======================================
| [ 8.668360] TCP: request_sock_TCP: Possible SYN flooding on port 10.0.254.1:7010. Sending cookies.
| [ 9.671406] ------------[ cut here ]------------
| [ 9.671532] kernel BUG at net/core/skbuff.c:2813!
| [ 9.671583] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[ 9.671681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 9.671766] RIP: 0010:__pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1))
[ 9.671816] Code: 44 24 10 e8 5d 2c 83 ff 49 8b be b8 00 00 00 44 8b 44 24 10 41 8b 8e b4 00 00 00 e9 f4 fc ff ff 4c 8d 48 ff e9 41 fd ff ff 90 <0f> 0b 48 c7 44 24 10 00 00 00 00 e9 99 fe ff ff 41 f6 44 24 76 20
All code
========
0: 44 24 10 rex.R and $0x10,%al
3: e8 5d 2c 83 ff call 0xffffffffff832c65
8: 49 8b be b8 00 00 00 mov 0xb8(%r14),%rdi
f: 44 8b 44 24 10 mov 0x10(%rsp),%r8d
14: 41 8b 8e b4 00 00 00 mov 0xb4(%r14),%ecx
1b: e9 f4 fc ff ff jmp 0xfffffffffffffd14
20: 4c 8d 48 ff lea -0x1(%rax),%r9
24: e9 41 fd ff ff jmp 0xfffffffffffffd6a
29: 90 nop
2a:* 0f 0b ud2 <-- trapping instruction
2c: 48 c7 44 24 10 00 00 movq $0x0,0x10(%rsp)
33: 00 00
35: e9 99 fe ff ff jmp 0xfffffffffffffed3
3a: 41 f6 44 24 76 20 testb $0x20,0x76(%r12)
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 48 c7 44 24 10 00 00 movq $0x0,0x10(%rsp)
9: 00 00
b: e9 99 fe ff ff jmp 0xfffffffffffffea9
10: 41 f6 44 24 76 20 testb $0x20,0x76(%r12)
[ 9.671956] RSP: 0018:ffffbb5cc0114e00 EFLAGS: 00010282
[ 9.671998] RAX: 00000000fffffff2 RBX: 0000000000000014 RCX: 0000000000000014
[ 9.672053] RDX: ffff97d08264d488 RSI: ffff97d08264d440 RDI: 0000000000000000
[ 9.672117] RBP: ffffbb5cc0114e40 R08: 00000000ffffffdc R09: 0000000000000008
[ 9.672172] R10: ffff97d08395e0c0 R11: 0000000000000024 R12: ffff97d08395e000
[ 9.672230] R13: 0000000000000014 R14: ffff97d082659700 R15: 0000000000000002
[ 9.672289] FS: 00007f2c013bf640(0000) GS:ffff97d0bed00000(0000) knlGS:0000000000000000
[ 9.672346] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 9.672398] CR2: 00007f2bfc01c068 CR3: 00000000025d4006 CR4: 0000000000770ef0
[ 9.672457] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 9.672520] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 9.672578] PKRU: 55555554
[ 9.672597] Call Trace:
[ 9.672621]
[ 9.672648] ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447)
[ 9.672684] ? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154)
[ 9.672716] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1))
[ 9.672746] ? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175)
[ 9.672780] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1))
[ 9.672810] ? exc_invalid_op (arch/x86/kernel/traps.c:265)
[ 9.672841] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1))
[ 9.672872] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:568)
[ 9.672906] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1))
[ 9.672939] tcp_v4_early_demux (./include/linux/skbuff.h:2731 ./include/linux/skbuff.h:2739 net/ipv4/tcp_ipv4.c:1966)
[ 9.672974] ip_rcv_finish_core.constprop.0 (./include/linux/skbuff.h:1139 ./include/net/dst_metadata.h:94 net/ipv4/ip_input.c:364)
[ 9.673021] ip_rcv (net/ipv4/ip_input.c:448 ./include/linux/netfilter.h:422 net/ipv4/ip_input.c:569)
