last executing test programs: 278.596836ms ago: executing program 2: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 83.020017ms ago: executing program 1: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 51.471512ms ago: executing program 2: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.141' (ED25519) to the list of known hosts. 2024/06/17 20:30:21 fuzzer started 2024/06/17 20:30:21 dialing manager at 10.128.0.163:30035 syzkaller login: [ 58.521323][ T5094] cgroup: Unknown subsys name 'net' [ 58.872925][ T5094] cgroup: Unknown subsys name 'rlimit' [ 59.952986][ T5105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/17 20:30:29 starting 3 executor processes [ 66.437794][ T11] [ 66.440349][ T11] ============================= [ 66.445227][ T11] WARNING: suspicious RCU usage [ 66.450169][ T11] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted [ 66.457293][ T11] ----------------------------- [ 66.462219][ T11] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 66.472111][ T11] [ 66.472111][ T11] other info that might help us debug this: [ 66.472111][ T11] [ 66.482547][ T11] [ 66.482547][ T11] rcu_scheduler_active = 2, debug_locks = 1 [ 66.490851][ T11] 3 locks held by kworker/u8:0/11: [ 66.495983][ T11] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 66.507418][ T11] #1: ffffc90000107d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 66.518313][ T11] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 66.528157][ T11] [ 66.528157][ T11] stack backtrace: [ 66.534090][ T11] CPU: 1 PID: 11 Comm: kworker/u8:0 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 [ 66.544265][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 66.554435][ T11] Workqueue: netns cleanup_net [ 66.559253][ T11] Call Trace: [ 66.562550][ T11] [ 66.565484][ T11] dump_stack_lvl+0x241/0x360 [ 66.570276][ T11] ? __pfx_dump_stack_lvl+0x10/0x10 [ 66.575591][ T11] ? __pfx__printk+0x10/0x10 [ 66.580226][ T11] lockdep_rcu_suspicious+0x221/0x340 [ 66.585642][ T11] _destroy_all_sets+0x232/0x5f0 [ 66.590636][ T11] ip_set_net_exit+0x20/0x50 [ 66.595271][ T11] cleanup_net+0x802/0xcc0 [ 66.599731][ T11] ? __pfx_cleanup_net+0x10/0x10 [ 66.604718][ T11] ? process_scheduled_works+0x945/0x1830 [ 66.610466][ T11] process_scheduled_works+0xa2c/0x1830 [ 66.616087][ T11] ? __pfx_process_scheduled_works+0x10/0x10 [ 66.622109][ T11] ? assign_work+0x364/0x3d0 [ 66.626738][ T11] worker_thread+0x86d/0xd70 [ 66.631366][ T11] ? __kthread_parkme+0x169/0x1d0 2024/06/17 20:30:29 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 66.636393][ T11] ? __pfx_worker_thread+0x10/0x10 [ 66.641616][ T11] kthread+0x2f0/0x390 [ 66.645691][ T11] ? __pfx_worker_thread+0x10/0x10 [ 66.650826][ T11] ? __pfx_kthread+0x10/0x10 [ 66.655438][ T11] ret_from_fork+0x4b/0x80 [ 66.659946][ T11] ? __pfx_kthread+0x10/0x10 [ 66.664529][ T11] ret_from_fork_asm+0x1a/0x30 [ 66.669298][ T11] [ 66.689787][ T11] [ 66.692161][ T11] ============================= [ 66.697014][ T11] WARNING: suspicious RCU usage [ 66.702412][ T11] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted [ 66.709778][ T11] ----------------------------- [ 66.714646][ T11] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 66.724348][ T11] [ 66.724348][ T11] other info that might help us debug this: [ 66.724348][ T11] [ 66.734644][ T11] [ 66.734644][ T11] rcu_scheduler_active = 2, debug_locks = 1 [ 66.742780][ T11] 3 locks held by kworker/u8:0/11: [ 66.747908][ T11] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 66.758935][ T11] #1: ffffc90000107d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 66.769590][ T11] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 66.779098][ T11] [ 66.779098][ T11] stack backtrace: [ 66.784995][ T11] CPU: 0 PID: 11 Comm: kworker/u8:0 Not t