last executing test programs: 457.449229ms ago: executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 402.932187ms ago: executing program 1: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 402.385717ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 119.518821ms ago: executing program 2: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 18.946687ms ago: executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) 0s ago: executing program 0: readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.27' (ED25519) to the list of known hosts. 2024/06/18 00:33:05 fuzzer started 2024/06/18 00:33:05 dialing manager at 10.128.0.163:30035 [ 58.041830][ T5090] cgroup: Unknown subsys name 'net' [ 58.298913][ T5090] cgroup: Unknown subsys name 'rlimit' [ 59.442256][ T5114] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/18 00:33:13 starting 3 executor processes [ 66.811677][ T1097] [ 66.814323][ T1097] ============================= [ 66.819186][ T1097] WARNING: suspicious RCU usage [ 66.824563][ T1097] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted [ 66.831709][ T1097] ----------------------------- [ 66.836669][ T1097] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 66.846627][ T1097] [ 66.846627][ T1097] other info that might help us debug this: [ 66.846627][ T1097] [ 66.857064][ T1097] [ 66.857064][ T1097] rcu_scheduler_active = 2, debug_locks = 1 [ 66.865276][ T1097] 3 locks held by kworker/u8:5/1097: [ 66.870769][ T1097] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 66.882084][ T1097] #1: ffffc900045f7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 66.893248][ T1097] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 66.902833][ T1097] [ 66.902833][ T1097] stack backtrace: [ 66.908822][ T1097] CPU: 1 PID: 1097 Comm: kworker/u8:5 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 [ 66.919347][ T1097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 66.929442][ T1097] Workqueue: netns cleanup_net [ 66.934270][ T1097] Call Trace: [ 66.937579][ T1097] [ 66.940542][ T1097] dump_stack_lvl+0x241/0x360 [ 66.945266][ T1097] ? __pfx_dump_stack_lvl+0x10/0x10 [ 66.950516][ T1097] ? __pfx__printk+0x10/0x10 [ 66.955163][ T1097] lockdep_rcu_suspicious+0x221/0x340 [ 66.960586][ T1097] _destroy_all_sets+0x232/0x5f0 [ 66.965578][ T1097] ip_set_net_exit+0x20/0x50 [ 66.970218][ T1097] cleanup_net+0x802/0xcc0 [ 66.974683][ T1097] ? __pfx_cleanup_net+0x10/0x10 [ 66.979761][ T1097] ? process_scheduled_works+0x945/0x1830 [ 66.985694][ T1097] process_scheduled_works+0xa2c/0x1830 [ 66.991332][ T1097] ? __pfx_process_scheduled_works+0x10/0x10 [ 66.997360][ T1097] ? assign_work+0x364/0x3d0 [ 67.002041][ T1097] worker_thread+0x86d/0xd70 [ 67.006799][ T1097] ? __kthread_parkme+0x169/0x1d0 2024/06/18 00:33:14 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 67.011971][ T1097] ? __pfx_worker_thread+0x10/0x10 [ 67.017131][ T1097] kthread+0x2f0/0x390 [ 67.021238][ T1097] ? __pfx_worker_thread+0x10/0x10 [ 67.026399][ T1097] ? __pfx_kthread+0x10/0x10 [ 67.031034][ T1097] ret_from_fork+0x4b/0x80 [ 67.035584][ T1097] ? __pfx_kthread+0x10/0x10 [ 67.040357][ T1097] ret_from_fork_asm+0x1a/0x30 [ 67.045363][ T1097] [ 67.093665][ T1097] [ 67.096049][ T1097] ============================= [ 67.101148][ T1097] WARNING: suspicious RCU usage [ 67.106397][ T1097] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted [ 67.114114][ T1097] ----------------------------- [ 67.118993][ T1097] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 67.130103][ T1097] [ 67.130103][ T1097] other info that might help us debug this: [ 67.130103][ T1097] [ 67.141293][ T1097] [ 67.141293][ T1097] rcu_scheduler_active = 2, debug_locks = 1 [ 67.149706][ T1097] 3 locks held by kworker/u8:5/1097: [ 67.155858][ T1097] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 67.167559][ T1097] #1: ffffc900045f7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 67.178860][ T1097] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 67.188666][ T1097] [ 67.188666][ T1097] stack backtrace: [ 67.194874][ T1097] CPU: 0 PID: 1097 Comm: kworker/u8:5 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 [ 67.205233][ T1097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 67.215620][ T1097] Workqueue: netns cleanup_net [ 67.220673][ T1097] Call Trace: [ 67.224148][ T1097] [ 67.227107][ T1097] dump_stack_lvl+0x241/0x360 [ 67.231923][ T1097] ? __pfx_dump_stack_lvl+0x10/0x10 [ 67.237242][ T1097] ? __pfx__printk+0x10/0x10 [ 67.242066][ T1097] lo