============================= WARNING: suspicious RCU usage 6.1.95-syzkaller #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_core.c:1202 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by kworker/u4:4/1606: #0: ffff0000c0845138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x664/0x1404 kernel/workqueue.c:2265 #1: ffff8000225a7c20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6a8/0x1404 kernel/workqueue.c:2267 #2: ffff800017e26350 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf4/0x994 net/core/net_namespace.c:566 stack backtrace: CPU: 1 PID: 1606 Comm: kworker/u4:4 Not tainted 6.1.95-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: netns cleanup_net Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x5c lib/dump_stack.c:113 lockdep_rcu_suspicious+0x260/0x464 kernel/locking/lockdep.c:6592 _destroy_all_sets+0x21c/0x5a4 net/netfilter/ipset/ip_set_core.c:1202 ip_set_net_exit+0x28/0x60 net/netfilter/ipset/ip_set_core.c:2398 ops_exit_list net/core/net_namespace.c:172 [inline] cleanup_net+0x564/0x994 net/core/net_namespace.c:604 process_one_work+0x7ac/0x1404 kernel/workqueue.c:2292 worker_thread+0x8e4/0xfec kernel/workqueue.c:2439 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:864