ip_tables: iptables: counters copy to user failed while replacing table
=============================
WARNING: suspicious RCU usage
4.14.281-syzkaller #0 Not tainted
-----------------------------
net/netfilter/nf_queue.c:244 suspicious rcu_dereference_check() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
2 locks held by syz-fuzzer/10869:
 #0:  (rcu_callback){....}, at: [<ffffffff8146dbde>] __rcu_reclaim kernel/rcu/rcu.h:185 [inline]
 #0:  (rcu_callback){....}, at: [<ffffffff8146dbde>] rcu_do_batch kernel/rcu/tree.c:2699 [inline]
 #0:  (rcu_callback){....}, at: [<ffffffff8146dbde>] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline]
 #0:  (rcu_callback){....}, at: [<ffffffff8146dbde>] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline]
 #0:  (rcu_callback){....}, at: [<ffffffff8146dbde>] rcu_process_callbacks+0x84e/0x1180 kernel/rcu/tree.c:2946
 #1:  (&(&inst->lock)->rlock){+.-.}, at: [<ffffffff85e4ca9f>] spin_lock_bh include/linux/spinlock.h:322 [inline]
 #1:  (&(&inst->lock)->rlock){+.-.}, at: [<ffffffff85e4ca9f>] nfqnl_flush+0x2f/0x2a0 net/netfilter/nfnetlink_queue.c:232

stack backtrace:
CPU: 1 PID: 10869 Comm: syz-fuzzer Not tainted 4.14.281-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x281 lib/dump_stack.c:58
 nf_reinject+0x56e/0x700 net/netfilter/nf_queue.c:244
 nfqnl_flush+0x1ab/0x2a0 net/netfilter/nfnetlink_queue.c:237
 instance_destroy_rcu+0x19/0x30 net/netfilter/nfnetlink_queue.c:171
 __rcu_reclaim kernel/rcu/rcu.h:195 [inline]
 rcu_do_batch kernel/rcu/tree.c:2699 [inline]
 invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline]
 __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline]
 rcu_process_callbacks+0x780/0x1180 kernel/rcu/tree.c:2946
 __do_softirq+0x24d/0x9ff kernel/softirq.c:288
 invoke_softirq kernel/softirq.c:368 [inline]
 irq_exit+0x193/0x240 kernel/softirq.c:409
 exiting_irq arch/x86/include/asm/apic.h:638 [inline]
 smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106
 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793
 </IRQ>
RIP: 0033:0x40ffd2
RSP: 002b:000000c002619b00 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff10
RAX: 000000000069abe0 RBX: 0000000000000000 RCX: 000000c002b09870
RDX: 000000c002b09878 RSI: 00000000c118e608 RDI: 000000000069abe0
RBP: 000000c002619b10 R08: 0000000000000038 R09: 0000000000000000
R10: 0000000000000005 R11: 000000c00a3f3642 R12: 0000000000000022
R13: 000000c00a3f3618 R14: 000000c0000836c0 R15: ffffffffffffffff
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
ip_tables: iptables: counters copy to user failed while replacing table
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
ip_tables: iptables: counters copy to user failed while replacing table
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
ip_tables: iptables: counters copy to user failed while replacing table
ip_tables: iptables: counters copy to user failed while replacing table
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
ip_tables: iptables: counters copy to user failed while replacing table
8021q: adding VLAN 0 to HW filter on device team0
bond0: Enslaving team0 as an active interface with an up link
syz-executor.1 (12901) used greatest stack depth: 24072 bytes left
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
ip_tables: iptables: counters copy to user failed while replacing table
======================================================
WARNING: the mand mount option is being deprecated and
         will be removed in v5.15!
======================================================
8021q: adding VLAN 0 to HW filter on device team0
bond0: Enslaving team0 as an active interface with an up link
bond0: Releasing backup interface team0
bridge0: port 3(team0) entered blocking state
bridge0: port 3(team0) entered disabled state
device team0 entered promiscuous mode
device team_slave_0 entered promiscuous mode
device team_slave_1 entered promiscuous mode
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
device team0 left promiscuous mode
device team_slave_0 left promiscuous mode
device team_slave_1 left promiscuous mode
bridge0: port 3(team0) entered disabled state
8021q: adding VLAN 0 to HW filter on device team0
bond0: Enslaving team0 as an active interface with an up link
bond0: Releasing backup interface team0
bridge0: port 3(team0) entered blocking state
bridge0: port 3(team0) entered disabled state
device team0 entered promiscuous mode
device team_slave_0 entered promiscuous mode
device team_slave_1 entered promiscuous mode
device team0 left promiscuous mode
device team_slave_0 left promiscuous mode
device team_slave_1 left promiscuous mode
bridge0: port 3(team0) entered disabled state
8021q: adding VLAN 0 to HW filter on device team0
bond0: Enslaving team0 as an active interface with an up link
bond0: Releasing backup interface team0
bridge0: port 3(team0) entered blocking state
bridge0: port 3(team0) entered disabled state
device team0 entered promiscuous mode
device team_slave_0 entered promiscuous mode
device team_slave_1 entered promiscuous mode
device team0 left promiscuous mode
device team_slave_0 left promiscuous mode
device team_slave_1 left promiscuous mode
bridge0: port 3(team0) entered disabled state
8021q: adding VLAN 0 to HW filter on device team0
bond0: Enslaving team0 as an active interface with an up link
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
bond0: Releasing backup interface team0
bridge0: port 3(team0) entered blocking state
bridge0: port 3(team0) entered disabled state
device team0 entered promiscuous mode
device team_slave_0 entered promiscuous mode
device team_slave_1 entered promiscuous mode
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
kauditd_printk_skb: 7 callbacks suppressed
audit: type=1800 audit(1653988839.334:15): pid=13389 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=14320 res=0
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
audit: type=1800 audit(1653988839.634:16): pid=13420 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=14255 res=0
hub 9-0:1.0: USB hub found
hub 9-0:1.0: 8 ports detected
audit: type=1800 audit(1653988840.214:17): pid=13467 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=14333 res=0
hub 9-0:1.0: USB hub found
hub 9-0:1.0: 8 ports detected
audit: type=1800 audit(1653988840.264:18): pid=13471 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=14338 res=0
audit: type=1800 audit(1653988840.504:19): pid=13494 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=14333 res=0
audit: type=1800 audit(1653988840.744:20): pid=13505 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=14316 res=0
hub 9-0:1.0: USB hub found
hub 9-0:1.0: 8 ports detected
audit: type=1800 audit(1653988841.215:21): pid=13550 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=14316 res=0
hub 9-0:1.0: USB hub found
hub 9-0:1.0: 8 ports detected
hub 9-0:1.0: USB hub found
hub 9-0:1.0: 8 ports detected
print_req_error: I/O error, dev loop3, sector 0