====================================== | [ 8.668360] TCP: request_sock_TCP: Possible SYN flooding on port 10.0.254.1:7010. Sending cookies. | [ 9.671406] ------------[ cut here ]------------ | [ 9.671532] kernel BUG at net/core/skbuff.c:2813! | [ 9.671583] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 9.671681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 9.671766] RIP: 0010:__pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1)) [ 9.671816] Code: 44 24 10 e8 5d 2c 83 ff 49 8b be b8 00 00 00 44 8b 44 24 10 41 8b 8e b4 00 00 00 e9 f4 fc ff ff 4c 8d 48 ff e9 41 fd ff ff 90 <0f> 0b 48 c7 44 24 10 00 00 00 00 e9 99 fe ff ff 41 f6 44 24 76 20 All code ======== 0: 44 24 10 rex.R and $0x10,%al 3: e8 5d 2c 83 ff call 0xffffffffff832c65 8: 49 8b be b8 00 00 00 mov 0xb8(%r14),%rdi f: 44 8b 44 24 10 mov 0x10(%rsp),%r8d 14: 41 8b 8e b4 00 00 00 mov 0xb4(%r14),%ecx 1b: e9 f4 fc ff ff jmp 0xfffffffffffffd14 20: 4c 8d 48 ff lea -0x1(%rax),%r9 24: e9 41 fd ff ff jmp 0xfffffffffffffd6a 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 48 c7 44 24 10 00 00 movq $0x0,0x10(%rsp) 33: 00 00 35: e9 99 fe ff ff jmp 0xfffffffffffffed3 3a: 41 f6 44 24 76 20 testb $0x20,0x76(%r12) Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 48 c7 44 24 10 00 00 movq $0x0,0x10(%rsp) 9: 00 00 b: e9 99 fe ff ff jmp 0xfffffffffffffea9 10: 41 f6 44 24 76 20 testb $0x20,0x76(%r12) [ 9.671956] RSP: 0018:ffffbb5cc0114e00 EFLAGS: 00010282 [ 9.671998] RAX: 00000000fffffff2 RBX: 0000000000000014 RCX: 0000000000000014 [ 9.672053] RDX: ffff97d08264d488 RSI: ffff97d08264d440 RDI: 0000000000000000 [ 9.672117] RBP: ffffbb5cc0114e40 R08: 00000000ffffffdc R09: 0000000000000008 [ 9.672172] R10: ffff97d08395e0c0 R11: 0000000000000024 R12: ffff97d08395e000 [ 9.672230] R13: 0000000000000014 R14: ffff97d082659700 R15: 0000000000000002 [ 9.672289] FS: 00007f2c013bf640(0000) GS:ffff97d0bed00000(0000) knlGS:0000000000000000 [ 9.672346] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 9.672398] CR2: 00007f2bfc01c068 CR3: 00000000025d4006 CR4: 0000000000770ef0 [ 9.672457] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 9.672520] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 9.672578] PKRU: 55555554 [ 9.672597] Call Trace: [ 9.672621] [ 9.672648] ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) [ 9.672684] ? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154) [ 9.672716] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1)) [ 9.672746] ? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175) [ 9.672780] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1)) [ 9.672810] ? exc_invalid_op (arch/x86/kernel/traps.c:265) [ 9.672841] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1)) [ 9.672872] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:568) [ 9.672906] ? __pskb_pull_tail (net/core/skbuff.c:2813 (discriminator 1)) [ 9.672939] tcp_v4_early_demux (./include/linux/skbuff.h:2731 ./include/linux/skbuff.h:2739 net/ipv4/tcp_ipv4.c:1966) [ 9.672974] ip_rcv_finish_core.constprop.0 (./include/linux/skbuff.h:1139 ./include/net/dst_metadata.h:94 net/ipv4/ip_input.c:364) [ 9.673021] ip_rcv (net/ipv4/ip_input.c:448 ./include/linux/netfilter.h:422 net/ipv4/ip_input.c:569) [ 9.673052] __netif_receive_skb_one_core (net/core/dev.c:5610 (discriminator 4)) [ 9.673095] process_backlog (./include/linux/rcupdate.h:782 net/core/dev.c:6053) [ 9.673127] __napi_poll (net/core/dev.c:6703) [ 9.673162] net_rx_action (net/core/dev.c:6774 net/core/dev.c:6886) [ 9.673197] __do_softirq (kernel/softirq.c:553) [ 9.673234] do_softirq (kernel/softirq.c:454 kernel/softirq.c:441) [ 9.673272] [ 9.673291] [ 9.673310] __local_bh_enable_ip (kernel/softirq.c:381) [ 9.673344] __dev_queue_xmit (net/core/dev.c:4400) [ 9.673379] ? tcp_ao_hash_skb (net/ipv4/tcp_ao.c:643) [ 9.673412] ip_finish_output2 (./include/linux/netdevice.h:3172 ./include/net/neighbour.h:526 ./include/net/neighbour.h:540 net/ipv4/ip_output.c:235) [ 9.673447] ? __ip_finish_output (./include/linux/skbuff.h:4942 net/ipv4/ip_output.c:307) [ 9.673491] __ip_queue_xmit (net/ipv4/ip_output.c:535) [ 9.673519] __tcp_transmit_skb (net/ipv4/tcp_output.c:1462 (discriminator 4)) [ 9.673554] tcp_write_xmit (net/ipv4/tcp_output.c:2792) [ 9.673586] __tcp_push_pending_frames (net/ipv4/tcp_output.c:2977) [ 9.673626] tcp_sendmsg_locked (net/ipv4/tcp.c:1309) [ 9.673661] tcp_sendmsg (net/ipv4/tcp.c:1342) [ 9.673691] __sys_sendto (net/socket.c:730 net/socket.c:745 net/socket.c:2191) [ 9.673727] ? __sys_getsockopt (./include/linux/file.h:32 net/socket.c:2405) [ 9.673757] ? __sys_getsockopt (net/socket.c:2406) [ 9.673792] __x64_sys_sendto (net/socket.c:2203 net/socket.c:2199 net/socket.c:2199) [ 9.673826] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 9.673860] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 9.673906] RIP: 0033:0x7f2c0151274e [ 9.673937] Code: 4c 24 1c e8 b4 c4 f4 ff 44 8b 54 24 1c 8b 3c 24 45 31 c9 41 89 c4 48 8b 54 24 10 48 8b 74 24 08 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 e7 48 89 04 24 e8 fe c4 f4 ff 48 8b All code ======== 0: 4c 24 1c rex.WR and $0x1c,%al 3: e8 b4 c4 f4 ff call 0xfffffffffff4c4bc 8: 44 8b 54 24 1c mov 0x1c(%rsp),%r10d d: 8b 3c 24 mov (%rsp),%edi 10: 45 31 c9 xor %r9d,%r9d 13: 41 89 c4 mov %eax,%r12d 16: 48 8b 54 24 10 mov 0x10(%rsp),%rdx 1b: 48 8b 74 24 08 mov 0x8(%rsp),%rsi 20: 45 31 c0 xor %r8d,%r8d 23: b8 2c 00 00 00 mov $0x2c,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 32 ja 0x64 32: 44 89 e7 mov %r12d,%edi 35: 48 89 04 24 mov %rax,(%rsp) 39: e8 fe c4 f4 ff call 0xfffffffffff4c53c 3e: 48 rex.W 3f: 8b .byte 0x8b Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 32 ja 0x3a 8: 44 89 e7 mov %r12d,%edi b: 48 89 04 24 mov %rax,(%rsp) f: e8 fe c4 f4 ff call 0xfffffffffff4c512 14: 48 rex.W 15: 8b .byte 0x8b [ 9.674076] RSP: 002b:00007f2c013be480 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 9.674134] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007f2c0151274e [ 9.674195] RDX: 0000000000000064 RSI: 00007f2c013be5a0 RDI: 0000000000000008 [ 9.674252] RBP: 00007f2c013be590 R08: 0000000000000000 R09: 0000000000000000 [ 9.674308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 Finger prints: __pskb_pull_tail:tcp_v4_early_demux:ip_rcv:__netif_receive_skb_one_core