veth1_macvtap: left promiscuous mode veth0_macvtap: left promiscuous mode veth1_vlan: left promiscuous mode veth0_vlan: left promiscuous mode ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:2024 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del+0x11b0/0x11e4 net/ipv6/ip6_fib.c:2023 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:2036 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del+0x648/0x11e4 net/ipv6/ip6_fib.c:2035 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1922 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del_route net/ipv6/ip6_fib.c:1921 [inline] fib6_del+0x6f0/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1931 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del_route net/ipv6/ip6_fib.c:1930 [inline] fib6_del+0x718/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1976 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 7 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 #6: ffff0000cb8a6d38 (&net->ipv6.fib6_walker_lock){++..}-{3:3}, at: fib6_del_route net/ipv6/ip6_fib.c:1971 [inline] #6: ffff0000cb8a6d38 (&net->ipv6.fib6_walker_lock){++..}-{3:3}, at: fib6_del+0x8cc/0x11e4 net/ipv6/ip6_fib.c:2040 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del_route net/ipv6/ip6_fib.c:1975 [inline] fib6_del+0xa7c/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1806 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_repair_tree+0xb28/0xf20 net/ipv6/ip6_fib.c:1805 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1808 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_repair_tree+0xb50/0xf20 net/ipv6/ip6_fib.c:1807 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1810 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_repair_tree+0xb78/0xf20 net/ipv6/ip6_fib.c:1809 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1812 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_repair_tree+0xba0/0xf20 net/ipv6/ip6_fib.c:1811 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1814 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_repair_tree+0xbc8/0xf20 net/ipv6/ip6_fib.c:1813 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1816 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_repair_tree+0xbf0/0xf20 net/ipv6/ip6_fib.c:1815 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1818 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_repair_tree+0xc18/0xf20 net/ipv6/ip6_fib.c:1817 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1767 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_find_prefix+0x200/0x3fc net/ipv6/ip6_fib.c:1766 fib6_repair_tree+0xe14/0xf20 net/ipv6/ip6_fib.c:1845 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1769 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_find_prefix+0x21c/0x3fc net/ipv6/ip6_fib.c:1768 fib6_repair_tree+0xe14/0xf20 net/ipv6/ip6_fib.c:1845 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1772 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_find_prefix+0x3c4/0x3fc net/ipv6/ip6_fib.c:1771 fib6_repair_tree+0xe14/0xf20 net/ipv6/ip6_fib.c:1845 fib6_del_route net/ipv6/ip6_fib.c:1992 [inline] fib6_del+0xbb8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1049 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_purge_rt+0x4e8/0x74c net/ipv6/ip6_fib.c:1048 fib6_del_route net/ipv6/ip6_fib.c:1995 [inline] fib6_del+0xbc8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1059 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:8/4294: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff8000a2177bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000f18cd830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_purge_rt+0x50c/0x74c net/ipv6/ip6_fib.c:1058 fib6_del_route net/ipv6/ip6_fib.c:1995 [inline] fib6_del+0xbc8/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ================================================================== BUG: KASAN: slab-out-of-bounds in call_fib6_entry_notifiers net/ipv6/ip6_fib.c:396 [inline] BUG: KASAN: slab-out-of-bounds in fib6_del_route net/ipv6/ip6_fib.c:1999 [inline] BUG: KASAN: slab-out-of-bounds in fib6_del+0x1030/0x11e4 net/ipv6/ip6_fib.c:2040 Read of size 4 at addr ffff0000d56d352c by task kworker/u8:8/4294 CPU: 1 UID: 0 PID: 4294 Comm: kworker/u8:8 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 print_address_description+0xa8/0x254 mm/kasan/report.c:408 print_report+0x68/0x84 mm/kasan/report.c:521 kasan_report+0xb0/0x110 mm/kasan/report.c:634 __asan_report_load4_noabort+0x20/0x2c mm/kasan/report_generic.c:380 call_fib6_entry_notifiers net/ipv6/ip6_fib.c:396 [inline] fib6_del_route net/ipv6/ip6_fib.c:1999 [inline] fib6_del+0x1030/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 Allocated by task 6490: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x40/0x78 mm/kasan/common.c:68 kasan_save_alloc_info+0x44/0x54 mm/kasan/generic.c:562 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x9c/0xb4 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x2a4/0x3fc mm/slub.c:4358 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] binderfs_binder_device_create+0x174/0x9d0 drivers/android/binderfs.c:147 binderfs_fill_super+0x7c8/0xc54 drivers/android/binderfs.c:730 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xb4/0x144 fs/super.c:1299 binderfs_fs_context_get_tree+0x28/0x38 drivers/android/binderfs.c:750 vfs_get_tree+0x90/0x28c fs/super.c:1759 do_new_mount+0x228/0x814 fs/namespace.c:3881 path_mount+0x5b4/0xde0 fs/namespace.c:4208 do_mount fs/namespace.c:4221 [inline] __do_sys_mount fs/namespace.c:4432 [inline] __se_sys_mount fs/namespace.c:4409 [inline] __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4409 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 The buggy address belongs to the object at ffff0000d56d3400 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 20 bytes to the right of allocated 280-byte region [ffff0000d56d3400, ffff0000d56d3518) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1156d0 head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 anon flags: 0x5ffc00000000040(head|node=0|zone=2|lastcpupid=0x7ff) page_type: f5(slab) raw: 05ffc00000000040 ffff0000c0001c80 0000000000000000 dead000000000001 raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 head: 05ffc00000000040 ffff0000c0001c80 0000000000000000 dead000000000001 head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 head: 05ffc00000000002 fffffdffc355b401 00000000ffffffff 00000000ffffffff head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000d56d3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff0000d56d3480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff0000d56d3500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff0000d56d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff0000d56d3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in kernel/locking/qspinlock.h:68:9 index 12927 is out of range for type 'unsigned long[8]' CPU: 0 UID: 0 PID: 4294 Comm: kworker/u8:8 Tainted: G B 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 ubsan_epilogue+0x14/0x48 lib/ubsan.c:231 __ubsan_handle_out_of_bounds+0xd0/0xfc lib/ubsan.c:453 decode_tail kernel/locking/qspinlock.h:68 [inline] queued_spin_lock_slowpath+0x9f4/0xaec kernel/locking/qspinlock.c:285 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0x2a8/0x2cc kernel/locking/spinlock_debug.c:116 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline] _raw_spin_lock_bh+0x50/0x60 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:356 [inline] __ip6_del_rt+0x90/0x1a8 net/ipv6/route.c:3918 ip6_del_rt+0xac/0xf4 net/ipv6/route.c:3934 __ipv6_ifa_notify+0x510/0x988 net/ipv6/addrconf.c:6313 addrconf_ifdown+0xbf4/0x148c net/ipv6/addrconf.c:3981 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many net/core/dev.c:12036 [inline] default_device_exit_batch+0x838/0x8b4 net/core/dev.c:12530 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x650/0x9c0 net/core/net_namespace.c:654 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ---[ end trace ]---