====================================== | [ 34.433228][ T67] ------------[ cut here ]------------ | [ 34.433546][ T67] RTNL: assertion failed at net/core/link_watch.c (59) | [ 34.433800][ T67] WARNING: CPU: 2 PID: 67 at net/core/link_watch.c:59 default_operstate (net/core/link_watch.c:59 (discriminator 3)) | [ 34.434089][ T67] Modules linked in: act_gact cls_flower sch_ingress vxlan [ 34.434673][ T67] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 34.434881][ T67] Workqueue: netns cleanup_net [ 34.435065][ T67] RIP: 0010:default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 34.435246][ T67] Code: 83 e4 01 0f 85 03 ff ff ff c6 05 08 23 5c 02 01 90 ba 3b 00 00 00 48 c7 c6 00 7c 77 b9 48 c7 c7 40 7c 77 b9 e8 b3 b2 e5 fd 90 <0f> 0b 90 90 e9 d9 fe ff ff 48 89 ef e8 81 63 6d fe e9 f7 fd ff ff All code ======== 0: 83 e4 01 and $0x1,%esp 3: 0f 85 03 ff ff ff jne 0xffffffffffffff0c 9: c6 05 08 23 5c 02 01 movb $0x1,0x25c2308(%rip) # 0x25c2318 10: 90 nop 11: ba 3b 00 00 00 mov $0x3b,%edx 16: 48 c7 c6 00 7c 77 b9 mov $0xffffffffb9777c00,%rsi 1d: 48 c7 c7 40 7c 77 b9 mov $0xffffffffb9777c40,%rdi 24: e8 b3 b2 e5 fd call 0xfffffffffde5b2dc 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 d9 fe ff ff jmp 0xffffffffffffff0c 33: 48 89 ef mov %rbp,%rdi 36: e8 81 63 6d fe call 0xfffffffffe6d63bc 3b: e9 f7 fd ff ff jmp 0xfffffffffffffe37 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 d9 fe ff ff jmp 0xfffffffffffffee2 9: 48 89 ef mov %rbp,%rdi c: e8 81 63 6d fe call 0xfffffffffe6d6392 11: e9 f7 fd ff ff jmp 0xfffffffffffffe0d [ 34.435808][ T67] RSP: 0018:ffffc90000487a48 EFLAGS: 00010282 [ 34.436021][ T67] RAX: 0000000000000000 RBX: ffff88800b50c000 RCX: 1ffffffff73fdd8c [ 34.436261][ T67] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 34.436522][ T67] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff73fdd8c [ 34.436765][ T67] R10: 0000000000000003 R11: ffff8880090b8040 R12: 0000000000000000 [ 34.437016][ T67] R13: dffffc0000000000 R14: ffff888004e29000 R15: ffff88800b50c5c0 [ 34.437258][ T67] FS: 0000000000000000(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 34.437553][ T67] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.437758][ T67] CR2: 00000000004060bb CR3: 0000000039b3a005 CR4: 0000000000772ef0 [ 34.438004][ T67] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.438250][ T67] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.438608][ T67] PKRU: 55555554 [ 34.438744][ T67] Call Trace: [ 34.438877][ T67] [ 34.438976][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 34.439156][ T67] ? __warn (kernel/panic.c:748) [ 34.439292][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 34.439474][ T67] ? report_bug (lib/bug.c:201 lib/bug.c:219) [ 34.439651][ T67] ? handle_bug (arch/x86/kernel/traps.c:285) [ 34.439786][ T67] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 34.439956][ T67] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621) [ 34.440134][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 34.440305][ T67] ? default_operstate (net/core/link_watch.c:59 (discriminator 3)) [ 34.440485][ T67] rfc2863_policy (net/core/link_watch.c:78) [ 34.440665][ T67] linkwatch_do_dev (net/core/link_watch.c:180) [ 34.440830][ T67] netdev_run_todo (net/core/dev.c:10894 (discriminator 2)) [ 34.441003][ T67] ? __pfx_netdev_run_todo (net/core/dev.c:10867) [ 34.441189][ T67] ? __pfx_unregister_netdevice_queue (net/core/dev.c:11455) [ 34.441404][ T67] default_device_exit_batch (net/core/dev.c:12051) [ 34.441583][ T67] ? __pfx_default_device_exit_batch (net/core/dev.c:12051) [ 34.441787][ T67] ? ops_exit_list (net/core/net_namespace.c:171 (discriminator 3)) [ 34.441964][ T67] cleanup_net (net/core/net_namespace.c:647 (discriminator 3)) [ 34.442131][ T67] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5814) [ 34.442302][ T67] ? __pfx_cleanup_net (net/core/net_namespace.c:592) [ 34.442495][ T67] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 37)) [ 34.442666][ T67] ? lock_acquire (kernel/locking/lockdep.c:5822) [ 34.442834][ T67] ? process_one_work (kernel/workqueue.c:3205) [ 34.443007][ T67] process_one_work (kernel/workqueue.c:3229) [ 34.443192][ T67] ? __pfx___lock_release (kernel/locking/lockdep.c:5501) [ 34.443359][ T67] ? __pfx_process_one_work (kernel/workqueue.c:3131) [ 34.443549][ T67] ? assign_work (kernel/workqueue.c:1200) [ 34.443728][ T67] worker_thread (kernel/workqueue.c:3304 kernel/workqueue.c:3391) [ 34.443897][ T67] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 34.444107][ T67] ? __pfx_worker_thread (kernel/workqueue.c:3337) [ 34.444277][ T67] ? __pfx_worker_thread (kernel/workqueue.c:3337) [ 34.444468][ T67] kthread (kernel/kthread.c:389) [ 34.444602][ T67] ? __pfx_kthread (kernel/kthread.c:342) [ 34.444775][ T67] ret_from_fork (arch/x86/kernel/process.c:147) [ 34.444944][ T67] ? __pfx_kthread (kernel/kthread.c:342) Finger prints: default_operstate:rfc2863_policy:linkwatch_do_dev:netdev_run_todo:default_device_exit_batch