lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 24 Jul 2023 14:24:15 -0700
From: Jakub Kicinski <kuba@...nel.org>
To: Ian Kumlien <ian.kumlien@...il.com>
Cc: Linux Kernel Network Developers <netdev@...r.kernel.org>,
 netfilter-devel@...r.kernel.org
Subject: Re: Kernel oops with 6.4.4 - flow offloads - NULL pointer deref

Adding netfilter to CC.

On Sun, 23 Jul 2023 16:44:50 +0200 Ian Kumlien wrote:
> Running vanilla 6.4.4 with cherry picked:
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v6.4.5&id=7a59f29961cf97b98b02acaadf5a0b1f8dde938c
> 
> cat bug.txt | ./scripts/decode_stacktrace.sh vmlinux
> [108431.234344] BUG: kernel NULL pointer dereference, address: 0000000000000081
> [108431.241509] #PF: supervisor write access in kernel mode
> [108431.246912] #PF: error_code(0x0002) - not-present page
> [108431.252226] PGD 0 P4D 0
> [108431.254938] Oops: 0002 [#1] PREEMPT SMP NOPTI
> [108431.259472] CPU: 2 PID: 76217 Comm: kworker/2:0 Not tainted 6.4.4-dirty #381
> [108431.266698] Hardware name: Supermicro Super
> Server/A2SDi-12C-HLN4F, BIOS 1.7a 10/13/2022
> [108431.274967] Workqueue: events_power_efficient nf_flow_offload_work_gc
> [108431.281599] RIP: 0010:flow_offload_teardown
> (./arch/x86/include/asm/bitops.h:75
> ./include/asm-generic/bitops/instrumented-atomic.h:42
> net/netfilter/nf_flow_table_core.c:362)
> [108431.286746] Code: 00 00 e9 96 fd ff ff 66 0f 1f 44 00 00 48 83 c7
> 08 be 32 00 00 00 e9 82 fd ff ff 66 90 48 8b 87 b0 00 00 00 48 05 81
> 00 00 00 <f0> 80 20 bf f0 80 8f b8 00 00 00 04 48 8b 97 b0 00 00 00 0f
> b6 42
> All code
> ========
>    0: 00 00                add    %al,(%rax)
>    2: e9 96 fd ff ff        jmp    0xfffffffffffffd9d
>    7: 66 0f 1f 44 00 00    nopw   0x0(%rax,%rax,1)
>    d: 48 83 c7 08          add    $0x8,%rdi
>   11: be 32 00 00 00        mov    $0x32,%esi
>   16: e9 82 fd ff ff        jmp    0xfffffffffffffd9d
>   1b: 66 90                xchg   %ax,%ax
>   1d: 48 8b 87 b0 00 00 00 mov    0xb0(%rdi),%rax
>   24: 48 05 81 00 00 00    add    $0x81,%rax
>   2a:* f0 80 20 bf          lock andb $0xbf,(%rax) <-- trapping instruction
>   2e: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>   35: 04
>   36: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   3d: 0f                    .byte 0xf
>   3e: b6 42                mov    $0x42,%dh
> 
> Code starting with the faulting instruction
> ===========================================
>    0: f0 80 20 bf          lock andb $0xbf,(%rax)
>    4: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>    b: 04
>    c: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   13: 0f                    .byte 0xf
>   14: b6 42                mov    $0x42,%dh
> [108431.305700] RSP: 0018:ffffac250ade7e28 EFLAGS: 00010206
> [108431.311107] RAX: 0000000000000081 RBX: ffff9ebc413b42f8 RCX:
> 0000000000000001
> [108431.318420] RDX: 00000001067200c0 RSI: ffff9ebeda71ce58 RDI:
> ffff9ebeda71ce58
> [108431.325735] RBP: ffff9ebc413b4250 R08: ffff9ebc413b4250 R09:
> ffff9ebe3d7fad58
> [108431.333068] R10: 0000000000000000 R11: 0000000000000003 R12:
> ffff9ebfafab0000
> [108431.340415] R13: 0000000000000000 R14: ffff9ebfafab0005 R15:
> ffff9ebd79a0f780
> [108431.347764] FS:  0000000000000000(0000) GS:ffff9ebfafa80000(0000)
> knlGS:0000000000000000
> [108431.356069] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.362012] CR2: 0000000000000081 CR3: 000000045e99e000 CR4:
> 00000000003526e0
> [108431.369361] Call Trace:
> [108431.371999]  <TASK>
> [108431.374296] ? __die (arch/x86/kernel/dumpstack.c:421
> arch/x86/kernel/dumpstack.c:434)
> [108431.377553] ? page_fault_oops (arch/x86/mm/fault.c:707)
> [108431.381850] ? load_balance (kernel/sched/fair.c:10926)
> [108431.385884] ? exc_page_fault (arch/x86/mm/fault.c:1279
> arch/x86/mm/fault.c:1486 arch/x86/mm/fault.c:1542)
> [108431.390094] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:570)
> [108431.394482] ? flow_offload_teardown
