last executing test programs:
554.401813ms ago: executing program 2:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
464.104657ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
413.134455ms ago: executing program 1:
read(0xffffffffffffffff, &(0x7f0000000000), 0x0)
213.885856ms ago: executing program 2:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
158.349655ms ago: executing program 0:
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))
92.525535ms ago: executing program 1:
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x0)
0s ago: executing program 2:
recvfrom(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.76' (ED25519) to the list of known hosts.
2024/06/17 09:53:20 fuzzer started
2024/06/17 09:53:21 dialing manager at 10.128.0.163:30035
syzkaller login: [ 58.228092][ T5095] cgroup: Unknown subsys name 'net'
[ 58.408030][ T5095] cgroup: Unknown subsys name 'rlimit'
[ 59.616758][ T5119] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/17 09:53:29 starting 3 executor processes
[ 66.980226][ T2479]
[ 66.982704][ T2479] =============================
[ 66.987861][ T2479] WARNING: suspicious RCU usage
[ 66.992755][ T2479] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 67.000124][ T2479] -----------------------------
[ 67.005305][ T2479] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 67.015550][ T2479]
[ 67.015550][ T2479] other info that might help us debug this:
[ 67.015550][ T2479]
[ 67.026018][ T2479]
[ 67.026018][ T2479] rcu_scheduler_active = 2, debug_locks = 1
[ 67.034216][ T2479] 3 locks held by kworker/u8:8/2479:
[ 67.039522][ T2479] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 67.050913][ T2479] #1: ffffc90009b5fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 67.061560][ T2479] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 67.071206][ T2479]
[ 67.071206][ T2479] stack backtrace:
2024/06/17 09:53:30 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 67.077983][ T2479] CPU: 1 PID: 2479 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 67.088424][ T2479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 67.098501][ T2479] Workqueue: netns cleanup_net
[ 67.103312][ T2479] Call Trace:
[ 67.106676][ T2479]
[ 67.109597][ T2479] dump_stack_lvl+0x241/0x360
[ 67.114278][ T2479] ? __pfx_dump_stack_lvl+0x10/0x10
[ 67.119464][ T2479] ? __pfx__printk+0x10/0x10
[ 67.124049][ T2479] lockdep_rcu_suspicious+0x221/0x340
[ 67.129415][ T2479] _destroy_all_sets+0x232/0x5f0
[ 67.134438][ T2479] ip_set_net_exit+0x20/0x50
[ 67.139043][ T2479] cleanup_net+0x802/0xcc0
[ 67.143497][ T2479] ? __pfx_cleanup_net+0x10/0x10
[ 67.148449][ T2479] ? process_scheduled_works+0x945/0x1830
[ 67.154163][ T2479] process_scheduled_works+0xa2c/0x1830
[ 67.159824][ T2479] ? __pfx_process_scheduled_works+0x10/0x10
[ 67.165799][ T2479] ? assign_work+0x364/0x3d0
[ 67.170388][ T2479] worker_thread+0x86d/0xd70
[ 67.174970][ T2479] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 67.180857][ T2479] ? __kthread_parkme+0x169/0x1d0
[ 67.185876][ T2479] ? __pfx_worker_thread+0x10/0x10
[ 67.190990][ T2479] kthread+0x2f0/0x390
[ 67.195052][ T2479] ? __pfx_worker_thread+0x10/0x10
[ 67.200161][ T2479] ? __pfx_kthread+0x10/0x10
[ 67.204743][ T2479] ret_from_fork+0x4b/0x80
[ 67.209151][ T2479] ? __pfx_kthread+0x10/0x10
[ 67.213912][ T2479] ret_from_fork_asm+0x1a/0x30
[ 67.218767][ T2479]
[ 67.299913][ T2479]
[ 67.302391][ T2479] =============================
[ 67.307450][ T2479] WARNING: suspicious RCU usage
[ 67.312308][ T2479] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 67.319474][ T2479] -----------------------------
[ 67.324386][ T2479] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 67.334119][ T2479]
[ 67.334119][ T2479] other info that might help us debug this:
[ 67.334119][ T2479]
[ 67.344750][ T2479]
[ 67.344750][ T2479] rcu_scheduler_active = 2, debug_locks = 1
[ 67.352855][ T2479] 3 locks held by kworker/u8:8/2479:
[ 67.358397][ T2479] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 67.369745][ T2479] #1: ffffc90009b5fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 67.380891][ T2479] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 67.390932][ T2479]
[ 67.390932][ T2479] stack backtrace:
[ 67.397356][ T2479] CPU: 0 PID: 2479 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 67.407630][ T2479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 67.417970][ T2479] Workqueue: netns cleanup_net
[ 67.422766][ T2479] Call Trace:
[ 67.426237][ T2479]
[ 67.429179][ T2479] dump_stack_lvl+0x241/0x360
[ 67.433881][ T2479] ? __pfx_dump_stack_lvl+0x10/0x10
[ 67.439101][ T2479] ? __pfx__printk+0x10/0x10
[ 67.443741][ T2479] lockdep_rcu_suspicious+0x221/0x340
[ 67.449343][ T2479] _destroy_all_sets+0x53f/0x5f0
[ 67.454420][ T2479] ip_set_net_exit+0x20/0x50
[ 67.459051][ T2479] cleanup_net+0x802/0xcc0
[ 67.463716][ T2479] ? __pfx_cleanup_net+0x10/0x10
[ 67.468814][ T2479] ? process_scheduled_works+0x945/0x1830
[ 67.474743][ T2479] process_scheduled_works+0xa2c/0x1830
[ 67.480374][ T2479] ? __pfx_process_scheduled_works+0x10/0x10
[ 67.486478][ T2479] ? assign_work+0x364/0x3d0
[ 67.491080][ T2479] worker_thread+0x86d/0xd70
[ 67.495684][ T2479] ? _raw_spin_unlock_irqrestore+0xdd/