last executing test programs:
493.694994ms ago: executing program 1:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
436.328433ms ago: executing program 2:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)
355.443296ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
116.065542ms ago: executing program 1:
socket(0x10, 0x3, 0x10)
93.997736ms ago: executing program 2:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
0s ago: executing program 0:
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.82' (ED25519) to the list of known hosts.
2024/06/17 01:26:10 fuzzer started
2024/06/17 01:26:11 dialing manager at 10.128.0.163:30035
[ 58.017478][ T5089] cgroup: Unknown subsys name 'net'
[ 58.270594][ T5089] cgroup: Unknown subsys name 'rlimit'
[ 59.465137][ T5104] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/17 01:26:18 starting 3 executor processes
[ 65.802037][ T35]
[ 65.804705][ T35] =============================
[ 65.809586][ T35] WARNING: suspicious RCU usage
[ 65.814526][ T35] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 65.822025][ T35] -----------------------------
[ 65.826962][ T35] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 65.836673][ T35]
[ 65.836673][ T35] other info that might help us debug this:
[ 65.836673][ T35]
[ 65.847001][ T35]
2024/06/17 01:26:19 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 65.847001][ T35] rcu_scheduler_active = 2, debug_locks = 1
[ 65.855303][ T35] 3 locks held by kworker/u8:2/35:
[ 65.860441][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 65.871834][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 65.882737][ T35] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 65.892219][ T35]
[ 65.892219][ T35] stack backtrace:
[ 65.898478][ T35] CPU: 0 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 65.911263][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 65.921325][ T35] Workqueue: netns cleanup_net
[ 65.926109][ T35] Call Trace:
[ 65.929390][ T35]
[ 65.932317][ T35] dump_stack_lvl+0x241/0x360
[ 65.936998][ T35] ? __pfx_dump_stack_lvl+0x10/0x10
[ 65.942183][ T35] ? __pfx__printk+0x10/0x10
[ 65.946790][ T35] lockdep_rcu_suspicious+0x221/0x340
[ 65.952158][ T35] _destroy_all_sets+0x232/0x5f0
[ 65.957123][ T35] ip_set_net_exit+0x20/0x50
[ 65.961815][ T35] cleanup_net+0x802/0xcc0
[ 65.966237][ T35] ? __pfx_cleanup_net+0x10/0x10
[ 65.971295][ T35] ? process_scheduled_works+0x945/0x1830
[ 65.977128][ T35] process_scheduled_works+0xa2c/0x1830
[ 65.982797][ T35] ? __pfx_process_scheduled_works+0x10/0x10
[ 65.988774][ T35] ? assign_work+0x364/0x3d0
[ 65.993463][ T35] worker_thread+0x86d/0xd70
[ 65.998090][ T35] ? __kthread_parkme+0x169/0x1d0
[ 66.003405][ T35] ? __pfx_worker_thread+0x10/0x10
[ 66.008544][ T35] kthread+0x2f0/0x390
[ 66.012875][ T35] ? __pfx_worker_thread+0x10/0x10
[ 66.018067][ T35] ? __pfx_kthread+0x10/0x10
[ 66.022743][ T35] ret_from_fork+0x4b/0x80
[ 66.027166][ T35] ? __pfx_kthread+0x10/0x10
[ 66.031750][ T35] ret_from_fork_asm+0x1a/0x30
[ 66.036521][ T35]
[ 66.052754][ T35]
[ 66.055479][ T35] =============================
[ 66.060488][ T35] WARNING: suspicious RCU usage
[ 66.065431][ T35] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 66.072732][ T35] -----------------------------
[ 66.077594][ T35] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 66.087534][ T35]
[ 66.087534][ T35] other info that might help us debug this:
[ 66.087534][ T35]
[ 66.097878][ T35]
[ 66.097878][ T35] rcu_scheduler_active = 2, debug_locks = 1
[ 66.106513][ T35] 3 locks held by kworker/u8:2/35:
[ 66.111731][ T35] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 66.122827][ T35] #1: ffffc90000ab7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 66.133635][ T35] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 66.143261][ T35]
[ 66.143261][ T35] stack backtrace:
[ 66.149254][ T35] CPU: 1 PID: 35 Comm: kworker/u8:2 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 66.159332][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 66.169412][ T35] Workqueue: netns cleanup_net
[ 66.174440][ T35] Call Trace:
[ 66.177809][ T35]
[ 66.180729][ T35] dump_stack_lvl+0x241/0x360
[ 66.185579][ T35] ? __pfx_dump_stack_lvl+0x10/0x10
[ 66.190773][ T35] ? __pfx__printk+0x10/0x10
[ 66.195499][ T35] lockdep_rcu_suspicious+0x221/0x340
[ 66.200935][ T35] _destroy_all_sets+0x53f/0x5f0
[ 66.205979][ T35] ip_set_net_exit+0x20/0x50
[ 66.210624][ T35] cleanup_net+0x802/0xcc0
[ 66.215055][ T35] ? __pfx_cleanup_net+0x10/0x10
[ 66.219997][ T35] ? process_scheduled_works+0x945/0x1830
[ 66.225727][ T35] process_scheduled_works+0xa2c/0x1830
[ 66.231575][ T35] ? __pfx_process_scheduled_works+0x10/0x10
[ 66.237596][ T35] ? assign_work+0x364/0x3d0
[ 66.242301][ T35] worker_thread+0x86d/0xd70
[ 66.246917][ T35] ? __kthread_parkme+0x169/0x1d0
[ 66.251980][ T35] ? __pfx_worker_thread+0x10/0x10
[ 66.257120][ T35] kthread+0x2f0/0x390
[ 66.261207][ T35] ? __pfx_worker_thread+0x10/0x10
[ 66.266404][ T35] ? __pfx_kthread+0x10/0x10
[ 66.270998][ T35] ret_from_fork+0x4b/0x80
[ 66.275599][ T35] ? __pfx_kthread+0x10/0x10
[ 66.280446][ T35] ret_from_fork_asm+0x1a/0x30
[ 66.285392][ T35]