======================================
| [ 483.515218][ T3854] Mirror/redirect action on
| [ 484.027999][ C2] ------------[ cut here ]------------
| [ 484.028514][ C2] WARNING: CPU: 2 PID: 3860 at ./include/net/sch_generic.h:843 tc_run (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/sch_generic.h:1366 net/core/dev.c:4370)
| [ 484.029082][ C2] Modules linked in: act_mirred ip6_gre ip6_tunnel tunnel6 cls_matchall ip_gre gre vxlan ip6_udp_tunnel udp_tunnel dummy act_gact cls_flower sch_ingress bridge stp llc 8021q vrf veth
[ 484.030775][ C2] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 484.031182][ C2] RIP: 0010:tc_run (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/sch_generic.h:1366 net/core/dev.c:4370)
[ 484.031527][ C2] Code: 89 f8 49 c1 e8 03 45 0f b6 04 30 48 89 fe 83 e6 07 83 c6 01 44 38 c6 7c 09 45 84 c0 0f 85 83 02 00 00 66 83 7a 06 00 74 04 90 <0f> 0b 90 48 ba 00 00 00 00 00 fc ff df 48 8d 7b 28 48 89 fe 48 c1
All code
========
0: 89 f8 mov %edi,%eax
2: 49 c1 e8 03 shr $0x3,%r8
6: 45 0f b6 04 30 movzbl (%r8,%rsi,1),%r8d
b: 48 89 fe mov %rdi,%rsi
e: 83 e6 07 and $0x7,%esi
11: 83 c6 01 add $0x1,%esi
14: 44 38 c6 cmp %r8b,%sil
17: 7c 09 jl 0x22
19: 45 84 c0 test %r8b,%r8b
1c: 0f 85 83 02 00 00 jne 0x2a5
22: 66 83 7a 06 00 cmpw $0x0,0x6(%rdx)
27: 74 04 je 0x2d
29: 90 nop
2a:* 0f 0b ud2 <-- trapping instruction
2c: 90 nop
2d: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx
34: fc ff df
37: 48 8d 7b 28 lea 0x28(%rbx),%rdi
3b: 48 89 fe mov %rdi,%rsi
3e: 48 rex.W
3f: c1 .byte 0xc1
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 90 nop
3: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx
a: fc ff df
d: 48 8d 7b 28 lea 0x28(%rbx),%rdi
11: 48 89 fe mov %rdi,%rsi
14: 48 rex.W
15: c1 .byte 0xc1
[ 484.032667][ C2] RSP: 0018:ffffc90000218980 EFLAGS: 00010246
[ 484.033095][ C2] RAX: ffffe8ffffd03760 RBX: ffff88800c9bde00 RCX: 0000000000000000
[ 484.033817][ C2] RDX: ffff88800b6e06c0 RSI: 0000000000000000 RDI: ffff88800b6e06c4
[ 484.034319][ C2] RBP: ffffc90000218a28 R08: 0000000000000000 R09: ffffed1001680d39
[ 484.034775][ C2] R10: ffff88800b4069cf R11: ffffffff987744c0 R12: ffffc90000218b28
[ 484.035264][ C2] R13: 1ffff92000043134 R14: ffff88800c9bde48 R15: ffff88800bde36f8
[ 484.035732][ C2] FS: 00007f357ae93740(0000) GS:ffff88809c8f2000(0000) knlGS:0000000000000000
[ 484.036284][ C2] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 484.036675][ C2] CR2: 00007f357b2e4a98 CR3: 0000000009307004 CR4: 0000000000772ef0
[ 484.037159][ C2] PKRU: 55555554
[ 484.037409][ C2] Call Trace:
[ 484.037647][ C2]
[ 484.037819][ C2] ? napi_disable (net/core/dev.c:4349)
[ 484.038165][ C2] ? packet_rcv (net/packet/af_packet.c:2210)
[ 484.038503][ C2] __netif_receive_skb_core.constprop.0 (net/core/dev.c:4448 net/core/dev.c:5989)
[ 484.038891][ C2] ? kmem_cache_free (mm/slub.c:6630 mm/slub.c:6740)
[ 484.039241][ C2] ? dst_release (./arch/x86/include/asm/preempt.h:104 ./include/linux/rcuref.h:174 net/core/dst.c:167)
[ 484.039585][ C2] ? do_xdp_generic (net/core/dev.c:5908)
[ 484.039908][ C2] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380)
[ 484.040258][ C2] ? validate_chain (kernel/locking/lockdep.c:3801 kernel/locking/lockdep.c:3821 kernel/locking/lockdep.c:3876)
[ 484.040586][ C2] ? __lock_acquire (kernel/locking/lockdep.c:5237)
[ 484.040907][ C2] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601)
[ 484.041235][ C2] __netif_receive_skb_one_core (net/core/dev.c:6137)
