last executing test programs: 510.051582ms ago: executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 410.096397ms ago: executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 289.763675ms ago: executing program 2: socket$netlink(0x10, 0x3, 0x0) 201.811099ms ago: executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) 79.464967ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/mac80211_hwsim/', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/mac80211_hwsim/', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/mac80211_hwsim/', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/mac80211_hwsim/', 0x800, 0x0) 0s ago: executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.176' (ED25519) to the list of known hosts. 2024/06/14 09:35:27 fuzzer started 2024/06/14 09:35:28 dialing manager at 10.128.0.163:30035 [ 55.918755][ T5089] cgroup: Unknown subsys name 'net' [ 56.203418][ T5089] cgroup: Unknown subsys name 'rlimit' [ 57.290756][ T5093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/14 09:35:29 starting 3 executor processes [ 58.083651][ T1106] [ 58.086160][ T1106] ============================= [ 58.091148][ T1106] WARNING: suspicious RCU usage [ 58.096017][ T1106] 6.10.0-rc3-syzkaller-00664-g3873d0d107c1 #0 Not tainted [ 58.103332][ T1106] ----------------------------- [ 58.108202][ T1106] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 58.118650][ T1106] [ 58.118650][ T1106] other info that might help us debug this: [ 58.118650][ T1106] [ 58.128995][ T1106] 2024/06/14 09:35:30 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 58.128995][ T1106] rcu_scheduler_active = 2, debug_locks = 1 [ 58.137156][ T1106] 3 locks held by kworker/u8:6/1106: [ 58.142530][ T1106] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 58.153653][ T1106] #1: ffffc9000436fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 58.164715][ T1106] #2: ffffffff8f5db390 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 58.174265][ T1106] [ 58.174265][ T1106] stack backtrace: [ 58.180539][ T1106] CPU: 1 PID: 1106 Comm: kworker/u8:6 Not tainted 6.10.0-rc3-syzkaller-00664-g3873d0d107c1 #0 [ 58.190804][ T1106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 58.200970][ T1106] Workqueue: netns cleanup_net [ 58.205792][ T1106] Call Trace: [ 58.209265][ T1106] [ 58.212305][ T1106] dump_stack_lvl+0x241/0x360 [ 58.217028][ T1106] ? __pfx_dump_stack_lvl+0x10/0x10 [ 58.222252][ T1106] ? __pfx__printk+0x10/0x10 [ 58.226872][ T1106] lockdep_rcu_suspicious+0x221/0x340 [ 58.232273][ T1106] _destroy_all_sets+0x232/0x5f0 [ 58.237244][ T1106] ip_set_net_exit+0x20/0x50 [ 58.241950][ T1106] cleanup_net+0x802/0xcc0 [ 58.246511][ T1106] ? __pfx_cleanup_net+0x10/0x10 [ 58.251514][ T1106] ? process_scheduled_works+0x945/0x1830 [ 58.257435][ T1106] process_scheduled_works+0xa2c/0x1830 [ 58.263038][ T1106] ? __pfx_process_scheduled_works+0x10/0x10 [ 58.269078][ T1106] ? assign_work+0x364/0x3d0 [ 58.273725][ T1106] worker_thread+0x86d/0xd70 [ 58.278367][ T1106] ? __kthread_parkme+0x169/0x1d0 [ 58.283433][ T1106] ? __pfx_worker_thread+0x10/0x10 [ 58.288737][ T1106] kthread+0x2f0/0x390 [ 58.292832][ T1106] ? __pfx_worker_thread+0x10/0x10 [ 58.297978][ T1106] ? __pfx_kthread+0x10/0x10 [ 58.302602][ T1106] ret_from_fork+0x4b/0x80 [ 58.307022][ T1106] ? __pfx_kthread+0x10/0x10 [ 58.311612][ T1106] ret_from_fork_asm+0x1a/0x30 [ 58.316381][ T1106] [ 58.321560][ T1106] [ 58.323925][ T1106] ============================= [ 58.328783][ T1106] WARNING: suspicious RCU usage [ 58.334127][ T1106] 6.10.0-rc3-syzkaller-00664-g3873d0d107c1 #0 Not tainted [ 58.341630][ T1106] ----------------------------- [ 58.346672][ T1106] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 58.356583][ T1106] [ 58.356583][ T1106] other info that might help us debug this: [ 58.356583][ T1106] [ 58.366880][ T1106] [ 58.366880][ T1106] rcu_scheduler_active = 2, debug_locks = 1 [ 58.375138][ T1106] 3 locks held by kworker/u8:6/1106: [ 58.380560][ T1106] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 58.391827][ T1106] #1: ffffc9000436fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 58.402459][ T1106] #2: ffffffff8f5db390 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 58.412071][ T1106] [ 58.412071][ T1106] stack backtrace: [ 58.418057][ T1106] CPU: 1 PID: 1106 Comm: kworker/u8:6 Not tainted 6.10.0-rc3-syzkaller-00664-g3873d0d107c1 #0 [ 58.428314][ T1106] Hardware name: Google Google Compute Engine/Google Compute