> (./arch/x86/include/asm/bitops.h:75
> ./include/asm-generic/bitops/instrumented-atomic.h:42
> net/netfilter/nf_flow_table_core.c:362)
> [108431.399036] nf_flow_offload_gc_step
> (./arch/x86/include/asm/bitops.h:207
> ./arch/x86/include/asm/bitops.h:239
> ./include/asm-generic/bitops/instrumented-non-atomic.h:142
> net/netfilter/nf_flow_table_core.c:436)
> [108431.403675] nf_flow_offload_work_gc
> (net/netfilter/nf_flow_table_core.c:407
> net/netfilter/nf_flow_table_core.c:452
> net/netfilter/nf_flow_table_core.c:460)
> [108431.408321] process_one_work (kernel/workqueue.c:2413)
> [108431.412533] worker_thread (./include/linux/list.h:292
> kernel/workqueue.c:2556)
> [108431.416396] ? rescuer_thread (kernel/workqueue.c:2498)
> [108431.420608] kthread (kernel/kthread.c:379)
> [108431.423944] ? kthread_complete_and_exit (kernel/kthread.c:332)
> [108431.428937] ret_from_fork (arch/x86/entry/entry_64.S:314)
> [108431.432710]  </TASK>
> [108431.435087] Modules linked in: chaoskey
> [108431.439119] CR2: 0000000000000081
> [108431.442633] ---[ end trace 0000000000000000 ]---
> [108431.455408] BUG: kernel NULL pointer dereference, address: 0000000000000008
> [108431.462591] #PF: supervisor read access in kernel mode
> [108431.464358] pstore: backend (erst) writing error (-28)
> [108431.467928] #PF: error_code(0x0000) - not-present page
> [108431.468038] RIP: 0010:flow_offload_teardown
> (./arch/x86/include/asm/bitops.h:75
> ./include/asm-generic/bitops/instrumented-atomic.h:42
> net/netfilter/nf_flow_table_core.c:362)
> [108431.468148] PGD 0
> [108431.468254] Code: 00 00 e9 96 fd ff ff 66 0f 1f 44 00 00 48 83 c7
> 08 be 32 00 00 00 e9 82 fd ff ff 66 90 48 8b 87 b0 00 00 00 48 05 81
> 00 00 00 <f0> 80 20 bf f0 80 8f b8 00 00 00 04 48 8b 97 b0 00 00 00 0f
> b6 42
> All code
> ========
>    0: 00 00                add    %al,(%rax)
>    2: e9 96 fd ff ff        jmp    0xfffffffffffffd9d
>    7: 66 0f 1f 44 00 00    nopw   0x0(%rax,%rax,1)
>    d: 48 83 c7 08          add    $0x8,%rdi
>   11: be 32 00 00 00        mov    $0x32,%esi
>   16: e9 82 fd ff ff        jmp    0xfffffffffffffd9d
>   1b: 66 90                xchg   %ax,%ax
>   1d: 48 8b 87 b0 00 00 00 mov    0xb0(%rdi),%rax
>   24: 48 05 81 00 00 00    add    $0x81,%rax
>   2a:* f0 80 20 bf          lock andb $0xbf,(%rax) <-- trapping instruction
>   2e: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>   35: 04
>   36: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   3d: 0f                    .byte 0xf
>   3e: b6 42                mov    $0x42,%dh
> 
> Code starting with the faulting instruction
> ===========================================
>    0: f0 80 20 bf          lock andb $0xbf,(%rax)
>    4: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>    b: 04
>    c: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   13: 0f                    .byte 0xf
>   14: b6 42                mov    $0x42,%dh
> [108431.473471] P4D 0
> [108431.473571] RSP: 0018:ffffac250ade7e28 EFLAGS: 00010206
> [108431.473740]
> [108431.473841]
> [108431.473949] Oops: 0000 [#2] PREEMPT SMP NOPTI
> [108431.474047] RAX: 0000000000000081 RBX: ffff9ebc413b42f8 RCX:
> 0000000000000001
> [108431.474150] CPU: 6 PID: 0 Comm: swapper/6 Tainted: G      D
>     6.4.4-dirty #381
> [108431.474253] RDX: 00000001067200c0 RSI: ffff9ebeda71ce58 RDI:
> ffff9ebeda71ce58
> [108431.474382] Hardware name: Supermicro Super
> Server/A2SDi-12C-HLN4F, BIOS 1.7a 10/13/2022
> [108431.474511] RBP: ffff9ebc413b4250 R08: ffff9ebc413b4250 R09:
> ffff9ebe3d7fad58
> [108431.474640] RIP: 0010:memcmp (lib/string.c:681)
> [108431.474768] R10: 0000000000000000 R11: 0000000000000003 R12:
> ffff9ebfafab0000
> [108431.474898] Code: cc cc cc 48 85 c0 75 f3 0f b6 4f 01 48 83 c7 01
> 84 c9 75 bc eb e3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 eb 14
> 48 8b 06 <48> 39 07 75 17 48 83 c7 08 48 83 c6 08 48 83 ea 08 48 83 fa
> 07 77
> All code
> ========
>    0: cc                    int3
