last executing test programs: 464.771608ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 437.335012ms ago: executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 379.326491ms ago: executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 83.247956ms ago: executing program 0: bind(0xffffffffffffffff, &(0x7f0000000000), 0x0) 27.165725ms ago: executing program 2: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) 0s ago: executing program 1: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.81' (ED25519) to the list of known hosts. 2024/06/20 13:46:49 fuzzer started 2024/06/20 13:46:50 dialing manager at 10.128.0.163:30035 [ 67.192204][ T5088] cgroup: Unknown subsys name 'net' [ 67.409440][ T5088] cgroup: Unknown subsys name 'rlimit' [ 68.649734][ T5096] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 72.512007][ T1246] ieee802154 phy0 wpan0: encryption failed: -22 [ 72.518639][ T1246] ieee802154 phy1 wpan1: encryption failed: -22 2024/06/20 13:46:57 starting 3 executor processes [ 74.865079][ T2900] [ 74.867728][ T2900] ============================= [ 74.873810][ T2900] WARNING: suspicious RCU usage [ 74.879054][ T2900] 6.10.0-rc3-syzkaller-00755-ga012f9a752a5 #0 Not tainted [ 74.887111][ T2900] ----------------------------- [ 74.892300][ T2900] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 74.902287][ T2900] [ 74.902287][ T2900] other info that might help us debug this: [ 74.902287][ T2900] [ 74.913175][ T2900] [ 74.913175][ T2900] rcu_scheduler_active = 2, debug_locks = 1 [ 74.922040][ T2900] 3 locks held by kworker/u8:8/2900: [ 74.927537][ T2900] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 74.939321][ T2900] #1: ffffc90009dd7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 74.950622][ T2900] #2: ffffffff8f5da110 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 74.960814][ T2900] 2024/06/20 13:46:58 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 74.960814][ T2900] stack backtrace: [ 74.967009][ T2900] CPU: 0 PID: 2900 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00755-ga012f9a752a5 #0 [ 74.977717][ T2900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 74.987991][ T2900] Workqueue: netns cleanup_net [ 74.993207][ T2900] Call Trace: [ 74.996973][ T2900] [ 75.000130][ T2900] dump_stack_lvl+0x241/0x360 [ 75.004958][ T2900] ? __pfx_dump_stack_lvl+0x10/0x10 [ 75.011186][ T2900] ? __pfx__printk+0x10/0x10 [ 75.016269][ T2900] lockdep_rcu_suspicious+0x221/0x340 [ 75.021703][ T2900] _destroy_all_sets+0x232/0x5f0 [ 75.026945][ T2900] ip_set_net_exit+0x20/0x50 [ 75.031714][ T2900] cleanup_net+0x802/0xcc0 [ 75.037239][ T2900] ? __pfx_cleanup_net+0x10/0x10 [ 75.042418][ T2900] ? process_scheduled_works+0x945/0x1830 [ 75.048699][ T2900] process_scheduled_works+0xa2c/0x1830 [ 75.054309][ T2900] ? __pfx_process_scheduled_works+0x10/0x10 [ 75.060326][ T2900] ? assign_work+0x364/0x3d0 [ 75.064957][ T2900] worker_thread+0x86d/0xd70 [ 75.070575][ T2900] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 75.076776][ T2900] ? __kthread_parkme+0x169/0x1d0 [ 75.081936][ T2900] ? __pfx_worker_thread+0x10/0x10 [ 75.087306][ T2900] kthread+0x2f0/0x390 [ 75.091557][ T2900] ? __pfx_worker_thread+0x10/0x10 [ 75.096681][ T2900] ? __pfx_kthread+0x10/0x10 [ 75.101288][ T2900] ret_from_fork+0x4b/0x80 [ 75.105749][ T2900] ? __pfx_kthread+0x10/0x10 [ 75.110361][ T2900] ret_from_fork_asm+0x1a/0x30 [ 75.115146][ T2900] [ 75.124636][ T2900] [ 75.127098][ T2900] ============================= [ 75.132196][ T2900] WARNING: suspicious RCU usage [ 75.137511][ T2900] 6.10.0-rc3-syzkaller-00755-ga012f9a752a5 #0 Not tainted [ 75.145061][ T2900] ----------------------------- [ 75.150312][ T2900] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 75.160473][ T2900] [ 75.160473][ T2900] other info that might help us debug this: [ 75.160473][ T2900] [ 75.171071][ T2900] [ 75.171071][ T2900] rcu_scheduler_active = 2, debug_locks = 1 [ 75.180074][ T2900] 3 locks held by kworker/u8:8/2900: [ 75.185564][ T2900] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 75.196572][ T2900] #1: ffffc90009dd7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 75.207428][ T2900] #2: ffffffff8f5da110 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [