====================================== | [ 1432.246086] #PF: supervisor read access in kernel mode | [ 1432.246146] #PF: error_code(0x0000) - not-present page | [ 1432.246203] PGD 11e26067 P4D 11e26067 PUD 11e27067 PMD 0 | [ 1432.246257] Oops: Oops: 0000 [#1] SMP [ 1432.246399] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1432.246469] RIP: 0010:ip_route_output_key_hash_rcu (net/ipv4/route.c:2663 net/ipv4/route.c:2871) [ 1432.246547] Code: ff 49 8b 06 ba 05 00 00 00 48 8b 80 08 01 00 00 48 8b 80 10 04 00 00 e9 48 f9 ff ff e8 2e 55 81 ff e9 3f fc ff ff 49 8b 45 18 <48> 8b 40 58 48 89 c2 48 83 ca 01 49 89 54 24 10 48 3d e0 93 2e 94 All code ======== 0: ff 49 8b decl -0x75(%rcx) 3: 06 (bad) 4: ba 05 00 00 00 mov $0x5,%edx 9: 48 8b 80 08 01 00 00 mov 0x108(%rax),%rax 10: 48 8b 80 10 04 00 00 mov 0x410(%rax),%rax 17: e9 48 f9 ff ff jmp 0xfffffffffffff964 1c: e8 2e 55 81 ff call 0xffffffffff81554f 21: e9 3f fc ff ff jmp 0xfffffffffffffc65 26: 49 8b 45 18 mov 0x18(%r13),%rax 2a:* 48 8b 40 58 mov 0x58(%rax),%rax <-- trapping instruction 2e: 48 89 c2 mov %rax,%rdx 31: 48 83 ca 01 or $0x1,%rdx 35: 49 89 54 24 10 mov %rdx,0x10(%r12) 3a: 48 3d e0 93 2e 94 cmp $0xffffffff942e93e0,%rax Code starting with the faulting instruction =========================================== 0: 48 8b 40 58 mov 0x58(%rax),%rax 4: 48 89 c2 mov %rax,%rdx 7: 48 83 ca 01 or $0x1,%rdx b: 49 89 54 24 10 mov %rdx,0x10(%r12) 10: 48 3d e0 93 2e 94 cmp $0xffffffff942e93e0,%rax [ 1432.246744] RSP: 0018:ffffc1b0022dfd58 EFLAGS: 00010246 [ 1432.246799] RAX: 0000000000000000 RBX: ffff9daf419758f8 RCX: 0000000000000017 [ 1432.246885] RDX: 0000000000000000 RSI: ffffffff9548e5c4 RDI: 0000000000000016 [ 1432.246969] RBP: ffff9daf4ccc5000 R08: 0000000000000000 R09: 0000000090000000 [ 1432.247052] R10: 0000000000000000 R11: 0000000000000003 R12: ffff9daf4e3b0cc0 [ 1432.247136] R13: ffffc1b0022dfdc0 R14: ffff9daf43db0600 R15: 0000000000000000 [ 1432.247222] FS: 00007fa84436a300(0000) GS:ffff9dafe991f000(0000) knlGS:0000000000000000 [ 1432.247307] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1432.247375] CR2: 0000000000000058 CR3: 0000000009f1a001 CR4: 0000000000772ef0 [ 1432.247459] PKRU: 55555554 [ 1432.247485] Call Trace: [ 1432.247514] [ 1432.247542] ip_route_output_flow (net/ipv4/route.c:2701 ./include/net/route.h:169 net/ipv4/route.c:2928) [ 1432.247590] __ip4_datagram_connect (./include/net/route.h:355 net/ipv4/datagram.c:49) [ 1432.247645] udp_connect (net/ipv4/udp.c:2153) [ 1432.247687] __sys_connect (./include/linux/file.h:62 ./include/linux/file.h:83 net/socket.c:2095) [ 1432.247740] ? sock_alloc_file (./include/linux/fs.h:3229 net/socket.c:486) [ 1432.247787] ? __sys_socket (net/socket.c:503 net/socket.c:1740) [ 1432.247829] __x64_sys_connect (net/socket.c:2111 net/socket.c:2108 net/socket.c:2108) [ 1432.247870] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1432.247919] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1432.247973] RIP: 