============================= WARNING: suspicious RCU usage 6.8.0-rc3-syzkaller-gf735966ee23c #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor.4/6201: #0: ffff0000c2f94420 (sb_writers#6){.+.+}-{0:0}, at: call_write_iter include/linux/fs.h:2085 [inline] #0: ffff0000c2f94420 (sb_writers#6){.+.+}-{0:0}, at: new_sync_write fs/read_write.c:497 [inline] #0: ffff0000c2f94420 (sb_writers#6){.+.+}-{0:0}, at: vfs_write+0x968/0xc3c fs/read_write.c:590 #1: ffff80008ee44080 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire+0xc/0x3c include/linux/rcupdate.h:297 stack backtrace: CPU: 1 PID: 6201 Comm: syz-executor.4 Not tainted 6.8.0-rc3-syzkaller-gf735966ee23c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x260/0x464 kernel/locking/lockdep.c:6712 hash_netportnet6_destroy+0xe0/0x268 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6c/0xe8 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0x890/0x1b34 kernel/rcu/tree.c:2465 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2482 __do_softirq+0x2d8/0xce4 kernel/softirq.c:553 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:434 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:632 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 inode_set_atime_to_ts include/linux/fs.h:1541 [inline] inode_update_timestamps+0x688/0x734 fs/inode.c:1876 generic_update_time fs/inode.c:1898 [inline] inode_update_time fs/inode.c:1918 [inline] __file_update_time fs/inode.c:2106 [inline] file_update_time+0x104/0x1ac fs/inode.c:2136 pipe_write+0x1118/0x1880 fs/pipe.c:617 call_write_iter include/linux/fs.h:2085 [inline] new_sync_write fs/read_write.c:497 [inline] vfs_write+0x968/0xc3c fs/read_write.c:590 ksys_write+0x15c/0x26c fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __arm64_sys_write+0x7c/0x90 fs/read_write.c:652 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 ============================= WARNING: suspicious RCU usage 6.8.0-rc3-syzkaller-gf735966ee23c #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor.4/883: #0: ffff80008ee44080 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire+0xc/0x3c include/linux/rcupdate.h:297 stack backtrace: CPU: 1 PID: 883 Comm: syz-executor.4 Not tainted 6.8.0-rc3-syzkaller-gf735966ee23c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x260/0x464 kernel/locking/lockdep.c:6712 hash_ipportip4_destroy+0xe0/0x268 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6c/0xe8 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0x890/0x1b34 kernel/rcu/tree.c:2465 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2482 __do_softirq+0x2d8/0xce4 kernel/softirq.c:553 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:434 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:632 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline] arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] _raw_spin_unlock_irq+0x34/0x80 kernel/locking/spinlock.c:202 spin_unlock_irq include/linux/spinlock.h:401 [inline] clear_inode fs/inode.c:621 [inline] evict+0x2ac/0x68c fs/inode.c:668 iput_final fs/inode.c:1739 [inline] iput+0x734/0x818 fs/inode.c:1765 dentry_unlink_inode+0x36c/0x4ac fs/dcache.c:400 __dentry_kill+0x178/0x5e8 fs/dcache.c:603 dput+0x1b8/0x290 fs/dcache.c:845 __fput+0x4f8/0x738 fs/file_table.c:384 ____fput+0x20/0x30 fs/file_table.c:404 task_work_run+0x230/0x2e0 kernel/task_work.c:180 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x618/0x1f64 kernel/exit.c:871 do_group_exit+0x194/0x22c kernel/exit.c:1020 __do_sys_exit_group kernel/exit.c:1031 [inline] __se_sys_exit_group kernel/exit.c:1029 [inline] pid_child_should_wake+0x0/0x1dc kernel/exit.c:1029 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598