====================================== | [ 32.297518][ T443] ------------[ cut here ]------------ | [ 32.297832][ T443] RTNL: assertion failed at net/core/link_watch.c (59) | [ 32.298114][ T443] WARNING: CPU: 2 PID: 443 at net/core/link_watch.c:59 default_operstate (net/core/link_watch.c:59 (discriminator 3)) | [ 32.298502][ T443] Modules linked in: openvswitch psample nf_nat nf_conntrack libcrc32c nf_defrag_ipv6 nf_defrag_ipv4 nsh [ 32.299209][ T443] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 32.299485][ T443] RIP: 0010:default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 32.299696][ T443] Code: 83 e4 01 0f 85 03 ff ff ff c6 05 08 23 5c 02 01 90 ba 3b 00 00 00 48 c7 c6 00 7c 37 88 48 c7 c7 40 7c 37 88 e8 b3 b2 e5 fd 90 <0f> 0b 90 90 e9 d9 fe ff ff 48 89 ef e8 81 63 6d fe e9 f7 fd ff ff All code ======== 0: 83 e4 01 and $0x1,%esp 3: 0f 85 03 ff ff ff jne 0xffffffffffffff0c 9: c6 05 08 23 5c 02 01 movb $0x1,0x25c2308(%rip) # 0x25c2318 10: 90 nop 11: ba 3b 00 00 00 mov $0x3b,%edx 16: 48 c7 c6 00 7c 37 88 mov $0xffffffff88377c00,%rsi 1d: 48 c7 c7 40 7c 37 88 mov $0xffffffff88377c40,%rdi 24: e8 b3 b2 e5 fd call 0xfffffffffde5b2dc 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 d9 fe ff ff jmp 0xffffffffffffff0c 33: 48 89 ef mov %rbp,%rdi 36: e8 81 63 6d fe call 0xfffffffffe6d63bc 3b: e9 f7 fd ff ff jmp 0xfffffffffffffe37 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 d9 fe ff ff jmp 0xfffffffffffffee2 9: 48 89 ef mov %rbp,%rdi c: e8 81 63 6d fe call 0xfffffffffe6d6392 11: e9 f7 fd ff ff jmp 0xfffffffffffffe0d [ 32.300406][ T443] RSP: 0018:ffffc900009c71c8 EFLAGS: 00010286 [ 32.300691][ T443] RAX: 0000000000000000 RBX: ffff888007bf9000 RCX: 1ffffffff117dd8c [ 32.300997][ T443] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 32.301302][ T443] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff117dd8c [ 32.301631][ T443] R10: 0000000000000003 R11: ffff888006418040 R12: 0000000000000000 [ 32.301925][ T443] R13: dffffc0000000000 R14: ffff8880098d4000 R15: ffff888007bf95c0 [ 32.302221][ T443] FS: 00007f62715a8800(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 32.302598][ T443] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.302847][ T443] CR2: 00000000004e5d00 CR3: 0000000009d54003 CR4: 0000000000772ef0 [ 32.303152][ T443] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 32.303482][ T443] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 32.303772][ T443] PKRU: 55555554 [ 32.303937][ T443] Call Trace: [ 32.304090][ T443] [ 32.304202][ T443] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 32.304454][ T443] ? __warn (kernel/panic.c:748) [ 32.304622][ T443] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 32.304820][ T443] ? report_bug (lib/bug.c:201 lib/bug.c:219) [ 32.305019][ T443] ? handle_bug (arch/x86/kernel/traps.c:285) [ 32.305176][ T443] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 32.305460][ T443] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621) [ 32.305675][ T443] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 32.305873][ T443] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 32.306080][ T443] rfc2863_policy (net/core/link_watch.c:78) [ 32.306398][ T443] linkwatch_do_dev (net/core/link_watch.c:180) [ 32.306614][ T443] netdev_run_todo (net/core/dev.c:10894 (discriminator 2)) [ 32.306817][ T443] ? __pfx_netdev_run_todo (net/core/dev.c:10867) [ 32.307018][ T443] ? __pfx_unregister_netdevice_queue (net/core/dev.c:11455) [ 32.307270][ T443] rtnl_dellink (net/core/rtnetlink.c:3528) [ 32.307489][ T443] ? __pfx_rtnl_dellink (net/core/rtnetlink.c:3484) [ 32.307751][ T443] ? find_held_lock (kernel/locking/lockdep.c:5339) [ 32.307958][ T443] ? __lock_release (kernel/locking/lockdep.c:5525) [ 32.308161][ T443] ? rtnetlink_rcv_msg (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/core/rtnetlink.c:6900) [ 32.308411][ T443] ? __pfx___lock_release (kernel/locking/lockdep.c:5501) [ 