============================= WARNING: suspicious RCU usage 4.16.0+ #11 Not tainted ----------------------------- net/ipv6/route.c:410 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by swapper/1/0: #0: 00000000fa286e76 ((&icsk->icsk_retransmit_timer)){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:178 [inline] #0: 00000000fa286e76 ((&icsk->icsk_retransmit_timer)){+.-.}, at: call_timer_fn+0x1bb/0x940 kernel/time/timer.c:1316 #1: 00000000495b451f (slock-AF_INET6){+.-.}, at: spin_lock include/linux/spinlock.h:310 [inline] #1: 00000000495b451f (slock-AF_INET6){+.-.}, at: tcp_write_timer+0x2b/0x1d0 net/ipv4/tcp_timer.c:591 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.16.0+ #11 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 rt6_check_expired+0x38b/0x3e0 net/ipv6/route.c:410 ip6_negative_advice+0x67/0xc0 net/ipv6/route.c:2204 dst_negative_advice include/net/sock.h:1786 [inline] tcp_write_timeout net/ipv4/tcp_timer.c:212 [inline] tcp_retransmit_timer+0x23c0/0x3060 net/ipv4/tcp_timer.c:461 tcp_write_timer_handler+0x339/0x960 net/ipv4/tcp_timer.c:573 tcp_write_timer+0x111/0x1d0 net/ipv4/tcp_timer.c:593 call_timer_fn+0x230/0x940 kernel/time/timer.c:1326 expire_timers kernel/time/timer.c:1363 [inline] __run_timers+0x79e/0xc50 kernel/time/timer.c:1666 run_timer_softirq+0x4c/0x70 kernel/time/timer.c:1692 __do_softirq+0x2e0/0xaf5 kernel/softirq.c:285 invoke_softirq kernel/softirq.c:365 [inline] irq_exit+0x1d1/0x200 kernel/softirq.c:405 exiting_irq arch/x86/include/asm/apic.h:525 [inline] smp_apic_timer_interrupt+0x17e/0x710 arch/x86/kernel/apic/apic.c:1052 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:862 RIP: 0010:native_safe_halt+0x6/0x10 arch/x86/include/asm/irqflags.h:54 RSP: 0018:ffff8801d9ae7c38 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: 1ffff1003b35cf8a RCX: 0000000000000000 RDX: 1ffffffff11a30f0 RSI: 0000000000000001 RDI: ffffffff88d18780 RBP: ffff8801d9ae7c38 R08: ffffed003b5e46c3 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: ffff8801d9ae7cf0 R14: ffffffff897bc960 R15: 0000000000000000 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0xc2/0x440 arch/x86/kernel/process.c:354 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:345 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x395/0x560 kernel/sched/idle.c:262 cpu_startup_entry+0x104/0x120 kernel/sched/idle.c:368 start_secondary+0x426/0x5b0 arch/x86/kernel/smpboot.c:267 secondary_startup_64+0xa5/0xb0 arch/x86/kernel/head_64.S:242 netlink: 17 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 17 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 188 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 188 bytes leftover after parsing attributes in process `syz-executor4'. bridge_slave_1: FDB only supports static addresses Subscription rejected, illegal request Subscription rejected, illegal request IPVS: Unknown mcast interface: teql0 IPVS: Unknown mcast interface: teql0 IPVS: set_ctl: invalid protocol: 94 224.0.0.2:20000 fo IPVS: set_ctl: invalid protocol: 2 224.0.0.1:20004 sed IPVS: set_ctl: invalid protocol: 94 224.0.0.2:20000 fo IPVS: ftp: loaded support on port[0] = 21 netlink: 'syz-executor0': attribute type 1 has an invalid length. netlink: 'syz-executor0': attribute type 1 has an invalid length. sctp: [Deprecated]: syz-executor7 (pid 32572) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor7 (pid 32589) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead Dead loop on virtual device ip6_vti0, fix it urgently! ebt_limit: overflow, try lower: 0/0 ebt_limit: overflow, try lower: 0/0 netlink: 'syz-executor7': attribute type 29 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. kernel msg: ebtables bug: please report to author: Wrong len argument netlink: 'syz-executor7': attribute type 29 has an invalid length. kernel msg: ebtables bug: please report to author: Wrong len argument netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 'syz-executor7': attribute type 29 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 'syz-executor7': attribute type 29 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 'syz-executor7': attribute type 29 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 'syz-executor7': attribute type 29 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 'syz-executor7': attribute type 29 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 'syz-executor7': attribute type 29 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. kernel msg: ebtables bug: please report to author: entries_size too small x_tables: eb_tables: mac match: used from hooks BROUTING, but only valid from PREROUTING/INPUT/FORWARD kernel msg: ebtables bug: please report to author: entries_size too small x_tables: eb_tables: mac match: used from hooks BROUTING, but only valid from PREROUTING/INPUT/FORWARD