====================================== | [ 342.095554] ------------[ cut here ]------------ | [ 342.095680] RTNL: assertion failed at net/core/link_watch.c (59) | [ 342.095757] WARNING: CPU: 3 PID: 6433 at net/core/link_watch.c:59 rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) | [ 342.095840] Modules linked in: 8021q act_pedit act_mirred ip6_gre ip6_tunnel tunnel6 cls_matchall ip_gre gre act_gact cls_flower sch_ingress bridge stp llc vrf veth [ 342.096063] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 342.096144] RIP: 0010:rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) [ 342.096199] Code: 80 3d 03 5d e8 00 00 75 ca c6 05 fa 5c e8 00 01 90 ba 3b 00 00 00 48 c7 c6 08 22 38 8a 48 c7 c7 28 0d 2a 8a e8 ef 95 57 ff 90 <0f> 0b 90 90 eb a3 83 f8 06 0f 85 14 ff ff ff b8 05 00 00 00 e9 0a All code ======== 0: 80 3d 03 5d e8 00 00 cmpb $0x0,0xe85d03(%rip) # 0xe85d0a 7: 75 ca jne 0xffffffffffffffd3 9: c6 05 fa 5c e8 00 01 movb $0x1,0xe85cfa(%rip) # 0xe85d0a 10: 90 nop 11: ba 3b 00 00 00 mov $0x3b,%edx 16: 48 c7 c6 08 22 38 8a mov $0xffffffff8a382208,%rsi 1d: 48 c7 c7 28 0d 2a 8a mov $0xffffffff8a2a0d28,%rdi 24: e8 ef 95 57 ff call 0xffffffffff579618 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: eb a3 jmp 0xffffffffffffffd3 30: 83 f8 06 cmp $0x6,%eax 33: 0f 85 14 ff ff ff jne 0xffffffffffffff4d 39: b8 05 00 00 00 mov $0x5,%eax 3e: e9 .byte 0xe9 3f: 0a .byte 0xa Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: eb a3 jmp 0xffffffffffffffa9 6: 83 f8 06 cmp $0x6,%eax 9: 0f 85 14 ff ff ff jne 0xffffffffffffff23 f: b8 05 00 00 00 mov $0x5,%eax 14: e9 .byte 0xe9 15: 0a .byte 0xa [ 342.096377] RSP: 0018:ffffa9aa416ff750 EFLAGS: 00010286 [ 342.096419] RAX: 0000000000000000 RBX: ffff9e70478c7000 RCX: 00000000ffffdfff [ 342.096496] RDX: 0000000000000000 RSI: 00000000ffffffea RDI: 0000000000000001 [ 342.096564] RBP: 0000000000000003 R08: ffffffff8a756968 R09: 00000000ffffdfff [ 342.096627] R10: ffffffff8a676980 R11: ffffffff8a726980 R12: dead000000000122 [ 342.096692] R13: dead000000000100 R14: ffffffff8a381b5f R15: ffffa9aa416ff290 [ 342.096774] FS: 00007fa7d4ebc800(0000) GS:ffff9e707ed80000(0000) knlGS:0000000000000000 [ 342.096853] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 342.096907] CR2: 00005573f8f834e0 CR3: 0000000006c52006 CR4: 0000000000772ef0 [ 342.096971] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 342.097033] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 342.097095] PKRU: 55555554 [ 342.097122] Call Trace: [ 342.097155] [ 342.097188] ? __warn (kernel/panic.c:748) [ 342.097243] ? rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) [ 342.097280] ? report_bug (lib/bug.c:201 lib/bug.c:219) [ 342.097323] ? prb_read_valid (kernel/printk/printk_ringbuffer.c:2183) [ 342.097367] ? handle_bug (arch/x86/kernel/traps.c:285) [ 342.097411] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 342.097455] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621) [ 342.097516] ? rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) [ 342.097559] linkwatch_do_dev (net/core/link_watch.c:180) [ 342.097595] netdev_run_todo (net/core/dev.c:10894 (discriminator 2)) [ 342.097640] ? vlan_vid_del (net/8021q/vlan_core.c:368 net/8021q/vlan_core.c:387) [ 342.097687] rtnl_dellink (net/core/rtnetlink.c:3528) [ 342.097737] ? __rtnl_unlock (net/core/rtnetlink.c:140 (discriminator 3)) [ 342.097781] ? netdev_run_todo (./include/linux/list.h:373 net/core/dev.c:10891) [ 342.097825] ? __pfx_rtnl_dellink (net/core/rtnetlink.c:3484) [ 342.097869] rtnetlink_rcv_msg (net/core/rtnetlink.c:6902) [ 342.097905] ? get_page_from_freelist (mm/page_alloc.c:1039 mm/page_alloc.c:1554 mm/page_alloc.c:1564 mm/page_alloc.c:3474) [ 342.097963] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6805) [ 342.098015] netlink_rcv_skb (net/netlink/af_netlink.c:2543) [ 342.098060] netlink_unicast (net/netlink/af_netlink.c:1322 net/netlink/af_netlink.c:1348) [ 342.098102] netlink_sendmsg (net/netlink/af_netlink.c:1892) [ 342.098146] ____sys_sendmsg (net/socket.c:711 net/socket.c:726 net/socket.c:2594) [ 342.098195] ? copy_msghdr_from_user (net/socket.c:2534) [ 342.098255] ___sys_sendmsg (net/socket.c:2650) [ 342.098295] ? __pte_offset_map (./include/linux/pgtable.h:345 ./include/linux/pgtable.h:615 mm/pgtable-generic.c:289) [ 342.098344] ? fsnotify_grab_connector (fs/notify/mark.c:702) [ 342.098412] ? fsnotify_destroy_marks (fs/notify/mark.c:929) [ 342.098479] __sys_sendmsg (net/socket.c:2680) [ 342.098527] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 342.098571] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 342.098626] RIP: 0033:0x7fa7d50c89a7 [ 342.098669] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 342.098850] RSP: 002b:00007ffc90ada8b8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 342.098913] RAX: ffffffffffffffda RBX: 00007ffc90adafe0 RCX: 00007fa7d50c89a7 [ 342.098970] RDX: 0000000000000000 RSI: 00007ffc90ada920 RDI: 0000000000000005 [ 342.099032] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 342.099095] R10: 00007fa7d4f86ef8 R11: 0000000000000246 R12: 0000000000000002 Finger prints: rfc2863_policy:linkwatch_do_dev:netdev_run_todo:rtnl_dellink:rtnetlink_rcv_msg