============================= WARNING: suspicious RCU usage 6.8.0-rc3-syzkaller-gf735966ee23c #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 8 locks held by syz-executor.3/6220: #0: ffff0000d79aa990 (&mm->mmap_lock){++++}-{3:3}, at: mmap_write_lock_killable include/linux/mmap_lock.h:124 [inline] #0: ffff0000d79aa990 (&mm->mmap_lock){++++}-{3:3}, at: dup_mmap kernel/fork.c:636 [inline] #0: ffff0000d79aa990 (&mm->mmap_lock){++++}-{3:3}, at: dup_mm kernel/fork.c:1685 [inline] #0: ffff0000d79aa990 (&mm->mmap_lock){++++}-{3:3}, at: copy_mm+0x204/0x1bbc kernel/fork.c:1734 #1: ffff0000da942190 (&mm->mmap_lock/1){+.+.}-{3:3}, at: mmap_write_lock_nested include/linux/mmap_lock.h:115 [inline] #1: ffff0000da942190 (&mm->mmap_lock/1){+.+.}-{3:3}, at: dup_mmap kernel/fork.c:645 [inline] #1: ffff0000da942190 (&mm->mmap_lock/1){+.+.}-{3:3}, at: dup_mm kernel/fork.c:1685 [inline] #1: ffff0000da942190 (&mm->mmap_lock/1){+.+.}-{3:3}, at: copy_mm+0x30c/0x1bbc kernel/fork.c:1734 #2: ffff80008ee43fc0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:297 #3: ffff0000d96cd258 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] #3: ffff0000d96cd258 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: __pte_offset_map_lock+0x158/0x368 mm/pgtable-generic.c:373 #4: ffff80008ee43fc0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:297 #5: ffff0000daad3b58 (ptlock_ptr(ptdesc)#2/1){+.+.}-{2:2}, at: copy_pte_range mm/memory.c:1059 [inline] #5: ffff0000daad3b58 (ptlock_ptr(ptdesc)#2/1){+.+.}-{2:2}, at: copy_pmd_range mm/memory.c:1187 [inline] #5: ffff0000daad3b58 (ptlock_ptr(ptdesc)#2/1){+.+.}-{2:2}, at: copy_pud_range mm/memory.c:1224 [inline] #5: ffff0000daad3b58 (ptlock_ptr(ptdesc)#2/1){+.+.}-{2:2}, at: copy_p4d_range mm/memory.c:1248 [inline] #5: ffff0000daad3b58 (ptlock_ptr(ptdesc)#2/1){+.+.}-{2:2}, at: copy_page_range+0xb38/0x3b28 mm/memory.c:1346 #6: ffff80008ee43fc0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x18/0x54 include/linux/rcupdate.h:297 #7: ffff80008ee44080 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire+0xc/0x3c include/linux/rcupdate.h:297 stack backtrace: CPU: 0 PID: 6220 Comm: syz-executor.3 Not tainted 6.8.0-rc3-syzkaller-gf735966ee23c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x260/0x464 kernel/locking/lockdep.c:6712 hash_netportnet6_destroy+0xe0/0x268 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6c/0xe8 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0x890/0x1b34 kernel/rcu/tree.c:2465 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2482 __do_softirq+0x2d8/0xce4 kernel/softirq.c:553 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:434 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:632 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __kern_my_cpu_offset+0x14/0x20 arch/arm64/include/asm/percpu.h:40 check_preemption_disabled+0x28/0xf8 lib/smp_processor_id.c:14 debug_smp_processor_id+0x20/0x2c lib/smp_processor_id.c:60 rcu_dynticks_curr_cpu_in_eqs include/linux/context_tracking.h:122 [inline] rcu_is_watching+0x5c/0x18c kernel/rcu/tree.c:700 trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0xe4/0x9ac kernel/locking/lockdep.c:5765 rcu_lock_release+0x30/0x40 include/linux/rcupdate.h:309 rcu_read_unlock include/linux/rcupdate.h:783 [inline] page_ext_put+0xb8/0xd0 