====================================== | [ 3990.571688][T31073] 1 lock held by sctp_hello/31073: | [3990.571877][T31073] #0: ffff888013e9c518 (sk_lock-AF_INET6){+.+.}-{0:0}, at: sctp_bind (./arch/x86/include/asm/jump_label.h:27 net/sctp/socket.c:315) sctp | [ 3990.572265][T31073] | [ 3990.572265][T31073] stack backtrace: [ 3990.573336][T31073] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 3990.573566][T31073] Call Trace: [ 3990.573710][T31073] [3990.573809][T31073] dump_stack_lvl (lib/dump_stack.c:123) [3990.574003][T31073] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [3990.574192][T31073] dev_get_by_index_rcu (net/core/dev.c:876 (discriminator 7)) [3990.574383][T31073] sctp_v6_available (net/sctp/ipv6.c:701) sctp [3990.574608][T31073] sctp_do_bind (net/sctp/socket.c:400) sctp [3990.574833][T31073] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [3990.575073][T31073] sctp_bind (net/sctp/socket.c:320) sctp [3990.575292][T31073] inet6_bind_sk (net/ipv6/af_inet6.c:451) [3990.575482][T31073] ? __pfx_inet6_bind_sk (net/ipv6/af_inet6.c:442) [3990.575672][T31073] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [3990.575867][T31073] __sys_bind (net/socket.c:1845 net/socket.c:1869) [3990.576017][T31073] ? __pfx___sys_bind (net/socket.c:1860) [3990.576199][T31073] ? __up_read (./arch/x86/include/asm/atomic64_64.h:79 ./include/linux/atomic/atomic-arch-fallback.h:2749 ./include/linux/atomic/atomic-long.h:184 ./include/linux/atomic/atomic-instrumented.h:3317 kernel/locking/rwsem.c:1345) [3990.576392][T31073] ? do_user_addr_fault (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340) [3990.576586][T31073] ? do_user_addr_fault (./include/linux/rcupdate.h:882 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340) [3990.576777][T31073] __x64_sys_bind (net/socket.c:1875) [3990.576963][T31073] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [3990.577148][T31073] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 3990.577374][T31073] RIP: 0033:0x7f1b41a3eb2b [ 3990.577561][T31073] Code: 73 01 c3 48 8b 0d d5 92 1b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 31 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a5 92 1b 00 f7 d8 64 89 01 48 All code ======== 0: 73 01 jae 0x3 2: c3 ret 3: 48 8b 0d d5 92 1b 00 mov 0x1b92d5(%rip),%rcx # 0x1b92df a: f7 d8 neg %eax c: 64 89 01 mov %eax,%fs:(%rcx) f: 48 83 c8 ff or $0xffffffffffffffff,%rax 13: c3 ret 14: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 1b: 00 00 00 1e: 90 nop 1f: f3 0f 1e fa endbr64 23: b8 31 00 00 00 mov $0x31,%eax 28: 0f 05 syscall 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 ret 33: 48 8b 0d a5 92 1b 00 mov 0x1b92a5(%rip),%rcx # 0x1b92df 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax 6: 73 01 jae 0x9 8: c3 ret 9: 48 8b 0d a5 92 1b 00 mov 0x1b92a5(%rip),%rcx # 0x1b92b5 10: f7 d8 neg %eax 12: 64 89 01 mov %eax,%fs:(%rcx) 15: 48 rex.W [ 3990.578196][T31073] RSP: 002b:00007ffef3dfe408 EFLAGS: 00000202 ORIG_RAX: 0000000000000031 [ 3990.578474][T31073] RAX: ffffffffffffffda RBX: 00007ffef3dfe5f8 RCX: 00007f1b41a3eb2b [ 3990.578749][T31073] RDX: 000000000000001c RSI: 00007ffef3dfe440 RDI: 0000000000000005 [ 3990.579033][T31073] RBP: 0000000000000005 R08: 1999999999999999 R09: 0000000000000000 [ 3990.579313][T31073] R10: 00007f1b41a0fd90 R11: 0000000000000202 R12: 00007ffef3dff9da Finger prints: lockdep_rcu_suspicious:dev_get_by_index_rcu:sctp_v6_available:sctp_do_bind:sctp_bind