veth1_macvtap: left promiscuous mode
veth0_macvtap: left promiscuous mode
veth1_vlan: left promiscuous mode
veth0_vlan: left promiscuous mode
=============================
WARNING: suspicious RCU usage
6.15.0-syzkaller-09161-g0f70f5b08a47 #0 Not tainted
-----------------------------
net/ipv6/ip6_fib.c:2076 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
6 locks held by kworker/u32:7/1137:
#0: ffff88801c68f948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 kernel/workqueue.c:3213
#1: ffffc90006f2fd10 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 kernel/workqueue.c:3214
#2: ffffffff9012dc90 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xad/0x890 net/core/net_namespace.c:662
#3: ffffffff90143ce8 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0x8b/0xaf0 net/core/dev.c:12629
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: __fib6_clean_all+0x3a/0x2d0 net/ipv6/ip6_fib.c:2316
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0xeb/0x2d0 net/ipv6/ip6_fib.c:2320
stack backtrace:
CPU: 2 UID: 0 PID: 1137 Comm: kworker/u32:7 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: netns cleanup_net
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
lockdep_rcu_suspicious+0x166/0x260 kernel/locking/lockdep.c:6871
fib6_del+0xcf2/0x1770 net/ipv6/ip6_fib.c:2076
fib6_clean_node+0x424/0x5b0 net/ipv6/ip6_fib.c:2255
fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2177
fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2225
fib6_clean_tree+0xd4/0x110 net/ipv6/ip6_fib.c:2305
__fib6_clean_all+0x107/0x2d0 net/ipv6/ip6_fib.c:2321
rt6_sync_down_dev net/ipv6/route.c:5004 [inline]
rt6_disable_ip+0x2ec/0x990 net/ipv6/route.c:5009
addrconf_ifdown.isra.0+0x11d/0x1a90 net/ipv6/addrconf.c:3857
addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3780
notifier_call_chain+0xbc/0x410 kernel/notifier.c:85
call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2230
call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]
call_netdevice_notifiers net/core/dev.c:2282 [inline]
dev_close_many+0x319/0x630 net/core/dev.c:1785
unregister_netdevice_many_notify+0x578/0x26f0 net/core/dev.c:12046
unregister_netdevice_many net/core/dev.c:12139 [inline]
default_device_exit_batch+0x853/0xaf0 net/core/dev.c:12643
ops_exit_list net/core/net_namespace.c:206 [inline]
ops_undo_list+0x360/0xab0 net/core/net_namespace.c:253
cleanup_net+0x408/0x890 net/core/net_namespace.c:686
process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3321 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
=============================
WARNING: suspicious RCU usage
6.15.0-syzkaller-09161-g0f70f5b08a47 #0 Not tainted
-----------------------------
net/ipv6/ip6_fib.c:2088 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
6 locks held by kworker/u32:7/1137:
#0: ffff88801c68f948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 kernel/workqueue.c:3213
#1: ffffc90006f2fd10 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 kernel/workqueue.c:3214
#2: ffffffff9012dc90 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xad/0x890 net/core/net_namespace.c:662
#3: ffffffff90143ce8 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0x8b/0xaf0 net/core/dev.c:12629
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: __fib6_clean_all+0x3a/0x2d0 net/ipv6/ip6_fib.c:2316
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0xeb/0x2d0 net/ipv6/ip6_fib.c:2320
stack backtrace:
CPU: 2 UID: 0 PID: 1137 Comm: kworker/u32:7 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: netns cleanup_net
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
lockdep_rcu_suspicious+0x166/0x260 kernel/locking/lockdep.c:6871
fib6_del+0x2ef/0x1770 net/ipv6/ip6_fib.c:2088
fib6_clean_node+0x424/0x5b0 net/ipv6/ip6_fib.c:2255
fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2177
fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2225
fib6_clean_tree+0xd4/0x110 net/ipv6/ip6_fib.c:2305
__fib6_clean_all+0x107/0x2d0 net/ipv6/ip6_fib.c:2321
rt6_sync_down_dev net/ipv6/route.c:5004 [inline]
rt6_disable_ip+0x2ec/0x990 net/ipv6/route.c:5009
addrconf_ifdown.isra.0+0x11d/0x1a90 net/ipv6/addrconf.c:3857
addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3780