>    1: cc                    int3
>    2: cc                    int3
>    3: 48 85 c0              test   %rax,%rax
>    6: 75 f3                jne    0xfffffffffffffffb
>    8: 0f b6 4f 01          movzbl 0x1(%rdi),%ecx
>    c: 48 83 c7 01          add    $0x1,%rdi
>   10: 84 c9                test   %cl,%cl
>   12: 75 bc                jne    0xffffffffffffffd0
>   14: eb e3                jmp    0xfffffffffffffff9
>   16: 66 66 2e 0f 1f 84 00 data16 cs nopw 0x0(%rax,%rax,1)
>   1d: 00 00 00 00
>   21: 0f 1f 40 00          nopl   0x0(%rax)
>   25: eb 14                jmp    0x3b
>   27: 48 8b 06              mov    (%rsi),%rax
>   2a:* 48 39 07              cmp    %rax,(%rdi) <-- trapping instruction
>   2d: 75 17                jne    0x46
>   2f: 48 83 c7 08          add    $0x8,%rdi
>   33: 48 83 c6 08          add    $0x8,%rsi
>   37: 48 83 ea 08          sub    $0x8,%rdx
>   3b: 48 83 fa 07          cmp    $0x7,%rdx
>   3f: 77                    .byte 0x77
> 
> Code starting with the faulting instruction
> ===========================================
>    0: 48 39 07              cmp    %rax,(%rdi)
>    3: 75 17                jne    0x1c
>    5: 48 83 c7 08          add    $0x8,%rdi
>    9: 48 83 c6 08          add    $0x8,%rsi
>    d: 48 83 ea 08          sub    $0x8,%rdx
>   11: 48 83 fa 07          cmp    $0x7,%rdx
>   15: 77                    .byte 0x77
> [108431.475001] R13: 0000000000000000 R14: ffff9ebfafab0005 R15:
> ffff9ebd79a0f780
> [108431.475129] RSP: 0018:ffffac2500200ae8 EFLAGS: 00010216
> [108431.475297] FS:  0000000000000000(0000) GS:ffff9ebfafa80000(0000)
> knlGS:0000000000000000
> [108431.475426]
> [108431.475534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.475664] RAX: 000000008a00000a RBX: ffff9ebc413b4250 RCX:
> 0000000000000000
> [108431.475764] CR2: 0000000000000081 CR3: 000000045e99e000 CR4:
> 00000000003526e0
> [108431.475872] RDX: 0000000000000032 RSI: ffffac2500200ba0 RDI:
> 0000000000000008
> [108431.476001] note: kworker/2:0[76217] exited with irqs disabled
> [108431.476128] RBP: ffff9ebd42b18058 R08: 000000000000000a R09:
> 0000000000000028
> [108431.653260] R10: 00000000000000f0 R11: 00000000000000f0 R12:
> 0000000000000000
> [108431.660609] R13: ffff9ebc413b4260 R14: ffff9ebd42b18000 R15:
> 0000000000000000
> [108431.667958] FS:  0000000000000000(0000) GS:ffff9ebfafb80000(0000)
> knlGS:0000000000000000
> [108431.676260] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.682203] CR2: 0000000000000008 CR3: 0000000109310000 CR4:
> 00000000003526e0
> [108431.689555] Call Trace:
> [108431.692193]  <IRQ>
> [108431.694401] ? __die (arch/x86/kernel/dumpstack.c:421
> arch/x86/kernel/dumpstack.c:434)
> [108431.697657] ? page_fault_oops (arch/x86/mm/fault.c:707)
> [108431.701954] ? vhost_poll_wakeup (drivers/vhost/vhost.c:179)
> [108431.706244] ? __wake_up_common (kernel/sched/wait.c:108)
> [108431.710546] ? exc_page_fault (arch/x86/mm/fault.c:1279
> arch/x86/mm/fault.c:1486 arch/x86/mm/fault.c:1542)
> [108431.714756] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:570)
> [108431.719136] ? memcmp (lib/string.c:681)
> [108431.722385] flow_offload_hash_cmp (net/netfilter/nf_flow_table_core.c:253)
> [108431.726854] flow_offload_lookup (./include/linux/rhashtable.h:608
> ./include/linux/rhashtable.h:646
> net/netfilter/nf_flow_table_core.c:376)
> [108431.731234] nf_flow_offload_ip_hook (net/netfilter/nf_flow_table_ip.c:363)
> [108431.736050] ? netlink_broadcast (net/netlink/af_netlink.c:1548)
> [108431.740517] nf_hook_slow (./include/linux/netfilter.h:143
> net/netfilter/core.c:626)
> [108431.744208] __netif_receive_skb_core.constprop.0
> (./include/linux/netfilter_netdev.h:34 net/core/dev.c:5274
> net/core/dev.c:5361)
> [108431.750163] __netif_receive_skb_list_core (net/core/dev.c:5570)
> [108431.755500] netif_receive_skb_list_internal (net/core/dev.c:5638
> net/core/dev.c:5727)
> [108431.761011] napi_complete_done (./include/linux/list.h:37
