last executing test programs: 438.518713ms ago: executing program 1: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 306.346324ms ago: executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 207.317019ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 161.834446ms ago: executing program 1: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 0s ago: executing program 2: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.171' (ED25519) to the list of known hosts. 2024/06/14 07:37:51 fuzzer started 2024/06/14 07:37:52 dialing manager at 10.128.0.163:30035 [ 55.622455][ T5090] cgroup: Unknown subsys name 'net' [ 55.908010][ T5090] cgroup: Unknown subsys name 'rlimit' [ 56.982256][ T5102] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/14 07:37:53 starting 3 executor processes [ 57.842599][ T3913] [ 57.845478][ T3913] ============================= [ 57.850346][ T3913] WARNING: suspicious RCU usage [ 57.855276][ T3913] 6.10.0-rc3-syzkaller-00655-g5f703ce5c981 #0 Not tainted [ 57.862489][ T3913] ----------------------------- [ 57.867415][ T3913] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 57.877173][ T3913] [ 57.877173][ T3913] other info that might help us debug this: [ 57.877173][ T3913] [ 57.887543][ T3913] [ 57.887543][ T3913] rcu_scheduler_active = 2, debug_locks = 1 [ 57.895691][ T3913] 3 locks held by kworker/u8:8/3913: [ 57.900999][ T3913] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 57.912141][ T3913] #1: ffffc9000c4bfd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 57.922810][ T3913] #2: ffffffff8f5db390 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 57.932338][ T3913] [ 57.932338][ T3913] stack backtrace: 2024/06/14 07:37:54 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 57.938377][ T3913] CPU: 0 PID: 3913 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00655-g5f703ce5c981 #0 [ 57.948727][ T3913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 57.958894][ T3913] Workqueue: netns cleanup_net [ 57.963701][ T3913] Call Trace: [ 57.967084][ T3913] [ 57.970040][ T3913] dump_stack_lvl+0x241/0x360 [ 57.974836][ T3913] ? __pfx_dump_stack_lvl+0x10/0x10 [ 57.980149][ T3913] ? __pfx__printk+0x10/0x10 [ 57.984773][ T3913] lockdep_rcu_suspicious+0x221/0x340 [ 57.990164][ T3913] _destroy_all_sets+0x232/0x5f0 [ 57.995129][ T3913] ip_set_net_exit+0x20/0x50 [ 57.999743][ T3913] cleanup_net+0x802/0xcc0 [ 58.004186][ T3913] ? __pfx_cleanup_net+0x10/0x10 [ 58.009148][ T3913] ? process_scheduled_works+0x945/0x1830 [ 58.014875][ T3913] process_scheduled_works+0xa2c/0x1830 [ 58.020461][ T3913] ? __pfx_process_scheduled_works+0x10/0x10 [ 58.026469][ T3913] ? assign_work+0x364/0x3d0 [ 58.031077][ T3913] worker_thread+0x86d/0xd70 [ 58.035692][ T3913] ? __kthread_parkme+0x169/0x1d0 [ 58.040734][ T3913] ? __pfx_worker_thread+0x10/0x10 [ 58.045895][ T3913] kthread+0x2f0/0x390 [ 58.050054][ T3913] ? __pfx_worker_thread+0x10/0x10 [ 58.055154][ T3913] ? __pfx_kthread+0x10/0x10 [ 58.059995][ T3913] ret_from_fork+0x4b/0x80 [ 58.064402][ T3913] ? __pfx_kthread+0x10/0x10 [ 58.069018][ T3913] ret_from_fork_asm+0x1a/0x30 [ 58.073785][ T3913]