====================================== | [ 84.196079][ T66] ------------[ cut here ]------------ | [ 84.196443][ T66] RTNL: assertion failed at net/core/link_watch.c (59) | [ 84.196690][ T66] WARNING: CPU: 2 PID: 66 at net/core/link_watch.c:59 default_operstate (net/core/link_watch.c:59 (discriminator 3)) | [ 84.196996][ T66] Modules linked in: [ 84.197466][ T66] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 84.197679][ T66] Workqueue: netns cleanup_net [ 84.197870][ T66] RIP: 0010:default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 84.198060][ T66] Code: 83 e4 01 0f 85 03 ff ff ff c6 05 08 23 5c 02 01 90 ba 3b 00 00 00 48 c7 c6 00 7c 37 8f 48 c7 c7 40 7c 37 8f e8 b3 b2 e5 fd 90 <0f> 0b 90 90 e9 d9 fe ff ff 48 89 ef e8 81 63 6d fe e9 f7 fd ff ff All code ======== 0: 83 e4 01 and $0x1,%esp 3: 0f 85 03 ff ff ff jne 0xffffffffffffff0c 9: c6 05 08 23 5c 02 01 movb $0x1,0x25c2308(%rip) # 0x25c2318 10: 90 nop 11: ba 3b 00 00 00 mov $0x3b,%edx 16: 48 c7 c6 00 7c 37 8f mov $0xffffffff8f377c00,%rsi 1d: 48 c7 c7 40 7c 37 8f mov $0xffffffff8f377c40,%rdi 24: e8 b3 b2 e5 fd call 0xfffffffffde5b2dc 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 d9 fe ff ff jmp 0xffffffffffffff0c 33: 48 89 ef mov %rbp,%rdi 36: e8 81 63 6d fe call 0xfffffffffe6d63bc 3b: e9 f7 fd ff ff jmp 0xfffffffffffffe37 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 d9 fe ff ff jmp 0xfffffffffffffee2 9: 48 89 ef mov %rbp,%rdi c: e8 81 63 6d fe call 0xfffffffffe6d6392 11: e9 f7 fd ff ff jmp 0xfffffffffffffe0d [ 84.198612][ T66] RSP: 0018:ffffc90000477a48 EFLAGS: 00010282 [ 84.198834][ T66] RAX: 0000000000000000 RBX: ffff8880083c9000 RCX: 1ffffffff1f7dd8c [ 84.199075][ T66] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 84.199352][ T66] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff1f7dd8c [ 84.199595][ T66] R10: 0000000000000003 R11: ffff88800915c5c0 R12: 0000000000000000 [ 84.199836][ T66] R13: dffffc0000000000 R14: ffff88800c2ac000 R15: ffff8880083c95c0 [ 84.200084][ T66] FS: 0000000000000000(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 84.200378][ T66] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 84.200584][ T66] CR2: 00007f815cc482c0 CR3: 000000003cb3a005 CR4: 0000000000772ef0 [ 84.200825][ T66] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 84.201065][ T66] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 84.201413][ T66] PKRU: 55555554 [ 84.201544][ T66] Call Trace: [ 84.201679][ T66] [ 84.201775][ T66] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 84.201948][ T66] ? __warn (kernel/panic.c:748) [ 84.202084][ T66] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 84.202263][ T66] ? report_bug (lib/bug.c:201 lib/bug.c:219) [ 84.202454][ T66] ? handle_bug (arch/x86/kernel/traps.c:285) [ 84.202585][ T66] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 84.202753][ T66] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621) [ 84.202934][ T66] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 84.203131][ T66] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 84.203324][ T66] rfc2863_policy (net/core/link_watch.c:78) [ 84.203498][ T66] linkwatch_do_dev (net/core/link_watch.c:180) [ 84.203665][ T66] netdev_run_todo (net/core/dev.c:10894 (discriminator 2)) [ 84.203835][ T66] ? __pfx_netdev_run_todo (net/core/dev.c:10867) [ 84.203999][ T66] ? vrf_dellink (drivers/net/vrf.c:1668) [ 84.204176][ T66] ? __pfx_unregister_netdevice_queue (net/core/dev.c:11455) [ 84.204402][ T66] default_device_exit_batch (net/core/dev.c:12051) [ 84.204572][ T66] ? __pfx_default_device_exit_batch (net/core/dev.c:12051) [ 84.204777][ T66] ? ops_exit_list (net/core/net_namespace.c:171 (discriminator 3)) [ 84.204950][ T66] cleanup_net (net/core/net_namespace.c:647 (discriminator 3)) [ 84.205114][ T66] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5814) [ 84.205304][ T66] ? __pfx_cleanup_net (net/core/net_namespace.c:592) [ 84.205472][ T66] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 37)) [ 84.205646][ T66] ? lock_acquire (kernel/locking/lockdep.c:5822) [ 84.205811][ T66] ? process_one_work (kernel/workqueue.c:3205) [ 84.205986][ T66] process_one_work (kernel/workqueue.c:3229) [ 84.206163][ T66] ? __pfx___lock_release (kernel/locking/lockdep.c:5501) [ 84.206340][ T66] ? __pfx_process_one_work (kernel/workqueue.c:3131) [ 84.206518][ T66] ? assign_work (kernel/workqueue.c:1200) [ 84.206689][ T66] worker_thread (kernel/workqueue.c:3304 kernel/workqueue.c:3391) [ 84.206860][ T66] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 84.207066][ T66] ? __pfx_worker_thread (kernel/workqueue.c:3337) [ 84.207238][ T66] ? __pfx_worker_thread (kernel/workqueue.c:3337) [ 84.207413][ T66] kthread (kernel/kthread.c:389) [ 84.207543][ T66] ? __pfx_kthread (kernel/kthread.c:342) [ 84.207711][ T66] ret_from_fork (arch/x86/kernel/process.c:147) [ 84.207875][ T66] ? __pfx_kthread (kernel/kthread.c:342) Finger prints: default_operstate:rfc2863_policy:linkwatch_do_dev:netdev_run_todo:default_device_exit_batch