last executing test programs: 435.366461ms ago: executing program 1: connect(0xffffffffffffffff, &(0x7f0000000000), 0x0) 418.477684ms ago: executing program 2: recvfrom(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 409.155665ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 91.210085ms ago: executing program 0: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) 9.899158ms ago: executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 2: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.63' (ED25519) to the list of known hosts. 2024/06/17 15:52:38 fuzzer started 2024/06/17 15:52:38 dialing manager at 10.128.0.163:30035 [ 58.191471][ T5088] cgroup: Unknown subsys name 'net' [ 58.442880][ T5088] cgroup: Unknown subsys name 'rlimit' [ 59.608142][ T5111] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/17 15:52:46 starting 3 executor processes [ 66.458511][ T1283] [ 66.461048][ T1283] ============================= [ 66.466222][ T1283] WARNING: suspicious RCU usage [ 66.471103][ T1283] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted [ 66.478505][ T1283] ----------------------------- [ 66.483391][ T1283] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 66.493099][ T1283] [ 66.493099][ T1283] other info that might help us debug this: [ 66.493099][ T1283] [ 66.503393][ T1283] 2024/06/17 15:52:47 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 66.503393][ T1283] rcu_scheduler_active = 2, debug_locks = 1 [ 66.511623][ T1283] 3 locks held by kworker/u8:6/1283: [ 66.517053][ T1283] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 66.528582][ T1283] #1: ffffc90004fdfd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 66.539239][ T1283] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 66.548864][ T1283] [ 66.548864][ T1283] stack backtrace: [ 66.555090][ T1283] CPU: 0 PID: 1283 Comm: kworker/u8:6 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 [ 66.565442][ T1283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 66.575528][ T1283] Workqueue: netns cleanup_net [ 66.580340][ T1283] Call Trace: [ 66.583632][ T1283] [ 66.586582][ T1283] dump_stack_lvl+0x241/0x360 [ 66.591290][ T1283] ? __pfx_dump_stack_lvl+0x10/0x10 [ 66.596536][ T1283] ? __pfx__printk+0x10/0x10 [ 66.601135][ T1283] lockdep_rcu_suspicious+0x221/0x340 [ 66.606506][ T1283] _destroy_all_sets+0x232/0x5f0 [ 66.611577][ T1283] ip_set_net_exit+0x20/0x50 [ 66.616199][ T1283] cleanup_net+0x802/0xcc0 [ 66.620631][ T1283] ? __pfx_cleanup_net+0x10/0x10 [ 66.625605][ T1283] ? process_scheduled_works+0x945/0x1830 [ 66.631344][ T1283] process_scheduled_works+0xa2c/0x1830 [ 66.636914][ T1283] ? __pfx_process_scheduled_works+0x10/0x10 [ 66.642900][ T1283] ? assign_work+0x364/0x3d0 [ 66.647491][ T1283] worker_thread+0x86d/0xd70 [ 66.652086][ T1283] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 66.657985][ T1283] ? __kthread_parkme+0x169/0x1d0 [ 66.663008][ T1283] ? __pfx_worker_thread+0x10/0x10 [ 66.668119][ T1283] kthread+0x2f0/0x390 [ 66.672188][ T1283] ? __pfx_worker_thread+0x10/0x10 [ 66.677300][ T1283] ? __pfx_kthread+0x10/0x10 [ 66.681912][ T1283] ret_from_fork+0x4b/0x80 [ 66.686330][ T1283] ? __pfx_kthread+0x10/0x10 [ 66.690922][ T1283] ret_from_fork_asm+0x1a/0x30 [ 66.695701][ T1283] [ 66.716601][ T1283] [ 66.718981][ T1283] ============================= [ 66.724197][ T1283] WARNING: suspicious RCU usage [ 66.729068][ T1283] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted [ 66.736529][ T1283] ----------------------------- [ 66.741479][ T1283] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 66.751490][ T1283] [ 66.751490][ T1283] other info that might help us debug this: [ 66.751490][ T1283] [ 66.762053][ T1283] [ 66.762053][ T1283] rcu_scheduler_active = 2, debug_locks = 1 [ 66.770558][ T1283] 3 locks held by kworker/u8:6/1283: [ 66.776164][ T1283] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 66.787594][ T1283] #1: ffffc90004fdfd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 66.798490][ T1283] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 66.808267][ T1283] [ 66.808267][ T1283] stack backtrace: [ 66.814585][ T1283] CPU: 1