=============================== [ INFO: suspicious RCU usage. ] 4.9.141+ #1 Not tainted ------------------------------- net/ipv6/ip6_fib.c:1471 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 0 3 locks held by syz-executor.1/27237: #0: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:70 #1: (rcu_read_lock){......}, at: [] __fib6_clean_all+0x0/0x220 net/ipv6/ip6_fib.c:1703 #2: (&tb->tb6_lock){++--..}, at: [] __fib6_clean_all+0xe0/0x220 net/ipv6/ip6_fib.c:1717 stack backtrace: CPU: 0 PID: 27237 Comm: syz-executor.1 Not tainted 4.9.141+ #1 ffff88017b807490 ffffffff81b42e79 ffff8801d7c10000 0000000000000000 0000000000000002 ffffffff82cc2480 ffffed002f700ee0 ffff88017b8074c0 ffffffff813fe948 ffff8801d6d2bdc0 ffff88017b8076b0 ffff8801d6d2bdc0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] lockdep_rcu_suspicious.cold.32+0x110/0x141 kernel/locking/lockdep.c:4455 [] fib6_del+0x810/0xb10 net/ipv6/ip6_fib.c:1470 [] fib6_clean_node+0x220/0x4c0 net/ipv6/ip6_fib.c:1657 [] fib6_walk_continue+0x3e5/0x640 net/ipv6/ip6_fib.c:1583 [] fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1628 [] fib6_clean_tree+0xd3/0x110 net/ipv6/ip6_fib.c:1702 [] __fib6_clean_all+0xf9/0x220 net/ipv6/ip6_fib.c:1718 [] fib6_clean_all+0x27/0x30 net/ipv6/ip6_fib.c:1729 [] rt6_ifdown+0xa1/0x7f0 net/ipv6/route.c:2719 [] addrconf_ifdown+0xd0/0x1420 net/ipv6/addrconf.c:3569 [] addrconf_notify+0x8ee/0x2140 net/ipv6/addrconf.c:3493 [] notifier_call_chain+0xb4/0x1d0 kernel/notifier.c:93 [] __raw_notifier_call_chain kernel/notifier.c:394 [inline] [] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 [] call_netdevice_notifiers_info+0x55/0x70 net/core/dev.c:1647 [] call_netdevice_notifiers net/core/dev.c:1663 [inline] [] rollback_registered_many+0x6e5/0xb50 net/core/dev.c:6860 [] rollback_registered+0xee/0x1b0 net/core/dev.c:6901 [] unregister_netdevice_queue+0x1aa/0x230 net/core/dev.c:7888 [] unregister_netdevice include/linux/netdevice.h:2465 [inline] [] __tun_detach+0x821/0xa00 drivers/net/tun.c:575 [] tun_detach drivers/net/tun.c:585 [inline] [] tun_chr_close+0x44/0x60 drivers/net/tun.c:2392 [] __fput+0x263/0x700 fs/file_table.c:208 [] ____fput+0x15/0x20 fs/file_table.c:244 [] task_work_run+0x10c/0x180 kernel/task_work.c:116 [] tracehook_notify_resume include/linux/tracehook.h:191 [inline] [] exit_to_usermode_loop+0x129/0x150 arch/x86/entry/common.c:162 [] prepare_exit_to_usermode arch/x86/entry/common.c:194 [inline] [] syscall_return_slowpath arch/x86/entry/common.c:263 [inline] [] do_syscall_64+0x3e2/0x550 arch/x86/entry/common.c:290 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb device lo entered promiscuous mode device lo left promiscuous mode input: syz1 as /devices/virtual/input/input133 device lo entered promiscuous mode device lo left promiscuous mode uinput: write device info first devpts: called with bogus options audit: type=1400 audit(1560918441.938:169): avc: denied { dac_read_search } for pid=27497 comm="syz-executor.1" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1