=============================
WARNING: suspicious RCU usage
6.8.0-rc3-syzkaller-gf735966ee23c #0 Not tainted
-----------------------------
net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
1 lock held by syz-fuzzer/6360:
 #0: ffff80008ee44080 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire+0xc/0x3c include/linux/rcupdate.h:297

stack backtrace:
CPU: 1 PID: 6360 Comm: syz-fuzzer Not tainted 6.8.0-rc3-syzkaller-gf735966ee23c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Call trace:
 dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106
 dump_stack+0x1c/0x28 lib/dump_stack.c:113
 lockdep_rcu_suspicious+0x260/0x464 kernel/locking/lockdep.c:6712
 hash_netportnet6_destroy+0xe0/0x268 net/netfilter/ipset/ip_set_hash_gen.h:455
 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline]
 ip_set_destroy_set_rcu+0x6c/0xe8 net/netfilter/ipset/ip_set_core.c:1190
 rcu_do_batch kernel/rcu/tree.c:2190 [inline]
 rcu_core+0x890/0x1b34 kernel/rcu/tree.c:2465
 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2482
 __do_softirq+0x2d8/0xce4 kernel/softirq.c:553
 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81
 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889
 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86
 invoke_softirq kernel/softirq.c:434 [inline]
 __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:632
 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644
 el0_interrupt+0x6c/0x234 arch/arm64/kernel/entry-common.c:761
 __el0_irq_handler_common+0x18/0x24 arch/arm64/kernel/entry-common.c:768
 el0t_64_irq_handler+0x10/0x1c arch/arm64/kernel/entry-common.c:773
 el0t_64_irq+0x190/0x194 arch/arm64/kernel/entry.S:599