[ 4487.030054][T20702] [ 4487.030432][T20702] ============================= [ 4487.030628][T20702] WARNING: suspicious RCU usage [ 4487.030815][T20702] 6.14.0-rc6-virtme #1 Not tainted [ 4487.031322][T20702] ----------------------------- [ 4487.031510][T20702] ./include/net/net_namespace.h:418 suspicious rcu_dereference_check() usage! [ 4487.031813][T20702] [ 4487.031813][T20702] other info that might help us debug this: [ 4487.031813][T20702] [ 4487.032164][T20702] [ 4487.032164][T20702] rcu_scheduler_active = 2, debug_locks = 1 [ 4487.032457][T20702] 1 lock held by psock_snd/20702: [ 4487.032644][T20702] #0: ffffffff8676f640 (rcu_read_lock_bh){....}-{1:3}, at: __dev_queue_xmit+0x1f5/0x18d0 [ 4487.033006][T20702] [ 4487.033006][T20702] stack backtrace: [ 4487.033254][T20702] CPU: 2 UID: 0 PID: 20702 Comm: psock_snd Not tainted 6.14.0-rc6-virtme #1 [ 4487.033259][T20702] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 4487.033266][T20702] Call Trace: [ 4487.033270][T20702] [ 4487.033272][T20702] dump_stack_lvl+0xb0/0xd0 [ 4487.033286][T20702] lockdep_rcu_suspicious+0x1ea/0x280 [ 4487.033309][T20702] dev_hard_start_xmit+0x2fc/0x3f0 [ 4487.033322][T20702] __dev_queue_xmit+0xfaa/0x18d0 [ 4487.033326][T20702] ? _copy_from_iter+0x1d2/0x12e0 [ 4487.033355][T20702] ? __pfx___dev_queue_xmit+0x10/0x10 [ 4487.033360][T20702] ? packet_parse_headers+0x243/0x9d0 [ 4487.033379][T20702] ? __pfx_packet_parse_headers+0x10/0x10 [ 4487.033385][T20702] ? skb_copy_datagram_from_iter+0xe6/0x6e0 [ 4487.033407][T20702] packet_snd+0xd0d/0x19c0 [ 4487.033419][T20702] ? __lock_release+0x103/0x460 [ 4487.033424][T20702] ? __might_fault+0x11b/0x170 [ 4487.033437][T20702] ? __pfx_packet_snd+0x10/0x10 [ 4487.033440][T20702] ? trace_lock_acquire+0x14c/0x1f0 [ 4487.033448][T20702] ? lock_acquire+0x32/0xc0 [ 4487.033454][T20702] ? __might_fault+0x11b/0x170 [ 4487.033465][T20702] __sys_sendto+0x3c3/0x450 [ 4487.033476][T20702] ? __pfx___sys_sendto+0x10/0x10 [ 4487.033479][T20702] ? find_held_lock+0x2c/0x110 [ 4487.033490][T20702] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 4487.033502][T20702] ? __virt_addr_valid+0x22b/0x430 [ 4487.033518][T20702] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 [ 4487.033527][T20702] ? trace_rcu_segcb_stats+0x36/0x1e0 [ 4487.033542][T20702] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 [ 4487.033545][T20702] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 4487.033554][T20702] __x64_sys_sendto+0xe0/0x1c0 [ 4487.033558][T20702] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 4487.033563][T20702] do_syscall_64+0xc1/0x1d0 [ 4487.033576][T20702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 4487.033589][T20702] RIP: 0033:0x7f3ac107ea4a [ 4487.033593][T20702] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 [ 4487.033597][T20702] RSP: 002b:00007fff2efaee88 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 4487.033604][T20702] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3ac107ea4a [ 4487.033606][T20702] RDX: 0000000000000080 RSI: 0000000000414138 RDI: 0000000000000007 [ 4487.033608][T20702] RBP: 0000000000000006 R08: 00007fff2efaeec0 R09: 0000000000000014 [ 4487.033610][T20702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 4487.033612][T20702] R13: 0000000000000007 R14: 00007fff2efaeec0 R15: 0000000000000080 [ 4487.033629][T20702] [ 4504.498791][ C1] IPv4: Oversized IP packet from 172.17.0.2