============================= WARNING: suspicious RCU usage 6.8.0-rc3-syzkaller #0 Not tainted ----------------------------- net/netfilter/ipset/ip_set_hash_gen.h:455 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 5 locks held by syz-executor.5/5033: #0: ffff888023c294a0 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:146 [inline] #0: ffff888023c294a0 (&mm->mmap_lock){++++}-{3:3}, at: exit_mmap+0x1be/0xd40 mm/mmap.c:3263 #1: ffffffff8e130ae0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #1: ffffffff8e130ae0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline] #1: ffffffff8e130ae0 (rcu_read_lock){....}-{1:2}, at: __pte_offset_map+0x82/0x380 mm/pgtable-generic.c:285 #2: ffff888026560888 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] #2: ffff888026560888 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: __pte_offset_map_lock+0x1ba/0x300 mm/pgtable-generic.c:373 #3: ffffffff8e130a60 (rcu_read_lock_sched){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #3: ffffffff8e130a60 (rcu_read_lock_sched){....}-{1:2}, at: rcu_read_lock_sched include/linux/rcupdate.h:842 [inline] #3: ffffffff8e130a60 (rcu_read_lock_sched){....}-{1:2}, at: pfn_valid+0xf6/0x440 include/linux/mmzone.h:2016 #4: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #4: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2184 [inline] #4: ffffffff8e130ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xcfc/0x1810 kernel/rcu/tree.c:2465 stack backtrace: CPU: 1 PID: 5033 Comm: syz-executor.5 Not tainted 6.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 lockdep_rcu_suspicious+0x220/0x340 kernel/locking/lockdep.c:6712 hash_netportnet6_destroy+0xf0/0x2c0 net/netfilter/ipset/ip_set_hash_gen.h:455 ip_set_destroy_set net/netfilter/ipset/ip_set_core.c:1180 [inline] ip_set_destroy_set_rcu+0x6c/0xe0 net/netfilter/ipset/ip_set_core.c:1190 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0xd78/0x1810 kernel/rcu/tree.c:2465 __do_softirq+0x2bd/0x942 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632 irq_exit_rcu+0x9/0x30 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:check_preemption_disabled+0x4f/0x120 lib/smp_processor_id.c:55 Code: 9d 74 a9 ff ff ff 7f 74 26 65 48 8b 04 25 28 00 00 00 48 3b 44 24 08 0f 85 cd 00 00 00 89 d8 48 83 c4 10 5b 41 5c 41 5e 41 5f 5c e3 0a 00 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 RSP: 0018:ffffc90003eaf438 EFLAGS: 00000286 RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff81713840 RDX: 0000000000000000 RSI: ffffffff8bfe6700 RDI: ffffffff8bfe66c0 RBP: ffffc90003eaf590 R08: ffffffff8f8557af R09: 1ffffffff1f0aaf5 R10: dffffc0000000000 R11: fffffbfff1f0aaf6 R12: 1ffff920007d5e98 R13: ffffffff82014b76 R14: ffffffff82014b76 R15: dffffc0000000000 rcu_dynticks_curr_cpu_in_eqs include/linux/context_tracking.h:122 [inline] rcu_is_watching+0x15/0xb0 kernel/rcu/tree.c:700 trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0xbf/0x9d0 kernel/locking/lockdep.c:5765 rcu_lock_release include/linux/rcupdate.h:308 [inline] rcu_read_unlock_sched include/linux/rcupdate.h:863 [inline] pfn_valid+0x3e0/0x440 include/linux/mmzone.h:2026 page_table_check_clear+0x21/0x730 mm/page_table_check.c:68 zap_pte_range mm/memory.c:1452 [inline] zap_pmd_range mm/memory.c:1597 [inline] zap_pud_range mm/memory.c:1626 [inline] zap_p4d_range mm/memory.c:1647 [inline] unmap_page_range+0x1f79/0x3600 mm/memory.c:1668 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1758 exit_mmap+0x2c6/0xd40 mm/mmap.c:3279 __mmput+0x115/0x3c0 kernel/fork.c:1343 exit_mm+0x21f/0x310 kernel/exit.c:569 do_exit+0x9af/0x2740 kernel/exit.c:858 do_group_exit+0x206/0x2c0 kernel/exit.c:1020 __do_sys_exit_group kernel/exit.c:1031 [inline] __se_sys_exit_group kernel/exit.c:1029 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1029 do_syscall_64+0xfb/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7fb3d447dda9 Code: Unable to access opcode bytes at 0x7fb3d447dd7f. RSP: 002b:00007fff49affe58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fb3d447dda9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 000000000000004e R09: 0000000000000000 R10: 0000001b2c720000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: a9 ff ff ff 7f test $0x7fffffff,%eax 5: 74 26 je 0x2d 7: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax e: 00 00 10: 48 3b 44 24 08 cmp 0x8(%rsp),%rax 15: 0f 85 cd 00 00 00 jne 0xe8 1b: 89 d8 mov %ebx,%eax 1d: 48 83 c4 10 add $0x10,%rsp 21: 5b pop %rbx 22: 41 5c pop %r12 24: 41 5e pop %r14 26: 41 5f pop %r15 * 28: e9 5c e3 0a 00 jmp 0xae389 <-- trapping instruction 2d: 48 c7 04 24 00 00 00 movq $0x0,(%rsp) 34: 00 35: 9c pushf 36: 8f 04 24 pop (%rsp) 39: f7 .byte 0xf7 3a: 04 24 add $0x24,%al 3c: 00 02 add %al,(%rdx)