last executing test programs:

477.308095ms ago: executing program 1:
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000))

404.572797ms ago: executing program 0:
write(0xffffffffffffffff, &(0x7f0000000000), 0x0)

263.574839ms ago: executing program 2:
sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0)

135.288578ms ago: executing program 1:
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000))

66.120849ms ago: executing program 0:
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0)

0s ago: executing program 2:
mmap(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

kernel console output (not intermixed with test programs):

Warning: Permanently added '10.128.1.89' (ED25519) to the list of known hosts.
2024/06/17 13:58:34 fuzzer started
2024/06/17 13:58:35 dialing manager at 10.128.0.163:30035
[   53.881339][ T5088] cgroup: Unknown subsys name 'net'
[   54.160100][ T5088] cgroup: Unknown subsys name 'rlimit'
[   55.369958][ T5103] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   55.382425][ T5103] syz-executor (5103) used greatest stack depth: 18744 bytes left
2024/06/17 13:58:41 starting 3 executor processes
[   61.230107][   T51] 
[   61.232649][   T51] =============================
[   61.237587][   T51] WARNING: suspicious RCU usage
[   61.242440][   T51] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted
[   61.250189][   T51] -----------------------------
[   61.255140][   T51] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage!
[   61.264847][   T51] 
[   61.264847][   T51] other info that might help us debug this:
[   61.264847][   T51] 
[   61.275164][   T51] 
[   61.275164][   T51] rcu_scheduler_active = 2, debug_locks = 1
[   61.283380][   T51] 3 locks held by kworker/u8:3/51:
[   61.288736][   T51]  #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[   61.299813][   T51]  #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[   61.310584][   T51]  #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[   61.320099][   T51] 
[   61.320099][   T51] stack backtrace:
[   61.326017][   T51] CPU: 0 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0
[   61.336101][   T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   61.346216][   T51] Workqueue: netns cleanup_net
[   61.351031][   T51] Call Trace:
[   61.354335][   T51]  <TASK>
[   61.357284][   T51]  dump_stack_lvl+0x241/0x360
[   61.362084][   T51]  ? __pfx_dump_stack_lvl+0x10/0x10
[   61.367310][   T51]  ? __pfx__printk+0x10/0x10
[   61.371942][   T51]  lockdep_rcu_suspicious+0x221/0x340
[   61.377341][   T51]  _destroy_all_sets+0x232/0x5f0
[   61.382398][   T51]  ip_set_net_exit+0x20/0x50
[   61.387020][   T51]  cleanup_net+0x802/0xcc0
[   61.391482][   T51]  ? __pfx_cleanup_net+0x10/0x10
[   61.396471][   T51]  ? process_scheduled_works+0x945/0x1830
[   61.402229][   T51]  process_scheduled_works+0xa2c/0x1830
[   61.407920][   T51]  ? __pfx_process_scheduled_works+0x10/0x10
[   61.413954][   T51]  ? assign_work+0x364/0x3d0
[   61.418586][   T51]  worker_thread+0x86d/0xd70
[   61.423314][   T51]  ? __kthread_parkme+0x169/0x1d0
2024/06/17 13:58:42 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF
[   61.428385][   T51]  ? __pfx_worker_thread+0x10/0x10
[   61.433533][   T51]  kthread+0x2f0/0x390
[   61.437635][   T51]  ? __pfx_worker_thread+0x10/0x10
[   61.442784][   T51]  ? __pfx_kthread+0x10/0x10
[   61.447406][   T51]  ret_from_fork+0x4b/0x80
[   61.451854][   T51]  ? __pfx_kthread+0x10/0x10
[   61.457091][   T51]  ret_from_fork_asm+0x1a/0x30
[   61.461904][   T51]  </TASK>
[   61.482534][   T51] 
[   61.484927][   T51] =============================
[   61.490207][   T51] WARNING: suspicious RCU usage
[   61.495086][   T51] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted
[   61.502299][   T51] -----------------------------
[   61.507277][   T51] net/netfilter/ipset/ip_set_core.c:1211 suspicious rcu_dereference_protected() usage!
[   61.516990][   T51] 
[   61.516990][   T51] other info that might help us debug this:
[   61.516990][   T51] 
[   61.527307][   T51] 
[   61.527307][   T51] rcu_scheduler_active = 2, debug_locks = 1
[   61.535398][   T51] 3 locks held by kworker/u8:3/51:
[   61.540594][   T51]  #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830
[   61.551682][   T51]  #1: ffffc90000bb7d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830
[   61.562348][   T51]  #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0
[   61.571889][   T51] 
[   61.571889][   T51] stack backtrace:
[   61.577882][   T51] CPU: 1 PID: 51 Comm: kworker/u8:3 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0
[   61.588124][   T51] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   61.598173][   T51] Workqueue: netns cleanup_net
[   61.602941][   T51] Call Trace:
[   61.606213][   T51]  <TASK>
[   61.609140][   T51]  dump_stack_lvl+0x241/0x360
[   61.613813][   T51]  ? __pfx_dump_stack_lvl+0x10/0x10
[   61.619003][   T51]  ? __pfx__printk+0x10/0x10
[   61.623592][   T51]  lockdep_rcu_suspicious+0x221/0x340
[   61.629071][   T51]  _destroy_all_sets+0x53f/0x5f0
[   61.634010][   T51]  ip_set_net_exit+0x20/0x50
[   61.638593][   T51]  cleanup_net+0x802/0xcc0
[   61.643008][   T51]  ? __pfx_cleanup_net+0x10/0x10
[   61.648208][   T51]  ? process_scheduled_works+0x945/0x1830
[   61.653916][   T51]  process_scheduled_works+0xa2c/0x1830
[   61.659474][   T51]  ? __pfx_process_scheduled_works+0x10/0x10
[   61.665457][   T51]  ? assign_work+0x364/0x3d0
[   61.670053][   T51]  worker_thread+0x86d/0xd70
[   61.674646][   T51]  ? __kthread_parkme+0x169/0x1d0
[   61.679662][   T51]  ? __pfx_worker_thread+0x10/0x10
[   61.684769][   T51]  kthread+0x2f0/0x390
[   61.688830][   T51]  ? __pfx_worker_thread+0x10/0x10
[   61.693929][   T51]  ? __pfx_kthread+0x10/0x10
[   61.698520][   T51]  ret_from_fork+0x4b/0x80
[   61.702928][   T51]  ? __pfx_kthread+0x10/0x10
[   61.707505][   T51]  ret_from_fork_asm+0x1a/0x30
[   61.712277][   T51]  </TASK>