0033:0x7fa844600d77 [ 1432.248014] Code: 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2a 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 18 89 54 24 0c 48 89 34 24 89 All code ======== 0: 64 89 01 mov %eax,%fs:(%rcx) 3: 48 83 c8 ff or $0xffffffffffffffff,%rax 7: c3 ret 8: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) f: 00 00 00 12: 90 nop 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2a 00 00 00 mov $0x2a,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 18 sub $0x18,%rsp 37: 89 54 24 0c mov %edx,0xc(%rsp) 3b: 48 89 34 24 mov %rsi,(%rsp) 3f: 89 .byte 0x89 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 18 sub $0x18,%rsp d: 89 54 24 0c mov %edx,0xc(%rsp) 11: 48 89 34 24 mov %rsi,(%rsp) 15: 89 .byte 0x89 [ 1432.248214] RSP: 002b:00007ffd59576878 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1432.248298] RAX: ffffffffffffffda RBX: 00007ffd595779a8 RCX: 00007fa844600d77 [ 1432.248382] RDX: 0000000000000010 RSI: 00007ffd595768e0 RDI: 0000000000000007 [ 1432.248465] RBP: 00007ffd59576f30 R08: 00000000000000ff R09: 0000000000000000 [ 1432.248549] R10: 00007fa8444f85a0 R11: 0000000000000246 R12: 00007ffd59577288 [ 1432.248634] R13: 000000000040305a R14: 0000000000415dd0 R15: 00007fa84476c000 | [ 1432.250571] Voluntary context switch within RCU read-side critical section! | [ 1432.250580] WARNING: CPU: 3 PID: 18377 at kernel/rcu/tree_plugin.h:332 rcu_note_context_switch (kernel/rcu/tree_plugin.h:332 (discriminator 11)) | [ 1432.250752] Modules linked in: vxcan can_dev xfrm_interface ip6_gre ip_gre gre macsec ipvlan xt_length act_ct nf_flow_table xt_conntrack drop_monitor netdevsim chacha chacha_x86_64 libchacha chacha20poly1305 libpoly1305 poly1305_x86_64 tls xt_mark act_mirred cls_basic sch_fq_codel act_gact cls_matchall sch_ingress xt_policy nft_compat nf_tables xfrm_user geneve vxlan act_csum act_pedit cls_flower sch_prio openvswitch psample nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nsh | [ 1432.251315] Tainted: [D]=DIE [ 1432.251357] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1432.251428] RIP: 0010:rcu_note_context_switch (kernel/rcu/tree_plugin.h:332 (discriminator 11)) [ 1432.251484] Code: 00 00 00 be 01 00 00 00 48 89 ef e8 e9 e3 fe ff e9 43 fc ff ff c6 05 b3 0b 68 01 01 90 48 c7 c7 40 d5 52 94 e8 20 1e f6 ff 90 <0f> 0b 90 90 e9 b9 fb ff ff 80 7b 11 00 0f 84 40 fe ff ff 90 0f 0b All code ======== 0: 00 00 add %al,(%rax) 2: 00 be 01 00 00 00 add %bh,0x1(%rsi) 8: 48 89 ef mov %rbp,%rdi b: e8 e9 e3 fe ff call 0xfffffffffffee3f9 10: e9 43 fc ff ff jmp 0xfffffffffffffc58 15: c6 05 b3 0b 68 01 01 movb $0x1,0x1680bb3(%rip) # 0x1680bcf 1c: 90 nop 1d: 48 c7 c7 40 d5 52 94 mov $0xffffffff9452d540,%rdi 24: e8 20 1e f6 ff call 0xfffffffffff61e49 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 b9 fb ff ff jmp 0xfffffffffffffbec 33: 80 7b 11 00 cmpb $0x0,0x11(%rbx) 37: 0f 84 