[ 484.041620][ C2] ? __netif_receive_skb_list_core (net/core/dev.c:6131)
[ 484.042016][ C2] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751)
[ 484.042356][ C2] ? lock_acquire (./include/trace/events/lock.h:24 kernel/locking/lockdep.c:5831)
[ 484.042660][ C2] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601)
[ 484.042988][ C2] process_backlog (./include/linux/rcupdate.h:895 net/core/dev.c:6604)
[ 484.043325][ C2] __napi_poll.constprop.0 (net/core/dev.c:7668)
[ 484.043664][ C2] net_rx_action (net/core/dev.c:7730 net/core/dev.c:7882)
[ 484.044056][ C2] ? run_backlog_napi (net/core/dev.c:7844)
[ 484.044394][ C2] ? clockevents_program_event (kernel/time/clockevents.c:326)
[ 484.044714][ C2] ? lock_downgrade (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./arch/x86/include/asm/irqflags.h:159 kernel/locking/lockdep.c:5765)
[ 484.045050][ C2] ? kvm_clock_get_cycles (./arch/x86/include/asm/preempt.h:95 arch/x86/kernel/kvmclock.c:80 arch/x86/kernel/kvmclock.c:86)
[ 484.045379][ C2] ? ktime_get (kernel/time/timekeeping.c:387 (discriminator 4) kernel/time/timekeeping.c:404 (discriminator 4) kernel/time/timekeeping.c:826 (discriminator 4))
[ 484.045621][ C2] ? clockevents_program_event (kernel/time/clockevents.c:336 (discriminator 3))
[ 484.046039][ C2] ? hrtimer_interrupt (kernel/time/hrtimer.c:1916)
[ 484.046381][ C2] handle_softirqs (kernel/softirq.c:623)
[ 484.046717][ C2] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847)
[ 484.047080][ C2] do_softirq (kernel/softirq.c:523 kernel/softirq.c:510)
[ 484.047330][ C2]
[ 484.047523][ C2]
[ 484.047716][ C2] __local_bh_enable_ip (kernel/softirq.c:450)
[ 484.048086][ C2] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847)
[ 484.048487][ C2] __dev_queue_xmit (net/core/dev.c:4848)
[ 484.049009][ C2] ? netdev_core_pick_tx (net/core/dev.c:4728)
[ 484.049521][ C2] ? packet_parse_headers (./include/linux/skbuff.h:3180 net/packet/af_packet.c:1938)
[ 484.050053][ C2] ? sock_wmalloc (net/core/sock.c:2968)
[ 484.050562][ C2] ? packet_cached_dev_get (net/packet/af_packet.c:1923)
[ 484.051072][ C2] ? skb_copy_datagram_from_iter (net/core/datagram.c:561)
[ 484.051699][ C2] packet_snd (net/packet/af_packet.c:3076)
[ 484.052249][ C2] ? tpacket_snd (net/packet/af_packet.c:2940)
[ 484.052749][ C2] ? find_held_lock (kernel/locking/lockdep.c:5350)
[ 484.053276][ C2] ? __might_fault (mm/memory.c:7081 mm/memory.c:7075)
[ 484.053780][ C2] __sys_sendto (net/socket.c:727 net/socket.c:742 net/socket.c:2244)
[ 484.054319][ C2] ? __ia32_sys_getpeername (net/socket.c:2211)
[ 484.054727][ C2] ? sock_ioctl (net/socket.c:1378)
[ 484.055220][ C2] ? down_write_nested (kernel/locking/rwsem.c:1350)
[ 484.055710][ C2] ? do_user_addr_fault (./include/linux/mmap_lock.h:396 arch/x86/mm/fault.c:1415)
[ 484.056263][ C2] __x64_sys_sendto (net/socket.c:2247)
[ 484.056760][ C2] ? do_syscall_64 (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./include/linux/entry-common.h:124 arch/x86/entry/syscall_64.c:90)
[ 484.057283][ C2] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4472)
[ 484.057795][ C2] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)
[ 484.058323][ C2] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
[ 484.058785][ C2] RIP: 0033:0x7f357b0af27a
[ 484.059144][ C2] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89
All code
========
0: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4)
