last executing test programs:
499.253882ms ago: executing program 0:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)
481.354965ms ago: executing program 1:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
456.061309ms ago: executing program 2:
read(0xffffffffffffffff, &(0x7f0000000000), 0x0)
172.085893ms ago: executing program 0:
socket(0x10, 0x3, 0x10)
100.974584ms ago: executing program 2:
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))
0s ago: executing program 1:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.149' (ED25519) to the list of known hosts.
2024/06/18 01:40:36 fuzzer started
2024/06/18 01:40:36 dialing manager at 10.128.0.163:30035
[ 58.931189][ T5095] cgroup: Unknown subsys name 'net'
[ 59.207976][ T5095] cgroup: Unknown subsys name 'rlimit'
[ 60.379567][ T5103] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/18 01:40:43 starting 3 executor processes
[ 65.679477][ T12]
[ 65.682156][ T12] =============================
[ 65.687304][ T12] WARNING: suspicious RCU usage
[ 65.692369][ T12] 6.10.0-rc3-syzkaller-00699-g0d9bb144276e #0 Not tainted
[ 65.699558][ T12] -----------------------------
[ 65.704423][ T12] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 65.714365][ T12]
[ 65.714365][ T12] other info that might help us debug this:
[ 65.714365][ T12]
[ 65.724774][ T12]
2024/06/18 01:40:43 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 65.724774][ T12] rcu_scheduler_active = 2, debug_locks = 1
[ 65.733045][ T12] 3 locks held by kworker/u8:1/12:
[ 65.738266][ T12] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 65.749540][ T12] #1: ffffc90000117d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 65.760288][ T12] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 65.770033][ T12]
[ 65.770033][ T12] stack backtrace:
[ 65.775961][ T12] CPU: 0 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc3-syzkaller-00699-g0d9bb144276e #0
[ 65.786039][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 65.796091][ T12] Workqueue: netns cleanup_net
[ 65.800874][ T12] Call Trace:
[ 65.804321][ T12]
[ 65.807266][ T12] dump_stack_lvl+0x241/0x360
[ 65.811959][ T12] ? __pfx_dump_stack_lvl+0x10/0x10
[ 65.817204][ T12] ? __pfx__printk+0x10/0x10
[ 65.821902][ T12] lockdep_rcu_suspicious+0x221/0x340
[ 65.827628][ T12] _destroy_all_sets+0x232/0x5f0
[ 65.832626][ T12] ip_set_net_exit+0x20/0x50
[ 65.837210][ T12] cleanup_net+0x802/0xcc0
[ 65.841714][ T12] ? __pfx_cleanup_net+0x10/0x10
[ 65.846654][ T12] ? process_scheduled_works+0x945/0x1830
[ 65.852799][ T12] process_scheduled_works+0xa2c/0x1830
[ 65.858362][ T12] ? __pfx_process_scheduled_works+0x10/0x10
[ 65.864342][ T12] ? assign_work+0x364/0x3d0
[ 65.868939][ T12] worker_thread+0x86d/0xd70
[ 65.873532][ T12] ? __kthread_parkme+0x169/0x1d0
[ 65.878644][ T12] ? __pfx_worker_thread+0x10/0x10
[ 65.883747][ T12] kthread+0x2f0/0x390
[ 65.887809][ T12] ? __pfx_worker_thread+0x10/0x10
[ 65.892924][ T12] ? __pfx_kthread+0x10/0x10
[ 65.897593][ T12] ret_from_fork+0x4b/0x80
[ 65.902002][ T12] ? __pfx_kthread+0x10/0x10
[ 65.906672][ T12] ret_from_fork_asm+0x1a/0x30
[ 65.911448][ T12]
[ 65.957888][ T12]
[ 65.960868][ T12] =============================
[ 65.965732][ T12] WARNING: suspicious RCU usage
[ 65.970744][ T12] 6.10.0-rc3-syzkaller-00699-g0d9bb144276e #0 Not tainted
[ 65.977867][ T12] -----------------------------
[ 65.983053][ T12] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 65.992782][ T12]
[ 65.992782][ T12] other info that might help us debug this:
[ 65.992782][ T12]
[ 66.003580][ T12]
[ 66.003580][ T12] rcu_scheduler_active = 2, debug_locks = 1
[ 66.012098][ T12] 3 locks held by kworker/u8:1/12:
[ 66.017311][ T12] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 66.028490][ T12] #1: ffffc90000117d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 66.039479][ T12] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 66.049042][ T12]
[ 66.049042][ T12] stack backtrace:
[ 66.054957][ T12] CPU: 0 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc3-syzkaller-00699-g0d9bb144276e #0
[ 66.065052][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 66.075122][ T12] Workqueue: netns cleanup_net
[ 66.079900][ T12] Call Trace:
[ 66.083171][ T12]
[ 66.086093][ T12] dump_stack_lvl+0x241/0x360
[ 66.090767][ T12] ? __pfx_dump_stack_lvl+0x10/0x10
[ 66.095958][ T12] ? __pfx__printk+0x10/0x10
[ 66.100549][ T12] lockdep_rcu_suspicious+0x221/0x340
[ 66.105919][ T12] _destroy_all_sets+0x53f/0x5f0
[ 66.110878][ T12] ip_set_net_exit+0x20/0x50
[ 66.115560][ T12] cleanup_net+0x802/0xcc0
[ 66.119979][ T12] ? __pfx_cleanup_net+0x10/0x10
[ 66.124921][ T12] ? process_scheduled_works+0x945/0x1830
[ 66.130727][ T12] process_scheduled_works+0xa2c/0x1830
[ 66.136386][ T12] ? __pfx_process_scheduled_works+0x10/0x10
[ 66.142451][ T12] ? assign_work+0x364/0x3d0
[ 66.147040][ T12] worker_thread+0x86d/0xd70
[ 66.151637][ T12] ? __kthread_parkme+0x169/0x1d0
[ 66.156671][ T12] ? __pfx_worker_thread+0x10/0x10
[ 66.161777][ T12] kthread+0x2f0/0x390
[ 66.165847][ T12] ? __pfx_worker_thread+0x10/0x10
[ 66.170948][ T12] ? __pfx_kthread+0x10/0x10
[ 66.175630][ T12] ret_from_fork+0x4b/0x80
[ 66.180155][ T12] ? __pfx_kthread+0x10/0x10
[ 66.184848][ T12] ret_from_fork_asm+0x1a/0x30
[ 66.189791][ T12]