====================================== | [ 2.789803] #PF: supervisor write access in kernel mode | [ 2.789855] #PF: error_code(0x0002) - not-present page | [ 2.789900] PGD 2ed2067 P4D 2ed2067 PUD 77dd067 PMD 0 | [ 2.789951] Oops: Oops: 0002 [#1] SMP [ 2.790075] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 2.790131] RIP: 0010:work_grab_pending (./arch/x86/include/asm/bitops.h:136 ./include/asm-generic/bitops/instrumented-atomic.h:72 kernel/workqueue.c:2072 kernel/workqueue.c:2160) [ 2.790188] Code: 83 e6 01 41 57 41 56 4c 8d 77 20 41 55 41 54 41 89 f4 55 48 89 d5 53 48 89 fb 9c 58 fa 48 89 45 00 45 85 e4 0f 85 8a 00 00 00 48 0f ba 2b 00 41 0f 92 c5 72 0e 5b 44 89 e8 5d 41 5c 41 5d 41 All code ======== 0: 83 e6 01 and $0x1,%esi 3: 41 57 push %r15 5: 41 56 push %r14 7: 4c 8d 77 20 lea 0x20(%rdi),%r14 b: 41 55 push %r13 d: 41 54 push %r12 f: 41 89 f4 mov %esi,%r12d 12: 55 push %rbp 13: 48 89 d5 mov %rdx,%rbp 16: 53 push %rbx 17: 48 89 fb mov %rdi,%rbx 1a: 9c pushf 1b: 58 pop %rax 1c: fa cli 1d: 48 89 45 00 mov %rax,0x0(%rbp) 21: 45 85 e4 test %r12d,%r12d 24: 0f 85 8a 00 00 00 jne 0xb4 2a:* f0 48 0f ba 2b 00 lock btsq $0x0,(%rbx) <-- trapping instruction 30: 41 0f 92 c5 setb %r13b 34: 72 0e jb 0x44 36: 5b pop %rbx 37: 44 89 e8 mov %r13d,%eax 3a: 5d pop %rbp 3b: 41 5c pop %r12 3d: 41 5d pop %r13 3f: 41 rex.B Code starting with the faulting instruction =========================================== 0: f0 48 0f ba 2b 00 lock btsq $0x0,(%rbx) 6: 41 0f 92 c5 setb %r13b a: 72 0e jb 0x1a c: 5b pop %rbx d: 44 89 e8 mov %r13d,%eax 10: 5d pop %rbp 11: 41 5c pop %r12 13: 41 5d pop %r13 15: 41 rex.B [ 2.790352] RSP: 0018:ffffc0d1402c3770 EFLAGS: 00010046 [ 2.790402] RAX: 0000000000000246 RBX: 0000000000000000 RCX: ffff9cd30321d528 [ 2.790468] RDX: ffffc0d1402c37a8 RSI: 0000000000000000 RDI: 0000000000000000 [ 2.790538] RBP: ffffc0d1402c37a8 R08: 0000000000000001 R09: 0000000000000001 [ 2.790605] R10: ffffffff962080d8 R11: ffffc0d14013cff8 R12: 0000000000000000 [ 2.790671] R13: 0000000000000000 R14: 0000000000000020 R15: 0000000000000001 [ 2.790743] FS: 00007f1d94c6e800(0000) GS:ffff9cd3a835a000(0000) knlGS:0000000000000000 [ 2.790816] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2.790879] CR2: 0000000000000000 CR3: 000000000775f002 CR4: 0000000000772ef0 [ 2.790953] PKRU: 55555554 [ 2.790980] Call Trace: [ 2.791005] [ 2.791033] __cancel_work (kernel/workqueue.c:4366) [ 2.791077] __cancel_work_sync (kernel/workqueue.c:4381) [ 2.791118] __dev_close_many (net/core/dev.c:1879 (discriminator 2) net/core/dev.c:1932 (discriminator 2)) [ 2.791162] __dev_change_flags (./include/linux/list.h:226 ./include/linux/list.h:237 net/core/dev.c:1945 net/core/dev.c:9924) [ 2.791204] netif_change_flags (net/core/dev.c:9989) [ 2.791242] dev_change_flags (./include/net/netdev_lock.h:30 ./include/net/netdev_lock.h:47 net/core/dev_api.c:69) [ 2.791277] cycle_netdev (drivers/net/vrf.c:1052) vrf [ 2.791315] vrf_add_slave (drivers/net/vrf.c:1083 drivers/net/vrf.c:1102) vrf [ 2.791349] do_set_master (./include/net/netdev_lock.h:30 ./include/net/netdev_lock.h:41 net/core/rtnetlink.c:2964) [ 2.791391] rtnl_newlink (net/core/rtnetlink.c:3854 net/core/rtnetlink.c:3957 net/core/rtnetlink.c:4072) [ 2.791434] ? rtnl_setlink (net/core/rtnetlink.c:3963) [ 2.791471] rtnetlink_rcv_msg (net/core/rtnetlink.c:6959) [ 2.791505] ? update_load_avg (kernel/sched/fair.c:4731) [ 2.791544] ? rtnl_calcit.isra.0 (net/core/rtnetlink.c:6861) [ 2.791589] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [ 2.791631] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) [ 2.791668] ? __alloc_skb (net/core/skbuff.c:706) [ 2.791709] netlink_sendmsg (net/netlink/af_netlink.c:1894) [ 2.791749] ____sys_sendmsg (net/socket.c:727 net/socket.c:742 net/socket.c:2630) [ 2.791790] ? copy_msghdr_from_user (net/socket.c:2570) [ 2.791842] ___sys_sendmsg (net/socket.c:2686) [ 2.791883] ? __handle_mm_fault (mm/memory.c:5708 mm/memory.c:5850 mm/memory.c:4362 mm/memory.c:6195 mm/memory.c:6336) [ 2.791933] __sys_sendmsg (net/socket.c:2716) [ 2.791975] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 2.792015] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 2.792066] RIP: 0033:0x7f1d94e3c1d7 [ 2.792103] Code: Unable to access opcode bytes at 0x7f1d94e3c1ad. Code starting with the faulting instruction =========================================== [ 2.792164] RSP: 002b:00007fff5a0521c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2.792231] RAX: ffffffffffffffda RBX: 00007fff5a0528f0 RCX: 00007f1d94e3c1d7 [ 2.792299] RDX: 0000000000000000 RSI: 00007fff5a052230 RDI: 0000000000000005 [ 2.792372] RBP: 0000000000000002 R08: 0000000000000054 R09: 0000000000000000 [ 2.792439] R10: 00007f1d94ecaac0 R11: 0000000000000246 R12: 00007fff5a052938 Finger prints: work_grab_pending:__cancel_work:__cancel_work_sync:__dev_close_many:__dev_change_flags