last executing test programs: 460.934839ms ago: executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 420.126125ms ago: executing program 0: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 227.627775ms ago: executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 135.466089ms ago: executing program 1: gettid() 0s ago: executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.7' (ED25519) to the list of known hosts. 2024/06/16 20:51:13 fuzzer started 2024/06/16 20:51:13 dialing manager at 10.128.0.163:30035 [ 57.563764][ T5091] cgroup: Unknown subsys name 'net' [ 57.767659][ T5091] cgroup: Unknown subsys name 'rlimit' [ 58.888563][ T5092] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/16 20:51:21 starting 3 executor processes [ 65.962445][ T35] [ 65.965500][ T35] ============================= [ 65.970375][ T35] WARNING: suspicious RCU usage [ 65.975735][ T35] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 65.982970][ T35] ----------------------------- [ 65.988045][ T35] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 65.998203][ T35] [ 65.998203][ T35] other info that might help us debug this: [ 65.998203][ T35] [ 66.008796][ T35] 2024/06/16 20:51:22 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 66.008796][ T35] rcu_scheduler_active = 2, debug_locks = 1 [ 66.017249][ T35] 3 locks held by kworker/u8:2/35: [ 66.022406][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 66.033693][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 66.044400][ T35] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 66.054092][ T35] [ 66.054092][ T35] stack backtrace: [ 66.060026][ T35] CPU: 1 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 [ 66.070143][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 66.080460][ T35] Workqueue: netns cleanup_net [ 66.086245][ T35] Call Trace: [ 66.089582][ T35] [ 66.092613][ T35] dump_stack_lvl+0x241/0x360 [ 66.097397][ T35] ? __pfx_dump_stack_lvl+0x10/0x10 [ 66.102631][ T35] ? __pfx__printk+0x10/0x10 [ 66.107252][ T35] lockdep_rcu_suspicious+0x221/0x340 [ 66.112649][ T35] _destroy_all_sets+0x232/0x5f0 [ 66.117710][ T35] ip_set_net_exit+0x20/0x50 [ 66.122342][ T35] cleanup_net+0x802/0xcc0 [ 66.126905][ T35] ? __pfx_cleanup_net+0x10/0x10 [ 66.132249][ T35] ? process_scheduled_works+0x945/0x1830 [ 66.138346][ T35] process_scheduled_works+0xa2c/0x1830 [ 66.143929][ T35] ? __pfx_process_scheduled_works+0x10/0x10 [ 66.149921][ T35] ? assign_work+0x364/0x3d0 [ 66.154516][ T35] worker_thread+0x86d/0xd70 [ 66.159114][ T35] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 66.165056][ T35] ? __kthread_parkme+0x169/0x1d0 [ 66.170241][ T35] ? __pfx_worker_thread+0x10/0x10 [ 66.175355][ T35] kthread+0x2f0/0x390 [ 66.179513][ T35] ? __pfx_worker_thread+0x10/0x10 [ 66.184638][ T35] ? __pfx_kthread+0x10/0x10 [ 66.189236][ T35] ret_from_fork+0x4b/0x80 [ 66.193649][ T35] ? __pfx_kthread+0x10/0x10 [ 66.198242][ T35] ret_from_fork_asm+0x1a/0x30 [ 66.203026][ T35] [ 66.303583][ T35] [ 66.306090][ T35] ============================= [ 66.311215][ T35] WARNING: suspicious RCU usage [ 66.316363][ T35] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 66.324072][ T35] ----------------------------- [ 66.329070][ T35] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 66.338999][ T35] [ 66.338999][ T35] other info that might help us debug this: [ 66.338999][ T35] [ 66.349524][ T35] [ 66.349524][ T35] rc