[ 9.673052] __netif_receive_skb_one_core (net/core/dev.c:5610 (discriminator 4))
[ 9.673095] process_backlog (./include/linux/rcupdate.h:782 net/core/dev.c:6053)
[ 9.673127] __napi_poll (net/core/dev.c:6703)
[ 9.673162] net_rx_action (net/core/dev.c:6774 net/core/dev.c:6886)
[ 9.673197] __do_softirq (kernel/softirq.c:553)
[ 9.673234] do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)
[ 9.673272]
[ 9.673291]
[ 9.673310] __local_bh_enable_ip (kernel/softirq.c:381)
[ 9.673344] __dev_queue_xmit (net/core/dev.c:4400)
[ 9.673379] ? tcp_ao_hash_skb (net/ipv4/tcp_ao.c:643)
[ 9.673412] ip_finish_output2 (./include/linux/netdevice.h:3172 ./include/net/neighbour.h:526 ./include/net/neighbour.h:540 net/ipv4/ip_output.c:235)
[ 9.673447] ? __ip_finish_output (./include/linux/skbuff.h:4942 net/ipv4/ip_output.c:307)
[ 9.673491] __ip_queue_xmit (net/ipv4/ip_output.c:535)
[ 9.673519] __tcp_transmit_skb (net/ipv4/tcp_output.c:1462 (discriminator 4))
[ 9.673554] tcp_write_xmit (net/ipv4/tcp_output.c:2792)
[ 9.673586] __tcp_push_pending_frames (net/ipv4/tcp_output.c:2977)
[ 9.673626] tcp_sendmsg_locked (net/ipv4/tcp.c:1309)
[ 9.673661] tcp_sendmsg (net/ipv4/tcp.c:1342)
[ 9.673691] __sys_sendto (net/socket.c:730 net/socket.c:745 net/socket.c:2191)
[ 9.673727] ? __sys_getsockopt (./include/linux/file.h:32 net/socket.c:2405)
[ 9.673757] ? __sys_getsockopt (net/socket.c:2406)
[ 9.673792] __x64_sys_sendto (net/socket.c:2203 net/socket.c:2199 net/socket.c:2199)
[ 9.673826] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
[ 9.673860] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
[ 9.673906] RIP: 0033:0x7f2c0151274e
[ 9.673937] Code: 4c 24 1c e8 b4 c4 f4 ff 44 8b 54 24 1c 8b 3c 24 45 31 c9 41 89 c4 48 8b 54 24 10 48 8b 74 24 08 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 e7 48 89 04 24 e8 fe c4 f4 ff 48 8b
All code
========
0: 4c 24 1c rex.WR and $0x1c,%al
3: e8 b4 c4 f4 ff call 0xfffffffffff4c4bc
8: 44 8b 54 24 1c mov 0x1c(%rsp),%r10d
d: 8b 3c 24 mov (%rsp),%edi
10: 45 31 c9 xor %r9d,%r9d
13: 41 89 c4 mov %eax,%r12d
16: 48 8b 54 24 10 mov 0x10(%rsp),%rdx
1b: 48 8b 74 24 08 mov 0x8(%rsp),%rsi
20: 45 31 c0 xor %r8d,%r8d
23: b8 2c 00 00 00 mov $0x2c,%eax
28: 0f 05 syscall
2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction
30: 77 32 ja 0x64
32: 44 89 e7 mov %r12d,%edi
35: 48 89 04 24 mov %rax,(%rsp)
39: e8 fe c4 f4 ff call 0xfffffffffff4c53c
3e: 48 rex.W
3f: 8b .byte 0x8b
Code starting with the faulting instruction
===========================================
0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax
6: 77 32 ja 0x3a
8: 44 89 e7 mov %r12d,%edi
b: 48 89 04 24 mov %rax,(%rsp)
f: e8 fe c4 f4 ff call 0xfffffffffff4c512
14: 48 rex.W
15: 8b .byte 0x8b
[ 9.674076] RSP: 002b:00007f2c013be480 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 9.674134] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007f2c0151274e
[ 9.674195] RDX: 0000000000000064 RSI: 00007f2c013be5a0 RDI: 0000000000000008
[ 9.674252] RBP: 00007f2c013be590 R08: 0000000000000000 R09: 0000000000000000
[ 9.674308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
Finger prints:
__pskb_pull_tail:tcp_v4_early_demux:ip_rcv:__netif_receive_skb_one_core