other info that might help us debug this:
[ 68.746751][ T2846]
[ 68.757051][ T2846]
[ 68.757051][ T2846] rcu_scheduler_active = 2, debug_locks = 1
[ 68.765140][ T2846] 3 locks held by kworker/u8:10/2846:
[ 68.770596][ T2846] #0: ffff888015ed3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 68.781627][ T2846] #1: ffffc90009af7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 68.792269][ T2846] #2: ffffffff8f5c7c10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 68.802046][ T2846]
[ 68.802046][ T2846] stack backtrace:
[ 68.808105][ T2846] CPU: 0 PID: 2846 Comm: kworker/u8:10 Not tainted 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0
[ 68.818545][ T2846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 68.828626][ T2846] Workqueue: netns cleanup_net
[ 68.833431][ T2846] Call Trace:
[ 68.836724][ T2846]
[ 68.839670][ T2846] dump_stack_lvl+0x241/0x360
[ 68.844396][ T2846] ? __pfx_dump_stack_lvl+0x10/0x10
[ 68.849627][ T2846] ? __pfx__printk+0x10/0x10
[ 68.854248][ T2846] lockdep_rcu_suspicious+0x221/0x340
[ 68.859733][ T2846] _destroy_all_sets+0x53f/0x5f0
[ 68.864712][ T2846] ip_set_net_exit+0x20/0x50
[ 68.869336][ T2846] cleanup_net+0x802/0xcc0
[ 68.873777][ T2846] ? __pfx_cleanup_net+0x10/0x10
[ 68.878757][ T2846] ? process_scheduled_works+0x945/0x1830
[ 68.884508][ T2846] process_scheduled_works+0xa2c/0x1830
[ 68.890121][ T2846] ? __pfx_process_scheduled_works+0x10/0x10
[ 68.896139][ T2846] ? assign_work+0x364/0x3d0
[ 68.900764][ T2846] worker_thread+0x86d/0xd70
[ 68.905396][ T2846] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 68.911336][ T2846] ? __kthread_parkme+0x169/0x1d0
[ 68.916397][ T2846] ? __pfx_worker_thread+0x10/0x10
[ 68.921545][ T2846] kthread+0x2f0/0x390
[ 68.925649][ T2846] ? __pfx_worker_thread+0x10/0x10
[ 68.930783][ T2846] ? __pfx_kthread+0x10/0x10
[ 68.935409][ T2846] ret_from_fork+0x4b/0x80
[ 68.939863][ T2846] ? __pfx_kthread+0x10/0x10
[ 68.944501][ T2846] ret_from_fork_asm+0x1a/0x30
[ 68.949325][ T2846]