last executing test programs: 241.032489ms ago: executing program 2: socket$key(0xf, 0x3, 0x2) 195.018548ms ago: executing program 0: socket(0x1, 0x1, 0x0) 185.033085ms ago: executing program 3: socket$igmp6(0xa, 0x3, 0x2) 184.12335ms ago: executing program 2: socket$bt_hidp(0x1f, 0x3, 0x6) 183.49826ms ago: executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) 169.692087ms ago: executing program 1: splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 155.904303ms ago: executing program 0: socket$phonet_pipe(0x23, 0x5, 0x2) 153.574587ms ago: executing program 2: epoll_create1(0x0) 149.552959ms ago: executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) 148.376643ms ago: executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) 135.003934ms ago: executing program 1: socket$pptp(0x18, 0x1, 0x2) 121.676103ms ago: executing program 2: socket$l2tp(0x2, 0x2, 0x73) 120.228694ms ago: executing program 4: gettid() 117.484799ms ago: executing program 3: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x14) 103.328955ms ago: executing program 0: getuid() 95.025032ms ago: executing program 1: socket$nl_sock_diag(0x10, 0x3, 0x4) 91.873293ms ago: executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) 89.125422ms ago: executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 81.820402ms ago: executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) 72.257235ms ago: executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) 66.479873ms ago: executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) 58.719842ms ago: executing program 3: socket$qrtr(0x2a, 0x2, 0x0) 51.19538ms ago: executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) 49.341176ms ago: executing program 4: socket$rds(0x15, 0x5, 0x0) 42.616879ms ago: executing program 1: socket$alg(0x26, 0x5, 0x0) 39.513608ms ago: executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) 28.206223ms ago: executing program 3: socket$pppoe(0x18, 0x1, 0x0) 11.726368ms ago: executing program 4: socket$caif_stream(0x25, 0x1, 0x0) 419.005µs ago: executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 0s ago: executing program 0: socket$nl_route(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.123' (ED25519) to the list of known hosts. 2024/06/17 10:55:18 fuzzer started 2024/06/17 10:55:18 dialing manager at 10.128.0.169:30019 [ 58.612942][ T5094] cgroup: Unknown subsys name 'net' [ 58.921954][ T5094] cgroup: Unknown subsys name 'rlimit' 2024/06/17 10:55:20 starting 5 executor processes [ 59.996733][ T5101] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 60.008989][ T5101] syz-executor (5101) used greatest stack depth: 18832 bytes left [ 60.995550][ T5211] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 61.410777][ T5269] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 62.262363][ T35] [ 62.264772][ T35] ============================= [ 62.270014][ T35] WARNING: suspicious RCU usage [ 62.275049][ T35] 6.10.0-rc3-syzkaller-00691-g69776921e82d #0 Not tainted [ 62.282466][ T35] ----------------------------- [ 62.287342][ T35] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 62.297203][ T35] [ 62.297203][ T35] other info that might help us debug this: [ 62.297203][ T35] [ 62.307626][ T35] [ 62.307626][ T35] rcu_scheduler_active = 2, debug_locks = 1 [ 62.315772][ T35] 3 locks held by kworker/u8:2/35: [ 62.320967][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 62.331999][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 62.342660][ T35] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 62.352180][ T35] [ 62.352180][ T35] stack backtrace: [ 62.358102][ T35] CPU: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00691-g69776921e82d #0 [ 62.368501][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 62.378581][ T35] Workqueue: netns cleanup_net [ 62.383484][ T35] Call Trace: [ 62.386786][ T35] [ 62.389734][ T35] dump_stack_lvl+0x241/0x360 [ 62.394445][ T35] ? __pfx_dump_stack_lvl+0x10/0x10 [ 62.399762][ T35] ? __pfx__printk+0x10/0x10 [ 62.404747][ T35] lockdep_rcu_suspicious+0x221/0x340 [ 62.410253][ T35] _destroy_all_sets+0x232/0x5f0 [ 62.415242][ T35] ip_set_net_exit+0x20/0x50 [ 62.419862][ T35] cleanup_net+0x802/0xcc0 [ 62.424320][ T35] ? __pfx_cleanup_net+0x10/0x10 [ 62.429475][ T35] ? process_scheduled_works+0x945/0x1830 [ 62.435225][ T35] process_scheduled_works+0xa2c/0x1830 [ 62.440828][ T35] ? __pfx_process_scheduled_works+0x10/0x10 [ 62.446856][ T35] ? assign_work+0x364/0x3d0 [ 62.451571][ T35] worker_thread+0x86d/0xd70 [ 62.456199][ T35] ? _raw_spin_unlock_irqrestore+0xdd/0x140 2024/06/17 10:55:22 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 62.462123][ T35] ? __kthread_parkme+0x169/0x1d0 [ 62.467161][ T35] ? __pfx_worker_thread+0x10/0x10 [ 62.472263][ T35] kthread+0x2f0/0x390 [ 62.476328][ T35] ? __pfx_worker_thread+0x10/0x10 [ 62.481427][ T35] ? __pfx_kthread+0x10/0x10 [ 62.486095][ T35] ret_from_fork+0x4b/0x80 [ 62.490599][ T35] ? __pfx_kthread+0x10/0x10 [ 62.495185][ T35] ret_from_fork_asm+0x1a/0x30 [ 62.499960][ T35] [ 62.520489][ T5282] workqueue: Failed to create a rescuer kthread for wq "bond0": -EINTR [ 62.574101][ T35] [ 62.585009][ T35] ============================= [ 62.590212][ T35] WARNING: suspicious RCU usage [ 62.595071][ T35] 6.10.0-rc3-syzkaller-00691-g69776921e82d #0 Not tainted [ 62.602539][ T35] ----------------------------- [ 62.607404][ T35] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 62.617445][ T35] [ 62.617445][ T35] other info that might help us debug this: [ 62.617445][ T35] [ 62.628298][ T35] [ 62.628298][ T35] rcu_scheduler_active = 2, debug_locks = 1 [ 62.636669][ T35] 3 locks held by kworker/u8:2/35: [ 62.642292][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 62.653726][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 62.664984][ T35] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 62.674830][ T35] [ 62.674830][ T35] stack backtrace: [ 62.680898][ T35] CPU: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00691-g69776921e82d #0 [ 62.690981][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 62.701144][ T35] Workqueue: netns cleanup_net [ 62.705937][ T35] Call Trace: [ 62.709224][ T35] [ 62.712174][ T35] dump_stack_lvl+0x241/0x360 [ 62.716965][ T35] ? __pfx_dump_stack_lvl+0x10/0x10 [ 62.722443][ T35] ? __pfx