last executing test programs:
501.087333ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)
460.65728ms ago: executing program 2:
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x0)
392.0485ms ago: executing program 1:
socket(0x1, 0x1, 0x0)
162.104356ms ago: executing program 0:
bind(0xffffffffffffffff, &(0x7f0000000000), 0x0)
47.516973ms ago: executing program 2:
socket$inet_udplite(0x2, 0x2, 0x88)
0s ago: executing program 1:
connect(0xffffffffffffffff, &(0x7f0000000000), 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.241' (ED25519) to the list of known hosts.
2024/06/14 03:18:42 fuzzer started
2024/06/14 03:18:42 dialing manager at 10.128.0.163:30035
[ 60.243359][ T5086] cgroup: Unknown subsys name 'net'
[ 60.494072][ T5086] cgroup: Unknown subsys name 'rlimit'
[ 61.728187][ T5105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
2024/06/14 03:18:45 starting 3 executor processes
[ 63.200951][ T5140] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 63.251981][ T4152]
[ 63.254798][ T4152] =============================
[ 63.260033][ T4152] WARNING: suspicious RCU usage
[ 63.265102][ T4152] 6.10.0-rc3-syzkaller-00654-g6e7e2e7e6327 #0 Not tainted
[ 63.272324][ T4152] -----------------------------
[ 63.277364][ T4152] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[ 63.287511][ T4152]
[ 63.287511][ T4152] other info that might help us debug this:
[ 63.287511][ T4152]
[ 63.298035][ T4152]
2024/06/14 03:18:46 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[ 63.298035][ T4152] rcu_scheduler_active = 2, debug_locks = 1
[ 63.306223][ T4152] 3 locks held by kworker/u8:8/4152:
[ 63.311528][ T4152] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 63.323169][ T4152] #1: ffffc9000c8c7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 63.334392][ T4152] #2: ffffffff8f5db390 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 63.343878][ T4152]
[ 63.343878][ T4152] stack backtrace:
[ 63.350001][ T4152] CPU: 1 PID: 4152 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00654-g6e7e2e7e6327 #0
[ 63.360278][ T4152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 63.370366][ T4152] Workqueue: netns cleanup_net
[ 63.375177][ T4152] Call Trace:
[ 63.378458][ T4152]
[ 63.381387][ T4152] dump_stack_lvl+0x241/0x360
[ 63.386070][ T4152] ? __pfx_dump_stack_lvl+0x10/0x10
[ 63.391291][ T4152] ? __pfx__printk+0x10/0x10
[ 63.396073][ T4152] lockdep_rcu_suspicious+0x221/0x340
[ 63.401491][ T4152] _destroy_all_sets+0x232/0x5f0
[ 63.406454][ T4152] ip_set_net_exit+0x20/0x50
[ 63.411437][ T4152] cleanup_net+0x802/0xcc0
[ 63.415988][ T4152] ? __pfx_cleanup_net+0x10/0x10
[ 63.421440][ T4152] ? process_scheduled_works+0x945/0x1830
[ 63.427244][ T4152] process_scheduled_works+0xa2c/0x1830
[ 63.433065][ T4152] ? __pfx_process_scheduled_works+0x10/0x10
[ 63.439040][ T4152] ? assign_work+0x364/0x3d0
[ 63.443628][ T4152] worker_thread+0x86d/0xd70
[ 63.448338][ T4152] ? _raw_spin_unlock_irqrestore+0xdd/0x140
[ 63.454231][ T4152] ? __kthread_parkme+0x169/0x1d0
[ 63.459256][ T4152] ? __pfx_worker_thread+0x10/0x10
[ 63.464359][ T4152] kthread+0x2f0/0x390
[ 63.468528][ T4152] ? __pfx_worker_thread+0x10/0x10
[ 63.473632][ T4152] ? __pfx_kthread+0x10/0x10
[ 63.478230][ T4152] ret_from_fork+0x4b/0x80
[ 63.482740][ T4152] ? __pfx_kthread+0x10/0x10
[ 63.487368][ T4152] ret_from_fork_asm+0x1a/0x30
[ 63.492158][ T4152]
[ 63.506526][ T4152]
[ 63.508909][ T4152] =============================
[ 63.513772][ T4152] WARNING: suspicious RCU usage
[ 63.519002][ T4152] 6.10.0-rc3-syzkaller-00654-g6e7e2e7e6327 #0 Not tainted
[ 63.526529][ T4152] -----------------------------
[ 63.531400][ T4152] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[ 63.541487][ T4152]
[ 63.541487][ T4152] other info that might help us debug this:
[ 63.541487][ T4152]
[ 63.552085][ T4152]
[ 63.552085][ T4152] rcu_scheduler_active = 2, debug_locks = 1
[ 63.560469][ T4152] 3 locks held by kworker/u8:8/4152:
[ 63.566003][ T4152] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[ 63.577134][ T4152] #1: ffffc9000c8c7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[ 63.587846][ T4152] #2: ffffffff8f5db390 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[ 63.597462][ T4152]
[ 63.597462][ T4152] stack backtrace:
[ 63.603645][ T4152] CPU: 1 PID: 4152 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00654-g6e7e2e7e6327 #0
[ 63.613918][ T4152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[ 63.624092][ T4152] Workqueue: netns cleanup_net
[ 63.628989][ T4152] Call Trace:
[ 63.632367][ T4152]
[ 63.635305][ T4152] dump_stack_lvl+0x241/0x360
[ 63.640003][ T4152] ? __pfx_dump_stack_lvl+0x10/0x10
[ 63.645220][ T4152] ? __pfx__printk+0x10/0x10
[ 63.649839][ T4152] lockdep_rcu_suspicious+0x221/0x340
[ 63.655240][ T4152] _