====================================== | xx__-> [ 96.025083][ T67] ------------[ cut here ]------------ | [ 96.025509][ T67] RTNL: assertion failed at net/core/link_watch.c (59) | [ 96.025764][ T67] WARNING: CPU: 2 PID: 67 at net/core/link_watch.c:59 default_operstate (net/core/link_watch.c:59 (discriminator 3)) | [ 96.026072][ T67] Modules linked in: unix_diag vxlan [ 96.026591][ T67] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 96.026918][ T67] Workqueue: netns cleanup_net [ 96.027112][ T67] RIP: 0010:default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 96.027300][ T67] Code: 83 e4 01 0f 85 03 ff ff ff c6 05 08 23 5c 02 01 90 ba 3b 00 00 00 48 c7 c6 00 7c 57 9e 48 c7 c7 40 7c 57 9e e8 b3 b2 e5 fd 90 <0f> 0b 90 90 e9 d9 fe ff ff 48 89 ef e8 81 63 6d fe e9 f7 fd ff ff All code ======== 0: 83 e4 01 and $0x1,%esp 3: 0f 85 03 ff ff ff jne 0xffffffffffffff0c 9: c6 05 08 23 5c 02 01 movb $0x1,0x25c2308(%rip) # 0x25c2318 10: 90 nop 11: ba 3b 00 00 00 mov $0x3b,%edx 16: 48 c7 c6 00 7c 57 9e mov $0xffffffff9e577c00,%rsi 1d: 48 c7 c7 40 7c 57 9e mov $0xffffffff9e577c40,%rdi 24: e8 b3 b2 e5 fd call 0xfffffffffde5b2dc 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 d9 fe ff ff jmp 0xffffffffffffff0c 33: 48 89 ef mov %rbp,%rdi 36: e8 81 63 6d fe call 0xfffffffffe6d63bc 3b: e9 f7 fd ff ff jmp 0xfffffffffffffe37 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 d9 fe ff ff jmp 0xfffffffffffffee2 9: 48 89 ef mov %rbp,%rdi c: e8 81 63 6d fe call 0xfffffffffe6d6392 11: e9 f7 fd ff ff jmp 0xfffffffffffffe0d [ 96.027911][ T67] RSP: 0000:ffffc90000487a48 EFLAGS: 00010282 [ 96.028141][ T67] RAX: 0000000000000000 RBX: ffff88800ac81000 RCX: 1ffffffff3dbdd8c [ 96.028414][ T67] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 96.028682][ T67] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff3dbdd8c [ 96.028949][ T67] R10: 0000000000000003 R11: ffff8880091b8040 R12: 0000000000000000 [ 96.029206][ T67] R13: dffffc0000000000 R14: ffff888008821000 R15: ffff88800ac815c0 [ 96.029482][ T67] FS: 0000000000000000(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 96.029785][ T67] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 96.030015][ T67] CR2: 00007f06f6f63155 CR3: 000000003633a003 CR4: 0000000000772ef0 [ 96.030277][ T67] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 96.030551][ T67] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 96.030817][ T67] PKRU: 55555554 [ 96.030960][ T67] Call Trace: [ 96.031103][ T67] [ 96.031218][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 96.031419][ T67] ? __warn (kernel/panic.c:748) [ 96.031566][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 96.031749][ T67] ? report_bug (lib/bug.c:201 lib/bug.c:219) [ 96.031937][ T67] ? handle_bug (arch/x86/kernel/traps.c:285) [ 96.032080][ T67] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 96.032263][ T67] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621) [ 96.032465][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 96.032648][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 96.032831][ T67] rfc2863_policy (net/core/link_watch.c:78) [ 96.033015][ T67] linkwatch_do_dev (net/core/link_watch.c:180) [ 96.033218][ T67] netdev_run_todo (net/core/dev.c:10894 (discriminator 2)) [ 96.033419][ T67] ? __pfx_netdev_run_todo (net/core/dev.c:10867) [ 96.033605][ T67] ? __pfx_unregister_netdevice_queue (net/core/dev.c:11455) [ 96.033833][ T67] default_device_exit_batch (net/core/dev.c:12051) [ 96.034016][ T67] ? __pfx_default_device_exit_batch (net/core/dev.c:12051) [ 96.034251][ T67] ? ops_exit_list (net/core/net_namespace.c:171 (discriminator 3)) [ 96.034451][ T67] cleanup_net (net/core/net_namespace.c:647 (discriminator 3)) [ 96.034631][ T67] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5814) [ 96.034819][ T67] ? __pfx_cleanup_net (net/core/net_namespace.c:592) [ 96.035012][ T67] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 37)) [ 96.035201][ T67] ? lock_acquire (kernel/locking/lockdep.c:5822) [ 96.035392][ T67] ? process_one_work (kernel/workqueue.c:3205) [ 96.035593][ T67] process_one_work (kernel/workqueue.c:3229) [ 96.035787][ T67] ? __pfx___lock_release (kernel/locking/lockdep.c:5501) [ 96.035968][ T67] ? __pfx_process_one_work (kernel/workqueue.c:3131) [ 96.036160][ T67] ? assign_work (kernel/workqueue.c:1200) [ 96.036372][ T67] worker_thread (kernel/workqueue.c:3304 kernel/workqueue.c:3391) [ 96.036564][ T67] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 96.036803][ T67] ? __pfx_worker_thread (kernel/workqueue.c:3337) [ 96.036985][ T67] ? __pfx_worker_thread (kernel/workqueue.c:3337) [ 96.037173][ T67] kthread (kernel/kthread.c:389) [ 96.037328][ T67] ? __pfx_kthread (kernel/kthread.c:342) [ 96.037520][ T67] ret_from_fork (arch/x86/kernel/process.c:147) [ 96.037707][ T67] ? __pfx_kthread (kernel/kthread.c:342) [ 96.037916][ T67] ret_from_fork_asm (arch/x86/entry/entry_64.S:257) | [ 968.168493][T12849] no locks held by mausezahn/12849. | [ 968.168682][T12849] | [ 968.168682][T12849] stack backtrace: | [ 968.169263][T12849] Tainted: [W]=WARN [ 968.169403][T12849] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 968.169623][T12849] Call Trace: [ 968.169764][T12849] [968.169860][T12849] dump_stack_lvl (lib/dump_stack.c:123) [968.170071][T12849] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6846) [968.170257][T12849] dev_get_by_index_rcu (net/core/dev.c:876 (discriminator 7)) [968.170433][T12849] ip6_create_rt_oif_rcu (net/ipv6/route.c:1223) [968.170611][T12849] ? ip6_route_output_flags (net/ipv6/route.c:2695) [968.170797][T12849] ip6_dst_lookup_tail.constprop.0 (net/ipv6/ip6_output.c:1160) [968.171019][T12849] ip6_dst_lookup_flow (net/ipv6/ip6_output.c:1265) [968.171219][T12849] ? __pfx_ip6_dst_lookup_flow (net/ipv6/ip6_output.c:1260) [968.171401][T12849] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [968.171578][T12849] ? validate_chain (kernel/locking/lockdep.c:3797 kernel/locking/lockdep.c:3817 kernel/locking/lockdep.c:3872) [968.171762][T12849] rawv6_sendmsg (net/ipv6/raw.c:899) [968.171941][T12849] ? rwsem_mark_wake (kernel/locking/rwsem.c:508 (discriminator 2)) [968.172144][T12849] ? __pfx_rawv6_sendmsg (net/ipv6/raw.c:741) [968.172327][T12849] ? __lock_acquire (kernel/locking/lockdep.c:5226) [968.172511][T12849] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [968.172696][T12849] ? find_held_lock (kernel/locking/lockdep.c:5339) [968.172879][T12849] ? __lock_release (kernel/locking/lockdep.c:5525) [968.173056][T12849] ? __might_fault (mm/memory.c:6751 mm/memory.c:6744) [968.173241][T12849] ? __might_fault (mm/memory.c:6751 mm/memory.c:6744) [968.173419][T12849] ? __might_fault (mm/memory.c:6751 mm/memory.c:6744) [968.173604][T12849] ? __sys_sendto (net/socket.c:711 net/socket.c:726 net/socket.c:2208) [968.173788][T12849] __sys_sendto (net/socket.c:711 net/socket.c:726 net/socket.c:2208) [968.173970][T12849] ? __pfx___sys_sendto (net/socket.c:2175) [968.174169][T12849] ? lock_acquire (kernel/locking/lockdep.c:5822) [968.174345][T12849] ? rseq_update_cpu_node_id (kernel/rseq.c:109 (discriminator 10)) [968.174525][T12849] ? __rseq_handle_notify_resume (kernel/rseq.c:333) [968.174743][T12849] ? do_user_addr_fault (./include/linux/mmap_lock.h:172 arch/x86/mm/fault.c:1417) [968.174920][T12849] ? __pfx___rseq_handle_notify_resume (kernel/rseq.c:316) [968.175143][T12849] __x64_sys_sendto (net/socket.c:2211) [968.175320][T12849] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [968.175560][T12849] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [968.175739][T12849] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 968.175957][T12849] RIP: 0033:0x7f6823fffa4a [ 968.176141][T12849] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 All code ======== 0: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4) 4: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax b: eb b8 jmp 0xffffffffffffffc5 d: 0f 1f 00 nopl (%rax) 10: f3 0f 1e fa endbr64 14: 41 89 ca mov %ecx,%r10d 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 15 jne 0x38 23: b8 2c 00 00 00 mov $0x2c,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 7e ja 0xb0 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 41 54 push %r12 3a: 48 83 ec 30 sub $0x30,%rsp 3e: 44 rex.R 3f: 89 .byte 0x89 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 7e ja 0x86 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 41 54 push %r12 10: 48 83 ec 30 sub $0x30,%rsp 14: 44 rex.R 15: 89 .byte 0x89 [ 968.176768][T12849] RSP: 002b:00007fff59f033d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 968.177036][T12849] RAX: ffffffffffffffda RBX: 0000000010d34ec0 RCX: 00007f6823fffa4a [ 968.177390][T12849] RDX: 0000000000000050 RSI: 0000000010d35190 RDI: 0000000000000005 [ 968.177738][T12849] RBP: 0000000010d34ec0 R08: 00007fff59f033e0 R09: 000000000000001c [ 968.178014][T12849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000050 Finger prints: lockdep_rcu_suspicious:dev_get_by_index_rcu:ip6_create_rt_oif_rcu:ip6_dst_lookup_flow:rawv6_sendmsg default_operstate:rfc2863_policy:linkwatch_do_dev:netdev_run_todo:default_device_exit_batch