====================================== | [ 358.747778][ T2928] Mirror/redirect action on | [ 359.285365][ C0] ------------[ cut here ]------------ | [ 359.285717][ C0] WARNING: CPU: 0 PID: 2934 at ./include/net/sch_generic.h:843 tc_run (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/sch_generic.h:1366 net/core/dev.c:4370) | [ 359.286322][ C0] Modules linked in: act_mirred ip6_gre ip6_tunnel tunnel6 cls_matchall ip_gre gre dummy sch_tbf macvlan 8021q vxlan ip6_udp_tunnel udp_tunnel act_gact act_pedit cls_flower bridge stp llc sch_ingress vrf veth [ 359.288137][ C0] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 359.288544][ C0] RIP: 0010:tc_run (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/sch_generic.h:1366 net/core/dev.c:4370) [ 359.288863][ C0] Code: 89 f8 49 c1 e8 03 45 0f b6 04 30 48 89 fe 83 e6 07 83 c6 01 44 38 c6 7c 09 45 84 c0 0f 85 83 02 00 00 66 83 7a 06 00 74 04 90 <0f> 0b 90 48 ba 00 00 00 00 00 fc ff df 48 8d 7b 28 48 89 fe 48 c1 All code ======== 0: 89 f8 mov %edi,%eax 2: 49 c1 e8 03 shr $0x3,%r8 6: 45 0f b6 04 30 movzbl (%r8,%rsi,1),%r8d b: 48 89 fe mov %rdi,%rsi e: 83 e6 07 and $0x7,%esi 11: 83 c6 01 add $0x1,%esi 14: 44 38 c6 cmp %r8b,%sil 17: 7c 09 jl 0x22 19: 45 84 c0 test %r8b,%r8b 1c: 0f 85 83 02 00 00 jne 0x2a5 22: 66 83 7a 06 00 cmpw $0x0,0x6(%rdx) 27: 74 04 je 0x2d 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 34: fc ff df 37: 48 8d 7b 28 lea 0x28(%rbx),%rdi 3b: 48 89 fe mov %rdi,%rsi 3e: 48 rex.W 3f: c1 .byte 0xc1 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx a: fc ff df d: 48 8d 7b 28 lea 0x28(%rbx),%rdi 11: 48 89 fe mov %rdi,%rsi 14: 48 rex.W 15: c1 .byte 0xc1 [ 359.290002][ C0] RSP: 0018:ffffc90000007980 EFLAGS: 00010246 [ 359.290393][ C0] RAX: ffffe8ffffc04130 RBX: ffff88800c67be00 RCX: 0000000000000000 [ 359.290822][ C0] RDX: ffff88800c259ec0 RSI: 0000000000000000 RDI: ffff88800c259ec4 [ 359.291290][ C0] RBP: ffffc90000007a28 R08: 0000000000000000 R09: ffffed10016f1d39 [ 359.291734][ C0] R10: ffff88800b78e9cf R11: ffffffff90b744c0 R12: ffffc90000007b28 [ 359.292181][ C0] R13: 1ffff92000000f34 R14: ffff88800c67be48 R15: ffff88800a309ed0 [ 359.292627][ C0] FS: 00007f475339b740(0000) GS:ffff8880a43f2000(0000) knlGS:0000000000000000 [ 359.293161][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.293543][ C0] CR2: 00007f47537eca98 CR3: 000000000bb1e006 CR4: 0000000000772ef0 [ 359.294000][ C0] PKRU: 55555554 [ 359.294221][ C0] Call Trace: [ 359.294472][ C0] [ 359.294626][ C0] ? napi_disable (net/core/dev.c:4349) [ 359.294945][ C0] ? packet_rcv (net/packet/af_packet.c:2210) [ 359.295253][ C0] __netif_receive_skb_core.constprop.0 (net/core/dev.c:4448 net/core/dev.c:5989) [ 359.295640][ C0] ? ip_local_deliver (./include/linux/netfilter.h:318 ./include/linux/netfilter.h:312 net/ipv4/ip_input.c:262) [ 359.295953][ C0] ? ip_local_deliver_finish (net/ipv4/ip_input.c:251) [ 359.296239][ C0] ? do_xdp_generic (net/core/dev.c:5908) [ 359.296554][ C0] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [ 359.296863][ C0] ? validate_chain (kernel/locking/lockdep.c:3801 kernel/locking/lockdep.c:3821 kernel/locking/lockdep.c:3876) [ 359.297171][ C0] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 359.297471][ C0] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601) [ 