[ 78.381322][ T771] br1: port 1(veth1) entered blocking state [ 78.381983][ T771] br1: port 1(veth1) entered disabled state [ 78.382251][ T771] veth1: entered allmulticast mode [ 78.384151][ T771] veth1: entered promiscuous mode [ 78.463400][ T56] br1: port 1(veth1) entered blocking state [ 78.463861][ T56] br1: port 1(veth1) entered forwarding state [ 78.564862][ T773] br1: port 2(veth2) entered blocking state [ 78.565147][ T773] br1: port 2(veth2) entered disabled state [ 78.565414][ T773] veth2: entered allmulticast mode [ 78.567338][ T773] veth2: entered promiscuous mode [ 78.659683][ T56] br1: port 2(veth2) entered blocking state [ 78.660095][ T56] br1: port 2(veth2) entered forwarding state [ 78.947033][ T777] 8021q: 802.1Q VLAN Support v1.8 [ 79.730822][ T788] GACT probability NOT on [ 83.956439][ T740] (udev-worker) (740) used greatest stack depth: 24168 bytes left [ 87.010594][ T826] Mirror/redirect action on [ 87.397344][ T832] [ 87.397654][ T832] ============================= [ 87.397827][ T832] WARNING: suspicious RCU usage [ 87.398288][ T832] 6.14.0-rc6-virtme #1 Not tainted [ 87.398454][ T832] ----------------------------- [ 87.398663][ T832] ./include/net/net_namespace.h:418 suspicious rcu_dereference_check() usage! [ 87.398930][ T832] [ 87.398930][ T832] other info that might help us debug this: [ 87.398930][ T832] [ 87.399249][ T832] [ 87.399249][ T832] rcu_scheduler_active = 2, debug_locks = 1 [ 87.399493][ T832] 1 lock held by mausezahn/832: [ 87.399662][ T832] #0: ffffffff9975b5c0 (rcu_read_lock_bh){....}-{1:3}, at: __dev_queue_xmit+0x1f0/0x18d0 [ 87.399987][ T832] [ 87.399987][ T832] stack backtrace: [ 87.400189][ T832] CPU: 2 UID: 0 PID: 832 Comm: mausezahn Not tainted 6.14.0-rc6-virtme #1 [ 87.400193][ T832] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 87.400195][ T832] Call Trace: [ 87.400197][ T832] [ 87.400199][ T832] dump_stack_lvl+0xb0/0xd0 [ 87.400208][ T832] lockdep_rcu_suspicious+0x1ea/0x280 [ 87.400218][ T832] dev_hard_start_xmit+0x2fc/0x3f0 [ 87.400229][ T832] __dev_queue_xmit+0xfaf/0x18d0 [ 87.400243][ T832] ? __pfx___dev_queue_xmit+0x10/0x10 [ 87.400248][ T832] ? packet_parse_headers+0x231/0x9c0 [ 87.400257][ T832] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 87.400263][ T832] ? __pfx_packet_parse_headers+0x10/0x10 [ 87.400267][ T832] ? skb_copy_datagram_from_iter+0xe6/0x6f0 [ 87.400272][ T832] ? dev_get_by_index+0xb2/0x190 [ 87.400284][ T832] packet_snd+0xd0c/0x19d0 [ 87.400295][ T832] ? __lock_release+0x103/0x460 [ 87.400299][ T832] ? __might_fault+0x11b/0x170 [ 87.400306][ T832] ? __pfx_packet_snd+0x10/0x10 [ 87.400308][ T832] ? trace_lock_acquire+0x14c/0x1f0 [ 87.400310][ T832] ? __might_fault+0x11b/0x170 [ 87.400317][ T832] ? lock_acquire+0x32/0xc0 [ 87.400324][ T832] ? __might_fault+0x11b/0x170 [ 87.400335][ T832] __sys_sendto+0x3c3/0x450 [ 87.400341][ T832] ? __pfx___sys_sendto+0x10/0x10 [ 87.400355][ T832] ? sock_ioctl+0x3b6/0x590 [ 87.400365][ T832] ? __pfx___up_read+0x10/0x10 [ 87.400373][ T832] ? do_user_addr_fault+0x374/0xe30 [ 87.400383][ T832] ? do_user_addr_fault+0x374/0xe30 [ 87.400390][ T832] __x64_sys_sendto+0xe0/0x1c0 [ 87.400394][ T832] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 87.400400][ T832] do_syscall_64+0xc1/0x1d0 [ 87.400407][ T832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.400412][ T832] RIP: 0033:0x7f73615eba4a [ 87.400417][ T832] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 [ 87.400419][ T832] RSP: 002b:00007fff92f2e008 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 87.400423][ T832] RAX: ffffffffffffffda RBX: 000000003d5a69d0 RCX: 00007f73615eba4a [ 87.400425][ T832] RDX: 000000000000002a RSI: 000000003d5a6c92 RDI: 0000000000000005 [ 87.400427][ T832] RBP: 000000003d5a6c92 R08: 00007fff92f2e010 R09: 0000000000000014 [ 87.400428][ T832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 87.400430][ T832] R13: 000000000000002a R14: 00007fff92f2e010 R15: 0000000000000000 [ 87.400446][ T832] [ 122.459416][ T1006] ip (1006) used greatest stack depth: 24024 bytes left [ 123.145684][ T1013] br1: port 1(veth1) entered disabled state [ 123.172777][ T1013] ip (1013) used greatest stack depth: 23512 bytes left [ 123.245388][ T1014] br1: port 2(veth2) entered disabled state [ 123.328688][ T1015] veth2: left allmulticast mode [ 123.328993][ T1015] veth2: left promiscuous mode [ 123.329348][ T1015] br1: port 2(veth2) entered disabled state [ 123.331342][ T1015] veth1: left allmulticast mode [ 123.332745][ T1015] veth1: left promiscuous mode [ 123.333093][ T1015] br1: port 1(veth1) entered disabled state