[ 10.434961][ T250] ip (250) used greatest stack depth: 24400 bytes left [ 14.853844][ T321] br1: port 1(veth1) entered blocking state [ 14.854330][ T321] br1: port 1(veth1) entered disabled state [ 14.854732][ T321] veth1: entered allmulticast mode [ 14.856817][ T321] veth1: entered promiscuous mode [ 14.940549][ T152] br1: port 1(veth1) entered blocking state [ 14.941039][ T152] br1: port 1(veth1) entered forwarding state [ 15.013123][ T323] br1: port 2(veth2) entered blocking state [ 15.013409][ T323] br1: port 2(veth2) entered disabled state [ 15.013679][ T323] veth2: entered allmulticast mode [ 15.015573][ T323] veth2: entered promiscuous mode [ 15.024437][ T323] ip (323) used greatest stack depth: 24368 bytes left [ 15.092984][ T152] br1: port 2(veth2) entered blocking state [ 15.093286][ T152] br1: port 2(veth2) entered forwarding state [ 15.373599][ T327] 8021q: 802.1Q VLAN Support v1.8 [ 16.157144][ T338] GACT probability NOT on [ 23.378543][ T376] Mirror/redirect action on [ 23.784911][ T382] [ 23.785245][ T382] ============================= [ 23.785432][ T382] WARNING: suspicious RCU usage [ 23.785603][ T382] 6.14.0-rc6-virtme #1 Not tainted [ 23.785953][ T382] ----------------------------- [ 23.786150][ T382] ./include/net/net_namespace.h:418 suspicious rcu_dereference_check() usage! [ 23.786435][ T382] [ 23.786435][ T382] other info that might help us debug this: [ 23.786435][ T382] [ 23.786782][ T382] [ 23.786782][ T382] rcu_scheduler_active = 2, debug_locks = 1 [ 23.787019][ T382] 1 lock held by mausezahn/382: [ 23.787202][ T382] #0: ffffffff8675b5c0 (rcu_read_lock_bh){....}-{1:3}, at: __dev_queue_xmit+0x1f0/0x18d0 [ 23.787505][ T382] [ 23.787505][ T382] stack backtrace: [ 23.787708][ T382] CPU: 2 UID: 0 PID: 382 Comm: mausezahn Not tainted 6.14.0-rc6-virtme #1 [ 23.787713][ T382] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 23.787716][ T382] Call Trace: [ 23.787718][ T382] [ 23.787721][ T382] dump_stack_lvl+0xb0/0xd0 [ 23.787730][ T382] lockdep_rcu_suspicious+0x1ea/0x280 [ 23.787742][ T382] dev_hard_start_xmit+0x2fc/0x3f0 [ 23.787752][ T382] __dev_queue_xmit+0xfaf/0x18d0 [ 23.787767][ T382] ? __pfx___dev_queue_xmit+0x10/0x10 [ 23.787772][ T382] ? packet_parse_headers+0x231/0x9c0 [ 23.787781][ T382] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 23.787788][ T382] ? __pfx_packet_parse_headers+0x10/0x10 [ 23.787792][ T382] ? skb_copy_datagram_from_iter+0xe6/0x6f0 [ 23.787798][ T382] ? dev_get_by_index+0xb2/0x190 [ 23.787811][ T382] packet_snd+0xd0c/0x19d0 [ 23.787823][ T382] ? __lock_release+0x103/0x460 [ 23.787827][ T382] ? __might_fault+0x11b/0x170 [ 23.787835][ T382] ? __pfx_packet_snd+0x10/0x10 [ 23.787837][ T382] ? trace_lock_acquire+0x14c/0x1f0 [ 23.787840][ T382] ? __might_fault+0x11b/0x170 [ 23.787847][ T382] ? lock_acquire+0x32/0xc0 [ 23.787853][ T382] ? __might_fault+0x11b/0x170 [ 23.787864][ T382] __sys_sendto+0x3c3/0x450 [ 23.787870][ T382] ? __pfx___sys_sendto+0x10/0x10 [ 23.787885][ T382] ? sock_ioctl+0x3b6/0x590 [ 23.787896][ T382] ? __pfx___up_read+0x10/0x10 [ 23.787905][ T382] ? do_user_addr_fault+0x374/0xe30 [ 23.787916][ T382] ? do_user_addr_fault+0x374/0xe30 [ 23.787923][ T382] __x64_sys_sendto+0xe0/0x1c0 [ 23.787927][ T382] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 23.787933][ T382] do_syscall_64+0xc1/0x1d0 [ 23.787941][ T382] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 23.787947][ T382] RIP: 0033:0x7fa08168da4a [ 23.787952][ T382] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 [ 23.787955][ T382] RSP: 002b:00007ffef75a2018 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 23.787959][ T382] RAX: ffffffffffffffda RBX: 000000002b7a89d0 RCX: 00007fa08168da4a [ 23.787961][ T382] RDX: 000000000000002a RSI: 000000002b7a8c92 RDI: 0000000000000005 [ 23.787963][ T382] RBP: 000000002b7a8c92 R08: 00007ffef75a2020 R09: 0000000000000014 [ 23.787965][ T382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 23.787967][ T382] R13: 000000000000002a R14: 00007ffef75a2020 R15: 0000000000000000 [ 23.787983][ T382] [ 59.264869][ T561] ip (561) used greatest stack depth: 24032 bytes left [ 59.469356][ T563] br1: port 1(veth1) entered disabled state [ 59.544878][ T564] br1: port 2(veth2) entered disabled state [ 59.639808][ T565] veth2: left allmulticast mode [ 59.640147][ T565] veth2: left promiscuous mode [ 59.640473][ T565] br1: port 2(veth2) entered disabled state [ 59.642441][ T565] veth1: left allmulticast mode [ 59.642643][ T565] veth1: left promiscuous mode [ 59.642947][ T565] br1: port 1(veth1) entered disabled state