4: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax
b: eb b8 jmp 0xffffffffffffffc5
d: 0f 1f 00 nopl (%rax)
10: f3 0f 1e fa endbr64
14: 41 89 ca mov %ecx,%r10d
17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax
1e: 00
1f: 85 c0 test %eax,%eax
21: 75 15 jne 0x38
23: b8 2c 00 00 00 mov $0x2c,%eax
28: 0f 05 syscall
2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction
30: 77 7e ja 0xb0
32: c3 ret
33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
38: 41 54 push %r12
3a: 48 83 ec 30 sub $0x30,%rsp
3e: 44 rex.R
3f: 89 .byte 0x89
Code starting with the faulting instruction
===========================================
0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax
6: 77 7e ja 0x86
8: c3 ret
9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
e: 41 54 push %r12
10: 48 83 ec 30 sub $0x30,%rsp
14: 44 rex.R
15: 89 .byte 0x89
[ 484.060222][ C2] RSP: 002b:00007fff684fc4b8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 484.060678][ C2] RAX: ffffffffffffffda RBX: 000000000c5ce9d0 RCX: 00007f357b0af27a
[ 484.061140][ C2] RDX: 000000000000002a RSI: 000000000c5cec92 RDI: 0000000000000005
[ 484.061600][ C2] RBP: 000000000c5cec92 R08: 00007fff684fc4c0 R09: 0000000000000014
[ 484.062077][ C2] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 484.062559][ C2] R13: 000000000000002a R14: 00007fff684fc4c0 R15: 0000000000000000
| [ 484.066172][ C2] ------------[ cut here ]------------
| [ 484.066533][ C2] WARNING: CPU: 2 PID: 3860 at ./include/net/sch_generic.h:843 tcf_gact_act (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/act_api.h:232 net/sched/act_gact.c:164) act_gact
| [ 484.067189][ C2] Modules linked in: act_mirred ip6_gre ip6_tunnel tunnel6 cls_matchall ip_gre gre vxlan ip6_udp_tunnel udp_tunnel dummy act_gact cls_flower sch_ingress bridge stp llc 8021q vrf veth
| [ 484.069514][ C2] Tainted: [W]=WARN
[ 484.069783][ C2] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 484.070219][ C2] RIP: 0010:tcf_gact_act (./include/net/sch_generic.h:843 ./include/net/sch_generic.h:889 ./include/net/act_api.h:232 net/sched/act_gact.c:164) act_gact
[ 484.070651][ C2] Code: 06 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 47 03 00 00 66 41 83 7d 06 00 74 04 90 <0f> 0b 90 48 b8 00 00 00 00 00 fc ff df 48 8d 7d 28 48 89 fa 48 c1
All code
========
0: 06 (bad)
1: 48 89 fa mov %rdi,%rdx
4: 48 c1 ea 03 shr $0x3,%rdx
8: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx
c: 48 89 f8 mov %rdi,%rax
f: 83 e0 07 and $0x7,%eax
12: 83 c0 01 add $0x1,%eax
15: 38 d0 cmp %dl,%al
17: 7c 08 jl 0x21
19: 84 d2 test %dl,%dl
1b: 0f 85 47 03 00 00 jne 0x368
21: 66 41 83 7d 06 00 cmpw $0x0,0x6(%r13)
27: 74 04 je 0x2d
29: 90 nop
2a:* 0f 0b ud2 <-- trapping instruction
2c: 90 nop
2d: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
34: fc ff df
37: 48 8d 7d 28 lea 0x28(%rbp),%rdi
3b: 48 89 fa mov %rdi,%rdx
3e: 48 rex.W
3f: c1 .byte 0xc1
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 90 nop
3: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
a: fc ff df
d: 48 8d 7d 28 lea 0x28(%rbp),%rdi
11: 48 89 fa mov %rdi,%rdx
14: 48 rex.W
15: c1 .byte 0xc1
[ 484.072175][ C2] RSP: 0018:ffffc90000218790 EFLAGS: 00010246
[ 484.073103][ C2] RAX: 0000000000000000 RBX: ffff888008e0ab00 RCX: 1ffffffff809765f
[ 484.073876][ C2] RDX: 0000000000000000 RSI: ffffffff97c5d5c0 RDI: ffff88800b6e06c4
[ 484.074716][ C2] RBP: ffff88800c9bde00 R08: 0000000000000001 R09: 0000000000000000
