====================================== | [ 37.264608][ T292] 1 lock held by iptables/292: | [ 37.264777][ T292] #0: ffff888004467ac8 (&nft_net->commit_mutex){+.+.}-{3:3}, at: nf_tables_valid_genid (./include/linux/jiffies.h:101 net/netfilter/nf_tables_api.c:10954) nf_tables | [ 37.265231][ T292] | [ 37.265231][ T292] stack backtrace: [ 37.265681][ T292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 37.266035][ T292] Call Trace: [ 37.266165][ T292] [ 37.266254][ T292] dump_stack_lvl (lib/dump_stack.c:123) [ 37.266429][ T292] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [ 37.266600][ T292] __nft_rule_lookup (net/netfilter/nf_tables_api.c:3420 (discriminator 7)) nf_tables [ 37.266826][ T292] nf_tables_newrule (net/netfilter/nf_tables_api.c:4061) nf_tables [ 37.267068][ T292] ? net_generic (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/net/netns/generic.h:48) [ 37.267237][ T292] ? __pfx_nf_tables_newrule (net/netfilter/nf_tables_api.c:4007) nf_tables [ 37.267464][ T292] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) [ 37.267636][ T292] ? __nla_validate_parse (lib/nlattr.c:638) [ 37.267807][ T292] nfnetlink_rcv_batch (net/netfilter/nfnetlink.c:524) [ 37.267989][ T292] ? __pfx_nfnetlink_rcv_batch (net/netfilter/nfnetlink.c:373) [ 37.268153][ T292] ? rcu_read_lock_any_held (kernel/rcu/update.c:387 kernel/rcu/update.c:380) [ 37.268315][ T292] ? find_stack (lib/stackdepot.c:552 (discriminator 1)) [ 37.268484][ T292] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [ 37.268646][ T292] ? validate_chain (kernel/locking/lockdep.c:3797 kernel/locking/lockdep.c:3817 kernel/locking/lockdep.c:3872) [ 37.268822][ T292] ? __pfx_validate_chain (kernel/locking/lockdep.c:3860) [ 37.268992][ T292] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 37.269156][ T292] ? __pfx_validate_nla (lib/nlattr.c:396) [ 37.269328][ T292] ? find_held_lock (kernel/locking/lockdep.c:5315) [ 37.269494][ T292] ? __nla_validate_parse (lib/nlattr.c:638) [ 37.269664][ T292] nfnetlink_rcv (net/netfilter/nfnetlink.c:647 net/netfilter/nfnetlink.c:665) [ 37.269827][ T292] ? __pfx_nfnetlink_rcv (net/netfilter/nfnetlink.c:651) [ 37.269992][ T292] ? netlink_deliver_tap (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [ 37.270160][ T292] netlink_unicast (net/netlink/af_netlink.c:1331 net/netlink/af_netlink.c:1357) [ 37.270326][ T292] ? __pfx_netlink_unicast (net/netlink/af_netlink.c:1342) [ 37.270496][ T292] netlink_sendmsg (net/netlink/af_netlink.c:1901) [ 37.270666][ T292] ? __pfx_netlink_sendmsg (net/netlink/af_netlink.c:1820) [ 37.270831][ T292] ? __import_iovec (lib/iov_iter.c:1433 lib/iov_iter.c:1449) [ 37.271012][ T292] ____sys_sendmsg (net/socket.c:729 net/socket.c:744 net/socket.c:2607) [ 37.271184][ T292] ? __pfx_____sys_sendmsg (net/socket.c:2553) [ 37.271344][ T292] ? __pfx_copy_msghdr_from_user (net/socket.c:2533) [ 37.271552][ T292] ? sk_setsockopt (net/core/sock.c:1129 net/core/sock.c:1621) [ 37.271711][ T292] ? __local_bh_enable_ip (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:97 kernel/softirq.c:387) [ 37.271880][ T292] ___sys_sendmsg (net/socket.c:2663) [ 37.272052][ T292] ? __pfx____sys_sendmsg (net/socket.c:2650) [ 37.272220][ T292] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 37.272383][ T292] ? usage_skip (kernel/locking/lockdep.c:2314 kernel/locking/lockdep.c:2282) [ 37.272548][ T292] ? trace_kfree (./include/trace/events/kmem.h:94 (discriminator 52)) [ 37.272711][ T292] ? kfree (mm/slub.c:4716) [ 37.272841][ T292] ? do_sock_setsockopt (net/socket.c:2303) [ 37.273004][ T292] ? __pfx_do_sock_setsockopt (net/socket.c:2303) [ 37.273173][ T292] ? fdget (./include/linux/atomic/atomic-arch-fallback.h:479 ./include/linux/atomic/atomic-instrumented.h:50 fs/file.c:1114 fs/file.c:1128) [ 37.273308][ T292] __sys_sendmsg (./include/linux/file.h:35 net/socket.c:2692) [ 37.273471][ T292] ? __pfx___sys_sendmsg (net/socket.c:2678) [ 37.273632][ T292] ? __sys_setsockopt (./include/linux/file.h:35 net/socket.c:2359) [ 37.273796][ T292] ? __pfx___sys_setsockopt (net/socket.c:2347) [ 37.273974][ T292] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 37.274141][ T292] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 37.274346][ T292] RIP: 0033:0x7f0ad88057b7 [ 37.274519][ T292] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 37.275082][ T292] RSP: 002b:00007fff565cd788 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 37.275327][ T292] RAX: ffffffffffffffda RBX: 00007fff565cd790 RCX: 00007f0ad88057b7 [ 37.275568][ T292] RDX: 0000000000000000 RSI: 00007fff565ce820 RDI: 0000000000000005 [ 37.275812][ T292] RBP: 00007fff565cee20 R08: 0000000000000004 R09: 0000000000000000 [ 37.276057][ T292] R10: 00007f0ad8906bd8 R11: 0000000000000246 R12: 0000000000006000 Finger prints: lockdep_rcu_suspicious:__nft_rule_lookup:nf_tables_newrule:nfnetlink_rcv_batch:nfnetlink_rcv