last executing test programs: 953.321789ms ago: executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) 930.169548ms ago: executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) 914.66693ms ago: executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 902.173412ms ago: executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) 894.833457ms ago: executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) 888.853735ms ago: executing program 2: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 872.044642ms ago: executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) 870.209105ms ago: executing program 1: socket(0x1, 0x1, 0x0) 860.110146ms ago: executing program 4: epoll_create1(0x0) 854.825922ms ago: executing program 2: pread64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 849.809468ms ago: executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) 840.882139ms ago: executing program 1: socket$caif_stream(0x25, 0x1, 0x0) 831.009692ms ago: executing program 2: getgid() 828.338296ms ago: executing program 0: getpid() 810.003187ms ago: executing program 4: pipe(&(0x7f0000000000)) 804.944211ms ago: executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) 795.637149ms ago: executing program 2: socket$pptp(0x18, 0x1, 0x2) 794.256419ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cmdline', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cmdline', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cmdline', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/cmdline', 0x800, 0x0) 785.191062ms ago: executing program 0: socket$l2tp6(0xa, 0x2, 0x73) 784.737944ms ago: executing program 4: socket$xdp(0x2c, 0x3, 0x0) 775.884222ms ago: executing program 1: getuid() 768.912342ms ago: executing program 3: socket$inet_icmp(0x2, 0x2, 0x1) 747.681553ms ago: executing program 0: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x14) 745.134859ms ago: executing program 1: syz_init_net_socket$ax25(0x3, 0x2, 0x0) 741.077049ms ago: executing program 3: socket$inet_mptcp(0x2, 0x1, 0x106) 740.558383ms ago: executing program 4: socket$vsock_dgram(0x28, 0x2, 0x0) 735.738567ms ago: executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) 714.573073ms ago: executing program 3: socket$nl_rdma(0x10, 0x3, 0x14) 706.278806ms ago: executing program 1: socket$packet(0x11, 0x2, 0x300) 0s ago: executing program 2: mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.117' (ED25519) to the list of known hosts. 2024/06/14 17:21:14 fuzzer started 2024/06/14 17:21:14 dialing manager at 10.128.0.169:30017 [ 56.364982][ T5091] cgroup: Unknown subsys name 'net' [ 56.580368][ T5091] cgroup: Unknown subsys name 'rlimit' 2024/06/14 17:21:16 starting 5 executor processes [ 57.715687][ T5097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 58.599401][ T5187] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 58.693913][ T5199] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 59.904447][ T3902] [ 59.906990][ T3902] ============================= [ 59.912054][ T3902] WARNING: suspicious RCU usage [ 59.916929][ T3902] 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0 Not tainted [ 59.924293][ T3902] ----------------------------- [ 59.929237][ T3902] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 59.938942][ T3902] [ 59.938942][ T3902] other info that might help us debug this: [ 59.938942][ T3902] [ 59.949335][ T3902] [ 59.949335][ T3902] rcu_scheduler_active = 2, debug_locks = 1 [ 59.957452][ T3902] 3 locks held by kworker/u8:9/3902: [ 59.962861][ T3902] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 59.973992][ T3902] #1: ffffc9000c27fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 59.984669][ T3902] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 