bridge_slave_0: left allmulticast mode bridge_slave_0: left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:2024 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:11/6994: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff80009edb7bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 6994 Comm: kworker/u8:11 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del+0x11b0/0x11e4 net/ipv6/ip6_fib.c:2023 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many+0x28/0x38 net/core/dev.c:12036 cleanup_net+0x570/0x9c0 net/core/net_namespace.c:649 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:2036 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:11/6994: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff80009edb7bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 6994 Comm: kworker/u8:11 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del+0x648/0x11e4 net/ipv6/ip6_fib.c:2035 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many+0x28/0x38 net/core/dev.c:12036 cleanup_net+0x570/0x9c0 net/core/net_namespace.c:649 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1922 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:11/6994: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff80009edb7bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 6994 Comm: kworker/u8:11 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del_route net/ipv6/ip6_fib.c:1921 [inline] fib6_del+0x6f0/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many+0x28/0x38 net/core/dev.c:12036 cleanup_net+0x570/0x9c0 net/core/net_namespace.c:649 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1931 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 6 locks held by kworker/u8:11/6994: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff80009edb7bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 stack backtrace: CPU: 1 UID: 0 PID: 6994 Comm: kworker/u8:11 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del_route net/ipv6/ip6_fib.c:1930 [inline] fib6_del+0x718/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many+0x28/0x38 net/core/dev.c:12036 cleanup_net+0x570/0x9c0 net/core/net_namespace.c:649 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 ============================= WARNING: suspicious RCU usage 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1976 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 7 locks held by kworker/u8:11/6994: #0: ffff0000c183a148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x658/0x156c kernel/workqueue.c:3212 #1: ffff80009edb7bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x6ec/0x156c kernel/workqueue.c:3212 #2: ffff800092481e50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x138/0x9c0 net/core/net_namespace.c:608 #3: ffff80009248e928 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x20/0x2c net/core/rtnetlink.c:80 #4: ffff80008f508920 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:330 #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #5: ffff0000ce487830 (&tb->tb6_lock){+...}-{3:3}, at: __fib6_clean_all+0x1a4/0x310 net/ipv6/ip6_fib.c:2267 #6: ffff0000c7998d38 (&net->ipv6.fib6_walker_lock){++..}-{3:3}, at: fib6_del_route net/ipv6/ip6_fib.c:1971 [inline] #6: ffff0000c7998d38 (&net->ipv6.fib6_walker_lock){++..}-{3:3}, at: fib6_del+0x8cc/0x11e4 net/ipv6/ip6_fib.c:2040 stack backtrace: CPU: 1 UID: 0 PID: 6994 Comm: kworker/u8:11 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: netns cleanup_net Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 lockdep_rcu_suspicious+0x168/0x274 kernel/locking/lockdep.c:6865 fib6_del_route net/ipv6/ip6_fib.c:1975 [inline] fib6_del+0xa7c/0x11e4 net/ipv6/ip6_fib.c:2040 fib6_clean_node+0x224/0x49c net/ipv6/ip6_fib.c:2202 fib6_walk_continue+0x654/0x878 net/ipv6/ip6_fib.c:2124 fib6_walk+0x140/0x254 net/ipv6/ip6_fib.c:2172 fib6_clean_tree net/ipv6/ip6_fib.c:2252 [inline] __fib6_clean_all+0x1dc/0x310 net/ipv6/ip6_fib.c:2268 fib6_clean_all+0x3c/0x50 net/ipv6/ip6_fib.c:2279 rt6_sync_down_dev net/ipv6/route.c:4951 [inline] rt6_disable_ip+0x104/0x6cc net/ipv6/route.c:4956 addrconf_ifdown+0x148/0x148c net/ipv6/addrconf.c:3857 addrconf_notify+0x2f4/0xcdc net/ipv6/addrconf.c:-1 notifier_call_chain+0x1b8/0x4e4 kernel/notifier.c:85 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:453 call_netdevice_notifiers_info net/core/dev.c:2176 [inline] call_netdevice_notifiers_extack net/core/dev.c:2214 [inline] call_netdevice_notifiers net/core/dev.c:2228 [inline] dev_close_many+0x2d4/0x448 net/core/dev.c:1731 unregister_netdevice_many_notify+0x664/0x1fbc net/core/dev.c:11942 unregister_netdevice_many+0x28/0x38 net/core/dev.c:12036 cleanup_net+0x570/0x9c0 net/core/net_namespace.c:649 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 bond0 (unregistering): (slave bond_slave_0): Releasing backup interface bond0 (unregistering): (slave bond_slave_1): Releasing backup interface bond0 (unregistering): Released all slaves hsr_slave_0: left promiscuous mode hsr_slave_1: left promiscuous mode batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 batman_adv: batadv0: Interface deactivated: batadv_slave_1 batman_adv: batadv0: Removing interface: batadv_slave_1 veth1_macvtap: left promiscuous mode veth0_macvtap: left promiscuous mode veth1_vlan: left promiscuous mode veth0_vlan: left promiscuous mode team0 (unregistering): Port device team_slave_1 removed team0 (unregistering): Port device team_slave_0 removed