IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 8021q: adding VLAN 0 to HW filter on device batadv0 netlink: 80 bytes leftover after parsing attributes in process `syz-executor286'. netlink: 48 bytes leftover after parsing attributes in process `syz-executor286'. ============================= WARNING: suspicious RCU usage 5.3.0+ #0 Not tainted ----------------------------- ./include/net/sch_generic.h:492 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syz-executor286/7947: #0: ffffffff888d3920 (rcu_read_lock_bh){....}, at: rcu_lock_acquire+0xd/0x40 include/linux/rcupdate.h:208 #1: ffffffff888d3920 (rcu_read_lock_bh){....}, at: rcu_lock_acquire+0xd/0x40 include/linux/rcupdate.h:208 #2: ffff8880867bb7c0 (&(&sch->q.lock)->rlock){+...}, at: spin_lock include/linux/spinlock.h:338 [inline] #2: ffff8880867bb7c0 (&(&sch->q.lock)->rlock){+...}, at: __dev_xmit_skb net/core/dev.c:3506 [inline] #2: ffff8880867bb7c0 (&(&sch->q.lock)->rlock){+...}, at: __dev_queue_xmit+0xdda/0x3010 net/core/dev.c:3842 stack backtrace: CPU: 1 PID: 7947 Comm: syz-executor286 Not tainted 5.3.0+ #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d8/0x2f8 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x156/0x1c0 kernel/locking/lockdep.c:5438 qdisc_root include/net/sch_generic.h:492 [inline] netem_enqueue+0x1063/0x33c0 net/sched/sch_netem.c:479 __dev_xmit_skb net/core/dev.c:3531 [inline] __dev_queue_xmit+0x1121/0x3010 net/core/dev.c:3842 dev_queue_xmit+0x17/0x20 net/core/dev.c:3906 neigh_resolve_output+0x60c/0x6b0 net/core/neighbour.c:1490 neigh_output include/net/neighbour.h:511 [inline] ip_finish_output2+0x13be/0x18d0 net/ipv4/ip_output.c:228 __ip_finish_output+0x801/0xa70 net/ipv4/ip_output.c:308 ip_finish_output+0x52/0x1e0 net/ipv4/ip_output.c:318 NF_HOOK_COND include/linux/netfilter.h:294 [inline] ip_mc_output+0x4db/0x630 net/ipv4/ip_output.c:417 dst_output include/net/dst.h:436 [inline] ip_local_out net/ipv4/ip_output.c:125 [inline] ip_send_skb+0x126/0x1e0 net/ipv4/ip_output.c:1555 udp_send_skb+0x929/0x13b0 net/ipv4/udp.c:888 udp_sendmsg+0x2148/0x31b0 net/ipv4/udp.c:1175 inet_sendmsg+0x147/0x310 net/ipv4/af_inet.c:807 sock_sendmsg_nosec net/socket.c:637 [inline] sock_sendmsg net/socket.c:657 [inline] ___sys_sendmsg+0x60d/0x910 net/socket.c:2311 __sys_sendmmsg+0x239/0x470 net/socket.c:2413 __do_sys_sendmmsg net/socket.c:2442 [inline] __se_sys_sendmmsg net/socket.c:2439 [inline] __x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2439 do_syscall_64+0xf7/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x441b59 Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fff57c4f058 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000315f6576616c RCX: 0000000000441b59 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000005 RBP: 735f656764697262 R08: 0000000001bbbbbb R09: 0000000001bbbbbb R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00000000004030f0 R14: 0000000000000000 R15: 0000000000000000