last executing test programs: 399.541529ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 390.2208ms ago: executing program 2: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 352.620286ms ago: executing program 1: mmap(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 24.846446ms ago: executing program 1: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 10.234508ms ago: executing program 0: read(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.143' (ED25519) to the list of known hosts. 2024/06/19 01:51:01 fuzzer started 2024/06/19 01:51:01 dialing manager at 10.128.0.163:30035 [ 52.934978][ T5097] cgroup: Unknown subsys name 'net' [ 53.238018][ T5097] cgroup: Unknown subsys name 'rlimit' [ 54.358609][ T5114] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/19 01:51:09 starting 3 executor processes [ 61.721767][ T1058] [ 61.724205][ T1058] ============================= [ 61.729241][ T1058] WARNING: suspicious RCU usage [ 61.734111][ T1058] 6.10.0-rc3-syzkaller-00710-g382d1741b5b2 #0 Not tainted [ 61.741499][ T1058] ----------------------------- [ 61.746409][ T1058] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 61.756409][ T1058] [ 61.756409][ T1058] other info that might help us debug this: [ 61.756409][ T1058] [ 61.766786][ T1058] [ 61.766786][ T1058] rcu_scheduler_active = 2, debug_locks = 1 [ 61.774873][ T1058] 3 locks held by kworker/u8:5/1058: [ 61.780284][ T1058] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 61.791615][ T1058] #1: ffffc900045a7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 61.802348][ T1058] #2: ffffffff8f5db750 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 61.811892][ T1058] [ 61.811892][ T1058] stack backtrace: [ 61.817874][ T1058] CPU: 0 PID: 1058 Comm: kworker/u8:5 Not tainted 6.10.0-rc3-syzkaller-00710-g382d1741b5b2 #0 [ 61.828139][ T1058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 61.838209][ T1058] Workqueue: netns cleanup_net [ 61.843112][ T1058] Call Trace: [ 61.846394][ T1058] [ 61.849330][ T1058] dump_stack_lvl+0x241/0x360 [ 61.854184][ T1058] ? __pfx_dump_stack_lvl+0x10/0x10 [ 61.859376][ T1058] ? __pfx__printk+0x10/0x10 [ 61.863962][ T1058] lockdep_rcu_suspicious+0x221/0x340 [ 61.869343][ T1058] _destroy_all_sets+0x232/0x5f0 [ 61.874280][ T1058] ip_set_net_exit+0x20/0x50 [ 61.878874][ T1058] cleanup_net+0x802/0xcc0 [ 61.883292][ T1058] ? __pfx_cleanup_net+0x10/0x10 [ 61.888236][ T1058] ? process_scheduled_works+0x945/0x1830 [ 61.893939][ T1058] process_scheduled_works+0xa2c/0x1830 [ 61.899667][ T1058] ? __pfx_process_scheduled_works+0x10/0x10 [ 61.905641][ T1058] ? assign_work+0x364/0x3d0 [ 61.910225][ T1058] worker_thread+0x86d/0xd70 [ 61.914824][ T1058] ? __kthread_parkme+0x169/0x1d0 2024/06/19 01:51:10 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 61.919869][ T1058] ? __pfx_worker_thread+0x10/0x10 [ 61.924999][ T1058] kthread+0x2f0/0x390 [ 61.929101][ T1058] ? __pfx_worker_thread+0x10/0x10 [ 61.934250][ T1058] ? __pfx_kthread+0x10/0x10 [ 61.938858][ T1058] ret_from_fork+0x4b/0x80 [ 61.943300][ T1058] ? __pfx_kthread+0x10/0x10 [ 61.947910][ T1058] ret_from_fork_asm+0x1a/0x30 [ 61.952696][ T1058] [ 62.078199][ T1058] [ 62.080628][ T1058] ============================= [ 62.085505][ T1058] WARNING: suspicious RCU usage [ 62.090879][ T1058] 6.10.0-rc3-syzkaller-00710-g382d1741b5b2 #0 Not tainted [ 62.098503][ T1058] ----------------------------- [ 62.103364][ T1058] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 62.113320][ T1058] [ 62.113320][ T1058] other info that might help us debug this: [ 62.113320][ T1058] [ 62.123958][ T1058] [ 62.123958][ T1058] rcu_