32.308625][ T443] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5814) [ 32.308848][ T443] ? rtnetlink_rcv_msg (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/core/rtnetlink.c:6900) [ 32.309050][ T443] ? __pfx_rtnl_dellink (net/core/rtnetlink.c:3484) [ 32.309248][ T443] rtnetlink_rcv_msg (net/core/rtnetlink.c:6902) [ 32.309490][ T443] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6805) [ 32.309694][ T443] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [ 32.309902][ T443] ? mark_lock (kernel/locking/lockdep.c:4727 (discriminator 3)) [ 32.310067][ T443] ? __lock_acquire (kernel/locking/lockdep.c:5226) [ 32.310273][ T443] netlink_rcv_skb (net/netlink/af_netlink.c:2543) [ 32.310507][ T443] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6805) [ 32.310719][ T443] ? __pfx_netlink_rcv_skb (net/netlink/af_netlink.c:2520) [ 32.310939][ T443] ? netlink_deliver_tap (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 net/netlink/af_netlink.c:340) [ 32.311148][ T443] ? netlink_deliver_tap (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [ 32.311367][ T443] netlink_unicast (net/netlink/af_netlink.c:1322 net/netlink/af_netlink.c:1348) [ 32.311568][ T443] ? __pfx_netlink_unicast (net/netlink/af_netlink.c:1333) [ 32.311770][ T443] ? find_held_lock (kernel/locking/lockdep.c:5339) [ 32.311980][ T443] netlink_sendmsg (net/netlink/af_netlink.c:1892) [ 32.312190][ T443] ? __pfx_netlink_sendmsg (net/netlink/af_netlink.c:1811) [ 32.312447][ T443] ____sys_sendmsg (net/socket.c:711 net/socket.c:726 net/socket.c:2594) [ 32.312703][ T443] ? __pfx_____sys_sendmsg (net/socket.c:2540) [ 32.312903][ T443] ? __pfx_copy_msghdr_from_user (net/socket.c:2520) [ 32.313151][ T443] ___sys_sendmsg (net/socket.c:2650) [ 32.313370][ T443] ? __pfx____sys_sendmsg (net/socket.c:2637) [ 32.313571][ T443] ? kasan_save_stack (mm/kasan/common.c:49) [ 32.313766][ T443] ? kasan_save_stack (mm/kasan/common.c:48) [ 32.313956][ T443] ? __kasan_record_aux_stack (mm/kasan/generic.c:544) [ 32.314150][ T443] ? __call_rcu_common.constprop.0 (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:123 kernel/rcu/tree.c:3087) [ 32.314447][ T443] ? __x64_sys_close (fs/open.c:1557 fs/open.c:1539 fs/open.c:1539) [ 32.314646][ T443] ? do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 32.314837][ T443] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 32.315085][ T443] ? __lock_acquire (kernel/locking/lockdep.c:5226) [ 32.315289][ T443] ? find_held_lock (kernel/locking/lockdep.c:5339) [ 32.315514][ T443] ? __lock_release (kernel/locking/lockdep.c:5525) [ 32.315707][ T443] ? __virt_addr_valid (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:962 ./include/linux/mmzone.h:2058 arch/x86/mm/physaddr.c:65) [ 32.315918][ T443] ? __pfx___lock_release (kernel/locking/lockdep.c:5501) [ 32.316110][ T443] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5814) [ 32.316309][ T443] __sys_sendmsg (net/socket.c:2680) [ 32.316527][ T443] ? __pfx___sys_sendmsg (net/socket.c:2665) [ 32.316724][ T443] ? __pfx_slab_free_after_rcu_debug (mm/slub.c:4643) [ 32.316978][ T443] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 32.317175][ T443] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 32.317425][ T443] RIP: 0033:0x7f62717b49a7 [ 32.317642][ T443] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0a 00 or (%rax),%al 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 32.318282][ T443] RSP: 002b:00007ffc0b85d6f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 32.318588][ T443] RAX: ffffffffffffffda RBX: 00007ffc0b85de20 RCX: 00007f62717b49a7 [ 32.318871][ T443] RDX: 0000000000000000 RSI: 00007ffc0b85d760 RDI: 0000000000000005 [ 32.319156][ T443] RBP: 0000000000000001 R08: 0000000000000003 R09: 0000000000000078 [ 32.319449][ T443] R10: 00007f6271672ef8 R11: 0000000000000246 R12: 0000000000000001 Finger prints: default_operstate:rfc2863_policy:linkwatch_do_dev:netdev_run_todo:rtnl_dellink