notifier_call_chain+0xbc/0x410 kernel/notifier.c:85
call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2230
call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]
call_netdevice_notifiers net/core/dev.c:2282 [inline]
dev_close_many+0x319/0x630 net/core/dev.c:1785
unregister_netdevice_many_notify+0x578/0x26f0 net/core/dev.c:12046
unregister_netdevice_many net/core/dev.c:12139 [inline]
default_device_exit_batch+0x853/0xaf0 net/core/dev.c:12643
ops_exit_list net/core/net_namespace.c:206 [inline]
ops_undo_list+0x360/0xab0 net/core/net_namespace.c:253
cleanup_net+0x408/0x890 net/core/net_namespace.c:686
process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3321 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
=============================
WARNING: suspicious RCU usage
6.15.0-syzkaller-09161-g0f70f5b08a47 #0 Not tainted
-----------------------------
net/ipv6/ip6_fib.c:1974 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
6 locks held by kworker/u32:7/1137:
#0: ffff88801c68f948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 kernel/workqueue.c:3213
#1: ffffc90006f2fd10 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 kernel/workqueue.c:3214
#2: ffffffff9012dc90 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xad/0x890 net/core/net_namespace.c:662
#3: ffffffff90143ce8 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0x8b/0xaf0 net/core/dev.c:12629
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: __fib6_clean_all+0x3a/0x2d0 net/ipv6/ip6_fib.c:2316
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0xeb/0x2d0 net/ipv6/ip6_fib.c:2320
stack backtrace:
CPU: 2 UID: 0 PID: 1137 Comm: kworker/u32:7 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: netns cleanup_net
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
lockdep_rcu_suspicious+0x166/0x260 kernel/locking/lockdep.c:6871
fib6_del_route net/ipv6/ip6_fib.c:1974 [inline]
fib6_del+0x1084/0x1770 net/ipv6/ip6_fib.c:2093
fib6_clean_node+0x424/0x5b0 net/ipv6/ip6_fib.c:2255
fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2177
fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2225
fib6_clean_tree+0xd4/0x110 net/ipv6/ip6_fib.c:2305
__fib6_clean_all+0x107/0x2d0 net/ipv6/ip6_fib.c:2321
rt6_sync_down_dev net/ipv6/route.c:5004 [inline]
rt6_disable_ip+0x2ec/0x990 net/ipv6/route.c:5009
addrconf_ifdown.isra.0+0x11d/0x1a90 net/ipv6/addrconf.c:3857
addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3780
notifier_call_chain+0xbc/0x410 kernel/notifier.c:85
call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2230
call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]
call_netdevice_notifiers net/core/dev.c:2282 [inline]
dev_close_many+0x319/0x630 net/core/dev.c:1785
unregister_netdevice_many_notify+0x578/0x26f0 net/core/dev.c:12046
unregister_netdevice_many net/core/dev.c:12139 [inline]
default_device_exit_batch+0x853/0xaf0 net/core/dev.c:12643
ops_exit_list net/core/net_namespace.c:206 [inline]
ops_undo_list+0x360/0xab0 net/core/net_namespace.c:253
cleanup_net+0x408/0x890 net/core/net_namespace.c:686
process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3321 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
=============================
WARNING: suspicious RCU usage
6.15.0-syzkaller-09161-g0f70f5b08a47 #0 Not tainted
-----------------------------
net/ipv6/ip6_fib.c:1983 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
6 locks held by kworker/u32:7/1137:
#0: ffff88801c68f948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 kernel/workqueue.c:3213
#1: ffffc90006f2fd10 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 kernel/workqueue.c:3214
#2: ffffffff9012dc90 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xad/0x890 net/core/net_namespace.c:662
#3: ffffffff90143ce8 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0x8b/0xaf0 net/core/dev.c:12629
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: __fib6_clean_all+0x3a/0x2d0 net/ipv6/ip6_fib.c:2316
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0xeb/0x2d0 net/ipv6/ip6_fib.c:2320
stack backtrace:
CPU: 2 UID: 0 PID: 1137 Comm: kworker/u32:7 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: netns cleanup_net
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
