====================================== | [ 356.790243] ------------[ cut here ]------------ | [ 356.790300] RTNL: assertion failed at net/core/link_watch.c (59) | [ 356.790370] WARNING: CPU: 0 PID: 65 at net/core/link_watch.c:59 rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) | [ 356.790431] Modules linked in: vxlan ip6_udp_tunnel udp_tunnel bridge stp llc act_mirred act_vlan act_mpls cls_matchall act_gact cls_flower sch_ingress ip6_gre ip6_tunnel tunnel6 dummy ip_gre gre 8021q vrf veth [ 356.790647] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 356.790690] Workqueue: netns cleanup_net [ 356.790727] RIP: 0010:rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) [ 356.790771] Code: 80 3d 03 5d e8 00 00 75 ca c6 05 fa 5c e8 00 01 90 ba 3b 00 00 00 48 c7 c6 08 22 98 9c 48 c7 c7 28 0d 8a 9c e8 ef 95 57 ff 90 <0f> 0b 90 90 eb a3 83 f8 06 0f 85 14 ff ff ff b8 05 00 00 00 e9 0a All code ======== 0: 80 3d 03 5d e8 00 00 cmpb $0x0,0xe85d03(%rip) # 0xe85d0a 7: 75 ca jne 0xffffffffffffffd3 9: c6 05 fa 5c e8 00 01 movb $0x1,0xe85cfa(%rip) # 0xe85d0a 10: 90 nop 11: ba 3b 00 00 00 mov $0x3b,%edx 16: 48 c7 c6 08 22 98 9c mov $0xffffffff9c982208,%rsi 1d: 48 c7 c7 28 0d 8a 9c mov $0xffffffff9c8a0d28,%rdi 24: e8 ef 95 57 ff call 0xffffffffff579618 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: eb a3 jmp 0xffffffffffffffd3 30: 83 f8 06 cmp $0x6,%eax 33: 0f 85 14 ff ff ff jne 0xffffffffffffff4d 39: b8 05 00 00 00 mov $0x5,%eax 3e: e9 .byte 0xe9 3f: 0a .byte 0xa Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: eb a3 jmp 0xffffffffffffffa9 6: 83 f8 06 cmp $0x6,%eax 9: 0f 85 14 ff ff ff jne 0xffffffffffffff23 f: b8 05 00 00 00 mov $0x5,%eax 14: e9 .byte 0xe9 15: 0a .byte 0xa [ 356.790892] RSP: 0018:ffffab684023fd10 EFLAGS: 00010286 [ 356.790932] RAX: 0000000000000000 RBX: ffff8dec07604000 RCX: 00000000ffffdfff [ 356.790982] RDX: 0000000000000000 RSI: 00000000ffffffea RDI: 0000000000000001 [ 356.791035] RBP: 0000000000000009 R08: ffffffff9cd56968 R09: 00000000ffffdfff [ 356.791086] R10: ffffffff9cc76980 R11: ffffffff9cd26980 R12: dead000000000122 [ 356.791142] R13: dead000000000100 R14: ffffffff9c981b5f R15: ffff8dec07600000 [ 356.791207] FS: 0000000000000000(0000) GS:ffff8dec3ec00000(0000) knlGS:0000000000000000 [ 356.791272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 356.791326] CR2: 00000000004060bb CR3: 0000000007732001 CR4: 0000000000772ef0 [ 356.791386] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 356.791442] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 356.791493] PKRU: 55555554 [ 356.791511] Call Trace: [ 356.791530] [ 356.791556] ? __warn (kernel/panic.c:748) [ 356.791590] ? rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) [ 356.791625] ? report_bug (lib/bug.c:201 lib/bug.c:219) [ 356.791657] ? prb_read_valid (kernel/printk/printk_ringbuffer.c:2183) [ 356.791691] ? handle_bug (arch/x86/kernel/traps.c:285) [ 356.791727] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 356.791761] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621) [ 356.791794] ? rfc2863_policy (net/core/link_watch.c:59 net/core/link_watch.c:76) [ 356.791834] linkwatch_do_dev (net/core/link_watch.c:180) [ 356.791865] netdev_run_todo (net/core/dev.c:10894 (discriminator 2)) [ 356.791904] ? unregister_netdevice_queue (net/core/dev.c:11456) [ 356.791946] default_device_exit_batch (net/core/dev.c:12077) [ 356.791988] cleanup_net (net/core/net_namespace.c:647 (discriminator 3)) [ 356.792019] process_one_work (kernel/workqueue.c:3229) [ 356.792053] worker_thread (kernel/workqueue.c:3304 kernel/workqueue.c:3391) [ 356.792098] ? __pfx_worker_thread (kernel/workqueue.c:3337) [ 356.792145] kthread (kernel/kthread.c:389) [ 356.792187] ? __pfx_kthread (kernel/kthread.c:342) [ 356.792219] ret_from_fork (arch/x86/kernel/process.c:147) [ 356.792254] ? __pfx_kthread (kernel/kthread.c:342) Finger prints: rfc2863_policy:linkwatch_do_dev:netdev_run_todo:default_device_exit_batch:cleanup_net