[ 484.075954][ C2] R10: ffff88800f72a940 R11: ffff888008e08100 R12: ffffe8ffffd03ef0
[ 484.076789][ C2] R13: ffff88800b6e06c0 R14: 0000000000000000 R15: 0000000000000002
[ 484.078002][ C2] FS: 00007f357ae93740(0000) GS:ffff88809c8f2000(0000) knlGS:0000000000000000
[ 484.078937][ C2] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 484.079480][ C2] CR2: 00007f357b2e4a98 CR3: 0000000009307004 CR4: 0000000000772ef0
[ 484.080705][ C2] PKRU: 55555554
[ 484.081149][ C2] Call Trace:
[ 484.081578][ C2]
[ 484.081880][ C2] tcf_action_exec.part.0 (./include/net/tc_wrapper.h:217 net/sched/act_api.c:1150)
[ 484.082458][ C2] ? mall_classify (net/sched/cls_matchall.c:41) cls_matchall
[ 484.083400][ C2] __tcf_classify (./include/net/tc_wrapper.h:223 net/sched/cls_api.c:1764)
[ 484.083805][ C2] tcf_classify (net/sched/cls_api.c:1860)
[ 484.084149][ C2] ? exc_invalid_op (arch/x86/kernel/traps.c:392 (discriminator 1))
[ 484.084488][ C2] ? __tcf_classify (net/sched/cls_api.c:1809)
[ 484.085064][ C2] tc_run (net/core/dev.c:4373)
[ 484.085330][ C2] ? napi_disable (net/core/dev.c:4349)
[ 484.085655][ C2] ? packet_rcv (net/packet/af_packet.c:2210)
[ 484.085998][ C2] __netif_receive_skb_core.constprop.0 (net/core/dev.c:4448 net/core/dev.c:5989)
[ 484.086650][ C2] ? kmem_cache_free (mm/slub.c:6630 mm/slub.c:6740)
[ 484.087009][ C2] ? dst_release (./arch/x86/include/asm/preempt.h:104 ./include/linux/rcuref.h:174 net/core/dst.c:167)
[ 484.087358][ C2] ? do_xdp_generic (net/core/dev.c:5908)
[ 484.087705][ C2] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380)
[ 484.088260][ C2] ? validate_chain (kernel/locking/lockdep.c:3801 kernel/locking/lockdep.c:3821 kernel/locking/lockdep.c:3876)
[ 484.088601][ C2] ? __lock_acquire (kernel/locking/lockdep.c:5237)
[ 484.088930][ C2] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601)
[ 484.089508][ C2] __netif_receive_skb_one_core (net/core/dev.c:6137)
[ 484.089913][ C2] ? __netif_receive_skb_list_core (net/core/dev.c:6131)
[ 484.090346][ C2] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751)
[ 484.090680][ C2] ? lock_acquire (./include/trace/events/lock.h:24 kernel/locking/lockdep.c:5831)
[ 484.091236][ C2] ? process_backlog (./include/linux/local_lock_internal.h:57 net/core/dev.c:6601)
[ 484.091572][ C2] process_backlog (./include/linux/rcupdate.h:895 net/core/dev.c:6604)
[ 484.091903][ C2] __napi_poll.constprop.0 (net/core/dev.c:7668)
[ 484.092243][ C2] net_rx_action (net/core/dev.c:7730 net/core/dev.c:7882)
[ 484.092806][ C2] ? run_backlog_napi (net/core/dev.c:7844)
[ 484.093157][ C2] ? clockevents_program_event (kernel/time/clockevents.c:326)
[ 484.093493][ C2] ? lock_downgrade (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./arch/x86/include/asm/irqflags.h:159 kernel/locking/lockdep.c:5765)
[ 484.093905][ C2] ? kvm_clock_get_cycles (./arch/x86/include/asm/preempt.h:95 arch/x86/kernel/kvmclock.c:80 arch/x86/kernel/kvmclock.c:86)
[ 484.094555][ C2] ? ktime_get (kernel/time/timekeeping.c:387 (discriminator 4) kernel/time/timekeeping.c:404 (discriminator 4) kernel/time/timekeeping.c:826 (discriminator 4))
[ 484.094813][ C2] ? clockevents_program_event (kernel/time/clockevents.c:336 (discriminator 3))
[ 484.095231][ C2] ? hrtimer_interrupt (kernel/time/hrtimer.c:1916)
[ 484.095597][ C2] handle_softirqs (kernel/softirq.c:623)
[ 484.096229][ C2] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847)