> ./include/net/gro.h:434 ./include/net/gro.h:429 net/core/dev.c:6067)
> [108431.765308] ixgbe_poll (drivers/net/ethernet/intel/ixgbe/ixgbe_main.c:3191)
> [108431.769093] __napi_poll (net/core/dev.c:6498)
> [108431.772779] net_rx_action (net/core/dev.c:6567 net/core/dev.c:6698)
> [108431.776723] __do_softirq (./arch/x86/include/asm/jump_label.h:27
> ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142
> kernel/softirq.c:572)
> [108431.780501] irq_exit_rcu (kernel/softirq.c:445
> kernel/softirq.c:650 kernel/softirq.c:662)
> [108431.784194] common_interrupt (arch/x86/kernel/irq.c:240 (discriminator 14))
> [108431.788232]  </IRQ>
> [108431.790518]  <TASK>
> [108431.792808] asm_common_interrupt (./arch/x86/include/asm/idtentry.h:636)
> [108431.797194] RIP: 0010:cpuidle_enter_state (drivers/cpuidle/cpuidle.c:291)
> [108431.802358] Code: 00 e8 52 14 fd fe e8 7d fa ff ff 8b 53 04 49 89
> c5 0f 1f 44 00 00 31 ff e8 cb 83 fc fe 45 84 ff 0f 85 60 02 00 00 fb
> 45 85 f6 <0f> 88 8e 01 00 00 49 63 ce 4c 8b 14 24 48 8d 04 49 48 8d 14
> 81 48
> All code
> ========
>    0: 00 e8                add    %ch,%al
>    2: 52                    push   %rdx
>    3: 14 fd                adc    $0xfd,%al
>    5: fe                    (bad)
>    6: e8 7d fa ff ff        call   0xfffffffffffffa88
>    b: 8b 53 04              mov    0x4(%rbx),%edx
>    e: 49 89 c5              mov    %rax,%r13
>   11: 0f 1f 44 00 00        nopl   0x0(%rax,%rax,1)
>   16: 31 ff                xor    %edi,%edi
>   18: e8 cb 83 fc fe        call   0xfffffffffefc83e8
>   1d: 45 84 ff              test   %r15b,%r15b
>   20: 0f 85 60 02 00 00    jne    0x286
>   26: fb                    sti
>   27: 45 85 f6              test   %r14d,%r14d
>   2a:* 0f 88 8e 01 00 00    js     0x1be <-- trapping instruction
>   30: 49 63 ce              movslq %r14d,%rcx
>   33: 4c 8b 14 24          mov    (%rsp),%r10
>   37: 48 8d 04 49          lea    (%rcx,%rcx,2),%rax
>   3b: 48 8d 14 81          lea    (%rcx,%rax,4),%rdx
>   3f: 48                    rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>    0: 0f 88 8e 01 00 00    js     0x194
>    6: 49 63 ce              movslq %r14d,%rcx
>    9: 4c 8b 14 24          mov    (%rsp),%r10
>    d: 48 8d 04 49          lea    (%rcx,%rcx,2),%rax
>   11: 48 8d 14 81          lea    (%rcx,%rax,4),%rdx
>   15: 48                    rex.W
> [108431.821362] RSP: 0018:ffffac25000c7e98 EFLAGS: 00000202
> [108431.826787] RAX: ffff9ebfafbabb80 RBX: ffff9ebfafbb6600 RCX:
> 0000000000000000
> [108431.834135] RDX: 0000000000000006 RSI: fffffff19cf255d6 RDI:
> 0000000000000000
> [108431.841486] RBP: 0000000000000002 R08: 0000000000000000 R09:
> 0000000040000000
> [108431.848833] R10: 0000000000000018 R11: 00000000000000d4 R12:
> ffffffff8c015480
> [108431.856185] R13: 0000629e2a6170d9 R14: 0000000000000002 R15:
> 0000000000000000
> [108431.863539] ? cpuidle_enter_state (drivers/cpuidle/cpuidle.c:285)
> [108431.868104] cpuidle_enter (drivers/cpuidle/cpuidle.c:390)
> [108431.871879] do_idle (kernel/sched/idle.c:219 kernel/sched/idle.c:282)
> [108431.875305] cpu_startup_entry (kernel/sched/idle.c:378 (discriminator 1))
> [108431.879429] start_secondary (arch/x86/kernel/smpboot.c:288)
> [108431.883459] secondary_startup_64_no_verify (arch/x86/kernel/head_64.S:370)
> [108431.888714]  </TASK>
> [108431.891094] Modules linked in: chaoskey
> [108431.895132] CR2: 0000000000000008
> [108431.898647] ---[ end trace 0000000000000000 ]---
> [108431.898648] BUG: kernel NULL pointer dereference, address: 0000000000000008
> [108431.910630] #PF: supervisor read access in kernel mode
> [108431.915969] #PF: error_code(0x0000) - not-present page
> [108431.916671] RIP: 0010:flow_offload_teardown
> (./arch/x86/include/asm/bitops.h:75
> ./include/asm-generic/bitops/instrumented-atomic.h:42
> net/netfilter/nf_flow_table_core.c:362)
> [108431.921305] PGD 0
> [108431.921416] Code: 00 00 e9 96 fd ff ff 66 0f 1f 44 00 00 48 83 c7
