[ 1432.793599][T18464] [ 1432.793868][T18464] ============================= [ 1432.794028][T18464] WARNING: suspicious RCU usage [ 1432.794205][T18464] 6.14.0-rc6-virtme #1 Not tainted [ 1432.794360][T18464] ----------------------------- [ 1432.794513][T18464] ./include/net/net_namespace.h:418 suspicious rcu_dereference_check() usage! [ 1432.794813][T18464] [ 1432.794813][T18464] other info that might help us debug this: [ 1432.794813][T18464] [ 1432.795142][T18464] [ 1432.795142][T18464] rcu_scheduler_active = 2, debug_locks = 1 [ 1432.795388][T18464] 1 lock held by mausezahn/18464: [ 1432.795551][T18464] #0: ffffffffa635b5c0 (rcu_read_lock_bh){....}-{1:3}, at: __dev_queue_xmit+0x1f0/0x18d0 [ 1432.795839][T18464] [ 1432.795839][T18464] stack backtrace: [ 1432.796033][T18464] CPU: 1 UID: 0 PID: 18464 Comm: mausezahn Not tainted 6.14.0-rc6-virtme #1 [ 1432.796039][T18464] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1432.796041][T18464] Call Trace: [ 1432.796043][T18464] [ 1432.796046][T18464] dump_stack_lvl+0xb0/0xd0 [ 1432.796053][T18464] lockdep_rcu_suspicious+0x1ea/0x280 [ 1432.796063][T18464] dev_hard_start_xmit+0x2fc/0x3f0 [ 1432.796074][T18464] __dev_queue_xmit+0xfaf/0x18d0 [ 1432.796088][T18464] ? __pfx___dev_queue_xmit+0x10/0x10 [ 1432.796092][T18464] ? packet_parse_headers+0x231/0x9c0 [ 1432.796100][T18464] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 1432.796107][T18464] ? __pfx_packet_parse_headers+0x10/0x10 [ 1432.796111][T18464] ? skb_copy_datagram_from_iter+0xe6/0x6f0 [ 1432.796117][T18464] ? dev_get_by_index+0xb2/0x190 [ 1432.796128][T18464] packet_snd+0xd0c/0x19d0 [ 1432.796140][T18464] ? __lock_release+0x103/0x460 [ 1432.796144][T18464] ? __might_fault+0x11b/0x170 [ 1432.796150][T18464] ? __pfx_packet_snd+0x10/0x10 [ 1432.796153][T18464] ? trace_lock_acquire+0x14c/0x1f0 [ 1432.796155][T18464] ? __might_fault+0x11b/0x170 [ 1432.796162][T18464] ? lock_acquire+0x32/0xc0 [ 1432.796168][T18464] ? __might_fault+0x11b/0x170 [ 1432.796179][T18464] __sys_sendto+0x3c3/0x450 [ 1432.796185][T18464] ? __pfx___sys_sendto+0x10/0x10 [ 1432.796199][T18464] ? sock_ioctl+0x3b6/0x590 [ 1432.796209][T18464] ? __pfx___up_read+0x10/0x10 [ 1432.796218][T18464] ? do_user_addr_fault+0x374/0xe30 [ 1432.796228][T18464] ? do_user_addr_fault+0x374/0xe30 [ 1432.796235][T18464] __x64_sys_sendto+0xe0/0x1c0 [ 1432.796238][T18464] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 1432.796244][T18464] do_syscall_64+0xc1/0x1d0 [ 1432.796251][T18464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1432.796256][T18464] RIP: 0033:0x7f804337ea4a [ 1432.796260][T18464] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 [ 1432.796263][T18464] RSP: 002b:00007ffd8a0c2238 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1432.796266][T18464] RAX: ffffffffffffffda RBX: 000000001bdb19d0 RCX: 00007f804337ea4a [ 1432.796268][T18464] RDX: 0000000000000062 RSI: 000000001bdb15c2 RDI: 0000000000000005 [ 1432.796270][T18464] RBP: 000000001bdb15c2 R08: 00007ffd8a0c2240 R09: 0000000000000014 [ 1432.796271][T18464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1432.796273][T18464] R13: 0000000000000062 R14: 00007ffd8a0c2240 R15: 0000000000000000 [ 1432.796289][T18464]