====================================== | [ 27.487430][ C0] 1 lock held by netserver/350: | [ 27.487714][ C0] #0: ffff88800e1a9058 (sk_lock-AF_INET6){+.+.}-{0:0}, at: tcp_sendmsg (net/ipv4/tcp.c:1398) | [ 27.488183][ C0] | [ 27.488183][ C0] stack backtrace: [ 27.488510][ C0] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 27.488513][ C0] Call Trace: [ 27.488515][ C0] [ 27.488517][ C0] dump_stack_lvl (lib/dump_stack.c:123) [ 27.488527][ C0] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6866) [ 27.488539][ C0] veth_xdp_rcv (drivers/net/veth.c:907 (discriminator 9)) [ 27.488548][ C0] ? ip_local_deliver_finish (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:871 net/ipv4/ip_input.c:234) [ 27.488557][ C0] ? ip_local_deliver_finish (net/ipv4/ip_input.c:237) [ 27.488564][ C0] ? ip_local_deliver (./include/linux/netfilter.h:314 ./include/linux/netfilter.h:308 net/ipv4/ip_input.c:254) [ 27.488569][ C0] ? __pfx_veth_xdp_rcv (drivers/net/veth.c:899) [ 27.488578][ C0] ? ip_rcv_finish_core (./include/linux/skbuff.h:1160 ./include/net/route.h:88 net/ipv4/ip_input.c:390) [ 27.488593][ C0] veth_poll (drivers/net/veth.c:977) [ 27.488597][ C0] ? __pfx_veth_poll (drivers/net/veth.c:965) [ 27.488610][ C0] ? find_held_lock (kernel/locking/lockdep.c:5348) [ 27.488616][ C0] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:736) [ 27.488626][ C0] ? trace_pelt_se_tp (./include/trace/events/sched.h:796 (discriminator 21)) [ 27.488631][ C0] ? __update_load_avg_se (kernel/sched/pelt.c:314) [ 27.488648][ C0] __napi_poll.constprop.0 (net/core/dev.c:7413) [ 27.488659][ C0] net_rx_action (net/core/dev.c:7477 net/core/dev.c:7599) [ 27.488671][ C0] ? __pfx_net_rx_action (net/core/dev.c:7561) [ 27.488673][ C0] ? try_to_wake_up (kernel/sched/core.c:4331) [ 27.488678][ C0] ? lock_downgrade (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./arch/x86/include/asm/irqflags.h:159 kernel/locking/lockdep.c:5763) [ 27.488686][ C0] ? do_raw_spin_unlock (./arch/x86/include/asm/atomic.h:23 ./include/linux/atomic/atomic-arch-fallback.h:457 ./include/linux/atomic/atomic-instrumented.h:33 ./include/asm-generic/qspinlock.h:57 kernel/locking/spinlock_debug.c:101 kernel/locking/spinlock_debug.c:141) [ 27.488692][ C0] ? try_to_wake_up (./arch/x86/include/asm/preempt.h:104 ./include/linux/preempt.h:481 ./include/linux/preempt.h:481 kernel/sched/core.c:4176) [ 27.488698][ C0] ? __pfx_try_to_wake_up (kernel/sched/core.c:4175) [ 27.488702][ C0] ? mark_held_locks (kernel/locking/lockdep.c:4326) [ 27.488712][ C0] handle_softirqs (kernel/softirq.c:579) [ 27.488723][ C0] ? __release_sock (./include/net/sock.h:1132 net/core/sock.c:3165) [ 27.488729][ C0] do_softirq (kernel/softirq.c:480 kernel/softirq.c:467) [ 27.488733][ C0] [ 27.488734][ C0] [ 27.488736][ C0] __local_bh_enable_ip (kernel/softirq.c:407) [ 27.488740][ C0] __release_sock (./include/net/sock.h:1132 net/core/sock.c:3165) [ 27.488749][ C0] release_sock (net/core/sock.c:3721) [ 27.488754][ C0] tcp_sendmsg (net/ipv4/tcp.c:1402) [ 27.488758][ C0] __sys_sendto (net/socket.c:712 net/socket.c:727 net/socket.c:2180) [ 27.488777][ C0] ? __pfx___sys_sendto (net/socket.c:2147) [ 27.488789][ C0] ? __sys_getsockname (net/socket.c:2094) [ 27.488794][ C0] ? __pfx___sys_getsockname (net/socket.c:2073) [ 27.488800][ C0] ? inet_listen (net/ipv4/af_inet.c:245) [ 27.488805][ C0] ? __lock_release (kernel/locking/lockdep.c:5534) [ 27.488808][ C0] ? inet_listen (net/ipv4/af_inet.c:245) [ 27.488811][ C0] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:736) [ 27.488814][ C0] ? __local_bh_enable_ip (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 kernel/softirq.c:412) [ 27.488818][ C0] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4473) [ 27.488822][ C0] ? inet_listen (net/ipv4/af_inet.c:245) [ 27.488824][ C0] ? __local_bh_enable_ip (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 kernel/softirq.c:412) [ 27.488832][ C0] __x64_sys_sendto (net/socket.c:2183) [ 27.488836][ C0] ? do_syscall_64 (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./include/linux/entry-common.h:198 arch/x86/entry/syscall_64.c:90) [ 27.488841][ C0] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4473) [ 27.488845][ C0] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 27.488849][ C0] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 27.488853][ C0] RIP: 0033:0x7f21f47328f0 [ 27.488857][ C0] Code: ff ff 64 89 02 eb bd 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 1d 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 68 c3 0f 1f 80 00 00 00 00 41 54 48 83 ec 20 All code ======== 0: ff (bad) 1: ff 64 89 02 jmp *0x2(%rcx,%rcx,4) 5: eb bd jmp 0xffffffffffffffc4 7: 0f 1f 00 nopl (%rax) a: f3 0f 1e fa endbr64 e: 41 89 ca mov %ecx,%r10d 11: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 18: 00 19: 85 c0 test %eax,%eax 1b: 75 1d jne 0x3a 1d: 45 31 c9 xor %r9d,%r9d 20: 45 31 c0 xor %r8d,%r8d 23: b8 2c 00 00 00 mov $0x2c,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 68 ja 0x9a 32: c3 ret 33: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 3a: 41 54 push %r12 3c: 48 83 ec 20 sub $0x20,%rsp Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 68 ja 0x70 8: c3 ret 9: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 10: 41 54 push %r12 12: 48 83 ec 20 sub $0x20,%rsp [ 27.488860][ C0] RSP: 002b:00007ffee3a40ae8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 27.488863][ C0] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f21f47328f0 [ 27.488865][ C0] RDX: 0000000000000290 RSI: 000000000042b960 RDI: 0000000000000008 [ 27.488867][ C0] RBP: 00007ffee3a40b10 R08: 0000000000000000 R09: 0000000000000000 [ 27.488869][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffee3a43108 Finger prints: lockdep_rcu_suspicious:veth_xdp_rcv:veth_poll:net_rx_action:handle_softirqs