====================================== | [ 3969.827223][ T3678] 1 lock held by sctp_hello/3678: | [ 3969.827424][ T3678] #0: ffff88800fa6a898 (sk_lock-AF_INET6){+.+.}-{0:0}, at: sctp_bind (./arch/x86/include/asm/jump_label.h:27 net/sctp/socket.c:315) sctp | [ 3969.827819][ T3678] | [ 3969.827819][ T3678] stack backtrace: [ 3969.828397][ T3678] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 3969.828630][ T3678] Call Trace: [ 3969.828771][ T3678] [ 3969.828869][ T3678] dump_stack_lvl (lib/dump_stack.c:123) [ 3969.829061][ T3678] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [ 3969.829251][ T3678] dev_get_by_index_rcu (net/core/dev.c:876 (discriminator 7)) [ 3969.829433][ T3678] sctp_v6_available (net/sctp/ipv6.c:701) sctp [ 3969.829650][ T3678] sctp_do_bind (net/sctp/socket.c:400) sctp [ 3969.829868][ T3678] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 3969.830108][ T3678] sctp_bind (net/sctp/socket.c:320) sctp [ 3969.830326][ T3678] inet6_bind_sk (net/ipv6/af_inet6.c:451) [ 3969.830510][ T3678] ? __pfx_inet6_bind_sk (net/ipv6/af_inet6.c:442) [ 3969.830696][ T3678] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [ 3969.830889][ T3678] __sys_bind (net/socket.c:1845 net/socket.c:1869) [ 3969.831030][ T3678] ? __pfx___sys_bind (net/socket.c:1860) [ 3969.831212][ T3678] ? __up_read (./arch/x86/include/asm/atomic64_64.h:79 ./include/linux/atomic/atomic-arch-fallback.h:2749 ./include/linux/atomic/atomic-long.h:184 ./include/linux/atomic/atomic-instrumented.h:3317 kernel/locking/rwsem.c:1345) [ 3969.831403][ T3678] ? do_user_addr_fault (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340) [ 3969.831591][ T3678] ? do_user_addr_fault (./include/linux/rcupdate.h:882 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340) [ 3969.831782][ T3678] __x64_sys_bind (net/socket.c:1875) [ 3969.831963][ T3678] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 3969.832145][ T3678] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 3969.832369][ T3678] RIP: 0033:0x7fd857673b2b [ 3969.832554][ T3678] Code: 73 01 c3 48 8b 0d d5 92 1b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 31 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a5 92 1b 00 f7 d8 64 89 01 48 All code ======== 0: 73 01 jae 0x3 2: c3 ret 3: 48 8b 0d d5 92 1b 00 mov 0x1b92d5(%rip),%rcx # 0x1b92df a: f7 d8 neg %eax c: 64 89 01 mov %eax,%fs:(%rcx) f: 48 83 c8 ff or $0xffffffffffffffff,%rax 13: c3 ret 14: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 1b: 00 00 00 1e: 90 nop 1f: f3 0f 1e fa endbr64 23: b8 31 00 00 00 mov $0x31,%eax 28: 0f 05 syscall 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 ret 33: 48 8b 0d a5 92 1b 00 mov 0x1b92a5(%rip),%rcx # 0x1b92df 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax 6: 73 01 jae 0x9 8: c3 ret 9: 48 8b 0d a5 92 1b 00 mov 0x1b92a5(%rip),%rcx # 0x1b92b5 10: f7 d8 neg %eax 12: 64 89 01 mov %eax,%fs:(%rcx) 15: 48 rex.W [ 3969.833171][ T3678] RSP: 002b:00007ffc732979a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000031 [ 3969.833440][ T3678] RAX: ffffffffffffffda RBX: 00007ffc73297b98 RCX: 00007fd857673b2b [ 3969.833707][ T3678] RDX: 000000000000001c RSI: 00007ffc732979e0 RDI: 0000000000000005 [ 3969.833974][ T3678] RBP: 0000000000000005 R08: 1999999999999999 R09: 0000000000000000 [ 3969.834237][ T3678] R10: 00007fd857644d90 R11: 0000000000000202 R12: 00007ffc732989da Finger prints: lockdep_rcu_suspicious:dev_get_by_index_rcu:sctp_v6_available:sctp_do_bind:sctp_bind