last executing test programs: 412.722523ms ago: executing program 3: futimesat(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000)) 398.002546ms ago: executing program 3: open_tree(0xffffffffffffffff, &(0x7f0000000000), 0x0) 379.615079ms ago: executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control', 0x800, 0x0) 324.827818ms ago: executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/lightnvm/control', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/lightnvm/control', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/lightnvm/control', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/lightnvm/control', 0x800, 0x0) 302.315401ms ago: executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0', 0x800, 0x0) 272.562576ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice', 0x800, 0x0) 258.922388ms ago: executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/adsp1', 0x800, 0x0) 231.192933ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/img-rogue', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/img-rogue', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/img-rogue', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/img-rogue', 0x800, 0x0) 213.499506ms ago: executing program 2: mremap(0x0, 0x0, 0x0, 0x0, 0x0) 208.154226ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cdrom', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cdrom', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cdrom', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cdrom', 0x800, 0x0) 191.760969ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cdrom1', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cdrom1', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cdrom1', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cdrom1', 0x800, 0x0) 182.706171ms ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans', 0x1, 0x0) 167.736963ms ago: executing program 0: pselect6(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000)) 163.316004ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/netlabel', 0x2, 0x0) 160.329974ms ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/revoke-subject', 0x2, 0x0) 142.420907ms ago: executing program 4: chroot(&(0x7f0000000000)) 130.701459ms ago: executing program 1: poll(&(0x7f0000000000), 0x0, 0x0) 130.275819ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3', 0x800, 0x0) 123.69298ms ago: executing program 4: lstat(&(0x7f0000000000), &(0x7f0000000000)) 120.464711ms ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/load', 0x2, 0x0) 110.462452ms ago: executing program 4: epoll_create1(0x0) 100.233414ms ago: executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey', 0x800, 0x0) 82.669907ms ago: executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable', 0x2, 0x0) 77.397907ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun', 0x800, 0x0) 74.301608ms ago: executing program 4: pivot_root(&(0x7f0000000000), &(0x7f0000000000)) 63.0333ms ago: executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) 61.04999ms ago: executing program 2: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0) 48.883612ms ago: executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy', 0x0, 0x0) 45.524713ms ago: executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37', 0x2, 0x0) 0s ago: executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs', 0x800, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.222' (ED25519) to the list of known hosts. 2024/06/19 03:43:43 fuzzer started 2024/06/19 03:43:44 dialing manager at 10.128.0.163:30033 [ 58.196082][ T5078] cgroup: Unknown subsys name 'net' [ 58.471127][ T5078] cgroup: Unknown subsys name 'rlimit' [ 59.581053][ T5081] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/19 03:43:51 starting 5 executor processes [ 68.471531][ T2846] [ 68.474036][ T2846] ============================= [ 68.478997][ T2846] WARNING: suspicious RCU usage [ 68.483896][ T2846] 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0 Not tainted [ 68.491194][ T2846] ----------------------------- [ 68.496237][ T2846] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 68.505961][ T2846] [ 68.505961][ T2846] other info that might help us debug this: [ 68.505961][ T2846] [ 68.516245][ T2846] [ 68.516245][ T2846] rcu_scheduler_active = 2, debug_locks = 1 [ 68.524553][ T2846] 3 locks held by kworker/u8:10/2846: [ 68.530030][ T2846] #0: ffff888015ed3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 68.541039][ T2846] #1: ffffc90009af7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 68.551699][ T2846] #2: ffffffff8f5c7c10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 68.561219][ T2846] [ 68.561219][ T2846] stack backtrace: 2024/06/19 03:43:54 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 68.567467][ T2846] CPU: 1 PID: 2846 Comm: kworker/u8:10 Not tainted 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0 [ 68.577904][ T2846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 68.587987][ T2846] Workqueue: netns cleanup_net [ 68.592807][ T2846] Call Trace: [ 68.596111][ T2846] [ 68.599058][ T2846] dump_stack_lvl+0x241/0x360 [ 68.603782][ T2846] ? __pfx_dump_stack_lvl+0x10/0x10 [ 68.609102][ T2846] ? __pfx__printk+0x10/0x10 [ 68.613833][ T2846] lockdep_rcu_suspicious+0x221/0x340 [ 68.619253][ T2846] _destroy_all_sets+0x232/0x5f0 [ 68.624204][ T2846] ip_set_net_exit+0x20/0x50 [ 68.628801][ T2846] cleanup_net+0x802/0xcc0 [ 68.633224][ T2846] ? __pfx_cleanup_net+0x10/0x10 [ 68.638169][ T2846] ? process_scheduled_works+0x945/0x1830 [ 68.643899][ T2846] process_scheduled_works+0xa2c/0x1830 [ 68.649456][ T2846] ? __pfx_process_scheduled_works+0x10/0x10 [ 68.655529][ T2846] ? assign_work+0x364/0x3d0 [ 68.660157][ T2846] worker_thread+0x86d/0xd70 [ 68.664747][ T2846] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 68.670651][ T2846] ? __kthread_parkme+0x169/0x1d0 [ 68.675675][ T2846] ? __pfx_worker_thread+0x10/0x10 [ 68.680864][ T2846] kthread+0x2f0/0x390 [ 68.684927][ T2846] ? __pfx_worker_thread+0x10/0x10 [ 68.690051][ T2846] ? __pfx_kthread+0x10/0x10 [ 68.694651][ T2846] ret_from_fork+0x4b/0x80 [ 68.699072][ T2846] ? __pfx_kthread+0x10/0x10 [ 68.703922][ T2846] ret_from_fork_asm+0x1a/0x30 [ 68.708700][ T2846] [ 68.712525][ T2846] [ 68.714887][ T2846] ============================= [ 68.719818][ T2846] WARNING: suspicious RCU usage [ 68.724679][ T2846] 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0 Not tainted [ 68.731953][ T2846] ----------------------------- [ 68.737061][ T2846] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 68.746751][ T2846] [ 68.746751][ T2846] other info that might help us debug this: [ 68.746751][ T2846] [ 68.757051][ T2846] [ 68.757051][ T2846] rcu_scheduler_active = 2, debug_locks = 1 [ 68.765140][ T2846] 3 locks held by kworker/u8:10/2846: [ 68.770596][ T2846] #0: ffff888015ed3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 68.781627][ T2846] #1: ffffc90009af7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 68.792269][ T2846] #2: ffffffff8f5c7c10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 68.802046][ T2846] [ 68.802046][ T2846] stack backtrace: [ 68.808105][ T2846] CPU: 0 PID: 2846 Comm: kworker/u8:10 Not tainted 6.10.0-rc4-syzkaller-00045-g92e5605a199e #0 [ 68.818545][ T2846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 68.828626][ T2846] Workqueue: netns cleanup_net [ 68.833431][ T2846] Call Trace: [ 68.836724][ T2846] [ 68.839670][ T2846] dump_stack_lvl+0x241/0x360 [ 68.844396][ T2846] ? __pfx_dump_stack_lvl+0x10/0x10 [ 68.849627][ T2846] ? __pfx__printk+0x10/0x10 [ 68.854248][ T2846] lockdep_rcu_suspicious+0x221/0x340 [ 68.859733][ T2846] _destroy_all_sets+0x53f/0x5f0 [ 68.864712][ T2846] ip_set_net_exit+0x20/0x50 [ 68.869336][ T2846] cleanup_net+0x802/0xcc0 [ 68.873777][ T2846] ? __pfx_cleanup_net+0x10/0x10 [ 68.878757][ T2846] ? process_scheduled_works+0x945/0x1830 [ 68.884508][ T2846] process_scheduled_works+0xa2c/0x1830 [ 68.890121][ T2846] ? __pfx_process_scheduled_works+0x10/0x10 [ 68.896139][ T2846] ? assign_work+0x364/0x3d0 [ 68.900764][ T2846] worker_thread+0x86d/0xd70 [ 68.905396][ T2846] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 68.911336][ T2846] ? __kthread_parkme+0x169/0x1d0 [ 68.916397][ T2846] ? __pfx_worker_thread+0x10/0x10 [ 68.921545][ T2846] kthread+0x2f0/0x390 [ 68.925649][ T2846] ? __pfx_worker_thread+0x10/0x10 [ 68.930783][ T2846] ? __pfx_kthread+0x10/0x10 [ 68.935409][ T2846] ret_from_fork+0x4b/0x80 [ 68.939863][ T2846] ? __pfx_kthread+0x10/0x10 [ 68.944501][ T2846] ret_from_fork_asm+0x1a/0x30 [ 68.949325][ T2846]