> 08 be 32 00 00 00 e9 82 fd ff ff 66 90 48 8b 87 b0 00 00 00 48 05 81
> 00 00 00 <f0> 80 20 bf f0 80 8f b8 00 00 00 04 48 8b 97 b0 00 00 00 0f
> b6 42
> All code
> ========
>    0: 00 00                add    %al,(%rax)
>    2: e9 96 fd ff ff        jmp    0xfffffffffffffd9d
>    7: 66 0f 1f 44 00 00    nopw   0x0(%rax,%rax,1)
>    d: 48 83 c7 08          add    $0x8,%rdi
>   11: be 32 00 00 00        mov    $0x32,%esi
>   16: e9 82 fd ff ff        jmp    0xfffffffffffffd9d
>   1b: 66 90                xchg   %ax,%ax
>   1d: 48 8b 87 b0 00 00 00 mov    0xb0(%rdi),%rax
>   24: 48 05 81 00 00 00    add    $0x81,%rax
>   2a:* f0 80 20 bf          lock andb $0xbf,(%rax) <-- trapping instruction
>   2e: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>   35: 04
>   36: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   3d: 0f                    .byte 0xf
>   3e: b6 42                mov    $0x42,%dh
> 
> Code starting with the faulting instruction
> ===========================================
>    0: f0 80 20 bf          lock andb $0xbf,(%rax)
>    4: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>    b: 04
>    c: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   13: 0f                    .byte 0xf
>   14: b6 42                mov    $0x42,%dh
> [108431.926468] P4D 0
> [108431.926568] RSP: 0018:ffffac250ade7e28 EFLAGS: 00010206
> [108431.926738]
> [108431.926839]
> [108431.926946] Oops: 0000 [#3] PREEMPT SMP NOPTI
> [108431.927044] RAX: 0000000000000081 RBX: ffff9ebc413b42f8 RCX:
> 0000000000000001
> [108431.927145] CPU: 10 PID: 986 Comm: CPU 1/KVM Tainted: G      D
>        6.4.4-dirty #381
> [108431.927249] RDX: 00000001067200c0 RSI: ffff9ebeda71ce58 RDI:
> ffff9ebeda71ce58
> [108431.927377] Hardware name: Supermicro Super
> Server/A2SDi-12C-HLN4F, BIOS 1.7a 10/13/2022
> [108431.927508] RBP: ffff9ebc413b4250 R08: ffff9ebc413b4250 R09:
> ffff9ebe3d7fad58
> [108431.927635] RIP: 0010:memcmp (lib/string.c:681)
> [108431.927765] R10: 0000000000000000 R11: 0000000000000003 R12:
> ffff9ebfafab0000
> [108431.927893] Code: cc cc cc 48 85 c0 75 f3 0f b6 4f 01 48 83 c7 01
> 84 c9 75 bc eb e3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 eb 14
> 48 8b 06 <48> 39 07 75 17 48 83 c7 08 48 83 c6 08 48 83 ea 08 48 83 fa
> 07 77
> All code
> ========
>    0: cc                    int3
>    1: cc                    int3
>    2: cc                    int3
>    3: 48 85 c0              test   %rax,%rax
>    6: 75 f3                jne    0xfffffffffffffffb
>    8: 0f b6 4f 01          movzbl 0x1(%rdi),%ecx
>    c: 48 83 c7 01          add    $0x1,%rdi
>   10: 84 c9                test   %cl,%cl
>   12: 75 bc                jne    0xffffffffffffffd0
>   14: eb e3                jmp    0xfffffffffffffff9
>   16: 66 66 2e 0f 1f 84 00 data16 cs nopw 0x0(%rax,%rax,1)
>   1d: 00 00 00 00
>   21: 0f 1f 40 00          nopl   0x0(%rax)
>   25: eb 14                jmp    0x3b
>   27: 48 8b 06              mov    (%rsi),%rax
>   2a:* 48 39 07              cmp    %rax,(%rdi) <-- trapping instruction
>   2d: 75 17                jne    0x46
>   2f: 48 83 c7 08          add    $0x8,%rdi
>   33: 48 83 c6 08          add    $0x8,%rsi
>   37: 48 83 ea 08          sub    $0x8,%rdx
>   3b: 48 83 fa 07          cmp    $0x7,%rdx
>   3f: 77                    .byte 0x77
> 
> Code starting with the faulting instruction
> ===========================================
>    0: 48 39 07              cmp    %rax,(%rdi)
>    3: 75 17                jne    0x1c
>    5: 48 83 c7 08          add    $0x8,%rdi
>    9: 48 83 c6 08          add    $0x8,%rsi
>    d: 48 83 ea 08          sub    $0x8,%rdx
>   11: 48 83 fa 07          cmp    $0x7,%rdx
>   15: 77                    .byte 0x77
> [108431.927997] R13: 0000000000000000 R14: ffff9ebfafab0005 R15:
> ffff9ebd79a0f780
> 
> [108431.928294] FS:  0000000000000000(0000) GS:ffff9ebfafb80000(0000)
> knlGS:0000000000000000
> [108431.928421]
