last executing test programs: 472.272097ms ago: executing program 1: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000)) 448.30881ms ago: executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 391.293969ms ago: executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) 85.433797ms ago: executing program 1: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) 201.67µs ago: executing program 0: bind(0xffffffffffffffff, &(0x7f0000000000), 0x0) 0s ago: executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.44' (ED25519) to the list of known hosts. 2024/06/15 13:12:18 fuzzer started 2024/06/15 13:12:18 dialing manager at 10.128.0.163:30035 [ 54.321241][ T5087] cgroup: Unknown subsys name 'net' [ 54.605774][ T5087] cgroup: Unknown subsys name 'rlimit' [ 55.742122][ T5114] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.755173][ T5114] syz-executor (5114) used greatest stack depth: 18704 bytes left 2024/06/15 13:12:26 starting 3 executor processes [ 62.281630][ T12] [ 62.284191][ T12] ============================= [ 62.289076][ T12] WARNING: suspicious RCU usage [ 62.294091][ T12] 6.10.0-rc3-syzkaller-00688-g934c29999b57 #0 Not tainted [ 62.301208][ T12] ----------------------------- [ 62.306140][ T12] net/netfilter/ipset/ip_set_core.c:1200 suspicious rcu_dereference_protected() usage! [ 62.316047][ T12] [ 62.316047][ T12] other info that might help us debug this: [ 62.316047][ T12] [ 62.326769][ T12] 2024/06/15 13:12:26 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 62.326769][ T12] rcu_scheduler_active = 2, debug_locks = 1 [ 62.335258][ T12] 3 locks held by kworker/u8:1/12: [ 62.340488][ T12] #0: ffff888015edd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 [ 62.351934][ T12] #1: ffffc90000117d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 [ 62.362831][ T12] #2: ffffffff8f5db650 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x16a/0xcc0 [ 62.372897][ T12] [ 62.372897][ T12] stack backtrace: [ 62.378827][ T12] CPU: 0 PID: 12 C