====================================== | [ 1102.796767][T12507] 1 lock held by ip/12507: | [1102.796943][T12507] #0: ffffffff857c5cc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg (net/core/rtnetlink.c:6645) | [ 1102.797269][T12507] | [ 1102.797269][T12507] stack backtrace: [ 1102.797763][T12507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1102.798155][T12507] Call Trace: [ 1102.798295][T12507] [1102.798388][T12507] dump_stack_lvl (lib/dump_stack.c:122) [1102.798572][T12507] lockdep_rcu_suspicious (./include/linux/context_tracking.h:153 kernel/locking/lockdep.c:6725) [1102.798745][T12507] ? __pfx_br_handle_frame (net/bridge/br_input.c:326) bridge [1102.798999][T12507] br_get_link_af_size_filtered (net/bridge/br_private.h:930 net/bridge/br_private.h:940 net/bridge/br_netlink.c:105) bridge [1102.799298][T12507] br_info_notify (./include/linux/skbuff.h:1320 ./include/net/netlink.h:1015 net/bridge/br_netlink.c:645) bridge [1102.799529][T12507] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4299 kernel/locking/lockdep.c:4358) [1102.799745][T12507] br_add_if (net/bridge/br_if.c:692) bridge [1102.799956][T12507] ? rtnl_is_locked (net/core/rtnetlink.c:164) [1102.800142][T12507] ? netdev_master_upper_dev_get (net/core/dev.c:7102) [1102.800363][T12507] do_setlink (net/core/rtnetlink.c:2907) [1102.800542][T12507] ? is_bpf_text_address (./include/linux/rcupdate.h:336 ./include/linux/rcupdate.h:869 ./kernel/bpf/core.c:769) [1102.800717][T12507] ? __pfx_do_setlink (net/core/rtnetlink.c:2778) [1102.800891][T12507] ? is_bpf_text_address (./kernel/bpf/core.c:772) [1102.801061][T12507] ? kernel_text_address (kernel/extable.c:97 kernel/extable.c:94) [1102.801233][T12507] ? __kernel_text_address (kernel/extable.c:79) [1102.801401][T12507] ? unwind_get_return_address (arch/x86/kernel/unwind_orc.c:369 arch/x86/kernel/unwind_orc.c:364) [1102.801573][T12507] ? __pfx_stack_trace_consume_entry (kernel/stacktrace.c:83) [1102.801794][T12507] ? arch_stack_walk (arch/x86/kernel/stacktrace.c:26) [1102.801977][T12507] ? stack_trace_save (kernel/stacktrace.c:123) [1102.802146][T12507] ? __pfx_stack_trace_save (kernel/stacktrace.c:114) [1102.802315][T12507] ? __pfx_validate_nla (lib/nlattr.c:396) [1102.802492][T12507] ? mark_lock (kernel/locking/lockdep.c:4655 (discriminator 3)) [1102.802624][T12507] ? kasan_save_stack (mm/kasan/common.c:49) [1102.802800][T12507] ? __nla_validate_parse (lib/nlattr.c:638) [1102.802977][T12507] __rtnl_newlink (net/core/rtnetlink.c:3696) [1102.803188][T12507] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:227) [1102.803363][T12507] ? __pfx___rtnl_newlink (net/core/rtnetlink.c:3557) [1102.803536][T12507] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4299 kernel/locking/lockdep.c:4358) [1102.803743][T12507] ? __create_object (mm/kmemleak.c:751) [1102.803914][T12507] ? trace_kmalloc (./include/trace/events/kmem.h:54 (discriminator 52)) [1102.804090][T12507] rtnl_newlink (net/core/rtnetlink.c:3744) [1102.804231][T12507] rtnetlink_rcv_msg (net/core/rtnetlink.c:6647) [1102.804400][T12507] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6541) [1102.804570][T12507] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:227) [1102.804747][T12507] ? mark_lock (kernel/locking/lockdep.c:4655 (discriminator 3)) [1102.804877][T12507] ? __lock_acquire (kernel/locking/lockdep.c:5142) [1102.805050][T12507] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [1102.805220][T12507] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6541) [1102.805394][T12507] ? __pfx_netlink_rcv_skb (net/netlink/af_netlink.c:2527) [1102.805575][T12507] ? netlink_deliver_tap (./include/linux/rcupdate.h:336 ./include/linux/rcupdate.h:869 net/netlink/af_netlink.c:340) [1102.805749][T12507] ? netlink_deliver_tap (./include/linux/rcupdate.h:336 ./include/linux/rcupdate.h:869 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [1102.805920][T12507] netlink_unicast (net/netlink/af_netlink.c:1331 net/netlink/af_netlink.c:1357) [1102.806101][T12507] ? __pfx_netlink_unicast (net/netlink/af_netlink.c:1342) [1102.806273][T12507] netlink_sendmsg (net/netlink/af_netlink.c:1901) [1102.806441][T12507] ? __pfx_netlink_sendmsg (net/netlink/af_netlink.c:1820) [1102.806608][T12507] ? __import_iovec (lib/iov_iter.c:1263 