last executing test programs:
477.703224ms ago: executing program 2:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
472.976825ms ago: executing program 1:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
457.011128ms ago: executing program 0:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)
142.921221ms ago: executing program 1:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
103.118459ms ago: executing program 2:
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))
0s ago: executing program 0:
bind(0xffffffffffffffff, &(0x7f0000000000), 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.34' (ED25519) to the list of known hosts.
2024/06/16 23:16:26 fuzzer started
2024/06/16 23:16:26 dialing manager at 10.128.0.163:30035
[ 59.339581][ T5089] cgroup: Unknown subsys name 'net'
[ 59.599081][ T5089] cgroup: Unknown subsys name 'rlimit'
[ 60.744327][ T5098] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/16 23:16:33 starting 3 executor processes
[ 66.675145][ T2914]
[ 66.677656][ T2914] =============================
[ 66.683088][ T2914] WARNING: suspicious RCU usage
[ 66.688218][ T2914] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 66.695625][ T2914] -----------------------------
[ 66.700645][ T2914] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 66.710528][ T2914]
[ 66.710528][ T2914] other info that might help us debug this:
[ 66.710528][ T2914]
[ 66.721123][ T2914]
[ 66.721123][ T2914] rcu_scheduler_active = 2, debug_locks = 1
[ 66.729280][ T2914] 3 locks held by kworker/u8:10/2914:
[ 66.734815][ T2914] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 66.746342][ T2914] #1: ffffc90009a9fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 66.757183][ T2914] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 66.766895][ T2914]
[ 66.766895][ T2914] stack backtrace:
[ 66.772887][ T2914] CPU: 0 PID: 2914 Comm: kworker/u8:10 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 66.783237][ T2914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 66.793336][ T2914] Workqueue: netns cleanup_net
[ 66.798152][ T2914] Call Trace:
[ 66.801461][ T2914]
[ 66.804496][ T2914] dump_stack_lvl+0x241/0x360
[ 66.809289][ T2914] ? __pfx_dump_stack_lvl+0x10/0x10
[ 66.814513][ T2914] ? __pfx__printk+0x10/0x10
[ 66.819147][ T2914] lockdep_rcu_suspicious+0x221/0x340
[ 66.824987][ T2914] _destroy_all_sets+0x232/0x5f0
[ 66.829959][ T2914] ip_set_net_exit+0x20/0x50
[ 66.834680][ T2914] cleanup_net+0x802/0xcc0
[ 66.839146][ T2914] ? __pfx_cleanup_net+0x10/0x10
[ 66.844214][ T2914] ? process_scheduled_works+0x945/0x1830
[ 66.850243][ T2914] process_scheduled_works+0xa2c/0x1830
[ 66.856024][ T2914] ? __pfx_process_scheduled_works+0x10/0x10
[ 66.862049][ T2914] ? assign_work+0x364/0x3d0
[ 66.866674][ T2914] worker_thread+0x86d/0xd70
2024/06/16 23:16:34 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 66.871304][ T2914] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 66.877228][ T2914] ? __kthread_parkme+0x169/0x1d0
[ 66.882286][ T2914] ? __pfx_worker_thread+0x10/0x10
[ 66.887396][ T2914] kthread+0x2f0/0x390
[ 66.891463][ T2914] ? __pfx_worker_thread+0x10/0x10
[ 66.896649][ T2914] ? __pfx_kthread+0x10/0x10
[ 66.901263][ T2914] ret_from_fork+0x4b/0x80
[ 66.905858][ T2914] ? __pfx_kthread+0x10/0x10
[ 66.910615][ T2914] ret_from_fork_asm+0x1a/0x30
[ 66.915646][ T2914]
[ 66.931257][ T2914]
[ 66.933731][ T2914] =============================
[ 66.938757][ T2914] WARNING: suspicious RCU usage
[ 66.943952][ T2914] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 66.951625][ T2914] -----------------------------
[ 66.956519][ T2914] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 66.966537][ T2914]
[ 66.966537][ T2914] other info that might help us debug this:
[ 66.966537][ T2914]
[ 66.976886][ T2914]
[ 66.976886][ T2914] rcu_scheduler_active = 2, debug_locks = 1
[ 66.985410][ T2914] 3 locks held by kworker/u8:10/2914:
[ 66.991239][ T2914] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 67.002483][ T2914] #1: ffffc90009a9fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 67.013943][ T2914] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 67.024190][ T2914]
[ 67.024190][ T2914] stack backtrace:
[ 67.030391][ T2914] CPU: 1 PID: 2914 Comm: kworker/u8:10 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 67.040768][ T2914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 67.050946][ T2914] Workqueue: netns cleanup_net
[ 67.055766][ T2914] Call Trace:
[ 67.059050][ T2914]
[ 67.062107][ T2914] dump_stack_lvl+0x241/0x360
[ 67.066875][ T2914] ? __pfx_dump_stack_lvl+0x10/0x10
[ 67.072185][ T2914] ? __pfx__printk+0x10/0x10
[ 67.076792][ T2914] lockdep_rcu_suspicious+0x221/0x340
[ 67.082162][ T2914] _destroy_all_sets+0x53f/0x5f0
[ 67.087100][ T2914] ip_set_net_exit+0x20/0x50
[ 67.091682][ T2914] cleanup_net+0x802/0xcc0
[ 67.096103][ T2914] ? __pfx_cleanup_net+0x10/0x10
[ 67.101049][ T2914] ? process_scheduled_works+0x945/0x1830
[ 67.106765][ T2914] process_scheduled_works+0xa2c/0x1830
[ 67.112497][ T2914] ? __pfx_process_scheduled_works+0x10/0x10
[ 67.118648][ T2914] ? assign_work+0x364/0x3d0
[ 67.123287][ T2914] worker_thread+0x86d/0xd70
[ 67.127898][ T2914] ? _raw_spin_unlock_irqrestor