last executing test programs:
452.84428ms ago: executing program 1:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)
335.981038ms ago: executing program 2:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))
315.135751ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
73.136069ms ago: executing program 2:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)
7.916269ms ago: executing program 0:
connect(0xffffffffffffffff, &(0x7f0000000000), 0x0)
0s ago: executing program 1:
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.173' (ED25519) to the list of known hosts.
2024/06/16 19:47:12 fuzzer started
2024/06/16 19:47:13 dialing manager at 10.128.0.163:30035
syzkaller login: [ 55.726863][ T5090] cgroup: Unknown subsys name 'net'
[ 56.007467][ T5090] cgroup: Unknown subsys name 'rlimit'
[ 57.104023][ T5113] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/16 19:47:19 starting 3 executor processes
[ 63.065160][ T2904]
[ 63.067809][ T2904] =============================
[ 63.072835][ T2904] WARNING: suspicious RCU usage
[ 63.077777][ T2904] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 63.085640][ T2904] -----------------------------
[ 63.090614][ T2904] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 63.100416][ T2904]
[ 63.100416][ T2904] other info that might help us debug this:
[ 63.100416][ T2904]
[ 63.110763][ T2904]
[ 63.110763][ T2904] rcu_scheduler_active = 2, debug_locks = 1
[ 63.119008][ T2904] 3 locks held by kworker/u8:9/2904:
[ 63.124371][ T2904] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 63.135905][ T2904] #1: ffffc90009f37d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 63.146766][ T2904] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 63.156547][ T2904]
[ 63.156547][ T2904] stack backtrace:
2024/06/16 19:47:20 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 63.162701][ T2904] CPU: 0 PID: 2904 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 63.172995][ T2904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 63.183078][ T2904] Workqueue: netns cleanup_net
[ 63.187966][ T2904] Call Trace:
[ 63.191268][ T2904]
[ 63.194215][ T2904] dump_stack_lvl+0x241/0x360
[ 63.198926][ T2904] ? __pfx_dump_stack_lvl+0x10/0x10
[ 63.204261][ T2904] ? __pfx__printk+0x10/0x10
[ 63.208915][ T2904] lockdep_rcu_suspicious+0x221/0x340
[ 63.214327][ T2904] _destroy_all_sets+0x232/0x5f0
[ 63.219310][ T2904] ip_set_net_exit+0x20/0x50
[ 63.223931][ T2904] cleanup_net+0x802/0xcc0
[ 63.228392][ T2904] ? __pfx_cleanup_net+0x10/0x10
[ 63.233526][ T2904] ? process_scheduled_works+0x945/0x1830
[ 63.239258][ T2904] process_scheduled_works+0xa2c/0x1830
[ 63.244845][ T2904] ? __pfx_process_scheduled_works+0x10/0x10
[ 63.251242][ T2904] ? assign_work+0x364/0x3d0
[ 63.255891][ T2904] worker_thread+0x86d/0xd70
[ 63.260524][ T2904] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 63.266531][ T2904] ? __kthread_parkme+0x169/0x1d0
[ 63.271563][ T2904] ? __pfx_worker_thread+0x10/0x10
[ 63.276672][ T2904] kthread+0x2f0/0x390
[ 63.280736][ T2904] ? __pfx_worker_thread+0x10/0x10
[ 63.285847][ T2904] ? __pfx_kthread+0x10/0x10
[ 63.290431][ T2904] ret_from_fork+0x4b/0x80
[ 63.294931][ T2904] ? __pfx_kthread+0x10/0x10
[ 63.299600][ T2904] ret_from_fork_asm+0x1a/0x30
[ 63.304401][ T2904]
[ 63.316352][ T2904]
[ 63.318747][ T2904] =============================
[ 63.324295][ T2904] WARNING: suspicious RCU usage
[ 63.329161][ T2904] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted
[ 63.336603][ T2904] -----------------------------
[ 63.341868][ T2904] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 63.352417][ T2904]
[ 63.352417][ T2904] other info that might help us debug this:
[ 63.352417][ T2904]
[ 63.362777][ T2904]
[ 63.362777][ T2904] rcu_scheduler_active = 2, debug_locks = 1
[ 63.370877][ T2904] 3 locks held by kworker/u8:9/2904:
[ 63.376267][ T2904] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 63.387257][ T2904] #1: ffffc90009f37d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 63.398122][ T2904] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 63.407761][ T2904]
[ 63.407761][ T2904] stack backtrace:
[ 63.413743][ T2904] CPU: 1 PID: 2904 Comm: kworker/u8:9 Not tainted 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0
[ 63.424184][ T2904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 63.434281][ T2904] Workqueue: netns cleanup_net
[ 63.439087][ T2904] Call Trace:
[ 63.442490][ T2904]
[ 63.445442][ T2904] dump_stack_lvl+0x241/0x360
[ 63.450237][ T2904] ? __pfx_dump_stack_lvl+0x10/0x10
[ 63.455447][ T2904] ? __pfx__printk+0x10/0x10
[ 63.460074][ T2904] lockdep_rcu_suspicious+0x221/0x340
[ 63.465465][ T2904] _destroy_all_sets+0x53f/0x5f0
[ 63.470619][ T2904] ip_set_net_exit+0x20/0x50
[ 63.475241][ T2904] cleanup_net+0x802/0xcc0
[ 63.479673][ T2904] ? __pfx_cleanup_net+0x10/0x10
[ 63.484625][ T2904] ? process_scheduled_works+0x945/0x1830
[ 63.490357][ T2904] process_scheduled_works+0xa2c/0x1830
[ 63.495916][ T2904] ? __pfx_process_scheduled_works+0x10/0x10
[ 63.502164][ T2904] ? assign_work+0x364/0x3d0
[ 63.506752][ T2904] worker_thread+0x86d/0xd70
[ 63.511346][ T2904] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[