last executing test programs:
477.308095ms ago: executing program 1:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
404.572797ms ago: executing program 0:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)
263.574839ms ago: executing program 2:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
135.288578ms ago: executing program 1:
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))
66.120849ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
0s ago: executing program 2:
mmap(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.89' (ED25519) to the list of known hosts.
2024/06/17 13:58:34 fuzzer started
2024/06/17 13:58:35 dialing manager at 10.128.0.163:30035
[ 53.881339][ T5088] cgroup: Unknown subsys name 'net'
[ 54.160100][ T5088] cgroup: Unknown subsys name 'rlimit'
[ 55.369958][ T5103] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 55.382425][ T5103] syz-executor (5103) used greatest stack depth: 18744 bytes left
2024/06/17 13:58:41 starting 3 executor processes
[ 61.230107][ T51]
[ 61.232649][ T51] =============================
[ 61.237587][ T51] WARNING: suspicious RCU usage
[ 61.242440][ T51] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted
[ 61.250189][ T51] -----------------------------
[ 61.255140][ T51] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 61.264847][ T51]
[ 61.264847][ T51] other info that might help us debug this:
[ 61.264847][ T51]
[ 61.275164][ T51]
[ 61.275164][ T51] rcu_scheduler_active = 2, debug_locks = 1
[ 61.283380][ T51] 3 locks held by kworker/u8:3/51:
[ 61.288736][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 61.299813][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 61.310584][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 61.320099][ T51]
[ 61.320099][ T51] stack backtrace:
[ 61.326017][ T51] CPU: 0 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0
[ 61.336101][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 61.346216][ T51] Workqueue: netns cleanup_net
[ 61.351031][ T51] Call Trace:
[ 61.354335][ T51]
[ 61.357284][ T51] dump_stack_lvl+0x241/0x360
[ 61.362084][ T51] ? __pfx_dump_stack_lvl+0x10/0x10
[ 61.367310][ T51] ? __pfx__printk+0x10/0x10
[ 61.371942][ T51] lockdep_rcu_suspicious+0x221/0x340
[ 61.377341][ T51] _destroy_all_sets+0x232/0x5f0
[ 61.382398][ T51] ip_set_net_exit+0x20/0x50
[ 61.387020][ T51] cleanup_net+0x802/0xcc0
[ 61.391482][ T51] ? __pfx_cleanup_net+0x10/0x10
[ 61.396471][ T51] ? process_scheduled_works+0x945/0x1830
[ 61.402229][ T51] process_scheduled_works+0xa2c/0x1830
[ 61.407920][ T51] ? __pfx_process_scheduled_works+0x10/0x10
[ 61.413954][ T51] ? assign_work+0x364/0x3d0
[ 61.418586][ T51] worker_thread+0x86d/0xd70
[ 61.423314][ T51] ? __kthread_parkme+0x169/0x1d0
2024/06/17 13:58:42 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 61.428385][ T51] ? __pfx_worker_thread+0x10/0x10
[ 61.433533][ T51] kthread+0x2f0/0x390
[ 61.437635][ T51] ? __pfx_worker_thread+0x10/0x10
[ 61.442784][ T51] ? __pfx_kthread+0x10/0x10
[ 61.447406][ T51] ret_from_fork+0x4b/0x80
[ 61.451854][ T51] ? __pfx_kthread+0x10/0x10
[ 61.457091][ T51] ret_from_fork_asm+0x1a/0x30
[ 61.461904][ T51]
[ 61.482534][ T51]
[ 61.484927][ T51] =============================
[ 61.490207][ T51] WARNING: suspicious RCU usage
[ 61.495086][ T51] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted
[ 61.502299][ T51] -----------------------------
[ 61.507277][ T51] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 61.516990][ T51]
[ 61.516990][ T51] other info that might help us debug this:
[ 61.516990][ T51]
[ 61.527307][ T51]
[ 61.527307][ T51] rcu_scheduler_active = 2, debug_locks = 1
[ 61.535398][ T51] 3 locks held by kworker/u8:3/51:
[ 61.540594][ T51] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 61.551682][ T51] #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 61.562348][ T51] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 61.571889][ T51]
[ 61.571889][ T51] stack backtrace:
[ 61.577882][ T51] CPU: 1 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0
[ 61.588124][ T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 61.598173][ T51] Workqueue: netns cleanup_net
[ 61.602941][ T51] Call Trace:
[ 61.606213][ T51]
[ 61.609140][ T51] dump_stack_lvl+0x241/0x360
[ 61.613813][ T51] ? __pfx_dump_stack_lvl+0x10/0x10
[ 61.619003][ T51] ? __pfx__printk+0x10/0x10
[ 61.623592][ T51] lockdep_rcu_suspicious+0x221/0x340
[ 61.629071][ T51] _destroy_all_sets+0x53f/0x5f0
[ 61.634010][ T51] ip_set_net_exit+0x20/0x50
[ 61.638593][ T51] cleanup_net+0x802/0xcc0
[ 61.643008][ T51] ? __pfx_cleanup_net+0x10/0x10
[ 61.648208][ T51] ? process_scheduled_works+0x945/0x1830
[ 61.653916][ T51] process_scheduled_works+0xa2c/0x1830
[ 61.659474][ T51] ? __pfx_process_scheduled_works+0x10/0x10
[ 61.665457][ T51] ? assign_work+0x364/0x3d0
[ 61.670053][ T51] worker_thread+0x86d/0xd70
[ 61.674646][ T51] ? __kthread_parkme+0x169/0x1d0
[ 61.679662][ T51] ? __pfx_worker_thread+0x10/0x10
[ 61.684769][ T51] kthread+0x2f0/0x390
[ 61.688830][ T51] ? __pfx_worker_thread+0x10/0x10
[ 61.693929][ T51] ? __pfx_kthread+0x10/0x10
[ 61.698520][ T51] ret_from_fork+0x4b/0x80
[ 61.702928][ T51] ? __pfx_kthread+0x10/0x10
[ 61.707505][ T51] ret_from_fork_asm+0x1a/0x30
[ 61.712277][ T51]