====================================== | [ 86.257707][ T566] 1 lock held by iptables/566: | [ 86.257998][ T566] #0: ffff88803da5acc8 (&nft_net->commit_mutex){+.+.}-{3:3}, at: nf_tables_valid_genid (./include/linux/jiffies.h:101 net/netfilter/nf_tables_api.c:10954) nf_tables | [ 86.258719][ T566] | [ 86.258719][ T566] stack backtrace: [ 86.259553][ T566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 86.260152][ T566] Call Trace: [ 86.260374][ T566] [ 86.260531][ T566] dump_stack_lvl (lib/dump_stack.c:123) [ 86.260817][ T566] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [ 86.261107][ T566] __nft_rule_lookup (net/netfilter/nf_tables_api.c:3420 (discriminator 7)) nf_tables [ 86.261519][ T566] nf_tables_newrule (net/netfilter/nf_tables_api.c:4061) nf_tables [ 86.261939][ T566] ? net_generic (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/net/netns/generic.h:48) [ 86.262237][ T566] ? __pfx_nf_tables_newrule (net/netfilter/nf_tables_api.c:4007) nf_tables [ 86.262635][ T566] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) [ 86.262919][ T566] ? __nla_validate_parse (lib/nlattr.c:638) [ 86.263204][ T566] nfnetlink_rcv_batch (net/netfilter/nfnetlink.c:524) [ 86.263510][ T566] ? __pfx_nfnetlink_rcv_batch (net/netfilter/nfnetlink.c:373) [ 86.263795][ T566] ? rcu_read_lock_any_held (kernel/rcu/update.c:387 kernel/rcu/update.c:380) [ 86.264076][ T566] ? find_stack (lib/stackdepot.c:552 (discriminator 1)) [ 86.264363][ T566] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [ 86.264622][ T566] ? validate_chain (kernel/locking/lockdep.c:3797 kernel/locking/lockdep.c:3817 kernel/locking/lockdep.c:3872) [ 86.264928][ T566] ? __pfx_validate_chain (kernel/locking/lockdep.c:3860) [ 86.265217][ T566] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 86.265486][ T566] ? __pfx_validate_nla (lib/nlattr.c:396) [ 86.265764][ T566] ? find_held_lock (kernel/locking/lockdep.c:5315) [ 86.266040][ T566] ? __nla_validate_parse (lib/nlattr.c:638) [ 86.266329][ T566] nfnetlink_rcv (net/netfilter/nfnetlink.c:647 net/netfilter/nfnetlink.c:665) [ 86.266601][ T566] ? __pfx_nfnetlink_rcv (net/netfilter/nfnetlink.c:651) [ 86.266867][ T566] ? netlink_deliver_tap (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [ 86.267144][ T566] netlink_unicast (net/netlink/af_netlink.c:1331 net/netlink/af_netlink.c:1357) [ 86.267420][ T566] ? __pfx_netlink_unicast (net/netlink/af_netlink.c:1342) [ 86.267699][ T566] netlink_sendmsg (net/netlink/af_netlink.c:1901) [ 86.267973][ T566] ? __pfx_netlink_sendmsg (net/netlink/af_netlink.c:1820) [ 86.268259][ T566] ? __import_iovec (lib/iov_iter.c:1433 lib/iov_iter.c:1449) [ 86.268572][ T566] ____sys_sendmsg (net/socket.c:729 net/socket.c:744 net/socket.c:2607) [ 86.268855][ T566] ? __pfx_____sys_sendmsg (net/socket.c:2553) [ 86.269139][ T566] ? __pfx_copy_msghdr_from_user (net/socket.c:2533) [ 86.269494][ T566] ? sk_setsockopt (net/core/sock.c:1129 net/core/sock.c:1621) [ 86.269775][ T566] ? __local_bh_enable_ip (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:97 kernel/softirq.c:387) [ 86.270065][ T566] ___sys_sendmsg (net/socket.c:2663) [ 86.270353][ T566] ? __pfx____sys_sendmsg (net/socket.c:2650) [ 86.270642][ T566] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 86.270942][ T566] ? usage_skip (kernel/locking/lockdep.c:2314 kernel/locking/lockdep.c:2282) [ 86.271230][ T566] ? trace_kfree (./include/trace/events/kmem.h:94 (discriminator 52)) [ 86.271508][ T566] ? kfree (mm/slub.c:4716) [ 86.271739][ T566] ? do_sock_setsockopt (net/socket.c:2303) [ 86.272019][ T566] ? __pfx_do_sock_setsockopt (net/socket.c:2303) [ 86.272317][ T566] ? fdget (./include/linux/atomic/atomic-arch-fallback.h:479 ./include/linux/atomic/atomic-instrumented.h:50 fs/file.c:1114 fs/file.c:1128) [ 86.272545][ T566] __sys_sendmsg (./include/linux/file.h:35 net/socket.c:2692) [ 86.272829][ T566] ? __pfx___sys_sendmsg (net/socket.c:2678) [ 86.273118][ T566] ? __sys_setsockopt (./include/linux/file.h:35 net/socket.c:2359) [ 86.273407][ T566] ? __pfx___sys_setsockopt (net/socket.c:2347) [ 86.273719][ T566] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 86.274009][ T566] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 86.274363][ T566] RIP: 0033:0x7f6cafd7d7b7 [ 86.274659][ T566] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 86.275622][ T566] RSP: 002b:00007ffcb8ea2ea8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 86.276039][ T566] RAX: ffffffffffffffda RBX: 00007ffcb8ea2eb0 RCX: 00007f6cafd7d7b7 [ 86.276462][ T566] RDX: 0000000000000000 RSI: 00007ffcb8ea3f40 RDI: 0000000000000005 [ 86.276877][ T566] RBP: 00007ffcb8ea4540 R08: 0000000000000004 R09: 0000000000000000 [ 86.277322][ T566] R10: 00007f6cafe7ebd8 R11: 0000000000000246 R12: 0000000000006000 Finger prints: lockdep_rcu_suspicious:__nft_rule_lookup:nf_tables_newrule:nfnetlink_rcv_batch:nfnetlink_rcv