359.297767][ C0] __netif_receive_skb_one_core (net/core/dev.c:6137) [ 359.298140][ C0] ? __netif_receive_skb_list_core (net/core/dev.c:6131) [ 359.298513][ C0] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 359.298807][ C0] ? lock_acquire (./include/trace/events/lock.h:24 kernel/locking/lockdep.c:5831) [ 359.299110][ C0] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601) [ 359.299417][ C0] process_backlog (./include/linux/rcupdate.h:895 net/core/dev.c:6604) [ 359.299714][ C0] __napi_poll.constprop.0 (net/core/dev.c:7668) [ 359.300022][ C0] net_rx_action (net/core/dev.c:7730 net/core/dev.c:7882) [ 359.300323][ C0] ? run_backlog_napi (net/core/dev.c:7844) [ 359.300615][ C0] ? clockevents_program_event (kernel/time/clockevents.c:326) [ 359.300930][ C0] ? lock_downgrade (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./arch/x86/include/asm/irqflags.h:159 kernel/locking/lockdep.c:5765) [ 359.301221][ C0] ? kvm_clock_get_cycles (./arch/x86/include/asm/preempt.h:95 arch/x86/kernel/kvmclock.c:80 arch/x86/kernel/kvmclock.c:86) [ 359.301538][ C0] ? ktime_get (kernel/time/timekeeping.c:387 (discriminator 4) kernel/time/timekeeping.c:404 (discriminator 4) kernel/time/timekeeping.c:826 (discriminator 4)) [ 359.301760][ C0] ? clockevents_program_event (kernel/time/clockevents.c:336 (discriminator 3)) [ 359.302173][ C0] ? hrtimer_interrupt (kernel/time/hrtimer.c:1916) [ 359.302479][ C0] handle_softirqs (kernel/softirq.c:623) [ 359.302770][ C0] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847) [ 359.303081][ C0] do_softirq (kernel/softirq.c:523 kernel/softirq.c:510) [ 359.303298][ C0] [ 359.303459][ C0] [ 359.303604][ C0] __local_bh_enable_ip (kernel/softirq.c:450) [ 359.303896][ C0] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847) [ 359.304202][ C0] __dev_queue_xmit (net/core/dev.c:4848) [ 359.304526][ C0] ? netdev_core_pick_tx (net/core/dev.c:4728) [ 359.304809][ C0] ? packet_parse_headers (./include/linux/skbuff.h:3180 net/packet/af_packet.c:1938) [ 359.305130][ C0] ? sock_wmalloc (net/core/sock.c:2968) [ 359.305437][ C0] ? packet_cached_dev_get (net/packet/af_packet.c:1923) [ 359.305720][ C0] ? skb_copy_datagram_from_iter (net/core/datagram.c:561) [ 359.306111][ C0] packet_snd (net/packet/af_packet.c:3076) [ 359.306424][ C0] ? tpacket_snd (net/packet/af_packet.c:2940) [ 359.306706][ C0] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 359.307021][ C0] ? __might_fault (mm/memory.c:7081 mm/memory.c:7075) [ 359.307327][ C0] __sys_sendto (net/socket.c:727 net/socket.c:742 net/socket.c:2244) [ 359.307623][ C0] ? __ia32_sys_getpeername (net/socket.c:2211) [ 359.307937][ C0] ? sock_ioctl (net/socket.c:1378) [ 359.308250][ C0] ? down_write_nested (kernel/locking/rwsem.c:1350) [ 359.308550][ C0] ? do_user_addr_fault (./include/linux/mmap_lock.h:396 arch/x86/mm/fault.c:1415) [ 359.308866][ C0] __x64_sys_sendto (net/socket.c:2247) [ 359.309179][ C0] ? do_syscall_64 (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./include/linux/entry-common.h:124 arch/x86/entry/syscall_64.c:90) [ 359.309482][ C0] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4472) [ 359.309767][ C0] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 359.310076][ C0] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 