> [108431.928529] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.928658] RAX: 00000000af00000a RBX: ffff9ebc413b4250 RCX:
> 0000000000000000
> [108431.928758] CR2: 0000000000000008 CR3: 0000000109310000 CR4:
> 00000000003526e0
> [108431.928866] RDX: 0000000000000032 RSI: ffffac25002b0ba0 RDI:
> 0000000000000008
> [108431.928996] Kernel panic - not syncing: Fatal exception in interrupt
> [108431.929123] RBP: ffff9ebd42b18058 R08: 000000000000000a R09:
> 000000000000001c
> [108431.929254] R10: 000000000000006b R11: 000000000000006b R12:
> 0000000000000000
> [108431.930351] R13: ffff9ebc413b4260 R14: ffff9ebd42b18000 R15:
> 0000000000000000
> [108431.930482] FS:  00007f50a75fe6c0(0000) GS:ffff9ebfafc80000(0000)
> knlGS:0000000000000000
> [108431.930615] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.930746] CR2: 0000000000000008 CR3: 0000000109310000 CR4:
> 00000000003526e0
> [108431.930879] Call Trace:
> [108431.930992]  <IRQ>
> [108431.931124] ? __die (arch/x86/kernel/dumpstack.c:421
> arch/x86/kernel/dumpstack.c:434)
> [108431.931236] ? page_fault_oops (arch/x86/mm/fault.c:707)
> [108431.931347] ? vhost_poll_wakeup (drivers/vhost/vhost.c:179)
> [108431.931456] ? __wake_up_common (kernel/sched/wait.c:108)
> [108431.931572] ? exc_page_fault (arch/x86/mm/fault.c:1279
> arch/x86/mm/fault.c:1486 arch/x86/mm/fault.c:1542)
> [108431.931685] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:570)
> [108431.931801] ? memcmp (lib/string.c:681)
> [108431.931912] flow_offload_hash_cmp (net/netfilter/nf_flow_table_core.c:253)
> [108431.932023] flow_offload_lookup (./include/linux/rhashtable.h:608
> ./include/linux/rhashtable.h:646
> net/netfilter/nf_flow_table_core.c:376)
> [108431.932133] nf_flow_offload_ip_hook (net/netfilter/nf_flow_table_ip.c:363)
> [108431.932245] ? netif_receive_skb (net/core/dev.c:5695 net/core/dev.c:5752)
> [108431.932358] ? reuseport_select_sock (net/core/sock_reuseport.c:609)
> [108431.932476] nf_hook_slow (./include/linux/netfilter.h:143
> net/netfilter/core.c:626)
> [108431.932591] __netif_receive_skb_core.constprop.0
> (./include/linux/netfilter_netdev.h:34 net/core/dev.c:5274
> net/core/dev.c:5361)
> [108431.932709] __netif_receive_skb_list_core (net/core/dev.c:5570)
> [108431.932822] netif_receive_skb_list_internal (net/core/dev.c:5638
> net/core/dev.c:5727)
> [108431.932938] ? napi_gro_flush (net/core/gro.c:342 net/core/gro.c:361)
> [108431.933052] napi_complete_done (./include/linux/list.h:37
> ./include/net/gro.h:434 ./include/net/gro.h:429 net/core/dev.c:6067)
> [108431.933166] ixgbe_poll (drivers/net/ethernet/intel/ixgbe/ixgbe_main.c:3191)
> [108431.933281] ? timekeeping_advance (kernel/time/timekeeping.c:2223
> (discriminator 5))
> [108431.933395] __napi_poll (net/core/dev.c:6498)
> [108431.933506] net_rx_action (net/core/dev.c:6567 net/core/dev.c:6698)
> [108431.933621] __do_softirq (./arch/x86/include/asm/jump_label.h:27
> ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142
> kernel/softirq.c:572)
> [108431.933734] irq_exit_rcu (kernel/softirq.c:445
> kernel/softirq.c:650 kernel/softirq.c:662)
> [108431.933847] common_interrupt (arch/x86/kernel/irq.c:240 (discriminator 14))
> [108431.933958]  </IRQ>
> [108431.934063]  <TASK>
> [108431.934168] asm_common_interrupt (./arch/x86/include/asm/idtentry.h:636)
> [108431.934277] RIP: 0010:vmx_set_hv_timer (arch/x86/kvm/vmx/vmx.c:7947)
> [108431.934389] Code: 5b c3 cc cc cc cc 31 f6 48 89 df e8 7a dd 01 00
> 85 c0 75 ec c6 83 da 1f 00 00 01 31 c0 c6 83 e9 21 00 00 00 eb da 0f
> 1f 40 00 <41> 56 41 55 41 54 49 89 fc 55 48 89 d5 53 48 89 f3 4c 8b b7
> 08 02
> All code
> ========
>    0: 5b                    pop    %rbx
>    1: c3                    ret
>    2: cc                    int3
>    3: cc                    int3
>    4: cc                    int3
>    5: cc                    int3
>    6: 31 f6                xor    %esi,%esi
>    8: 48 89 df              mov    %rbx,%rdi
>    b: e8 7a dd 01 00        call   0x1dd8a
