last executing test programs: 478.627736ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 457.870039ms ago: executing program 2: socket$caif_stream(0x25, 0x1, 0x0) 326.61356ms ago: executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 65.14927ms ago: executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 55.038742ms ago: executing program 0: unshare(0x0) 0s ago: executing program 1: getpeername(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.254' (ED25519) to the list of known hosts. 2024/06/16 13:14:24 fuzzer started 2024/06/16 13:14:25 dialing manager at 10.128.0.163:30035 [ 57.867250][ T5090] cgroup: Unknown subsys name 'net' [ 58.120005][ T5090] cgroup: Unknown subsys name 'rlimit' [ 59.354092][ T5111] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/16 13:14:31 starting 3 executor processes [ 65.026919][ T51] [ 65.029478][ T51] ============================= [ 65.034398][ T51] WARNING: suspicious RCU usage [ 65.039717][ T51] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 65.046939][ T51] ----------------------------- [ 65.051901][ T51] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 65.061804][ T51] [ 65.061804][ T51] other info that might help us debug this: [ 65.061804][ T51] [ 65.072483][ T51] [ 65.072483][ T51] rcu_scheduler_active = 2, debug_locks = 1 [ 65.080726][ T51] 3 locks held by kworker/u8:3/51: [ 65.085991][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 65.097217][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 65.108160][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 65.117921][ T51] [ 65.117921][ T51] stack backtrace: [ 65.124027][ T51] CPU: 0 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 [ 65.134229][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 65.144375][ T51] Workqueue: netns cleanup_net [ 65.149158][ T51] Call Trace: [ 65.152446][ T51] [ 65.155366][ T51] dump_stack_lvl+0x241/0x360 [ 65.160045][ T51] ? __pfx_dump_stack_lvl+0x10/0x10 [ 65.165243][ T51] ? __pfx__printk+0x10/0x10 [ 65.170004][ T51] lockdep_rcu_suspicious+0x221/0x340 [ 65.175461][ T51] _destroy_all_sets+0x232/0x5f0 [ 65.180509][ T51] ip_set_net_exit+0x20/0x50 [ 65.185099][ T51] cleanup_net+0x802/0xcc0 [ 65.189521][ T51] ? __pfx_cleanup_net+0x10/0x10 [ 65.194838][ T51] ? process_scheduled_works+0x945/0x1830 [ 65.200570][ T51] process_scheduled_works+0xa2c/0x1830 [ 65.206280][ T51] ? __pfx_process_scheduled_works+0x10/0x10 [ 65.212421][ T51] ? assign_work+0x364/0x3d0 [ 65.217119][ T51] worker_thread+0x86d/0xd70 [ 65.221836][ T51] ? __kthread_parkme+0x169/0x1d0 2024/06/16 13:14:32 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 65.226978][ T51] ? __pfx_worker_thread+0x10/0x10 [ 65.232438][ T51] kthread+0x2f0/0x390 [ 65.236503][ T51] ? __pfx_worker_thread+0x10/0x10 [ 65.241697][ T51] ? __pfx_kthread+0x10/0x10 [ 65.246363][ T51] ret_from_fork+0x4b/0x80 [ 65.250774][ T51] ? __pfx_kthread+0x10/0x10 [ 65.255351][ T51] ret_from_fork_asm+0x1a/0x30 [ 65.260211][ T51] [ 65.306954][ T51] [ 65.309432][ T51] ============================= [ 65.314296][ T51] WARNING: suspicious RCU usage [ 65.319685][ T51] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 65.327226][ T51] ----------------------------- [ 65.332100][ T51] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 65.342328][ T51] [ 65.342328][ T51] other info that might help us debug this: [ 65.342328][ T51] [ 65.353049][ T51] [ 65.353049][ T51] rcu_scheduler_active = 2, debug_locks = 1 [ 65.361285][ T51] 3 locks held by kworker/u8:3/51: [ 65.366547][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 65.377817][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 65.388633][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 65.398258][ T51] [ 65.398258][ T51] stack backtrace: [ 65.404166][ T51] CPU: 0 PID: 51