=============================
WARNING: suspicious RCU usage
6.8.0-rc3-syzkaller #0 Not tainted
-----------------------------
net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
5 locks held by syz-executor.5/5033:
#0: ffff888023c294a0 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:146 [inline]
#0: ffff888023c294a0 (&mm->mmap_lock){++++}-{3:3}, at: exit_mmap+0x1be/0xd40 mm/mmap.c:3263
#1: ffffffff8e130ae0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
#1: ffffffff8e130ae0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
#1: ffffffff8e130ae0 (rcu_read_lock){....}-{1:2}, at: __pte_offset_map+0x82/0x380 mm/pgtable-generic.c:285
#2: ffff888026560888 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
#2: ffff888026560888 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: __pte_offset_map_lock+0x1ba/0x300 mm/pgtable-generic.c:373
#3: ffffffff8e130a60 (rcu_read_lock_sched){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
#3: ffffffff8e130a60 (rcu_read_lock_sched){....}-{1:2}, at: rcu_read_lock_sched include/linux/rcupdate.h:842 [inline]
#3: ffffffff8e130a60 (rcu_read_lock_sched){....}-{1:2}, at: pfn_valid+0xf6/0x440 include/linux/mmzone.h:2016
#4: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
#4: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2184 [inline]
#4: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xcfc/0x1810 kernel/rcu/tree.c:2465
stack backtrace:
CPU: 1 PID: 5033 Comm: syz-executor.5 Not tainted 6.8.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
lockdep_rcu_suspicious+0x220/0x340 kernel/locking/lockdep.c:6712
hash_netportnet6_destroy+0xf0/0x2c0 net/netfilter/ipset/ip_set_hash_gen.h:455
ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline]
ip_set_destroy_set_rcu+0x6c/0xe0 net/netfilter/ipset/ip_set_core.c:1190
rcu_do_batch kernel/rcu/tree.c:2190 [inline]
rcu_core+0xd78/0x1810 kernel/rcu/tree.c:2465
__do_softirq+0x2bd/0x942 kernel/softirq.c:553
invoke_softirq kernel/softirq.c:427 [inline]
__irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632
irq_exit_rcu+0x9/0x30 kernel/softirq.c:644
sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:check_preemption_disabled+0x4f/0x120 lib/smp_processor_id.c:55
Code: 9d 74 a9 ff ff ff 7f 74 26 65 48 8b 04 25 28 00 00 00 48 3b 44 24 08 0f 85 cd 00 00 00 89 d8 48 83 c4 10 5b 41 5c 41 5e 41 5f 5c e3 0a 00 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02
RSP: 0018:ffffc90003eaf438 EFLAGS: 00000286
RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff81713840
RDX: 0000000000000000 RSI: ffffffff8bfe6700 RDI: ffffffff8bfe66c0
RBP: ffffc90003eaf590 R08: ffffffff8f8557af R09: 1ffffffff1f0aaf5
R10: dffffc0000000000 R11: fffffbfff1f0aaf6 R12: 1ffff920007d5e98
R13: ffffffff82014b76 R14: ffffffff82014b76 R15: dffffc0000000000
rcu_dynticks_curr_cpu_in_eqs include/linux/context_tracking.h:122 [inline]
rcu_is_watching+0x15/0xb0 kernel/rcu/tree.c:700
trace_lock_release include/trace/events/lock.h:69 [inline]
lock_release+0xbf/0x9d0 kernel/locking/lockdep.c:5765
rcu_lock_release include/linux/rcupdate.h:308 [inline]
rcu_read_unlock_sched include/linux/rcupdate.h:863 [inline]
pfn_valid+0x3e0/0x440 include/linux/mmzone.h:2026
page_table_check_clear+0x21/0x730 mm/page_table_check.c:68
zap_pte_range mm/memory.c:1452 [inline]
zap_pmd_range mm/memory.c:1597 [inline]
zap_pud_range mm/memory.c:1626 [inline]
zap_p4d_range mm/memory.c:1647 [inline]
unmap_page_range+0x1f79/0x3600 mm/memory.c:1668
unmap_vmas+0x3cc/0x5f0 mm/memory.c:1758
exit_mmap+0x2c6/0xd40 mm/mmap.c:3279
__mmput+0x115/0x3c0 kernel/fork.c:1343
exit_mm+0x21f/0x310 kernel/exit.c:569
do_exit+0x9af/0x2740 kernel/exit.c:858
do_group_exit+0x206/0x2c0 kernel/exit.c:1020
__do_sys_exit_group kernel/exit.c:1031 [inline]
__se_sys_exit_group kernel/exit.c:1029 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1029
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7fb3d447dda9
Code: Unable to access opcode bytes at 0x7fb3d447dd7f.
RSP: 002b:00007fff49affe58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fb3d447dda9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: 000000000000004e R09: 0000000000000000
R10: 0000001b2c720000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001
----------------
Code disassembly (best guess), 2 bytes skipped:
0: a9 ff ff ff 7f test $0x7fffffff,%eax
5: 74 26 je 0x2d
7: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax
e: 00 00
10: 48 3b 44 24 08 cmp 0x8(%rsp),%rax
15: 0f 85 cd 00 00 00 jne 0xe8
1b: 89 d8 mov %ebx,%eax
1d: 48 83 c4 10 add $0x10,%rsp
21: 5b pop %rbx
22: 41 5c pop %r12
24: 41 5e pop %r14
26: 41 5f pop %r15
* 28: e9 5c e3 0a 00 jmp 0xae389 <-- trapping instruction
2d: 48 c7 04 24 00 00 00 movq $0x0,(%rsp)
34: 00
35: 9c pushf
36: 8f 04 24 pop (%rsp)
39: f7 .byte 0xf7
3a: 04 24 add $0x24,%al
3c: 00 02 add %al,(%rdx)