>   10: 85 c0                test   %eax,%eax
>   12: 75 ec                jne    0x0
>   14: c6 83 da 1f 00 00 01 movb   $0x1,0x1fda(%rbx)
>   1b: 31 c0                xor    %eax,%eax
>   1d: c6 83 e9 21 00 00 00 movb   $0x0,0x21e9(%rbx)
>   24: eb da                jmp    0x0
>   26: 0f 1f 40 00          nopl   0x0(%rax)
>   2a:* 41 56                push   %r14 <-- trapping instruction
>   2c: 41 55                push   %r13
>   2e: 41 54                push   %r12
>   30: 49 89 fc              mov    %rdi,%r12
>   33: 55                    push   %rbp
>   34: 48 89 d5              mov    %rdx,%rbp
>   37: 53                    push   %rbx
>   38: 48 89 f3              mov    %rsi,%rbx
>   3b: 4c                    rex.WR
>   3c: 8b                    .byte 0x8b
>   3d: b7 08                mov    $0x8,%bh
>   3f: 02                    .byte 0x2
> 
> Code starting with the faulting instruction
> ===========================================
>    0: 41 56                push   %r14
>    2: 41 55                push   %r13
>    4: 41 54                push   %r12
>    6: 49 89 fc              mov    %rdi,%r12
>    9: 55                    push   %rbp
>    a: 48 89 d5              mov    %rdx,%rbp
>    d: 53                    push   %rbx
>    e: 48 89 f3              mov    %rsi,%rbx
>   11: 4c                    rex.WR
>   12: 8b                    .byte 0x8b
>   13: b7 08                mov    $0x8,%bh
>   15: 02                    .byte 0x2
> [108431.934498] RSP: 0018:ffffac2503c7fdb0 EFLAGS: 00000206
> [108431.934776] RAX: 0000000000000000 RBX: ffff9ebc49303200 RCX:
> 0000000000000000
> [108431.934886] RDX: ffffac2503c7fdbf RSI: 0000c534e9ede5fa RDI:
> ffff9ebcf5bb23c0
> [108431.935017] RBP: ffff9ebcf5bb23c0 R08: 0000000000000000 R09:
> ffffac2503c7fd0c
> [108431.935148] R10: 0000000000000000 R11: 0000000000000022 R12:
> ffff9ebc4ca4d000
> [108431.935278] R13: ffff9ebcfaea5d00 R14: 0000000000000003 R15:
> ffff9ebcf5bb23c0
> [108431.935413] restart_apic_timer (arch/x86/kvm/lapic.c:2085
> arch/x86/kvm/lapic.c:2138)
> [108431.935552] kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:10887
> arch/x86/kvm/x86.c:10954 arch/x86/kvm/x86.c:11173)
> [108431.935666] ? kvm_vm_ioctl_irq_line (arch/x86/kvm/x86.c:6241)
> [108431.935778] kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4124)
> [108431.935891] ? net_rx_action (net/core/dev.c:6567 net/core/dev.c:6698)
> [108431.936003] ? __seccomp_filter (kernel/seccomp.c:1207)
> [108431.936120] __x64_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:870
> fs/ioctl.c:856 fs/ioctl.c:856)
> [108431.936235] do_syscall_64 (arch/x86/entry/common.c:50
> arch/x86/entry/common.c:80)
> [108431.936346] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
> [108431.936457] RIP: 0033:0x7f512ebfda3c
> [108431.936570] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 48 89 44
> 24 08 48 8d 44 24 20 48 89 44 24 10 c7 04 24 10 00 00 00 b8 10 00 00
> 00 0f 05 <3d> 00 f0 ff ff 89 c2 77 1b 48 8b 44 24 18 64 48 2b 04 25 28
> 00 00
> All code
> ========
>    0: 00 48 89              add    %cl,-0x77(%rax)
>    3: 44 24 18              rex.R and $0x18,%al
>    6: 31 c0                xor    %eax,%eax
>    8: 48 8d 44 24 60        lea    0x60(%rsp),%rax
>    d: 48 89 44 24 08        mov    %rax,0x8(%rsp)
>   12: 48 8d 44 24 20        lea    0x20(%rsp),%rax
>   17: 48 89 44 24 10        mov    %rax,0x10(%rsp)
>   1c: c7 04 24 10 00 00 00 movl   $0x10,(%rsp)
>   23: b8 10 00 00 00        mov    $0x10,%eax
>   28: 0f 05                syscall
>   2a:* 3d 00 f0 ff ff        cmp    $0xfffff000,%eax <-- trapping instruction
>   2f: 89 c2                mov    %eax,%edx
>   31: 77 1b                ja     0x4e
>   33: 48 8b 44 24 18        mov    0x18(%rsp),%rax
>   38: 64                    fs
>   39: 48                    rex.W
>   3a: 2b                    .byte 0x2b
>   3b: 04 25                add    $0x25,%al
>   3d: 28 00                sub    %al,(%rax)
> ...