359.310448][ C0] RIP: 0033:0x7f47535b727a [ 359.310758][ C0] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 All code ======== 0: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4) 4: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax b: eb b8 jmp 0xffffffffffffffc5 d: 0f 1f 00 nopl (%rax) 10: f3 0f 1e fa endbr64 14: 41 89 ca mov %ecx,%r10d 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 15 jne 0x38 23: b8 2c 00 00 00 mov $0x2c,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 7e ja 0xb0 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 41 54 push %r12 3a: 48 83 ec 30 sub $0x30,%rsp 3e: 44 rex.R 3f: 89 .byte 0x89 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 7e ja 0x86 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 41 54 push %r12 10: 48 83 ec 30 sub $0x30,%rsp 14: 44 rex.R 15: 89 .byte 0x89 [ 359.311808][ C0] RSP: 002b:00007ffd6e2e4dc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 359.312265][ C0] RAX: ffffffffffffffda RBX: 00000000379d89d0 RCX: 00007f47535b727a [ 359.312700][ C0] RDX: 000000000000002a RSI: 00000000379d8c92 RDI: 0000000000000005 [ 359.313158][ C0] RBP: 00000000379d8c92 R08: 00007ffd6e2e4dd0 R09: 0000000000000014 [ 359.313595][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 359.314045][ C0] R13: 000000000000002a R14: 00007ffd6e2e4dd0 R15: 0000000000000000 | [ 359.318083][ C0] ------------[ cut here ]------------ | [ 359.318406][ C0] WARNING: CPU: 0 PID: 2934 at ./include/net/sch_generic.h:843 tcf_gact_act (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/act_api.h:232 net/sched/act_gact.c:164) act_gact | [ 359.319245][ C0] Modules linked in: act_mirred ip6_gre ip6_tunnel tunnel6 cls_matchall ip_gre gre dummy sch_tbf macvlan 8021q vxlan ip6_udp_tunnel udp_tunnel act_gact act_pedit cls_flower bridge stp llc sch_ingress vrf veth | [ 359.321977][ C0] Tainted: [W]=WARN [ 359.322456][ C0] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 359.322860][ C0] RIP: 0010:tcf_gact_act (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/act_api.h:232 net/sched/act_gact.c:164) act_gact [ 359.323269][ C0] Code: 06 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 47 03 00 00 66 41 83 7d 06 00 74 04 90 <0f> 0b 90 48 b8 00 00 00 00 00 fc ff df 48 8d 7d 28 48 89 fa 48 c1 All code ======== 0: 06 (bad) 1: 48 89 fa mov %rdi,%rdx 4: 48 c1 ea 03 shr $0x3,%rdx 8: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx c: 48 89 f8 mov %rdi,%rax f: 83 e0 07 and $0x7,%eax 12: 83 c0 01 add $0x1,%eax 15: 38 d0 cmp %dl,%al 17: 7c 08 jl 0x21 19: 84 d2 test %dl,%dl 1b: 0f 85 47 03 00 00 jne 0x368 21: 66 41 83 7d 06 00 cmpw $0x0,0x6(%r13) 27: 74 04 je 0x2d 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 34: fc ff df 37: 48 8d 7d 28 lea 0x28(%rbp),%rdi 3b: 48 89 fa mov %rdi,%rdx 3e: 48 rex.W 3f: c1 .byte 0xc1 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax a: fc ff df d: 48 8d 7d 28 lea 0x28(%rbp),%rdi 11: 48 89 fa mov %rdi,%rdx 14: 48 rex.W 15: c1 .byte 0xc1 [ 359.324658][ C0] RSP: 0018:ffffc90000007790 EFLAGS: 00010246 [ 359.325067][ C0] RAX: 0000000000000000 RBX: ffff88800f507400 RCX: 1ffffffff80cc65f [ 359.325778][ C0] RDX: 0000000000000000 RSI: ffffffff9005d5c0 RDI: ffff88800c259ec4 [ 359.326247][ C0] RBP: ffff88800c67be00 R08: 0000000000000001 R09: 