last executing test programs: 397.221859ms ago: executing program 1: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) 301.980944ms ago: executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 151.632237ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 42.983174ms ago: executing program 1: recvfrom(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2: sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.120' (ED25519) to the list of known hosts. 2024/06/20 02:08:30 fuzzer started 2024/06/20 02:08:30 dialing manager at 10.128.0.163:30035 syzkaller login: [ 55.004681][ T5090] cgroup: Unknown subsys name 'net' [ 55.292432][ T5090] cgroup: Unknown subsys name 'rlimit' [ 56.391207][ T5092] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/20 02:08:36 starting 3 executor processes [ 61.886878][ T12] [ 61.889466][ T12] ============================= [ 61.894339][ T12] WARNING: suspicious RCU usage [ 61.899380][ T12] 6.10.0-rc3-syzkaller-00750-g7e8fcb815432 #0 Not tainted [ 61.906501][ T12] ----------------------------- [ 61.911427][ T12] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 61.921131][ T12] [ 61.921131][ T12] other info that might help us debug this: [ 61.921131][ T12] [ 61.931441][ T12] [ 61.931441][ T12] rcu_scheduler_active = 2, debug_locks = 1 [ 61.939841][ T12] 3 locks held by kworker/u8:1/12: [ 61.944996][ T12] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 61.956018][ T12] #1: ffffc90000117d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 61.966739][ T12] #2: ffffffff8f5da110 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 61.976291][ T12] [ 61.976291][ T12] stack backtrace: 2024/06/20 02:08:37 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 61.982362][ T12] CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc3-syzkaller-00750-g7e8fcb815432 #0 [ 61.992452][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 62.002627][ T12] Workqueue: netns cleanup_net [ 62.007447][ T12] Call Trace: [ 62.010747][ T12] [ 62.013694][ T12] dump_stack_lvl+0x241/0x360 [ 62.018399][ T12] ? __pfx_dump_stack_lvl+0x10/0x10 [ 62.023625][ T12] ? __pfx__printk+0x10/0x10 [ 62.028261][ T12] lockdep_rcu_suspicious+0x221/0x340 [ 62.033678][ T12] _destroy_all_sets+0x232/0x5f0 [ 62.038665][ T12] ip_set_net_exit+0x20/0x50 [ 62.043298][ T12] cleanup_net+0x802/0xcc0 [ 62.047739][ T12] ? __pfx_cleanup_net+0x10/0x10 [ 62.052706][ T12] ? process_scheduled_works+0x945/0x1830 [ 62.058442][ T12] process_scheduled_works+0xa2c/0x1830 [ 62.064126][ T12] ? __pfx_process_scheduled_works+0x10/0x10 [ 62.070223][ T12] ? assign_work+0x364/0x3d0 [ 62.074831][ T12] worker_thread+0x86d/0xd70 [ 62.079548][ T12] ? __kthread_parkme+0x169/0x1d0 [ 62.084589][ T12] ? __pfx_worker_thread+0x10/0x10 [ 62.089722][ T12] kthread+0x2f0/0x390 [ 62.093823][ T12] ? __pfx_worker_thread+0x10/0x10 [ 62.098936][ T12] ? __pfx_kthread+0x10/0x10 [ 62.103675][ T12] ret_from_fork+0x4b/0x80 [ 62.108104][ T12] ? __pfx_kthread+0x10/0x10 [ 62.112705][ T12] ret_from_fork_asm+0x1a/0x30 [ 62.117498][ T12] [ 62.127707][ T12] [ 62.130128][ T12] ============================= [ 62.134979][ T12] WARNING: susp