40 fe ff ff je 0xfffffffffffffe7d 3d: 90 nop 3e: 0f 0b ud2 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 b9 fb ff ff jmp 0xfffffffffffffbc2 9: 80 7b 11 00 cmpb $0x0,0x11(%rbx) d: 0f 84 40 fe ff ff je 0xfffffffffffffe53 13: 90 nop 14: 0f 0b ud2 [ 1432.251685] RSP: 0018:ffffc1b0022dfcf0 EFLAGS: 00010082 [ 1432.251740] RAX: 0000000000000000 RBX: ffff9daf7eda9340 RCX: 00000000ffffdfff [ 1432.251828] RDX: 0000000000000000 RSI: 00000000ffffffea RDI: 0000000000000001 [ 1432.251916] RBP: ffff9daf49cb9700 R08: ffffffff94d5b248 R09: 00000000ffffdfff [ 1432.252003] R10: ffffffff94c7b260 R11: ffffffff94d32088 R12: 0000000000000000 [ 1432.252091] R13: 0000000000000000 R14: ffff9daf7eda85c0 R15: 0000000000000000 [ 1432.252178] FS: 0000000000000000(0000) GS:ffff9dafe991f000(0000) knlGS:0000000000000000 [ 1432.252266] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1432.252338] CR2: 0000000000000058 CR3: 000000003da46003 CR4: 0000000000772ef0 [ 1432.252426] PKRU: 55555554 [ 1432.252454] Call Trace: [ 1432.252485] [ 1432.252513] __schedule (./arch/x86/include/asm/preempt.h:80 kernel/sched/core.c:634 kernel/sched/sched.h:1519 kernel/sched/sched.h:1841 kernel/sched/core.c:6865) [ 1432.252557] schedule (./arch/x86/include/asm/preempt.h:85 kernel/sched/core.c:7044 kernel/sched/core.c:7058) [ 1432.252600] __lock_sock (./include/linux/spinlock.h:356 net/core/sock.c:3173) [ 1432.252644] ? housekeeping_test_cpu (kernel/sched/wait.c:402) [ 1432.252699] __lock_sock_fast (./include/linux/spinlock.h:396 net/core/sock.c:3788) [ 1432.252742] udp_destroy_sock (./include/net/sock.h:1703 net/ipv4/udp.c:2887) [ 1432.252787] sk_common_release (net/core/sock.c:3942) [ 1432.252829] inet_release (net/ipv4/af_inet.c:436) [ 1432.252873] __sock_release (net/socket.c:650) [ 1432.252916] sock_close (net/socket.c:1441) [ 1432.252959] __fput (fs/file_table.c:469) [ 1432.253010] task_work_run (./include/linux/sched.h:2070 (discriminator 1) kernel/task_work.c:229 (discriminator 1)) [ 1432.253054] do_exit (kernel/exit.c:962) [ 1432.253106] make_task_dead (kernel/exit.c:1050) [ 1432.253149] rewind_stack_and_make_dead (??:?) [ 1432.253208] RIP: 0033:0x7fa844600d77 [ 1432.253250] Code: Unable to access opcode bytes at 0x7fa844600d4d. Code starting with the faulting instruction =========================================== [ 1432.253323] RSP: 002b:00007ffd59576878 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1432.253411] RAX: ffffffffffffffda RBX: 00007ffd595779a8 RCX: 00007fa844600d77 [ 1432.253497] RDX: 0000000000000010 RSI: 00007ffd595768e0 RDI: 0000000000000007 [ 1432.253583] RBP: 00007ffd59576f30 R08: 00000000000000ff R09: 0000000000000000 [ 1432.253670] R10: 00007fa8444f85a0 R11: 0000000000000246 R12: 00007ffd59577288 Finger prints: ip_route_output_key_hash_rcu:ip_route_output_flow:__ip4_datagram_connect:udp_connect:__sys_connect rcu_note_context_switch:__schedule:schedule:__lock_sock:__lock_sock_fast