[ 90.832812][ T1023] veth0: entered allmulticast mode [ 90.833438][ T1023] veth1: entered allmulticast mode [ 90.833802][ T1023] veth2: entered allmulticast mode [ 90.834863][ T1023] veth3: entered allmulticast mode [ 90.835235][ T1023] veth4: entered allmulticast mode [ 90.835572][ T1023] veth5: entered allmulticast mode [ 101.683275][ T1109] GACT probability NOT on [ 102.018858][ T1113] [ 102.019412][ T1113] ============================= [ 102.019695][ T1113] WARNING: suspicious RCU usage [ 102.019966][ T1113] 6.14.0-rc6-virtme #1 Not tainted [ 102.020272][ T1113] ----------------------------- [ 102.020554][ T1113] ./include/net/net_namespace.h:418 suspicious rcu_dereference_check() usage! [ 102.021002][ T1113] [ 102.021002][ T1113] other info that might help us debug this: [ 102.021002][ T1113] [ 102.021586][ T1113] [ 102.021586][ T1113] rcu_scheduler_active = 2, debug_locks = 1 [ 102.021967][ T1113] 1 lock held by mausezahn/1113: [ 102.022269][ T1113] #0: ffffffff9175b5c0 (rcu_read_lock_bh){....}-{1:3}, at: __dev_queue_xmit+0x1f0/0x18d0 [ 102.022759][ T1113] [ 102.022759][ T1113] stack backtrace: [ 102.023105][ T1113] CPU: 2 UID: 0 PID: 1113 Comm: mausezahn Not tainted 6.14.0-rc6-virtme #1 [ 102.023113][ T1113] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 102.023116][ T1113] Call Trace: [ 102.023119][ T1113] [ 102.023124][ T1113] dump_stack_lvl+0xb0/0xd0 [ 102.023136][ T1113] lockdep_rcu_suspicious+0x1ea/0x280 [ 102.023154][ T1113] dev_hard_start_xmit+0x2fc/0x3f0 [ 102.023176][ T1113] __dev_queue_xmit+0xfaf/0x18d0 [ 102.023205][ T1113] ? __pfx___dev_queue_xmit+0x10/0x10 [ 102.023213][ T1113] ? packet_parse_headers+0x231/0x9c0 [ 102.023230][ T1113] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 102.023241][ T1113] ? __pfx_packet_parse_headers+0x10/0x10 [ 102.023250][ T1113] ? skb_copy_datagram_from_iter+0xe6/0x6f0 [ 102.023259][ T1113] ? dev_get_by_index+0xb2/0x190 [ 102.023279][ T1113] packet_snd+0xd0c/0x19d0 [ 102.023301][ T1113] ? __lock_release+0x103/0x460 [ 102.023307][ T1113] ? __might_fault+0x11b/0x170 [ 102.023319][ T1113] ? __pfx_packet_snd+0x10/0x10 [ 102.023323][ T1113] ? trace_lock_acquire+0x14c/0x1f0 [ 102.023327][ T1113] ? __might_fault+0x11b/0x170 [ 102.023338][ T1113] ? lock_acquire+0x32/0xc0 [ 102.023349][ T1113] ? __might_fault+0x11b/0x170 [ 102.023371][ T1113] __sys_sendto+0x3c3/0x450 [ 102.023382][ T1113] ? __pfx___sys_sendto+0x10/0x10 [ 102.023410][ T1113] ? sock_ioctl+0x3b6/0x590 [ 102.023429][ T1113] ? __pfx___up_read+0x10/0x10 [ 102.023445][ T1113] ? do_user_addr_fault+0x374/0xe30 [ 102.023463][ T1113] ? do_user_addr_fault+0x374/0xe30 [ 102.023477][ T1113] __x64_sys_sendto+0xe0/0x1c0 [ 102.023484][ T1113] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 102.023493][ T1113] do_syscall_64+0xc1/0x1d0 [ 102.023507][ T1113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.023516][ T1113] RIP: 0033:0x7ff3cb906a4a [ 102.023523][ T1113] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 [ 102.023527][ T1113] RSP: 002b:00007ffd1a015e58 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 102.023534][ T1113] RAX: ffffffffffffffda RBX: 0000000004a609d0 RCX: 00007ff3cb906a4a [ 102.023537][ T1113] RDX: 00000000000000aa RSI: 0000000004a60d02 RDI: 0000000000000005 [ 102.023541][ T1113] RBP: 0000000004a60d02 R08: 00007ffd1a015e60 R09: 0000000000000014 [ 102.023544][ T1113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 102.023547][ T1113] R13: 00000000000000aa R14: 00007ffd1a015e60 R15: 0000000000000000 [ 102.023579][ T1113] [ 118.158186][ T1023] veth0: left allmulticast mode [ 118.158571][ T1023] veth1: left allmulticast mode [ 118.158824][ T1023] veth2: left allmulticast mode [ 118.159079][ T1023] veth3: left allmulticast mode [ 118.159319][ T1023] veth4: left allmulticast mode [ 118.159568][ T1023] veth5: left allmulticast mode