====================================== | [ 2153.345417][ T8938] 1 lock held by ping6/8938: | [ 2153.345584][ T8938] #0: ffff888010051418 (sk_lock-AF_INET6){+.+.}-{0:0}, at: udpv6_connect (net/ipv6/udp.c:1310) | [ 2153.345883][ T8938] | [ 2153.345883][ T8938] stack backtrace: [ 2153.346332][ T8938] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 2153.346539][ T8938] Call Trace: [ 2153.346665][ T8938] [ 2153.346760][ T8938] dump_stack_lvl (lib/dump_stack.c:123) [ 2153.346928][ T8938] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6846) [ 2153.347094][ T8938] dev_get_by_index_rcu (net/core/dev.c:876 (discriminator 7)) [ 2153.347270][ T8938] ip6_create_rt_oif_rcu (net/ipv6/route.c:1223) [ 2153.347449][ T8938] ? ip6_route_output_flags (net/ipv6/route.c:2695) [ 2153.347641][ T8938] ip6_dst_lookup_tail.constprop.0 (net/ipv6/ip6_output.c:1160) [ 2153.347859][ T8938] ? ip6_datagram_dst_update (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/ipv6/datagram.c:94) [ 2153.348043][ T8938] ip6_dst_lookup_flow (net/ipv6/ip6_output.c:1265) [ 2153.348218][ T8938] ? __pfx_ip6_dst_lookup_flow (net/ipv6/ip6_output.c:1260) [ 2153.348403][ T8938] ? ip6_datagram_dst_update (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/ipv6/datagram.c:94) [ 2153.348585][ T8938] ip6_datagram_dst_update (net/ipv6/datagram.c:96) [ 2153.348769][ T8938] ? __pfx_ip6_datagram_dst_update (net/ipv6/datagram.c:73) [ 2153.349016][ T8938] ? __ip6_datagram_connect (net/ipv6/datagram.c:256) [ 2153.349197][ T8938] __ip6_datagram_connect (net/ipv6/datagram.c:256) [ 2153.349374][ T8938] ? __lock_release (kernel/locking/lockdep.c:5525) [ 2153.349561][ T8938] ? __pfx___ip6_datagram_connect (net/ipv6/datagram.c:143) [ 2153.349792][ T8938] ? mark_held_locks (kernel/locking/lockdep.c:4321) [ 2153.349977][ T8938] ? __pfx_inet_dgram_connect (net/ipv4/af_inet.c:570) [ 2153.350159][ T8938] ? udpv6_connect (net/ipv6/udp.c:1310) [ 2153.350337][ T8938] udpv6_connect (net/ipv6/udp.c:1310) [ 2153.350515][ T8938] ? inet_dgram_connect (net/ipv4/af_inet.c:590 (discriminator 1)) [ 2153.350696][ T8938] __sys_connect (net/socket.c:2066 net/socket.c:2085) [ 2153.350875][ T8938] ? __pfx___sys_connect (net/socket.c:2073) [ 2153.351064][ T8938] ? __pfx_slab_free_after_rcu_debug (mm/slub.c:4643) [ 2153.351299][ T8938] ? trace_rcu_segcb_stats (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 ./include/linux/cpumask.h:570 ./include/linux/cpumask.h:1117 ./include/trace/events/rcu.h:537) [ 2153.351484][ T8938] ? __sys_setsockopt (net/socket.c:2349) [ 2153.351668][ T8938] __x64_sys_connect (net/socket.c:2088) [ 2153.351848][ T8938] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 2153.352031][ T8938] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 2153.352252][ T8938] RIP: 0033:0x7f84f35625c7 [ 2153.352442][ T8938] Code: 0a 00 f7 d8 64 89 02 b8 ff ff ff ff eb bc 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2a 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 18 89 54 24 0c 48 89 34 24 89 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: b8 ff ff ff ff mov $0xffffffff,%eax c: eb bc jmp 0xffffffffffffffca e: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2a 00 00 00 mov $0x2a,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 18 sub $0x18,%rsp 37: 89 54 24 0c mov %edx,0xc(%rsp) 3b: 48 89 34 24 mov %rsi,(%rsp) 3f: 89 .byte 0x89 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 18 sub $0x18,%rsp d: 89 54 24 0c mov %edx,0xc(%rsp) 11: 48 89 34 24 mov %rsi,(%rsp) 15: 89 .byte 0x89 [ 2153.353065][ T8938] RSP: 002b:00007fffacf787c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 2153.353342][ T8938] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007f84f35625c7 [ 2153.353612][ T8938] RDX: 000000000000001c RSI: 000000000041861c RDI: 0000000000000006 [ 2153.353879][ T8938] RBP: 00007fffacf78ab0 R08: 00000000072c84d0 R09: 0000000000000000 [ 2153.354149][ T8938] R10: 00007f84f341a598 R11: 0000000000000246 R12: 00007fffacf78e08 [ 2153.354419][ T8938] R13: 000000000040305a R14: 0000000000415dd0 R15: 00007f84f3689000 | [ 4429.173085][T19428] ------------[ cut here ]------------ | [ 4429.173364][T19428] RTNL: assertion failed at net/core/link_watch.c (59) | [4429.173643][T19428] WARNING: CPU: 3 PID: 19428 at net/core/link_watch.c:59 default_operstate (net/core/link_watch.c:59 (discriminator 3)) | [ 4429.173973][T19428] Modules linked in: ip6t_REJECT ipt_REJECT nft_compat nf_tables libcrc32c [ 4429.174602][T19428] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [4429.174832][T19428] RIP: 0010:default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 4429.175030][T19428] Code: 83 e4 01 0f 85 03 ff ff ff c6 05 08 23 5c 02 01 90 ba 3b 00 00 00 48 c7 c6 00 7c 97 9d 48 c7 c7 40 7c 97 9d e8 b3 b2 e5 fd 90 <0f> 0b 90 90 e9 d9 fe ff ff 48 89 ef e8 81 63 6d fe e9 f7 fd ff ff All code ======== 0: 83 e4 01 and $0x1,%esp 3: 0f 85 03 ff ff ff jne 0xffffffffffffff0c 9: c6 05 08 23 5c 02 01 movb $0x1,0x25c2308(%rip) # 0x25c2318 10: 90 nop 11: ba 3b 00 00 00 mov $0x3b,%edx 16: 48 c7 c6 00 7c 97 9d mov $0xffffffff9d977c00,%rsi 1d: 48 c7 c7 40 7c 97 9d mov $0xffffffff9d977c40,%rdi 24: e8 b3 b2 e5 fd call 0xfffffffffde5b2dc 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 d9 fe ff ff jmp 0xffffffffffffff0c 33: 48 89 ef mov %rbp,%rdi 36: e8 81 63 6d fe call 0xfffffffffe6d63bc 3b: e9 f7 fd ff ff jmp 0xfffffffffffffe37 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 d9 fe ff ff jmp 0xfffffffffffffee2 9: 48 89 ef mov %rbp,%rdi c: e8 81 63 6d fe call 0xfffffffffe6d6392 11: e9 f7 fd ff ff jmp 0xfffffffffffffe0d [ 4429.175687][T19428] RSP: 0018:ffffc90001ef71c8 EFLAGS: 00010286 [ 4429.175921][T19428] RAX: 0000000000000000 RBX: ffff888004eb9000 RCX: 1ffffffff3c3dd8c [ 4429.176195][T19428] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 4429.176485][T19428] RBP: 0000000000000007 R08: 0000000000000000 R09: fffffbfff3c3dd8c [ 4429.176764][T19428] R10: 0000000000000003 R11: ffff888002068040 R12: 0000000000000000 [ 4429.177035][T19428] R13: dffffc0000000000 R14: ffffc90001ef6ca0 R15: ffff888004eb95c0 [ 4429.177323][T19428] FS: 00007fb037b7f800(0000) GS:ffff88806d180000(0000) knlGS:0000000000000000 [ 4429.177647][T19428] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 4429.177888][T19428] CR2: 00000000004e6380 CR3: 0000000004c88003 CR4: 0000000000772ef0 [ 4429.178178][T19428] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 4429.178465][T19428] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 4429.178742][T19428] PKRU: 55555554 [ 4429.178884][T19428] Call Trace: [ 4429.179028][T19428] [4429.179128][T19428] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [4429.179332][T19428] ? __warn (kernel/panic.c:748) [4429.179477][T19428] ? do_raw_spin_unlock (./arch/x86/include/asm/atomic.h:23 ./include/linux/atomic/atomic-arch-fallback.h:457 ./include/linux/atomic/atomic-instrumented.h:33 ./include/asm-generic/qspinlock.h:57 kernel/locking/spinlock_debug.c:101 kernel/locking/spinlock_debug.c:141) [4429.179666][T19428] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [4429.179851][T19428] ? report_bug (lib/bug.c:201 lib/bug.c:219) [4429.180041][T19428] ? handle_bug (arch/x86/kernel/traps.c:285) [4429.180186][T19428] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [4429.180383][T19428] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621) [4429.180584][T19428] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [4429.180777][T19428] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [4429.180962][T19428] rfc2863_policy (net/core/link_watch.c:78) [4429.181152][T19428] linkwatch_do_dev (net/core/link_watch.c:180) [4429.181345][T19428] netdev_run_todo (net/core/dev.c:10894 (discriminator 2)) [4429.181537][T19428] ? __pfx_netdev_run_todo (net/core/dev.c:10867) [4429.181740][T19428] rtnl_dellink (net/core/rtnetlink.c:3528) [4429.181930][T19428] ? __pfx_rtnl_dellink (net/core/rtnetlink.c:3484) [4429.182166][T19428] ? find_held_lock (kernel/locking/lockdep.c:5339) [4429.182367][T19428] ? __lock_release (kernel/locking/lockdep.c:5525) [4429.182555][T19428] ? rtnetlink_rcv_msg (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/core/rtnetlink.c:6900) [4429.182764][T19428] ? __pfx___lock_release (kernel/locking/lockdep.c:5501) [4429.182956][T19428] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5814) [4429.183147][T19428] ? rtnetlink_rcv_msg (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/core/rtnetlink.c:6900) [4429.183347][T19428] ? __pfx_rtnl_dellink (net/core/rtnetlink.c:3484) [4429.183535][T19428] rtnetlink_rcv_msg (net/core/rtnetlink.c:6902) [4429.183723][T19428] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6805) [4429.183906][T19428] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [4429.184092][T19428] ? mark_lock (kernel/locking/lockdep.c:4727 (discriminator 3)) [4429.184261][T19428] ? __lock_acquire (kernel/locking/lockdep.c:5226) [4429.184452][T19428] netlink_rcv_skb (net/netlink/af_netlink.c:2543) [4429.184643][T19428] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6805) [4429.184830][T19428] ? __pfx_netlink_rcv_skb (net/netlink/af_netlink.c:2520) [4429.185029][T19428] ? netlink_deliver_tap (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/netlink/af_netlink.c:340) [4429.185216][T19428] ? netlink_deliver_tap (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [4429.185416][T19428] netlink_unicast (net/netlink/af_netlink.c:1322 net/netlink/af_netlink.c:1348) [4429.185606][T19428] ? __pfx_netlink_unicast (net/netlink/af_netlink.c:1333) [4429.185793][T19428] ? find_held_lock (kernel/locking/lockdep.c:5339) [4429.185989][T19428] netlink_sendmsg (net/netlink/af_netlink.c:1892) [4429.186178][T19428] ? __pfx_netlink_sendmsg (net/netlink/af_netlink.c:1811) [4429.186388][T19428] ____sys_sendmsg (net/socket.c:711 net/socket.c:726 net/socket.c:2594) [4429.186577][T19428] ? __pfx_____sys_sendmsg (net/socket.c:2540) [4429.186759][T19428] ? __pfx_copy_msghdr_from_user (net/socket.c:2520) [4429.187002][T19428] ___sys_sendmsg (net/socket.c:2650) [4429.187192][T19428] ? __pfx____sys_sendmsg (net/socket.c:2637) [4429.187393][T19428] ? kasan_save_stack (mm/kasan/common.c:49) [4429.187582][T19428] ? kasan_save_stack (mm/kasan/common.c:48) [4429.187768][T19428] ? __kasan_record_aux_stack (mm/kasan/generic.c:544) [4429.187952][T19428] ? __call_rcu_common.constprop.0 (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:123 kernel/rcu/tree.c:3087) [4429.188182][T19428] ? __x64_sys_close (fs/open.c:1557 fs/open.c:1539 fs/open.c:1539) [4429.188381][T19428] ? do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [4429.188567][T19428] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [4429.188796][T19428] ? __lock_acquire (kernel/locking/lockdep.c:5226) [4429.188996][T19428] ? find_held_lock (kernel/locking/lockdep.c:5339) [4429.189186][T19428] ? __lock_release (kernel/locking/lockdep.c:5525) [4429.189382][T19428] ? __virt_addr_valid (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:962 ./include/linux/mmzone.h:2058 arch/x86/mm/physaddr.c:65) [4429.189569][T19428] ? __pfx___lock_release (kernel/locking/lockdep.c:5501) [4429.189753][T19428] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5814) [4429.189946][T19428] __sys_sendmsg (net/socket.c:2680) [4429.190135][T19428] ? __pfx___sys_sendmsg (net/socket.c:2665) [4429.190335][T19428] ? __pfx_slab_free_after_rcu_debug (mm/slub.c:4643) [4429.190586][T19428] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [4429.190772][T19428] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 4429.191000][T19428] RIP: 0033:0x7fb037d8b9a7 [ 4429.191192][T19428] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 4429.191842][T19428] RSP: 002b:00007ffdd3ff99f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 4429.192123][T19428] RAX: ffffffffffffffda RBX: 00007ffdd3ffa120 RCX: 00007fb037d8b9a7 [ 4429.192414][T19428] RDX: 0000000000000000 RSI: 00007ffdd3ff9a60 RDI: 0000000000000005 [ 4429.192692][T19428] RBP: 0000000000000001 R08: 0000000000000003 R09: 0000000000000078 [ 4429.192980][T19428] R10: 00007fb037c49ef8 R11: 0000000000000246 R12: 0000000000000001 Finger prints: default_operstate:rfc2863_policy:linkwatch_do_dev:netdev_run_todo:rtnl_dellink lockdep_rcu_suspicious:dev_get_by_index_rcu:ip6_create_rt_oif_rcu:ip6_dst_lookup_flow:ip6_datagram_dst_update