last executing test programs:
505.189702ms ago: executing program 0:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
493.122604ms ago: executing program 1:
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))
457.919599ms ago: executing program 2:
bind(0xffffffffffffffff, &(0x7f0000000000), 0x0)
149.533367ms ago: executing program 2:
getpeername(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000))
144.188998ms ago: executing program 0:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
0s ago: executing program 1:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.164' (ED25519) to the list of known hosts.
2024/06/17 18:19:22 fuzzer started
2024/06/17 18:19:22 dialing manager at 10.128.0.163:30035
syzkaller login: [ 58.841727][ T5091] cgroup: Unknown subsys name 'net'
[ 59.167152][ T5091] cgroup: Unknown subsys name 'rlimit'
[ 60.242174][ T5099] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/17 18:19:29 starting 3 executor processes
[ 66.667327][ T51]
[ 66.669892][ T51] =============================
[ 66.675209][ T51] WARNING: suspicious RCU usage
[ 66.680357][ T51] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted
[ 66.687856][ T51] -----------------------------
[ 66.693182][ T51] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 66.703057][ T51]
[ 66.703057][ T51] other info that might help us debug this:
[ 66.703057][ T51]
[ 66.713693][ T51]
[ 66.713693][ T51] rcu_scheduler_active = 2, debug_locks = 1
[ 66.722078][ T51] 3 locks held by kworker/u8:3/51:
[ 66.727273][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 66.738408][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 66.749272][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 66.758976][ T51]
[ 66.758976][ T51] stack backtrace:
[ 66.765453][ T51] CPU: 1 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0
[ 66.775827][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 66.786249][ T51] Workqueue: netns cleanup_net
[ 66.791201][ T51] Call Trace:
[ 66.794567][ T51]
[ 66.797574][ T51] dump_stack_lvl+0x241/0x360
[ 66.802246][ T51] ? __pfx_dump_stack_lvl+0x10/0x10
[ 66.807462][ T51] ? __pfx__printk+0x10/0x10
[ 66.812242][ T51] lockdep_rcu_suspicious+0x221/0x340
[ 66.817706][ T51] _destroy_all_sets+0x232/0x5f0
[ 66.822873][ T51] ip_set_net_exit+0x20/0x50
[ 66.827568][ T51] cleanup_net+0x802/0xcc0
[ 66.831984][ T51] ? __pfx_cleanup_net+0x10/0x10
[ 66.836951][ T51] ? process_scheduled_works+0x945/0x1830
[ 66.842748][ T51] process_scheduled_works+0xa2c/0x1830
[ 66.848307][ T51] ? __pfx_process_scheduled_works+0x10/0x10
[ 66.854393][ T51] ? assign_work+0x364/0x3d0
[ 66.859014][ T51] worker_thread+0x86d/0xd70
[ 66.863642][ T51] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 66.869730][ T51] ? __kthread_parkme+0x169/0x1d0
[ 66.874795][ T51] ? __pfx_worker_thread+0x10/0x10
[ 66.879905][ T51] kthread+0x2f0/0x390
[ 66.883981][ T51] ? __pfx_worker_thread+0x10/0x10
[ 66.889135][ T51] ? __pfx_kthread+0x10/0x10
[ 66.893809][ T51] ret_from_fork+0x4b/0x80
[ 66.898605][ T51] ? __pfx_kthread+0x10/0x10
[ 66.903352][ T51] ret_from_fork_asm+0x1a/0x30
[ 66.908252][ T51]
2024/06/17 18:19:30 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 66.923214][ T51]
[ 66.926162][ T51] =============================
[ 66.931133][ T51] WARNING: suspicious RCU usage
[ 66.936186][ T51] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted
[ 66.943486][ T51] -----------------------------
[ 66.948387][ T51] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 66.958069][ T51]
[ 66.958069][ T51] other info that might help us debug this:
[ 66.958069][ T51]
[ 66.968523][ T51]
[ 66.968523][ T51] rcu_scheduler_active = 2, debug_locks = 1
[ 66.976828][ T51] 3 locks held by kworker/u8:3/51:
[ 66.981968][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 66.993223][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 67.004108][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 67.014093][ T51]
[ 67.014093][ T51] stack backtrace:
[ 67.020202][ T51] CPU: 1 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0
[ 67.030481][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 67.040560][ T51] Workqueue: netns cleanup_net
[ 67.045362][ T51] Call Trace:
[ 67.048672][ T51]
[ 67.052011][ T51] dump_stack_lvl+0x241/0x360
[ 67.056743][ T51] ? __pfx_dump_stack_lvl+0x10/0x10
[ 67.062403][ T51] ? __pfx__printk+0x10/0x10
[ 67.067128][ T51] lockdep_rcu_suspicious+0x221/0x340
[ 67.072542][ T51] _destroy_all_sets+0x53f/0x5f0
[ 67.077968][ T51] ip_set_net_exit+0x20/0x50
[ 67.082582][ T51] cleanup_net+0x802/0xcc0
[ 67.087035][ T51] ? __pfx_cleanup_net+0x10/0x10
[ 67.092030][ T51] ? process_scheduled_works+0x945/0x1830
[ 67.098383][ T51] process_scheduled_works+0xa2c/0x1830
[ 67.104595][ T51] ? __pfx_process_scheduled_works+0x10/0x10
[ 67.110616][ T51] ? assign_work+0x364/0x3d0
[ 67.115233][ T51] worker_thread+0x86d/0xd70
[ 67.119968][ T51] ? _raw_spin_unlock_irqrestor