=============================
WARNING: suspicious RCU usage
6.8.0-rc2-syzkaller-00419-gb555d191561a #0 Not tainted
-----------------------------
net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
1 lock held by kworker/u4:5/25380:
#0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
#0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2184 [inline]
#0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xcfc/0x1810 kernel/rcu/tree.c:2465
stack backtrace:
CPU: 0 PID: 25380 Comm: kworker/u4:5 Not tainted 6.8.0-rc2-syzkaller-00419-gb555d191561a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Workqueue: 0x0 (events_unbound)
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
lockdep_rcu_suspicious+0x220/0x340 kernel/locking/lockdep.c:6712
hash_netportnet6_destroy+0xf0/0x2c0 net/netfilter/ipset/ip_set_hash_gen.h:455
ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline]
ip_set_destroy_set_rcu+0x6a/0xe0 net/netfilter/ipset/ip_set_core.c:1190
rcu_do_batch kernel/rcu/tree.c:2190 [inline]
rcu_core+0xd76/0x1810 kernel/rcu/tree.c:2465
__do_softirq+0x2bb/0x942 kernel/softirq.c:553
invoke_softirq kernel/softirq.c:427 [inline]
__irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632
irq_exit_rcu+0x9/0x30 kernel/softirq.c:644
sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:160 [inline]
RIP: 0010:_raw_spin_unlock_irq+0x29/0x50 kernel/locking/spinlock.c:202
Code: 90 f3 0f 1e fa 53 48 89 fb 48 83 c7 18 48 8b 74 24 08 e8 ea dc 08 f6 48 89 df e8 a2 1c 0a f6 e8 1d 3a 32 f6 fb bf 01 00 00 00 b2 ed fb f5 65 8b 05 03 65 9b 74 85 c0 74 06 5b c3 cc cc cc cc
RSP: 0018:ffffc900146a7dc8 EFLAGS: 00000282
RAX: d49f67544d8d3800 RBX: ffff888014ca1000 RCX: ffffffff9444a303
RDX: dffffc0000000000 RSI: ffffffff8baab560 RDI: 0000000000000001
RBP: dffffc0000000000 R08: ffffffff8f84296f R09: 1ffffffff1f0852d
R10: dffffc0000000000 R11: fffffbfff1f0852e R12: ffff888014ca1000
R13: ffff88801f92b000 R14: ffff888014ca1060 R15: ffff88801f92b058
worker_thread+0xc21/0x1000 kernel/workqueue.c:2801
kthread+0x2ef/0x390 kernel/kthread.c:388
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242
----------------
Code disassembly (best guess):
0: 90 nop
1: f3 0f 1e fa endbr64
5: 53 push %rbx
6: 48 89 fb mov %rdi,%rbx
9: 48 83 c7 18 add $0x18,%rdi
d: 48 8b 74 24 08 mov 0x8(%rsp),%rsi
12: e8 ea dc 08 f6 call 0xf608dd01
17: 48 89 df mov %rbx,%rdi
1a: e8 a2 1c 0a f6 call 0xf60a1cc1
1f: e8 1d 3a 32 f6 call 0xf6323a41
24: fb sti
25: bf 01 00 00 00 mov $0x1,%edi
* 2a: e8 b2 ed fb f5 call 0xf5fbede1 <-- trapping instruction
2f: 65 8b 05 03 65 9b 74 mov %gs:0x749b6503(%rip),%eax # 0x749b6539
36: 85 c0 test %eax,%eax
38: 74 06 je 0x40
3a: 5b pop %rbx
3b: c3 ret
3c: cc int3
3d: cc int3
3e: cc int3
3f: cc int3