last executing test programs: 296.685823ms ago: executing program 4: socket$hf(0x13, 0x2, 0x0) 227.763307ms ago: executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) 209.512578ms ago: executing program 0: socket(0x1e, 0x2, 0x0) 204.811419ms ago: executing program 1: getgid() 190.032402ms ago: executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 189.219708ms ago: executing program 2: socket$inet6_mptcp(0xa, 0x1, 0x106) 178.059045ms ago: executing program 1: gettid() 166.69303ms ago: executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 163.259872ms ago: executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) 160.113192ms ago: executing program 3: socket$tipc(0x1e, 0x2, 0x0) 147.624203ms ago: executing program 2: epoll_wait(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 146.058386ms ago: executing program 1: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 120.348388ms ago: executing program 0: pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 114.625254ms ago: executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) 110.881588ms ago: executing program 2: socket$bt_hidp(0x1f, 0x3, 0x6) 101.772785ms ago: executing program 1: poll(&(0x7f0000000000), 0x0, 0x0) 100.625732ms ago: executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) 94.826304ms ago: executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 88.397574ms ago: executing program 0: socket$bt_bnep(0x1f, 0x3, 0x4) 81.715846ms ago: executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) 74.56227ms ago: executing program 4: socket$can_raw(0x1d, 0x3, 0x1) 65.992016ms ago: executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 60.241614ms ago: executing program 1: socket$pppoe(0x18, 0x1, 0x0) 55.007012ms ago: executing program 0: pipe(&(0x7f0000000000)) 40.935819ms ago: executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 36.111177ms ago: executing program 4: getpid() 32.699222ms ago: executing program 1: socket$isdn_base(0x22, 0x3, 0x0) 26.850867ms ago: executing program 2: socket$inet_sctp(0x2, 0x1, 0x84) 19.169463ms ago: executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) 0s ago: executing program 4: syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.11' (ED25519) to the list of known hosts. 2024/06/18 09:03:26 fuzzer started 2024/06/18 09:03:26 dialing manager at 10.128.0.169:30017 [ 64.548438][ T5088] cgroup: Unknown subsys name 'net' [ 64.834312][ T5088] cgroup: Unknown subsys name 'rlimit' 2024/06/18 09:03:28 starting 5 executor processes [ 66.099568][ T5104] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 67.112326][ T5197] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 67.467118][ T5243] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 68.347667][ T2798] [ 68.350304][ T2798] ============================= [ 68.355183][ T2798] WARNING: suspicious RCU usage [ 68.360053][ T2798] 6.10.0-rc3-syzkaller-00131-gd46401052c2d #0 Not tainted [ 68.367602][ T2798] ----------------------------- [ 68.372741][ T2798] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 68.382647][ T2798] [ 68.382647][ T2798] other info that might help us debug this: [ 68.382647][ T2798] [ 68.393129][ T2798] 2024/06/18 09:03:30 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 68.393129][ T2798] rcu_scheduler_active = 2, debug_locks = 1 [ 68.401664][ T2798] 3 locks held by kworker/u8:7/2798: [ 68.406983][ T2798] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 68.418586][ T2798] #1: ffffc90009637d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 68.429628][ T2798] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 68.439215][ T2798] [ 68.439215][ T2798] stack backtrace: [ 68.445559][ T2798] CPU: 1 PID: 2798 Comm: kworker/u8:7 Not tainted 6.10.0-rc3-syzkaller-00131-gd46401052c2d #0 [ 68.456103][ T2798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 68.466195][ T2798] Workqueue: netns cleanup_net [ 68.471019][ T2798] Call Trace: [ 68.474310][ T2798] [ 68.477250][ T2798] dump_stack_lvl+0x241/0x360 [ 68.481970][ T2798] ? __pfx_dump_stack_lvl+0x10/0x10 [ 68.487220][ T2798] ? __pfx__printk+0x10/0x10 [ 68.491861][ T2798] lockdep_rcu_suspicious+0x221/0x340 [ 68.497452][ T2798] _destroy_all_sets+0x232/0x5f0 [ 68.502433][ T2798] ip_set_net_exit+0x20/0x50 [ 68.507055][ T2798] cleanup_net+0x802/0xcc0 [ 68.511518][ T2798] ? __pfx_cleanup_net+0x10/0x10 [ 68.516511][ T2798] ? process_scheduled_works+0x945/0x1830 [ 68.522261][ T2798] process_scheduled_works+0xa2c/0x1830 [ 68.527852][ T2798] ? __pfx_process_scheduled_works+0x10/0x10 [ 68.533873][ T2798] ? assign_work+0x364/0x3d0 [ 68.538593][ T2798] worker_thread+0x86d/0xd70 [ 68.543196][ T2798] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 68.549273][ T2798] ? __kthread_parkme+0x169/0x1d0 [ 68.554302][ T2798] ? __pfx_worker_thread+0x10/0x10 [ 68.559407][ T2798] kthread+0x2f0/0x390 [ 68.563479][ T2798] ? __pfx_worker_thread+0x10/0x10 [ 68.568577][ T2798] ? __pfx_kthread+0x10/0x10 [ 68.573245][ T2798] ret_from_fork+0x4b/0x80 [ 68.577664][ T2798] ? __pfx_kthread+0x10/0x10 [ 68.582249][ T2798] ret_from_fork_asm+0x1a/0x30 [ 68.587022][ T2798] [ 68.638921][ T2798] [ 68.641560][ T2798] ============================= [ 68.646420][ T2798] WARNING: suspicious RCU usage [ 68.651333][ T2798] 6.10.0-rc3-syzkaller-00131-gd46401052c2d #0 Not tainted [ 68.658582][ T2798] ----------------------------- [ 68.663478][ T2798] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 68.673150][ T2798] [ 68.673150][ T2798] other info that might help us debug this: [ 68.673150][ T2798] [ 68.683605][ T2798] [ 68.683605][ T2798] rcu_scheduler_active = 2, debug_locks = 1 [ 68.691906][ T2798] 3 locks held by kworker/u8:7/2798: [ 68.697208][ T2798] #0: ffff888015ed5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 68.708321][ T2798] #1: ffffc90009637d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 68.719150][ T2798] #2: ffffffff8f5db250 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 68.728765][ T2798] [ 68.728765][ T2798] stack backtrace: [ 68.734714][ T2798] CPU: 1 PID: 2798 Comm: kworker/