last executing test programs: 631.129987ms ago: executing program 1: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 618.865499ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 551.93639ms ago: executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 266.552367ms ago: executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 240.484091ms ago: executing program 0: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 206.319316ms ago: executing program 2: socket(0x10, 0x3, 0x10) 0s ago: executing program 0: mmap(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.5' (ED25519) to the list of known hosts. 2024/06/16 11:23:46 fuzzer started 2024/06/16 11:23:47 dialing manager at 10.128.0.163:30035 [ 53.833267][ T5095] cgroup: Unknown subsys name 'net' [ 54.067460][ T5095] cgroup: Unknown subsys name 'rlimit' [ 55.264254][ T5115] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/16 11:23:56 starting 3 executor processes [ 64.287016][ T11] [ 64.289546][ T11] ============================= [ 64.295038][ T11] WARNING: suspicious RCU usage [ 64.300178][ T11] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 64.307467][ T11] ----------------------------- [ 64.312713][ T11] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 64.322597][ T11] [ 64.322597][ T11] other info that might help us debug this: [ 64.322597][ T11] [ 64.333037][ T11] [ 64.333037][ T11] rcu_scheduler_active = 2, debug_locks = 1 [ 64.341310][ T11] 3 locks held by kworker/u8:0/11: [ 64.347905][ T11] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 64.358955][ T11] #1: ffffc90000107d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 64.369621][ T11] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 64.379444][ T11] [ 64.379444][ T11] stack backtrace: [ 64.385433][ T11] CPU: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 [ 64.395778][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 64.405916][ T11] Workqueue: netns cleanup_net [ 64.410702][ T11] Call Trace: [ 64.413982][ T11] [ 64.416904][ T11] dump_stack_lvl+0x241/0x360 [ 64.421579][ T11] ? __pfx_dump_stack_lvl+0x10/0x10 [ 64.426767][ T11] ? __pfx__printk+0x10/0x10 [ 64.431356][ T11] lockdep_rcu_suspicious+0x221/0x340 [ 64.436722][ T11] _destroy_all_sets+0x232/0x5f0 [ 64.441663][ T11] ip_set_net_exit+0x20/0x50 [ 64.446249][ T11] cleanup_net+0x802/0xcc0 [ 64.450751][ T11] ? __pfx_cleanup_net+0x10/0x10 [ 64.455774][ T11] ? process_scheduled_works+0x945/0x1830 [ 64.461503][ T11] process_scheduled_works+0xa2c/0x1830 [ 64.467082][ T11] ? __pfx_process_scheduled_works+0x10/0x10 [ 64.473091][ T11] ? assign_work+0x364/0x3d0 [ 64.477772][ T11] worker_thread+0x86d/0xd70 [ 64.482450][ T11] ? __kthread_parkme+0x169/0x1d0 2024/06/16 11:23:57 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 64.487464][ T11] ? __pfx_worker_thread+0x10/0x10 [ 64.492565][ T11] kthread+0x2f0/0x390 [ 64.496624][ T11] ? __pfx_worker_thread+0x10/0x10 [ 64.501723][ T11] ? __pfx_kthread+0x10/0x10 [ 64.506303][ T11] ret_from_fork+0x4b/0x80 [ 64.510901][ T11] ? __pfx_kthread+0x10/0x10 [ 64.515579][ T11] ret_from_fork_asm+0x1a/0x30 [ 64.520349][ T11] [ 64.623574][ T11] [ 64.625958][ T11] ============================= [ 64.631029][ T11] WARNING: suspicious RCU usage [ 64.635957][ T11] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 64.643225][ T11] ----------------------------- [ 64.648085][ T11] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage! [ 64.658076][ T11] [ 64.658076][ T11] other info that might help us debug this: [ 64.658076][ T11] [ 64.668432][ T11] [ 64.668432][ T11] rcu_scheduler