============================= WARNING: suspicious RCU usage 6.8.0-rc2-syzkaller-00419-gb555d191561a #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by kworker/u4:5/25380: #0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2184 [inline] #0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xcfc/0x1810 kernel/rcu/tree.c:2465 stack backtrace: CPU: 0 PID: 25380 Comm: kworker/u4:5 Not tainted 6.8.0-rc2-syzkaller-00419-gb555d191561a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Workqueue: 0x0 (events_unbound) Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 lockdep_rcu_suspicious+0x220/0x340 kernel/locking/lockdep.c:6712 hash_netportnet6_destroy+0xf0/0x2c0 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6a/0xe0 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0xd76/0x1810 kernel/rcu/tree.c:2465 __do_softirq+0x2bb/0x942 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632 irq_exit_rcu+0x9/0x30 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:160 [inline] RIP: 0010:_raw_spin_unlock_irq+0x29/0x50 kernel/locking/spinlock.c:202 Code: 90 f3 0f 1e fa 53 48 89 fb 48 83 c7 18 48 8b 74 24 08 e8 ea dc 08 f6 48 89 df e8 a2 1c 0a f6 e8 1d 3a 32 f6 fb bf 01 00 00 00 b2 ed fb f5 65 8b 05 03 65 9b 74 85 c0 74 06 5b c3 cc cc cc cc RSP: 0018:ffffc900146a7dc8 EFLAGS: 00000282 RAX: d49f67544d8d3800 RBX: ffff888014ca1000 RCX: ffffffff9444a303 RDX: dffffc0000000000 RSI: ffffffff8baab560 RDI: 0000000000000001 RBP: dffffc0000000000 R08: ffffffff8f84296f R09: 1ffffffff1f0852d R10: dffffc0000000000 R11: fffffbfff1f0852e R12: ffff888014ca1000 R13: ffff88801f92b000 R14: ffff888014ca1060 R15: ffff88801f92b058 worker_thread+0xc21/0x1000 kernel/workqueue.c:2801 kthread+0x2ef/0x390 kernel/kthread.c:388 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242 ---------------- Code disassembly (best guess): 0: 90 nop 1: f3 0f 1e fa endbr64 5: 53 push %rbx 6: 48 89 fb mov %rdi,%rbx 9: 48 83 c7 18 add $0x18,%rdi d: 48 8b 74 24 08 mov 0x8(%rsp),%rsi 12: e8 ea dc 08 f6 call 0xf608dd01 17: 48 89 df mov %rbx,%rdi 1a: e8 a2 1c 0a f6 call 0xf60a1cc1 1f: e8 1d 3a 32 f6 call 0xf6323a41 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 b2 ed fb f5 call 0xf5fbede1 <-- trapping instruction 2f: 65 8b 05 03 65 9b 74 mov %gs:0x749b6503(%rip),%eax # 0x749b6539 36: 85 c0 test %eax,%eax 38: 74 06 je 0x40 3a: 5b pop %rbx 3b: c3 ret 3c: cc int3 3d: cc int3 3e: cc int3 3f: cc int3