last executing test programs:
476.556796ms ago: executing program 0:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
456.769029ms ago: executing program 1:
sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
353.847185ms ago: executing program 2:
poll(&(0x7f0000000000), 0x0, 0x0)
173.983783ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
46.912403ms ago: executing program 1:
sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0)
0s ago: executing program 2:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.76' (ED25519) to the list of known hosts.
2024/06/18 12:15:09 fuzzer started
2024/06/18 12:15:09 dialing manager at 10.128.0.163:30035
[ 52.531214][ T5088] cgroup: Unknown subsys name 'net'
[ 52.755437][ T5088] cgroup: Unknown subsys name 'rlimit'
[ 53.874806][ T5098] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/18 12:15:17 starting 3 executor processes
[ 60.617401][ T2927]
[ 60.619917][ T2927] =============================
[ 60.625082][ T2927] WARNING: suspicious RCU usage
[ 60.629952][ T2927] 6.10.0-rc3-syzkaller-00704-ge845bb84fb6e #0 Not tainted
[ 60.637722][ T2927] -----------------------------
[ 60.642656][ T2927] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 60.652361][ T2927]
[ 60.652361][ T2927] other info that might help us debug this:
[ 60.652361][ T2927]
[ 60.662692][ T2927]
[ 60.662692][ T2927] rcu_scheduler_active = 2, debug_locks = 1
[ 60.670836][ T2927] 3 locks held by kworker/u8:8/2927:
[ 60.676132][ T2927] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 60.687928][ T2927] #1: ffffc9000a56fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 60.698656][ T2927] #2: ffffffff8f5db750 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 60.708181][ T2927]
[ 60.708181][ T2927] stack backtrace:
[ 60.714181][ T2927] CPU: 1 PID: 2927 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00704-ge845bb84fb6e #0
[ 60.724422][ T2927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 60.734473][ T2927] Workqueue: netns cleanup_net
[ 60.739248][ T2927] Call Trace:
[ 60.742519][ T2927]
[ 60.745438][ T2927] dump_stack_lvl+0x241/0x360
[ 60.750106][ T2927] ? __pfx_dump_stack_lvl+0x10/0x10
[ 60.755291][ T2927] ? __pfx__printk+0x10/0x10
[ 60.759878][ T2927] lockdep_rcu_suspicious+0x221/0x340
[ 60.765241][ T2927] _destroy_all_sets+0x232/0x5f0
[ 60.770172][ T2927] ip_set_net_exit+0x20/0x50
[ 60.774751][ T2927] cleanup_net+0x802/0xcc0
[ 60.779173][ T2927] ? __pfx_cleanup_net+0x10/0x10
[ 60.784111][ T2927] ? process_scheduled_works+0x945/0x1830
[ 60.789816][ T2927] process_scheduled_works+0xa2c/0x1830
[ 60.795369][ T2927] ? __pfx_process_scheduled_works+0x10/0x10
[ 60.801340][ T2927] ? assign_work+0x364/0x3d0
[ 60.805918][ T2927] worker_thread+0x86d/0xd70
[ 60.810499][ T2927] ? _raw_spin_unlock_irqrestore+0xdd/0x140
2024/06/18 12:15:18 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 60.816386][ T2927] ? __kthread_parkme+0x169/0x1d0
[ 60.821402][ T2927] ? __pfx_worker_thread+0x10/0x10
[ 60.826499][ T2927] kthread+0x2f0/0x390
[ 60.830556][ T2927] ? __pfx_worker_thread+0x10/0x10
[ 60.835655][ T2927] ? __pfx_kthread+0x10/0x10
[ 60.840236][ T2927] ret_from_fork+0x4b/0x80
[ 60.844647][ T2927] ? __pfx_kthread+0x10/0x10
[ 60.849225][ T2927] ret_from_fork_asm+0x1a/0x30
[ 60.854007][ T2927]
[ 60.903236][ T2927]
[ 60.905616][ T2927] =============================
[ 60.910753][ T2927] WARNING: suspicious RCU usage
[ 60.915607][ T2927] 6.10.0-rc3-syzkaller-00704-ge845bb84fb6e #0 Not tainted
[ 60.922990][ T2927] -----------------------------
[ 60.927838][ T2927] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 60.937912][ T2927]
[ 60.937912][ T2927] other info that might help us debug this:
[ 60.937912][ T2927]
[ 60.948588][ T2927]
[ 60.948588][ T2927] rcu_scheduler_active = 2, debug_locks = 1
[ 60.956982][ T2927] 3 locks held by kworker/u8:8/2927:
[ 60.962635][ T2927] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 60.973865][ T2927] #1: ffffc9000a56fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 60.984735][ T2927] #2: ffffffff8f5db750 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 60.994515][ T2927]
[ 60.994515][ T2927] stack backtrace:
[ 61.000645][ T2927] CPU: 0 PID: 2927 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00704-ge845bb84fb6e #0
[ 61.010892][ T2927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 61.020950][ T2927] Workqueue: netns cleanup_net
[ 61.025724][ T2927] Call Trace:
[ 61.028996][ T2927]
[ 61.031921][ T2927] dump_stack_lvl+0x241/0x360
[ 61.036601][ T2927] ? __pfx_dump_stack_lvl+0x10/0x10
[ 61.041791][ T2927] ? __pfx__printk+0x10/0x10
[ 61.046381][ T2927] lockdep_rcu_suspicious+0x221/0x340
[ 61.051756][ T2927] _destroy_all_sets+0x53f/0x5f0
[ 61.056693][ T2927] ip_set_net_exit+0x20/0x50
[ 61.061732][ T2927] cleanup_net+0x802/0xcc0
[ 61.066153][ T2927] ? __pfx_cleanup_net+0x10/0x10
[ 61.071093][ T2927] ? process_scheduled_works+0x945/0x1830
[ 61.076886][ T2927] process_scheduled_works+0xa2c/0x1830
[ 61.082438][ T2927] ? __pfx_process_scheduled_works+0x10/0x10
[ 61.088409][ T2927] ? assign_work+0x364/0x3d0
[ 61.092991][ T2927] worker_thread+0x86d/0xd70
[ 61.097572][ T2927] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 61.103458][ T2927] ? __kthread_parkme+0x169/0x1d0
[ 61.108472][ T2927] ? __pfx_worker_thread+0x10/0x10
[ 61.113570][ T2927] kthread+0x2f0/0x390
[ 61.117631][ T2927] ? __pfx_worker_thread+0x10/0x10
[ 61.122732][ T2927] ? __pfx_kthread+0x10/0x10
[ 61.127312][ T2927] ret_from_fork+0x4b/0x80
[ 61.131720][ T2927] ? __pfx_kthread+0x10/0x10
[ 61.136326][ T2927] ret_from_fork_asm+0x1a/0x30
[ 61.141123][ T2927]