lockdep_rcu_suspicious+0x166/0x260 kernel/locking/lockdep.c:6871
fib6_del_route net/ipv6/ip6_fib.c:1983 [inline]
fib6_del+0xfef/0x1770 net/ipv6/ip6_fib.c:2093
fib6_clean_node+0x424/0x5b0 net/ipv6/ip6_fib.c:2255
fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2177
fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2225
fib6_clean_tree+0xd4/0x110 net/ipv6/ip6_fib.c:2305
__fib6_clean_all+0x107/0x2d0 net/ipv6/ip6_fib.c:2321
rt6_sync_down_dev net/ipv6/route.c:5004 [inline]
rt6_disable_ip+0x2ec/0x990 net/ipv6/route.c:5009
addrconf_ifdown.isra.0+0x11d/0x1a90 net/ipv6/addrconf.c:3857
addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3780
notifier_call_chain+0xbc/0x410 kernel/notifier.c:85
call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2230
call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]
call_netdevice_notifiers net/core/dev.c:2282 [inline]
dev_close_many+0x319/0x630 net/core/dev.c:1785
unregister_netdevice_many_notify+0x578/0x26f0 net/core/dev.c:12046
unregister_netdevice_many net/core/dev.c:12139 [inline]
default_device_exit_batch+0x853/0xaf0 net/core/dev.c:12643
ops_exit_list net/core/net_namespace.c:206 [inline]
ops_undo_list+0x360/0xab0 net/core/net_namespace.c:253
cleanup_net+0x408/0x890 net/core/net_namespace.c:686
process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3321 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
=============================
WARNING: suspicious RCU usage
6.15.0-syzkaller-09161-g0f70f5b08a47 #0 Not tainted
-----------------------------
net/ipv6/ip6_fib.c:2028 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
7 locks held by kworker/u32:7/1137:
#0: ffff88801c68f948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 kernel/workqueue.c:3213
#1: ffffc90006f2fd10 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 kernel/workqueue.c:3214
#2: ffffffff9012dc90 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xad/0x890 net/core/net_namespace.c:662
#3: ffffffff90143ce8 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0x8b/0xaf0 net/core/dev.c:12629
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
#4: ffffffff8e3c2600 (rcu_read_lock){....}-{1:3}, at: __fib6_clean_all+0x3a/0x2d0 net/ipv6/ip6_fib.c:2316
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
#5: ffff8880645e8830 (&tb->tb6_lock){+.-.}-{3:3}, at: __fib6_clean_all+0xeb/0x2d0 net/ipv6/ip6_fib.c:2320
#6: ffff88806d6c4eb8 (&net->ipv6.fib6_walker_lock){++..}-{3:3}, at: fib6_del_route net/ipv6/ip6_fib.c:2024 [inline]
#6: ffff88806d6c4eb8 (&net->ipv6.fib6_walker_lock){++..}-{3:3}, at: fib6_del+0x880/0x1770 net/ipv6/ip6_fib.c:2093
stack backtrace:
CPU: 2 UID: 0 PID: 1137 Comm: kworker/u32:7 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: netns cleanup_net
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
lockdep_rcu_suspicious+0x166/0x260 kernel/locking/lockdep.c:6871
fib6_del_route net/ipv6/ip6_fib.c:2028 [inline]
fib6_del+0x1281/0x1770 net/ipv6/ip6_fib.c:2093
fib6_clean_node+0x424/0x5b0 net/ipv6/ip6_fib.c:2255
fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2177
fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2225
fib6_clean_tree+0xd4/0x110 net/ipv6/ip6_fib.c:2305
__fib6_clean_all+0x107/0x2d0 net/ipv6/ip6_fib.c:2321
rt6_sync_down_dev net/ipv6/route.c:5004 [inline]
rt6_disable_ip+0x2ec/0x990 net/ipv6/route.c:5009
addrconf_ifdown.isra.0+0x11d/0x1a90 net/ipv6/addrconf.c:3857
addrconf_notify+0x220/0x19e0 net/ipv6/addrconf.c:3780
notifier_call_chain+0xbc/0x410 kernel/notifier.c:85
call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:2230
call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]
call_netdevice_notifiers net/core/dev.c:2282 [inline]
dev_close_many+0x319/0x630 net/core/dev.c:1785
unregister_netdevice_many_notify+0x578/0x26f0 net/core/dev.c:12046
unregister_netdevice_many net/core/dev.c:12139 [inline]
default_device_exit_batch+0x853/0xaf0 net/core/dev.c:12643
ops_exit_list net/core/net_namespace.c:206 [inline]
ops_undo_list+0x360/0xab0 net/core/net_namespace.c:253
cleanup_net+0x408/0x890 net/core/net_namespace.c:686
process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3321 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245