============================= WARNING: suspicious RCU usage 4.14.279-syzkaller #0 Not tainted ----------------------------- net/netfilter/nf_queue.c:244 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor.1/11610: #0: (rcu_callback){....}, at: [] __rcu_reclaim kernel/rcu/rcu.h:185 [inline] #0: (rcu_callback){....}, at: [] rcu_do_batch kernel/rcu/tree.c:2699 [inline] #0: (rcu_callback){....}, at: [] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline] #0: (rcu_callback){....}, at: [] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline] #0: (rcu_callback){....}, at: [] rcu_process_callbacks+0x84e/0x1180 kernel/rcu/tree.c:2946 #1: (&(&inst->lock)->rlock){+.-.}, at: [] spin_lock_bh include/linux/spinlock.h:322 [inline] #1: (&(&inst->lock)->rlock){+.-.}, at: [] nfqnl_flush+0x2f/0x2a0 net/netfilter/nfnetlink_queue.c:232 stack backtrace: CPU: 0 PID: 11610 Comm: syz-executor.1 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nf_reinject+0x56e/0x700 net/netfilter/nf_queue.c:244 nfqnl_flush+0x1ab/0x2a0 net/netfilter/nfnetlink_queue.c:237 instance_destroy_rcu+0x19/0x30 net/netfilter/nfnetlink_queue.c:171 __rcu_reclaim kernel/rcu/rcu.h:195 [inline] rcu_do_batch kernel/rcu/tree.c:2699 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline] rcu_process_callbacks+0x780/0x1180 kernel/rcu/tree.c:2946 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:depot_save_stack+0xd4/0x3f0 lib/stackdepot.c:222 RSP: 0018:ffff88809cbdf9d0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff10 RAX: 0000000000042407 RBX: 00000000f4f42407 RCX: 0000000000000002 RDX: 00000000ebe3f6dc RSI: 000000004c84d8cc RDI: 000000007a20e361 RBP: ffff88809cbdfa28 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: ffff888098b400c0 R12: 00000000014080c0 R13: 000000000000000a R14: ffff88809cbdfa40 R15: 0000000000000000 save_stack mm/kasan/kasan.c:453 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0x139/0x160 mm/kasan/kasan.c:551 kmem_cache_alloc+0x124/0x3c0 mm/slab.c:3552 kmem_cache_zalloc include/linux/slab.h:651 [inline] get_empty_filp+0x86/0x3f0 fs/file_table.c:123 dentry_open+0x5a/0x210 fs/open.c:902 open_related_ns+0xfc/0x190 fs/nsfs.c:154 sock_ioctl+0x3f4/0x4c0 net/socket.c:1068 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f3486db90e9 RSP: 002b:00007f348572e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f3486ecbf60 RCX: 00007f3486db90e9 RDX: 0000000000000000 RSI: 000000000000894c RDI: 0000000000000005 RBP: 00007f3486e1308d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fffaedab32f R14: 00007f348572e300 R15: 0000000000022000 ip_tables: iptables: counters copy to user failed while replacing table netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. ip_tables: iptables: counters copy to user failed while replacing table netlink: 312 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 312 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 312 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 312 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 312 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 312 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 312 bytes leftover after parsing attributes in process `syz-executor.4'. device batadv0 entered promiscuous mode device batadv0 entered promiscuous mode ICMPv6: NA: someone advertises our address fe80:0000:0000:0000:0000:0000:0000:00aa on syz_tun! MINIX-fs: mounting unchecked file system, running fsck is recommended cannot load conntrack support for proto=2 MINIX-fs: mounting unchecked file system, running fsck is recommended cannot load conntrack support for proto=2 IPVS: sync thread started: state = MASTER, mcast_ifn = macvlan1, syncid = 3, id = 0 MINIX-fs: mounting unchecked file system, running fsck is recommended attempt to access beyond end of device loop4: rw=0, want=8194, limit=144 Buffer I/O error on dev loop4, logical block 4096, async page read cannot load conntrack support for proto=2 attempt to access beyond end of device loop4: rw=0, want=8194, limit=144 Buffer I/O error on dev loop4, logical block 4096, async page read IPVS: sync thread started: state = MASTER, mcast_ifn = macvlan1, syncid = 3, id = 0 MINIX-fs: mounting unchecked file system, running fsck is recommended cannot load conntrack support for proto=2 IPVS: sync thread started: state = MASTER, mcast_ifn = macvlan1, syncid = 3, id = 0 nbd: socks must be embedded in a SOCK_ITEM attr nbd: socks must be embedded in a SOCK_ITEM attr nbd: socks must be embedded in a SOCK_ITEM attr x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 nbd: socks must be embedded in a SOCK_ITEM attr kauditd_printk_skb: 3 callbacks suppressed audit: type=1804 audit(1652650670.211:26): pid=12206 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2241336651/syzkaller.zVWuZR/87/bus/file0" dev="sda1" ino=14293 res=1 unregister_netdevice: waiting for ip6gre0 to become free. Usage count = -1 syz-executor.3 (12188) used greatest stack depth: 23328 bytes left audit: type=1800 audit(1652650670.601:27): pid=12256 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=14241 res=0