============================= WARNING: suspicious RCU usage 6.8.0-rc2-syzkaller-00199-g021533194476 #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor.0/16103: #0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2184 [inline] #0: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xcfc/0x1810 kernel/rcu/tree.c:2465 stack backtrace: CPU: 0 PID: 16103 Comm: syz-executor.0 Not tainted 6.8.0-rc2-syzkaller-00199-g021533194476 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 lockdep_rcu_suspicious+0x220/0x340 kernel/locking/lockdep.c:6712 hash_netportnet6_destroy+0xf0/0x2c0 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6a/0xe0 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0xd76/0x1810 kernel/rcu/tree.c:2465 __do_softirq+0x2bb/0x942 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632 irq_exit_rcu+0x9/0x30 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:unix_dgram_recvmsg+0x39/0xe0 net/unix/af_unix.c:2475 Code: 89 ce 49 89 d7 49 89 f4 48 89 fb 49 bd 00 00 00 00 00 fc ff df e8 27 89 93 f7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 28 00 <74> 08 48 89 df e8 8d 56 f2 f7 48 8b 1b 48 8d 6b 28 48 89 e8 48 c1 RSP: 0018:ffffc90004827888 EFLAGS: 00000246 RAX: 1ffff11009876f03 RBX: ffff88804c3b7818 RCX: 0000000000040000 RDX: ffffc9000a829000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: ffffffff8caacb90 R08: ffffffff892b6eee R09: 0000000000000000 R10: ffffc90004827980 R11: ffffffff89ffdce0 R12: ffffc90004827d00 R13: dffffc0000000000 R14: 0000000000000002 R15: 0000000000000000 sock_recvmsg_nosec+0x18e/0x1d0 net/socket.c:1046 ____sys_recvmsg+0x3c0/0x470 net/socket.c:2801 ___sys_recvmsg net/socket.c:2845 [inline] do_recvmmsg+0x474/0xae0 net/socket.c:2939 __sys_recvmmsg net/socket.c:3018 [inline] __do_sys_recvmmsg net/socket.c:3041 [inline] __se_sys_recvmmsg net/socket.c:3034 [inline] __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f2168c7dda9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2167fff0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f2168dac050 RCX: 00007f2168c7dda9 RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000006 RBP: 00007f2168cca47a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007f2168dac050 R15: 00007ffdbb9b9e58 ---------------- Code disassembly (best guess): 0: 89 ce mov %ecx,%esi 2: 49 89 d7 mov %rdx,%r15 5: 49 89 f4 mov %rsi,%r12 8: 48 89 fb mov %rdi,%rbx b: 49 bd 00 00 00 00 00 movabs $0xdffffc0000000000,%r13 12: fc ff df 15: e8 27 89 93 f7 call 0xf7938941 1a: 48 83 c3 18 add $0x18,%rbx 1e: 48 89 d8 mov %rbx,%rax 21: 48 c1 e8 03 shr $0x3,%rax 25: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) * 2a: 74 08 je 0x34 <-- trapping instruction 2c: 48 89 df mov %rbx,%rdi 2f: e8 8d 56 f2 f7 call 0xf7f256c1 34: 48 8b 1b mov (%rbx),%rbx 37: 48 8d 6b 28 lea 0x28(%rbx),%rbp 3b: 48 89 e8 mov %rbp,%rax 3e: 48 rex.W 3f: c1 .byte 0xc1