0000000000000000 [ 359.326963][ C0] R10: ffff888002550640 R11: ffff88800f507700 R12: ffffe8ffffc03880 [ 359.327458][ C0] R13: ffff88800c259ec0 R14: 0000000000000000 R15: 0000000000000002 [ 359.327942][ C0] FS: 00007f475339b740(0000) GS:ffff8880a43f2000(0000) knlGS:0000000000000000 [ 359.328716][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.329131][ C0] CR2: 00007f47537eca98 CR3: 000000000bb1e006 CR4: 0000000000772ef0 [ 359.329600][ C0] PKRU: 55555554 [ 359.330073][ C0] Call Trace: [ 359.330300][ C0] [ 359.330478][ C0] tcf_action_exec.part.0 (./include/net/tc_wrapper.h:217 net/sched/act_api.c:1150) [ 359.330798][ C0] ? mall_classify (net/sched/cls_matchall.c:41) cls_matchall [ 359.331440][ C0] __tcf_classify (./include/net/tc_wrapper.h:223 net/sched/cls_api.c:1764) [ 359.331755][ C0] tcf_classify (net/sched/cls_api.c:1860) [ 359.332108][ C0] ? exc_invalid_op (arch/x86/kernel/traps.c:392 (discriminator 1)) [ 359.332437][ C0] ? __tcf_classify (net/sched/cls_api.c:1809) [ 359.332751][ C0] tc_run (net/core/dev.c:4373) [ 359.333231][ C0] ? napi_disable (net/core/dev.c:4349) [ 359.333557][ C0] ? packet_rcv (net/packet/af_packet.c:2210) [ 359.333875][ C0] __netif_receive_skb_core.constprop.0 (net/core/dev.c:4448 net/core/dev.c:5989) [ 359.334512][ C0] ? ip_local_deliver (./include/linux/netfilter.h:318 ./include/linux/netfilter.h:312 net/ipv4/ip_input.c:262) [ 359.334840][ C0] ? ip_local_deliver_finish (net/ipv4/ip_input.c:251) [ 359.335174][ C0] ? do_xdp_generic (net/core/dev.c:5908) [ 359.335521][ C0] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [ 359.335867][ C0] ? validate_chain (kernel/locking/lockdep.c:3801 kernel/locking/lockdep.c:3821 kernel/locking/lockdep.c:3876) [ 359.336214][ C0] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 359.336533][ C0] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601) [ 359.336844][ C0] __netif_receive_skb_one_core (net/core/dev.c:6137) [ 359.337475][ C0] ? __netif_receive_skb_list_core (net/core/dev.c:6131) [ 359.337864][ C0] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 359.338188][ C0] ? lock_acquire (./include/trace/events/lock.h:24 kernel/locking/lockdep.c:5831) [ 359.338500][ C0] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601) [ 359.339062][ C0] process_backlog (./include/linux/rcupdate.h:895 net/core/dev.c:6604) [ 359.339392][ C0] __napi_poll.constprop.0 (net/core/dev.c:7668) [ 359.339697][ C0] net_rx_action (net/core/dev.c:7730 net/core/dev.c:7882) [ 359.340042][ C0] ? run_backlog_napi (net/core/dev.c:7844) [ 359.340584][ C0] ? clockevents_program_event (kernel/time/clockevents.c:326) [ 359.340900][ C0] ? lock_downgrade (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./arch/x86/include/asm/irqflags.h:159 kernel/locking/lockdep.c:5765) [ 359.341228][ C0] ? kvm_clock_get_cycles (./arch/x86/include/asm/preempt.h:95 arch/x86/kernel/kvmclock.c:80 arch/x86/kernel/kvmclock.c:86) [ 359.341547][ C0] ? ktime_get (kernel/time/timekeeping.c:387 (discriminator 4) kernel/time/timekeeping.c:404 (discriminator 4) kernel/time/timekeeping.c:826 (discriminator 4)) [ 359.342030][ C0] ? clockevents_program_event (kernel/time/clockevents.c:336 (discriminator 3)) [ 359.342429][ C0] ? hrtimer_interrupt (kernel/time/hrtimer.c:1916) [ 359.342736][ C0] handle_softirqs (kernel/softirq.c:623) [ 359.343072][ C0] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847) [ 359.343608][ C0] do_softirq (kernel/softirq.c:523 kernel/softirq.c:510) [ 359.343845][ C0] [ 359.344018][ C0] [ 359.344177][ C0] __local_bh_enable_ip (kernel/softirq.c:450) [ 359.344512][ C0] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847) [ 359.345060][ C0] __dev_queue_xmit (net/core/dev.c:4848) [ 359.345393][ C0] ? netdev_core_pick_tx (net/core/dev.c:4728) [ 359.345700][ C0] ? packet_parse_headers (./include/linux/skbuff.h:3180 net/packet/af_packet.c:1938) [ 359.346032][ C0] ? sock_wmalloc (net/core/sock.c:2968) [ 359.346569][ C0] ? packet_cached_dev_get (net/packet/af_packet.c:1923) [ 359.346893][ C0] ? skb_copy_datagram_from_iter (net/core/datagram.c:561) [ 359.347297][ C0] packet_snd (net/packet/af_packet.c:3076) [ 359.347671][ C0] ? tpacket_snd (net/packet/af_packet.c:2940) [ 359.348231][ C0] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 359.348573][ C0] ? __might_fault (mm/memory.c:7081 mm/memory.c:7075) [ 359.348908][ C0] __sys_sendto (net/socket.c:727 net/socket.c:742 net/socket.c:2244) [ 359.349242][ C0] ? __ia32_sys_getpeername (net/socket.c:2211) [ 359.349804][ C0] ? sock_ioctl (net/socket.c:1378) [ 359.350170][ C0] ? down_write_nested (kernel/locking/rwsem.c:1350) [ 359.350489][ C0] ? do_user_addr_fault (./include/linux/mmap_lock.h:396 arch/x86/mm/fault.c:1415) [ 359.350807][ C0] __x64_sys_sendto (net/socket.c:2247) [ 359.351363][ C0] ? do_syscall_64 (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./include/linux/entry-common.h:124 arch/x86/entry/syscall_64.c:90) [ 359.351708][ C0] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4472) [ 359.352036][ C0] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 359.352354][ C0] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 359.352986][ C0] RIP: 0033:0x7f47535b727a [ 359.353302][ C0] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 All code ======== 0: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4) 4: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax b: eb b8 jmp 0xffffffffffffffc5 d: 0f 1f 00 nopl (%rax) 10: f3 0f 1e fa endbr64 14: 41 89 ca mov %ecx,%r10d 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 15 jne 0x38 23: b8 2c 00 00 00 mov $0x2c,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 7e ja 0xb0 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 41 54 push %r12 3a: 48 83 ec 30 sub $0x30,%rsp 3e: 44 rex.R 3f: 89 .byte 0x89 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 7e ja 0x86 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 41 54 push %r12 10: 48 83 ec 30 sub $0x30,%rsp 14: 44 rex.R 15: 89 .byte 0x89 [ 359.354676][ C0] RSP: 002b:00007ffd6e2e4dc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 359.355162][ C0] RAX: ffffffffffffffda RBX: 00000000379d89d0 RCX: 00007f47535b727a [ 359.355874][ C0] RDX: 000000000000002a RSI: 00000000379d8c92 RDI: 0000000000000005 [ 359.356364][ C0] RBP: 00000000379d8c92 R08: 00007ffd6e2e4dd0 R09: 0000000000000014 [ 359.356818][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 Finger prints: tc_run:__netif_receive_skb_one_core:process_backlog:net_rx_action:handle_softirqs tcf_gact_act:__tcf_classify:tcf_classify:tc_run:__netif_receive_skb_one_core