last executing test programs: 477.906235ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 409.552445ms ago: executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 400.688467ms ago: executing program 1: shutdown(0xffffffffffffffff, 0x0) 109.524882ms ago: executing program 1: connect(0xffffffffffffffff, &(0x7f0000000000), 0x0) 72.767388ms ago: executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 0: socket(0x10, 0x3, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.22' (ED25519) to the list of known hosts. 2024/06/18 10:23:08 fuzzer started 2024/06/18 10:23:08 dialing manager at 10.128.0.163:30035 [ 53.558953][ T5088] cgroup: Unknown subsys name 'net' [ 53.793283][ T5088] cgroup: Unknown subsys name 'rlimit' [ 54.928572][ T5096] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/18 10:23:15 starting 3 executor processes [ 61.374538][ T80] [ 61.377439][ T80] ============================= [ 61.382312][ T80] WARNING: suspicious RCU usage [ 61.387472][ T80] 6.10.0-rc3-syzkaller-00700-gefb459303dd5 #0 Not tainted [ 61.394603][ T80] ----------------------------- [ 61.400123][ T80] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 61.410118][ T80] [ 61.410118][ T80] other info that might help us debug this: [ 61.410118][ T80] [ 61.420652][ T80] 2024/06/18 10:23:16 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 61.420652][ T80] rcu_scheduler_active = 2, debug_locks = 1 [ 61.429189][ T80] 3 locks held by kworker/u8:4/80: [ 61.434840][ T80] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 61.446091][ T80] #1: ffffc900015d7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 61.457030][ T80] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 61.466930][ T80] [ 61.466930][ T80] stack backtrace: [ 61.472844][ T80] CPU: 0 PID: 80 Comm: kworker/u8:4 Not tainted 6.10.0-rc3-syzkaller-00700-gefb459303dd5 #0 [ 61.482925][ T80] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 61.493002][ T80] Workqueue: netns cleanup_net [ 61.497814][ T80] Call Trace: [ 61.501106][ T80] [ 61.504047][ T80] dump_stack_lvl+0x241/0x360 [ 61.508750][ T80] ? __pfx_dump_stack_lvl+0x10/0x10 [ 61.513972][ T80] ? __pfx__printk+0x10/0x10 [ 61.518633][ T80] lockdep_rcu_suspicious+0x221/0x340 [ 61.524047][ T80] _destroy_all_sets+0x232/0x5f0 [ 61.529027][ T80] ip_set_net_exit+0x20/0x50 [ 61.533646][ T80] cleanup_net+0x802/0xcc0 [ 61.538104][ T80] ? __pfx_cleanup_net+0x10/0x10 [ 61.543087][ T80] ? process_scheduled_works+0x945/0x1830 [ 61.548829][ T80] process_scheduled_works+0xa2c/0x1830 [ 61.554427][ T80] ? __pfx_process_scheduled_works+0x10/0x10 [ 61.560439][ T80] ? assign_work+0x364/0x3d0 [ 61.565055][ T80] worker_thread+0x86d/0xd70 [ 61.569690][ T80] ? __kthread_parkme+0x169/0x1d0 [ 61.574748][ T80] ? __pfx_worker_thread+0x10/0x10 [ 61.579889][ T80] kthread+0x2f0/0x390 [ 61.583960][ T80] ? __pfx_worker_thread+0x10/0x10 [ 61.589081][ T80] ? __pfx_kthread+0x10/0x10 [ 61.593754][ T80] ret_from_fork+0x4b/0x80 [ 61.598169][ T80] ? __pfx_kthread+0x10/0x10 [ 61.602755][ T80] ret_from_fork_asm+0x1a/0x30 [ 61.607526][ T80] [ 61.612240][ T80] [ 61.614611][ T80] ============================= [ 61.619860][ T80] WARNING: suspicious RCU usage [ 61.625121][ T80] 6.10.0-rc3-syzkaller-00700-gefb459303dd5 #0 Not tainted [ 61.632243][ T80] ----------------------------- [ 61.637405][ T80] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 61.647378][ T80] [ 61.647378][ T80] other info that might help us debug this: [ 61.647378][ T80] [ 61.657983][ T80] [ 61.657983][ T80] rcu_scheduler_active = 2, debug_locks = 1 [ 61.666343][ T80] 3 locks held by kworker/u8:4/80: [ 61.671466][ T80] #0: ffff888015edd948 ((wq_c