last executing test programs: 431.296573ms ago: executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 418.143705ms ago: executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) 408.259697ms ago: executing program 1: connect(0xffffffffffffffff, &(0x7f0000000000), 0x0) 85.950087ms ago: executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 40.936464ms ago: executing program 2: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.190' (ED25519) to the list of known hosts. 2024/06/14 23:52:52 fuzzer started 2024/06/14 23:52:52 dialing manager at 10.128.0.163:30035 syzkaller login: [ 57.903207][ T5087] cgroup: Unknown subsys name 'net' [ 58.216779][ T5087] cgroup: Unknown subsys name 'rlimit' [ 59.352964][ T5089] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 59.366522][ T5089] syz-executor (5089) used greatest stack depth: 19456 bytes left 2024/06/14 23:53:00 starting 3 executor processes [ 65.916156][ T2439] [ 65.918696][ T2439] ============================= [ 65.923704][ T2439] WARNING: suspicious RCU usage [ 65.928580][ T2439] 6.10.0-rc3-syzkaller-00665-g404dbd26322f #0 Not tainted [ 65.935837][ T2439] ----------------------------- [ 65.940895][ T2439] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 65.950643][ T2439] [ 65.950643][ T2439] other info that might help us debug this: [ 65.950643][ T2439] [ 65.961186][ T2439] 2024/06/14 23:53:00 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 65.961186][ T2439] rcu_scheduler_