============================= WARNING: suspicious RCU usage 6.8.0-rc3-syzkaller-gf735966ee23c #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by udevd/5780: #0: ffff0000d226a0c8 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x218/0x2a4 fs/file.c:1191 #1: ffff0000dce6d080 (&type->i_mutex_dir_key#4){++++}-{3:3}, at: iterate_dir+0x340/0x580 fs/readdir.c:103 #2: ffff80008ee44080 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire+0xc/0x3c include/linux/rcupdate.h:297 stack backtrace: CPU: 1 PID: 5780 Comm: udevd Not tainted 6.8.0-rc3-syzkaller-gf735966ee23c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x260/0x464 kernel/locking/lockdep.c:6712 hash_netportnet6_destroy+0xe0/0x268 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6c/0xe8 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0x890/0x1b34 kernel/rcu/tree.c:2465 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2482 __do_softirq+0x2d8/0xce4 kernel/softirq.c:553 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:434 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:632 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 check_kcov_mode kernel/kcov.c:173 [inline] __sanitizer_cov_trace_pc+0x34/0x6c kernel/kcov.c:207 arch_kunwind_consume_entry arch/arm64/kernel/stacktrace.c:254 [inline] do_kunwind arch/arm64/kernel/stacktrace.c:169 [inline] kunwind_stack_walk arch/arm64/kernel/stacktrace.c:242 [inline] arch_stack_walk+0x1b4/0x2e4 arch/arm64/kernel/stacktrace.c:266 return_address+0xcc/0x16c arch/arm64/kernel/return_address.c:42 get_lock_parent_ip include/linux/ftrace.h:976 [inline] preempt_latency_start kernel/sched/core.c:5843 [inline] preempt_count_add+0x100/0x2f8 kernel/sched/core.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:132 [inline] _raw_spin_lock+0x20/0x60 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] find_vmap_area+0x2c/0x11c mm/vmalloc.c:1861 check_heap_object mm/usercopy.c:177 [inline] __check_object_size+0x27c/0x704 mm/usercopy.c:251 check_object_size include/linux/thread_info.h:215 [inline] __copy_to_user include/linux/uaccess.h:137 [inline] filldir64+0x6ec/0x948 fs/readdir.c:379 dir_emit include/linux/fs.h:3480 [inline] kernfs_fop_readdir+0x4d8/0x7b4 fs/kernfs/dir.c:1863 iterate_dir+0x3f8/0x580 fs/readdir.c:110 __do_sys_getdents64 fs/readdir.c:409 [inline] __se_sys_getdents64 fs/readdir.c:394 [inline] __arm64_sys_getdents64+0x1c4/0x4a0 fs/readdir.c:394 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598