mm/page_ext.c:533 page_table_check_set+0x3e4/0x484 mm/page_table_check.c:126 __page_table_check_ptes_set+0x1e4/0x238 mm/page_table_check.c:196 page_table_check_ptes_set include/linux/page_table_check.h:74 [inline] set_ptes arch/arm64/include/asm/pgtable.h:352 [inline] copy_present_pte mm/memory.c:993 [inline] copy_pte_range mm/memory.c:1102 [inline] copy_pmd_range mm/memory.c:1187 [inline] copy_pud_range mm/memory.c:1224 [inline] copy_p4d_range mm/memory.c:1248 [inline] copy_page_range+0x2bf8/0x3b28 mm/memory.c:1346 dup_mmap kernel/fork.c:745 [inline] dup_mm kernel/fork.c:1685 [inline] copy_mm+0xf4c/0x1bbc kernel/fork.c:1734 copy_process+0x1980/0x3478 kernel/fork.c:2497 kernel_clone+0x1d8/0x80c kernel/fork.c:2902 __do_sys_clone kernel/fork.c:3045 [inline] __se_sys_clone kernel/fork.c:3013 [inline] __arm64_sys_clone+0x1f8/0x24c kernel/fork.c:3013 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 ============================= WARNING: suspicious RCU usage 6.8.0-rc3-syzkaller-gf735966ee23c #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor.0/7228: #0: ffff80008ee43fc0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0xc/0x44 include/linux/rcupdate.h:297 #1: ffff80008ee44080 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire+0xc/0x3c include/linux/rcupdate.h:297 stack backtrace: CPU: 0 PID: 7228 Comm: syz-executor.0 Not tainted 6.8.0-rc3-syzkaller-gf735966ee23c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x260/0x464 kernel/locking/lockdep.c:6712 hash_ipport6_destroy+0xe0/0x268 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6c/0xe8 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0x890/0x1b34 kernel/rcu/tree.c:2465 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2482 __do_softirq+0x2d8/0xce4 kernel/softirq.c:553 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:434 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:632 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:176 [inline] arch_local_irq_restore arch/arm64/include/asm/irqflags.h:196 [inline] lock_acquire+0x278/0x71c kernel/locking/lockdep.c:5757 rcu_lock_acquire+0x38/0x44 include/linux/rcupdate.h:298 rcu_read_lock include/linux/rcupdate.h:750 [inline] percpu_ref_put_many include/linux/percpu-refcount.h:330 [inline] percpu_ref_put+0x24/0x274 include/linux/percpu-refcount.h:351 css_put include/linux/cgroup_refcnt.h:79 [inline] uncharge_folio+0x34c/0x4e8 mm/memcontrol.c:7478 __mem_cgroup_uncharge_list+0xc8/0x154 mm/memcontrol.c:7508 mem_cgroup_uncharge_list include/linux/memcontrol.h:720 [inline] release_pages+0xeec/0x114c mm/swap.c:1041 __folio_batch_release+0x94/0x10c mm/swap.c:1062 folio_batch_release include/linux/pagevec.h:83 [inline] shmem_undo_range+0x498/0x12d8 mm/shmem.c:1005 shmem_truncate_range mm/shmem.c:1114 [inline] shmem_evict_inode+0x230/0x8b4 mm/shmem.c:1242 evict+0x260/0x68c fs/inode.c:665 iput_final fs/inode.c:1739 [inline] iput+0x734/0x818 fs/inode.c:1765 dentry_unlink_inode+0x36c/0x4ac fs/dcache.c:400 __dentry_kill+0x178/0x5e8 fs/dcache.c:603 dput+0x1b8/0x290 fs/dcache.c:845 __fput+0x4f8/0x738 fs/file_table.c:384 __fput_sync+0x60/0x9c fs/file_table.c:461 __do_sys_close fs/open.c:1554 [inline] __se_sys_close fs/open.c:1539 [inline] __arm64_sys_close+0x150/0x1e0 fs/open.c:1539 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598