lib/iov_iter.c:1279) [1102.806782][T12507] ____sys_sendmsg (net/socket.c:730 net/socket.c:745 net/socket.c:2597) [1102.806959][T12507] ? __pfx_____sys_sendmsg (net/socket.c:2543) [1102.807126][T12507] ? __pfx_copy_msghdr_from_user (net/socket.c:2523) [1102.807338][T12507] ? __pfx_validate_chain (kernel/locking/lockdep.c:3824) [1102.807523][T12507] ___sys_sendmsg (net/socket.c:2653) [1102.807699][T12507] ? __pfx____sys_sendmsg (net/socket.c:2640) [1102.807884][T12507] ? find_held_lock (kernel/locking/lockdep.c:5249) [1102.808053][T12507] ? __lock_release (kernel/locking/lockdep.c:5435) [1102.808217][T12507] ? __debug_check_no_obj_freed (lib/debugobjects.c:1001) [1102.808432][T12507] ? __pfx___lock_release (kernel/locking/lockdep.c:5411) [1102.808600][T12507] ? __pfx_do_raw_spin_lock (kernel/locking/spinlock_debug.c:114) [1102.808773][T12507] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4299 kernel/locking/lockdep.c:4358) [1102.808987][T12507] ? __fget_light (./include/linux/atomic/atomic-arch-fallback.h:479 ./include/linux/atomic/atomic-instrumented.h:50 fs/file.c:1145) [1102.809163][T12507] __sys_sendmsg (./include/linux/file.h:34 net/socket.c:2682) [1102.809338][T12507] ? __pfx___sys_sendmsg (net/socket.c:2668) [1102.809505][T12507] ? __virt_addr_valid (./arch/x86/include/asm/preempt.h:94 ./include/linux/rcupdate.h:953 ./include/linux/mmzone.h:2034 arch/x86/mm/physaddr.c:65) [1102.809697][T12507] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [1102.809871][T12507] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1102.810077][T12507] RIP: 0033:0x7f47c818e7b7 [ 1102.810253][T12507] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 1102.810844][T12507] RSP: 002b:00007ffef1ed37f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1102.811095][T12507] RAX: ffffffffffffffda RBX: 00007ffef1ed3f30 RCX: 00007f47c818e7b7 [ 1102.811404][T12507] RDX: 0000000000000000 RSI: 00007ffef1ed3860 RDI: 0000000000000005 [ 1102.811817][T12507] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 1102.812216][T12507] R10: 0000000021225910 R11: 0000000000000246 R12: 0000000000000003 [ 1102.812594][T12507] R13: 0000000066be9ee6 R14: 0000000000496600 R15: 0000000000000000 | [ 1102.815725][T12507] 1 lock held by ip/12507: | [1102.816002][T12507] #0: ffffffff857c5cc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg (net/core/rtnetlink.c:6645) | [ 1102.816499][T12507] | [ 1102.816499][T12507] stack backtrace: [ 1102.817221][T12507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1102.817848][T12507] Call Trace: [ 1102.818061][T12507] [1102.818205][T12507] dump_stack_lvl (lib/dump_stack.c:122) [1102.818486][T12507] lockdep_rcu_suspicious (./include/linux/context_tracking.h:153 kernel/locking/lockdep.c:6725) [1102.818767][T12507] br_get_link_af_size_filtered (net/bridge/br_private.h:453 net/bridge/br_private.h:940 net/bridge/br_netlink.c:105) bridge [1102.819146][T12507] br_info_notify (./include/linux/skbuff.h:1320 ./include/net/netlink.h:1015 net/bridge/br_netlink.c:645) bridge [1102.819461][T12507] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4299 kernel/locking/lockdep.c:4358) [1102.819808][T12507] br_add_if (net/bridge/br_if.c:692) bridge [1102.820149][T12507] ? rtnl_is_locked (net/core/rtnetlink.c:164) [1102.820430][T12507] ? netdev_master_upper_dev_get (net/core/dev.c:7102) [1102.820785][T12507] do_setlink (net/core/rtnetlink.c:2907) [1102.821069][T12507] ? is_bpf_text_address (./include/linux/rcupdate.h:336 ./include/linux/rcupdate.h:869 ./kernel/bpf/core.c:769) [1102.821346][T12507] ? __pfx_do_setlink (net/core/rtnetlink.c:2778) [1102.821616][T12507] ? is_bpf_text_address (./kernel/bpf/core.c:772) [1102.821940][T12507] ? kernel_text_address (kernel/extable.c:97 kernel/extable.c:94) [1102.822230][T12507] ? __kernel_text_address (kernel/extable.c:79) [1102.822521][T12507] ? unwind_get_return_address (arch/x86/kernel/unwind_orc.c:369 arch/x86/kernel/unwind_orc.c:364) [1102.822806][T12507] ? __pfx_stack_trace_consume_entry (kernel/stacktrace.c:83) [1102.823154][T12507] ? arch_stack_walk (arch/x86/kernel/stacktrace.c:26) [1102.823442][T12507] ? stack_trace_save (kernel/stacktrace.c:123) [1102.823739][T12507] ? __pfx_stack_trace_save (kernel/stacktrace.c:114) [1102.824012][T12507] ? __pfx_validate_nla (lib/nlattr.c:396) [1102.824299][T12507] ? mark_lock (kernel/locking/lockdep.c:4655 (discriminator 3)) [1102.824518][T12507] ? kasan_save_stack (mm/kasan/common.c:49) [1102.824820][T12507] ? __nla_validate_parse (lib/nlattr.c:638) [1102.825119][T12507] __rtnl_newlink (net/core/rtnetlink.c:3696) [1102.825411][T12507] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:227) [1102.825973][T12507] ? __pfx___rtnl_newlink (net/core/rtnetlink.c:3557) [1102.826260][T12507] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4299 kernel/locking/lockdep.c:4358) [1102.826603][T12507] ? __create_object (mm/kmemleak.c:751) [1102.826884][T12507] ? trace_kmalloc (./include/trace/events/kmem.h:54 (discriminator 52)) [1102.827341][T12507] rtnl_newlink (net/core/rtnetlink.c:3744) [1102.827566][T12507] rtnetlink_rcv_msg (net/core/rtnetlink.c:6647) [1102.827857][T12507] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6541) [1102.828132][T12507] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:227) [1102.828584][T12507] ? mark_lock (kernel/locking/lockdep.c:4655 (discriminator 3)) [1102.828811][T12507] ? __lock_acquire (kernel/locking/lockdep.c:5142) [1102.829093][T12507] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [1102.829361][T12507] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6541) [1102.829668][T12507] ? __pfx_netlink_rcv_skb (net/netlink/af_netlink.c:2527) [1102.829979][T12507] ? netlink_deliver_tap (./include/linux/rcupdate.h:336 ./include/linux/rcupdate.h:869 net/netlink/af_netlink.c:340) [1102.830258][T12507] ? netlink_deliver_tap (./include/linux/rcupdate.h:336 ./include/linux/rcupdate.h:869 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [1102.830524][T12507] netlink_unicast (net/netlink/af_netlink.c:1331 net/netlink/af_netlink.c:1357) [1102.830798][T12507] ? __pfx_netlink_unicast (net/netlink/af_netlink.c:1342) [1102.831468][T12507] netlink_sendmsg (net/netlink/af_netlink.c:1901) [1102.831763][T12507] ? __pfx_netlink_sendmsg (net/netlink/af_netlink.c:1820) [1102.832052][T12507] ? __import_iovec (lib/iov_iter.c:1263 lib/iov_iter.c:1279) [1102.832348][T12507] ____sys_sendmsg (net/socket.c:730 net/socket.c:745 net/socket.c:2597) [1102.832820][T12507] ? __pfx_____sys_sendmsg (net/socket.c:2543) [1102.833092][T12507] ? __pfx_copy_msghdr_from_user (net/socket.c:2523) [1102.833425][T12507] ? __pfx_validate_chain (kernel/locking/lockdep.c:3824) [1102.833718][T12507] ___sys_sendmsg (net/socket.c:2653) [1102.834161][T12507] ? __pfx____sys_sendmsg (net/socket.c:2640) [1102.834444][T12507] ? find_held_lock (kernel/locking/lockdep.c:5249) [1102.834731][T12507] ? __lock_release (kernel/locking/lockdep.c:5435) [1102.834993][T12507] ? __debug_check_no_obj_freed (lib/debugobjects.c:1001) [1102.835536][T12507] ? __pfx___lock_release (kernel/locking/lockdep.c:5411) [1102.835829][T12507] ? __pfx_do_raw_spin_lock (kernel/locking/spinlock_debug.c:114) [1102.836124][T12507] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4299 kernel/locking/lockdep.c:4358) [1102.836467][T12507] ? __fget_light (./include/linux/atomic/atomic-arch-fallback.h:479 ./include/linux/atomic/atomic-instrumented.h:50 fs/file.c:1145) [1102.836747][T12507] __sys_sendmsg (./include/linux/file.h:34 net/socket.c:2682) [1102.837009][T12507] ? __pfx___sys_sendmsg (net/socket.c:2668) [1102.837274][T12507] ? __virt_addr_valid (./arch/x86/include/asm/preempt.h:94 ./include/linux/rcupdate.h:953 ./include/linux/mmzone.h:2034 arch/x86/mm/physaddr.c:65) [1102.837601][T12507] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [1102.837955][T12507] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1102.838309][T12507] RIP: 0033:0x7f47c818e7b7 [ 1102.838536][T12507] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 1102.839362][T12507] RSP: 002b:00007ffef1ed37f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1102.839641][T12507] RAX: ffffffffffffffda RBX: 00007ffef1ed3f30 RCX: 00007f47c818e7b7 [ 1102.840001][T12507] RDX: 0000000000000000 RSI: 00007ffef1ed3860 RDI: 0000000000000005 [ 1102.840269][T12507] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 1102.840525][T12507] R10: 0000000021225910 R11: 0000000000000246 R12: 0000000000000003 Finger prints: lockdep_rcu_suspicious:br_get_link_af_size_filtered:br_info_notify:br_add_if:do_setlink