[ 484.096571][ C2] do_softirq (kernel/softirq.c:523 kernel/softirq.c:510)
[ 484.096858][ C2]
[ 484.097107][ C2]
[ 484.097313][ C2] __local_bh_enable_ip (kernel/softirq.c:450)
[ 484.097935][ C2] ? __dev_queue_xmit (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:934 net/core/dev.c:4847)
[ 484.098305][ C2] __dev_queue_xmit (net/core/dev.c:4848)
[ 484.098692][ C2] ? netdev_core_pick_tx (net/core/dev.c:4728)
[ 484.099084][ C2] ? packet_parse_headers (./include/linux/skbuff.h:3180 net/packet/af_packet.c:1938)
[ 484.099724][ C2] ? sock_wmalloc (net/core/sock.c:2968)
[ 484.100173][ C2] ? packet_cached_dev_get (net/packet/af_packet.c:1923)
[ 484.100712][ C2] ? skb_copy_datagram_from_iter (net/core/datagram.c:561)
[ 484.101408][ C2] packet_snd (net/packet/af_packet.c:3076)
[ 484.102353][ C2] ? tpacket_snd (net/packet/af_packet.c:2940)
[ 484.102893][ C2] ? find_held_lock (kernel/locking/lockdep.c:5350)
[ 484.103464][ C2] ? __might_fault (mm/memory.c:7081 mm/memory.c:7075)
[ 484.104021][ C2] __sys_sendto (net/socket.c:727 net/socket.c:742 net/socket.c:2244)
[ 484.104951][ C2] ? __ia32_sys_getpeername (net/socket.c:2211)
[ 484.105511][ C2] ? sock_ioctl (net/socket.c:1378)
[ 484.105908][ C2] ? down_write_nested (kernel/locking/rwsem.c:1350)
[ 484.106432][ C2] ? do_user_addr_fault (./include/linux/mmap_lock.h:396 arch/x86/mm/fault.c:1415)
[ 484.107418][ C2] __x64_sys_sendto (net/socket.c:2247)
[ 484.107992][ C2] ? do_syscall_64 (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./include/linux/entry-common.h:124 arch/x86/entry/syscall_64.c:90)
[ 484.108545][ C2] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4472)
[ 484.109097][ C2] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)
[ 484.109906][ C2] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
[ 484.110471][ C2] RIP: 0033:0x7f357b0af27a
[ 484.110846][ C2] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89
All code
========
0: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4)
4: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax
b: eb b8 jmp 0xffffffffffffffc5
d: 0f 1f 00 nopl (%rax)
10: f3 0f 1e fa endbr64
14: 41 89 ca mov %ecx,%r10d
17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax
1e: 00
1f: 85 c0 test %eax,%eax
21: 75 15 jne 0x38
23: b8 2c 00 00 00 mov $0x2c,%eax
28: 0f 05 syscall
2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction
30: 77 7e ja 0xb0
32: c3 ret
33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
38: 41 54 push %r12
3a: 48 83 ec 30 sub $0x30,%rsp
3e: 44 rex.R
3f: 89 .byte 0x89
Code starting with the faulting instruction
===========================================
0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax
6: 77 7e ja 0x86
8: c3 ret
9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
e: 41 54 push %r12
10: 48 83 ec 30 sub $0x30,%rsp
14: 44 rex.R
15: 89 .byte 0x89
[ 484.112886][ C2] RSP: 002b:00007fff684fc4b8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 484.113641][ C2] RAX: ffffffffffffffda RBX: 000000000c5ce9d0 RCX: 00007f357b0af27a
[ 484.114745][ C2] RDX: 000000000000002a RSI: 000000000c5cec92 RDI: 0000000000000005
[ 484.115581][ C2] RBP: 000000000c5cec92 R08: 00007fff684fc4c0 R09: 0000000000000014
[ 484.116776][ C2] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
Finger prints:
tc_run:__netif_receive_skb_one_core:process_backlog:net_rx_action:handle_softirqs
tcf_gact_act:__tcf_classify:tcf_classify:tc_run:__netif_receive_skb_one_core