last executing test programs: 433.861878ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 362.822326ms ago: executing program 2: read(0xffffffffffffffff, &(0x7f0000000000), 0x0) 271.139567ms ago: executing program 1: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 99.001848ms ago: executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 2: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.43' (ED25519) to the list of known hosts. 2024/06/16 09:49:36 fuzzer started 2024/06/16 09:49:37 dialing manager at 10.128.0.163:30035 [ 57.188786][ T5089] cgroup: Unknown subsys name 'net' [ 57.420790][ T5089] cgroup: Unknown subsys name 'rlimit' [ 58.578226][ T5112] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 58.591836][ T5112] syz-executor (5112) used greatest stack depth: 19312 bytes left 2024/06/16 09:49:44 starting 3 executor processes [ 64.537527][ T51] [ 64.540086][ T51] ============================= [ 64.545209][ T51] WARNING: suspicious RCU usage [ 64.550250][ T51] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 64.557840][ T51] ----------------------------- [ 64.563059][ T51] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 64.572886][ T51] [ 64.572886][ T51] other info that might help us debug this: [ 64.572886][ T51] [ 64.583421][ T51] 2024/06/16 09:49:44 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 64.583421][ T51] rcu_scheduler_active = 2, debug_locks = 1 [ 64.592130][ T51] 3 locks held by kworker/u8:3/51: [ 64.597731][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 64.609164][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 64.620264][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 64.630529][ T51] [ 64.630529][ T51] stack backtrace: [ 64.636543][ T51] CPU: 0 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 [ 64.646892][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 64.657070][ T51] Workqueue: netns cleanup_net [ 64.661930][ T51] Call Trace: [ 64.665302][ T51] [ 64.668242][ T51] dump_stack_lvl+0x241/0x360 [ 64.673124][ T51] ? __pfx_dump_stack_lvl+0x10/0x10 [ 64.678605][ T51] ? __pfx__printk+0x10/0x10 [ 64.683373][ T51] lockdep_rcu_suspicious+0x221/0x340 [ 64.689058][ T51] _destroy_all_sets+0x232/0x5f0 [ 64.694032][ T51] ip_set_net_exit+0x20/0x50 [ 64.698634][ T51] cleanup_net+0x802/0xcc0 [ 64.703053][ T51] ? __pfx_cleanup_net+0x10/0x10 [ 64.708122][ T51] ? process_scheduled_works+0x945/0x1830 [ 64.714186][ T51] process_scheduled_works+0xa2c/0x1830 [ 64.719743][ T51] ? __pfx_process_scheduled_works+0x10/0x10 [ 64.725775][ T51] ? assign_work+0x364/0x3d0 [ 64.730376][ T51] worker_thread+0x86d/0xd70 [ 64.735270][ T51] ? __kthread_parkme+0x169/0x1d0 [ 64.740330][ T51] ? __pfx_worker_thread+0x10/0x10 [ 64.746161][ T51] kthread+0x2f0/0x390 [ 64.750234][ T51] ? __pfx_worker_thread+0x10/0x10 [ 64.755423][ T51] ? __pfx_kthread+0x10/0x10 [ 64.760052][ T51] ret_from_fork+0x4b/0x80 [ 64.764482][ T51] ? __pfx_kthread+0x10/0x10 [ 64.769292][ T51] ret_from_fork_asm+0x1a/0x30 [ 64.774117][ T51] [ 64.780675][ T51] [ 64.783117][ T51] ============================= [ 64.787988][ T51] WARNING: suspicious RCU usage [ 64.792936][ T51] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 64.800175][ T51] ----------------------------- [ 64.805457][ T51] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 64.815512][ T51] [ 64.815512][ T51] other info that might help us debug this: [ 64.815512][ T51] [ 64.825820][ T51] [ 64.825820][ T51] rcu_scheduler_active = 2, debug_locks = 1 [ 64.834982][ T51] 3 locks held by kworker/u8:3/51: [ 64.840124][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 64.851192][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 64.861858][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 64.871437][ T51] [ 64.871437][ T51] stack backtrace: [ 64.877731][ T51] CPU: 0 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 [ 64