last executing test programs: 360.640964ms ago: executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 236.641103ms ago: executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 122.662121ms ago: executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) 22.278706ms ago: executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 0s ago: executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.46' (ED25519) to the list of known hosts. 2024/06/17 23:19:42 fuzzer started 2024/06/17 23:19:42 dialing manager at 10.128.0.163:30035 [ 54.541545][ T5090] cgroup: Unknown subsys name 'net' [ 54.949627][ T5090] cgroup: Unknown subsys name 'rlimit' [ 55.947899][ T5109] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/17 23:19:49 starting 3 executor processes [ 61.627843][ T2853] [ 61.630335][ T2853] ============================= [ 61.636004][ T2853] WARNING: suspicious RCU usage [ 61.640875][ T2853] 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 Not tainted [ 61.648356][ T2853] ----------------------------- [ 61.653215][ T2853] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 61.662940][ T2853] [ 61.662940][ T2853] other info that might help us debug this: [ 61.662940][ T2853] [ 61.673243][ T2853] 2024/06/17 23:19:50 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 61.673243][ T2853] rcu_scheduler_active = 2, debug_locks = 1 [ 61.681657][ T2853] 3 locks held by kworker/u8:8/2853: [ 61.687014][ T2853] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 61.698050][ T2853] #1: ffffc9000a427d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 61.708691][ T2853] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 61.718202][ T2853] [ 61.718202][ T2853] stack backtrace: [ 61.724109][ T2853] CPU: 0 PID: 2853 Comm: kworker/u8:8 Not tainted 6.10.0-rc3-syzkaller-00696-g4314175af496 #0 [ 61.734360][ T2853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 61.744429][ T2853] Workqueue: netns cleanup_net [ 61.749236][ T2853] Call Trace: [ 61.752521][ T2853] [ 61.755452][ T2853] dump_stack_lvl+0x241/0x360 [ 61.760152][ T2853] ? __pfx_dump_stack_lvl+0x10/0x10 [ 61.765368][ T2853] ? __pfx__printk+0x10/0x10 [ 61.769980][ T2853] lockdep_rcu_suspicious+0x221/0x340 [ 61.775366][ T2853] _destroy_all_sets+0x232/0x5f0 [ 61.780322][ T2853] ip_set_net_exit+0x20/0x50 [ 61.784924][ T2853] cleanup_net+0x802/0xcc0 [ 61.789360][ T2853] ? __pfx_cleanup_net+0x10/0x10 [ 61.794322][ T2853] ? process_scheduled_works+0x945/0x1830 [ 61.800050][ T2853] process_scheduled_works+0xa2c/0x1830 [ 61.805649][ T2853] ? __pfx_process_scheduled_works+0x10/0x10 [ 61.811648][ T2853] ? assign_work+0x364/0x3d0 [ 61.816254][ T2853] worker_thread+0x86d/0xd70 [ 61.820869][ T2853] ? __kthread_parkme+0x169/0x1d0 [ 61.825907][ T2853] ? __pfx_worker_thread+0x10/0x10 [ 61.831024][ T2853] kthread+0x2f0/0x390 [ 61.835104][ T2853] ? __pfx_worker_thread+0x10/0x10 [ 61.840222][ T2853] ? __pfx_kthread+0x10/0x10 [ 61.844823][ T2853] ret_from_fork+0x4b/0x80 [ 61.849249][ T2853] ? __pfx_kthread+0x10/0x10 [ 61.853846][ T2853] ret_from_fork_asm+0x1a/0x30 [ 61.858636][ T2853] [ 61.865796][ T2853] [ 61.868154][ T2853] ============================= [ 61.873010][ T2853] WARNING: suspicious RCU usage [ 61.87793