59.994417][ T3902] [ 59.994417][ T3902] stack backtrace: [ 60.000409][ T3902] CPU: 0 PID: 3902 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0 [ 60.010676][ T3902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 60.021204][ T3902] Workqueue: netns cleanup_net [ 60.026289][ T3902] Call Trace: [ 60.029676][ T3902] [ 60.032628][ T3902] dump_stack_lvl+0x241/0x360 [ 60.037342][ T3902] ? __pfx_dump_stack_lvl+0x10/0x10 [ 60.042929][ T3902] ? __pfx__printk+0x10/0x10 [ 60.047563][ T3902] lockdep_rcu_suspicious+0x221/0x340 [ 60.053240][ T3902] _destroy_all_sets+0x232/0x5f0 [ 60.058220][ T3902] ip_set_net_exit+0x20/0x50 [ 60.062933][ T3902] cleanup_net+0x802/0xcc0 [ 60.067479][ T3902] ? __pfx_cleanup_net+0x10/0x10 [ 60.072475][ T3902] ? process_scheduled_works+0x945/0x1830 [ 60.078602][ T3902] process_scheduled_works+0xa2c/0x1830 [ 60.084212][ T3902] ? __pfx_process_scheduled_works+0x10/0x10 [ 60.090209][ T3902] ? assign_work+0x364/0x3d0 [ 60.094894][ T3902] worker_thread+0x86d/0xd70 [ 60.099488][ T3902] ? __kthread_parkme+0x169/0x1d0 2024/06/14 17:21:18 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 60.104508][ T3902] ? __pfx_worker_thread+0x10/0x10 [ 60.109699][ T3902] kthread+0x2f0/0x390 [ 60.113776][ T3902] ? __pfx_worker_thread+0x10/0x10 [ 60.118889][ T3902] ? __pfx_kthread+0x10/0x10 [ 60.123470][ T3902] ret_from_fork+0x4b/0x80 [ 60.127887][ T3902] ? __pfx_kthread+0x10/0x10 [ 60.132470][ T3902] ret_from_fork_asm+0x1a/0x30 [ 60.137346][ T3902] [ 60.183525][ T3902] [ 60.185963][ T3902] ============================= [ 60.191338][ T3902] WARNING: suspicious RCU usage [ 60.196220][ T3902] 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0 Not tainted [ 60.203444][ T3902] ----------------------------- [ 60.208329][ T3902] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 60.217987][ T3902] [ 60.217987][ T3902] other info that might help us debug this: [ 60.217987][ T3902] [ 60.228988][ T3902] [ 60.228988][ T3902] rcu_scheduler_active = 2, debug_locks = 1 [ 60.237164][ T3902] 3 locks held by kworker/u8:9/3902: [ 60.242535][ T3902] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 60.254132][ T3902] #1: ffffc9000c27fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 60.265084][ T3902] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 60.275020][ T3902] [ 60.275020][ T3902] stack backtrace: [ 60.281438][ T3902] CPU: 1 PID: 3902 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00102-g89aa3619d141 #0 [ 60.292318][ T3902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 60.302377][ T3902] Workqueue: netns cleanup_net [ 60.307171][ T3902] Call Trace: [ 60.310940][ T3902] [ 60.313967][ T3902] dump_stack_lvl+0x241/0x360 [ 60.318654][ T3902] ? __pfx_dump_stack_lvl+0x10/0x10 [ 60.324151][ T3902] ? __pfx__printk+0x10/0x10 [ 60.328767][ T3902] lockdep_rcu_suspicious+0x221/0x340 [ 60.334209][ T3902] _destroy_all_sets+0x53f/0x5f0 [ 60.339204][ T3902] ip_set_net_exit+0x20/0x50 [ 60.343978][ T3902] cleanup_net+0x802/0xcc0 [ 60.348406][ T3902] ? __pfx_cleanup_net+0x10/0x10 [ 60.353362][ T3902] ? process_scheduled_works+0x945/0x1830 [ 60.359337][ T3902] process_scheduled_works+0xa2c/0x1830 [ 60.364901][ T3902] ? __pfx_process_scheduled_works+0x10/0x10 [ 60.370880][ T3902] ? assign_work+0x364/0x3d0 [ 60.375583][ T3902] worker_thread+0x86d/0xd70 [ 60.380180][ T3902] ? __kthread_parkme+0x169/0x1d0 [ 60.385401][ T3902] ? __pfx_worker_thread+0x10/0x10 [ 60.390614][ T3902] kthread+0x2f0/0x390 [ 60.394680][ T3902] ? __pfx_worker_thread+0x10/0x10 [ 60.399789][ T3902] ? __pfx_kthread+0x10/0x10 [ 60.404384][ T3902] ret_from_fork+0x4b/0x80 [ 60.408796][ T3902] ? __pfx_kthread+0x10/0x10 [ 60.413380][ T3902] ret_from_fork_asm+0x1a/0x30 [ 60.418161][ T3902]