last executing test programs:
487.093525ms ago: executing program 1:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
423.655255ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
407.314677ms ago: executing program 2:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
127.41445ms ago: executing program 0:
read(0xffffffffffffffff, &(0x7f0000000000), 0x0)
21.160907ms ago: executing program 1:
socket$vsock_stream(0x28, 0x1, 0x0)
0s ago: executing program 2:
recvfrom(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.41' (ED25519) to the list of known hosts.
2024/06/16 17:24:37 fuzzer started
2024/06/16 17:24:37 dialing manager at 10.128.0.163:30035
[ 64.411361][ T5093] cgroup: Unknown subsys name 'net'
[ 64.759110][ T5093] cgroup: Unknown subsys name 'rlimit'
[ 65.882129][ T5107] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 72.418674][ T1251] ieee802154 phy0 wpan0: encryption failed: -22
[ 72.425276][ T1251] ieee802154 phy1 wpan1: encryption failed: -22
2024/06/16 17:24:47 starting 3 executor processes
[ 74.539470][ T2802]
[ 74.542044][ T2802] =============================
[ 74.547036][ T2802] WARNING: suspicious RCU usage
[ 74.551902][ T2802] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 74.559230][ T2802] -----------------------------
[ 74.564111][ T2802] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 74.574102][ T2802]
[ 74.574102][ T2802] other info that might help us debug this:
[ 74.574102][ T2802]
[ 74.584923][ T2802]
[ 74.584923][ T2802] rcu_scheduler_active = 2, debug_locks = 1
[ 74.593023][ T2802] 3 locks held by kworker/u8:9/2802:
[ 74.598434][ T2802] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 74.609500][ T2802] #1: ffffc90009c8fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 74.620178][ T2802] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 74.630010][ T2802]
[ 74.630010][ T2802] stack backtrace:
[ 74.635983][ T2802] CPU: 0 PID: 2802 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 74.646334][ T2802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 74.656510][ T2802] Workqueue: netns cleanup_net
[ 74.661338][ T2802] Call Trace:
[ 74.664648][ T2802]
[ 74.667601][ T2802] dump_stack_lvl+0x241/0x360
[ 74.672310][ T2802] ? __pfx_dump_stack_lvl+0x10/0x10
[ 74.677666][ T2802] ? __pfx__printk+0x10/0x10
[ 74.682270][ T2802] lockdep_rcu_suspicious+0x221/0x340
[ 74.687647][ T2802] _destroy_all_sets+0x232/0x5f0
[ 74.692583][ T2802] ip_set_net_exit+0x20/0x50
[ 74.697264][ T2802] cleanup_net+0x802/0xcc0
[ 74.701811][ T2802] ? __pfx_cleanup_net+0x10/0x10
[ 74.706756][ T2802] ? process_scheduled_works+0x945/0x1830
[ 74.712467][ T2802] process_scheduled_works+0xa2c/0x1830
[ 74.718148][ T2802] ? __pfx_process_scheduled_works+0x10/0x10
[ 74.724278][ T2802] ? assign_work+0x364/0x3d0
[ 74.728902][ T2802] worker_thread+0x86d/0xd70
[ 74.733557][ T2802] ? __kthread_parkme+0x169/0x1d0
2024/06/16 17:24:48 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 74.738592][ T2802] ? __pfx_worker_thread+0x10/0x10
[ 74.743708][ T2802] kthread+0x2f0/0x390
[ 74.747782][ T2802] ? __pfx_worker_thread+0x10/0x10
[ 74.752891][ T2802] ? __pfx_kthread+0x10/0x10
[ 74.757523][ T2802] ret_from_fork+0x4b/0x80
[ 74.761936][ T2802] ? __pfx_kthread+0x10/0x10
[ 74.766519][ T2802] ret_from_fork_asm+0x1a/0x30
[ 74.771374][ T2802]
[ 74.776322][ T2802]
[ 74.778705][ T2802] =============================
[ 74.783580][ T2802] WARNING: suspicious RCU usage
[ 74.788535][ T2802] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 74.795732][ T2802] -----------------------------
[ 74.800588][ T2802] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 74.810312][ T2802]
[ 74.810312][ T2802] other info that might help us debug this:
[ 74.810312][ T2802]
[ 74.820639][ T2802]
[ 74.820639][ T2802] rcu_scheduler_active = 2, debug_locks = 1
[ 74.828870][ T2802] 3 locks held by kworker/u8:9/2802:
[ 74.834203][ T2802] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 74.845348][ T2802] #1: ffffc90009c8fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 74.856023][ T2802] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 74.865603][ T2802]
[ 74.865603][ T2802] stack backtrace:
[ 74.871526][ T2802] CPU: 0 PID: 2802 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 74.881795][ T2802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 74.891879][ T2802] Workqueue: netns cleanup_net
[ 74.896776][ T2802] Call Trace:
[ 74.900068][ T2802]
[ 74.903172][ T2802] dump_stack_lvl+0x241/0x360
[ 74.907972][ T2802] ? __pfx_dump_stack_lvl+0x10/0x10
[ 74.913227][ T2802] ? __pfx__printk+0x10/0x10
[ 74.918195][ T2802] lockdep_rcu_suspicious+0x221/0x340
[ 74.923610][ T2802] _destroy_all_sets+0x53f/0x5f0
[ 74.928580][ T2802] ip_set_net_exit+0x20/0x50
[ 74.933169][ T2802] cleanup_net+0x802/0xcc0
[ 74.937588][ T2802] ? __pfx_cleanup_net+0x10/0x10
[ 74.942526][ T2802] ? process_scheduled_works+0x945/0x1830
[ 74.948233][ T2802] process_scheduled_works+0xa2c/0x1830
[ 74.953875][ T2802] ? __pfx_process_scheduled_works+0x10/0x10
[ 74.959852][ T2802] ? assign_work+0x364/0x3d0
[ 74.964463][ T2802] worker_thread+0x86d/0xd70
[ 74.969084][ T2802] ? __kthread_parkme+0x169/0x1d0
[ 74.974137][ T2802] ? __pfx_worker_thread+0x10/0x10
[ 74.979253][ T2802] kthread+0x2f0/0x390
[ 74.983406][ T2802] ? __pfx_worker_thread+0x10/0x10
[ 74.988593][ T2802] ? __pfx_kthread+0x10/0x10
[ 74.993323][ T2802] ret_from_fork+0x4b/0x80
[ 74.998109][ T2802] ? __pfx_kthread+0x10/0x10
[ 75.002752][ T2802] ret_from_fork_asm+0x1a/0x30
[ 75.007546][ T2802]