last executing test programs: 255.589016ms ago: executing program 2: gettid() 227.741394ms ago: executing program 4: syz_init_net_socket$llc(0x1a, 0x1, 0x0) 220.738262ms ago: executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000000), 0x0) 194.436917ms ago: executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) 182.841567ms ago: executing program 4: socket$pptp(0x18, 0x1, 0x2) 175.948217ms ago: executing program 0: epoll_create(0x0) 170.092128ms ago: executing program 1: socket$inet(0x2, 0x1, 0x0) 161.780262ms ago: executing program 2: vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 150.862179ms ago: executing program 3: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x14) 143.686189ms ago: executing program 4: socket$nl_generic(0x10, 0x3, 0x10) 141.946357ms ago: executing program 0: pipe(&(0x7f0000000000)) 130.949238ms ago: executing program 1: listen(0xffffffffffffffff, 0x0) 119.161859ms ago: executing program 3: socket$packet(0x11, 0x2, 0x300) 118.177413ms ago: executing program 2: epoll_pwait(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000), 0x0) 106.60316ms ago: executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) 105.798167ms ago: executing program 1: socket$igmp6(0xa, 0x3, 0x2) 103.948892ms ago: executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 85.113107ms ago: executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) 81.346922ms ago: executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) 74.189594ms ago: executing program 1: readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) 72.593736ms ago: executing program 3: socket$kcm(0x29, 0x2, 0x0) 66.987921ms ago: executing program 4: socket$rxrpc(0x21, 0x2, 0x0) 59.97293ms ago: executing program 0: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 51.848425ms ago: executing program 3: getuid() 35.81869ms ago: executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 24.009454ms ago: executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) 23.275481ms ago: executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 18.526734ms ago: executing program 0: socket$key(0xf, 0x3, 0x2) 1.167926ms ago: executing program 3: socket$isdn_base(0x22, 0x3, 0x0) 0s ago: executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.45' (ED25519) to the list of known hosts. 2024/06/14 23:14:21 fuzzer started 2024/06/14 23:14:21 dialing manager at 10.128.0.169:30017 [ 58.900669][ T5088] cgroup: Unknown subsys name 'net' [ 59.135902][ T5088] cgroup: Unknown subsys name 'rlimit' [ 60.238549][ T5105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/14 23:14:23 starting 5 executor processes [ 61.489833][ T5231] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 61.677190][ T5258] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 62.312180][ T4481] [ 62.314798][ T4481] ============================= [ 62.319677][ T4481] WARNING: suspicious RCU usage [ 62.324881][ T4481] 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0 Not tainted [ 62.332383][ T4481] ----------------------------- [ 62.337374][ T4481] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 62.347182][ T4481] [ 62.347182][ T4481] other info that might help us debug this: [ 62.347182][ T4481] [ 62.357865][ T4481] [ 62.357865][ T4481] rcu_scheduler_active = 2, debug_locks = 1 [ 62.366513][ T4481] 3 locks held by kworker/u8:9/4481: [ 62.371917][ T4481] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 62.383830][ T4481] #1: ffffc9000d177d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 62.394484][ T4481] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 62.404227][ T4481] [ 62.404227][ T4481] stack backtrace: [ 62.410245][ T4481] CPU: 1 PID: 4481 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0 [ 62.420615][ T4481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 62.430838][ T4481] Workqueue: netns cleanup_net [ 62.435753][ T4481] Call Trace: [ 62.439055][ T4481] [ 62.442112][ T4481] dump_stack_lvl+0x241/0x360 [ 62.447626][ T4481] ? __pfx_dump_stack_lvl+0x10/0x10 [ 62.452958][ T4481] ? __pfx__printk+0x10/0x10 [ 62.457791][ T4481] lockdep_rcu_suspicious+0x221/0x340 [ 62.463202][ T4481] _destroy_all_sets+0x232/0x5f0 [ 62.468261][ T4481] ip_set_net_exit+0x20/0x50 [ 62.473056][ T4481] cleanup_net+0x802/0xcc0 [ 62.477530][ T4481] ? __pfx_cleanup_net+0x10/0x10 [ 62.482524][ T4481] ? process_scheduled_works+0x945/0x1830 [ 62.488306][ T4481] process_scheduled_works+0xa2c/0x1830 [ 62.493887][ T4481] ? __pfx_process_scheduled_works+0x10/0x10 [ 62.499899][ T4481] ? assign_work+0x364/0x3d0 [ 62.504506][ T4481] worker_thread+0x86d/0xd70 2024/06/14 23:14:25 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 62.509217][ T4481] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 62.515155][ T4481] ? __kthread_parkme+0x169/0x1d0 [ 62.520236][ T4481] ? __pfx_worker_thread+0x10/0x10 [ 62.525359][ T4481] kthread+0x2f0/0x390 [ 62.529434][ T4481] ? __pfx_worker_thread+0x10/0x10 [ 62.534539][ T4481] ? __pfx_kthread+0x10/0x10 [ 62.539126][ T4481] ret_from_fork+0x4b/0x80 [ 62.543538][ T4481] ? __pfx_kthread+0x10/0x10 [ 62.548148][ T4481] ret_from_fork_asm+0x1a/0x30 [ 62.552942][ T4481] [ 62.625943][ T4481] [ 62.628338][ T4481] ============================= [ 62.633686][ T4481] WARNING: suspicious RCU usage [ 62.639281][ T4481] 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0 Not tainted [ 62.647021][ T4481] ----------------------------- [ 62.652437][ T4481] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 62.662164][ T4481] [ 62.662164][ T4481] other info that might help us debug this: [ 62.662164][ T4481] [ 62.672512][ T4481] [ 62.672512][ T4481] rcu_scheduler_active = 2, debug_locks = 1 [ 62.680755][ T4481] 3 locks held by kworker/u8:9/4481: [ 62.686219][ T4481] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 62.697514][ T4481] #1: ffffc9000d177d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 62.708450][ T4481] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 62.718280][ T4481] [ 62.718280][ T4481] stack backtrace: [ 62.724319][ T4481] CPU: 1 PID: 4481 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00111-g1afe4a64379f #0 [ 62.734580][ T4481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 62.744664][ T4481] Workqueue: netns cleanup_net [ 62.749468][ T4481] Call Trace: [ 62.753032][ T4481] [ 62.756171][ T4481] dump_stack_lvl+0x241/0x360 [ 62.760878][ T4481] ? __pfx_dump_stack_lvl+0x10/0x10 [ 62.766258][ T4481] ? __pfx__printk+0x10/0x10 [ 62.770878][ T4481] lockdep_rcu_suspicious+0x221/0x340 [ 62.776287][ T4481] _destroy_all_sets+0x53f/0x5f0 [ 62.781258][ T4481] ip_set_net_exit+0x20/0x50 [ 62.785870][ T4481] cleanup_net+0x802/0xcc0 [ 62.790330][ T4481] ? __pfx_cleanup_net+0x10/0x10 [ 62.795277][ T4481] ? process_scheduled_works+0x945/0x1830 [ 62.801085][ T4481] process_scheduled_works+0xa2c/0x1830 [ 62.806643][ T4481] ? __pfx_process_scheduled_works+0x10/0x10 [ 62.812658][ T4481] ? assign_work+0x364/0x3d0 [ 62.817297][ T4481] worker_thread+0x86d/0xd70 [ 62.821985][ T4481] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 62.828138][ T4481] ? __kthread_parkme+0x169/0x1d0 [ 62.833192][ T4481] ? __pfx_worker_thread+0x10/0x10 [ 62.838338][ T4481] kthread+0x2f0/0x390 [ 62.842408][ T4481] ? __pfx_worker_thread+0x10/0x10 [ 62.847511][ T4481] ? __pfx_kthread+0x10/0x10 [ 62.852098][ T4481] ret_from_fork+0x4b/0x80 [ 62.856514][ T4481] ? __pfx_kthread+0x10/0x10 [ 62.861114][ T4481] ret_from_fork_asm+0x1a/0x30 [ 62.865995][ T4481]