> 
> Code starting with the faulting instruction
> ===========================================
>    0: 3d 00 f0 ff ff        cmp    $0xfffff000,%eax
>    5: 89 c2                mov    %eax,%edx
>    7: 77 1b                ja     0x24
>    9: 48 8b 44 24 18        mov    0x18(%rsp),%rax
>    e: 64                    fs
>    f: 48                    rex.W
>   10: 2b                    .byte 0x2b
>   11: 04 25                add    $0x25,%al
>   13: 28 00                sub    %al,(%rax)
> ...
> [108431.936678] RSP: 002b:00007f50a75fd5a0 EFLAGS: 00000246 ORIG_RAX:
> 0000000000000010
> [108431.936979] RAX: ffffffffffffffda RBX: 0000556810191420 RCX:
> 00007f512ebfda3c
> [108431.937110] RDX: 0000000000000000 RSI: 000000000000ae80 RDI:
> 000000000000001c
> [108431.937240] RBP: 000000000000ae80 R08: 000055680eb3bdf0 R09:
> 00000000000000ff
> [108431.937371] R10: 0000000000000002 R11: 0000000000000246 R12:
> 0000000000000000
> [108431.937501] R13: 0000000000000001 R14: 0000000000000001 R15:
> 0000000000000000
> [108431.937634]  </TASK>
> [108431.937736] Modules linked in: chaoskey
> [108431.937851] CR2: 0000000000000008
> [108431.937959] ---[ end trace 0000000000000000 ]---
> [108431.937962] BUG: kernel NULL pointer dereference, address: 0000000000000000
> [108431.937972] #PF: supervisor read access in kernel mode
> [108431.937977] #PF: error_code(0x0000) - not-present page
> [108431.937982] PGD 0 P4D 0
> [108431.937989] Oops: 0000 [#4] PREEMPT SMP NOPTI
> [108431.937997] CPU: 3 PID: 74552 Comm: kworker/3:1 Tainted: G      D
>           6.4.4-dirty #381
> [108431.938006] Hardware name: Supermicro Super
> Server/A2SDi-12C-HLN4F, BIOS 1.7a 10/13/2022
> [108431.938009] Workqueue: events rht_deferred_worker
> [108431.938026] RIP: 0010:rht_deferred_worker (lib/rhashtable.c:244
> lib/rhashtable.c:288 lib/rhashtable.c:328 lib/rhashtable.c:432)
> [108431.938038] Code: 00 48 83 e2 fe 48 0f 44 14 24 48 89 d0 f6 c2 01
> 0f 85 af 01 00 00 48 8b 2a 40 f6 c5 01 74 0b e9 87 02 00 00 48 89 e8
> 4c 89 e5 <4c> 8b 65 00 41 f6 c4 01 74 f0 48 89 c3 41 0f b7 56 d6 49 8b
> 46 e8
> All code
> ========
>    0: 00 48 83              add    %cl,-0x7d(%rax)
>    3: e2 fe                loop   0x3
>    5: 48 0f 44 14 24        cmove  (%rsp),%rdx
>    a: 48 89 d0              mov    %rdx,%rax
>    d: f6 c2 01              test   $0x1,%dl
>   10: 0f 85 af 01 00 00    jne    0x1c5
>   16: 48 8b 2a              mov    (%rdx),%rbp
>   19: 40 f6 c5 01          test   $0x1,%bpl
>   1d: 74 0b                je     0x2a
>   1f: e9 87 02 00 00        jmp    0x2ab
>   24: 48 89 e8              mov    %rbp,%rax
>   27: 4c 89 e5              mov    %r12,%rbp
>   2a:* 4c 8b 65 00          mov    0x0(%rbp),%r12 <-- trapping instruction
>   2e: 41 f6 c4 01          test   $0x1,%r12b
>   32: 74 f0                je     0x24
>   34: 48 89 c3              mov    %rax,%rbx
>   37: 41 0f b7 56 d6        movzwl -0x2a(%r14),%edx
>   3c: 49 8b 46 e8          mov    -0x18(%r14),%rax
> 
> Code starting with the faulting instruction
> ===========================================
>    0: 4c 8b 65 00          mov    0x0(%rbp),%r12
>    4: 41 f6 c4 01          test   $0x1,%r12b
>    8: 74 f0                je     0xfffffffffffffffa
>    a: 48 89 c3              mov    %rax,%rbx
>    d: 41 0f b7 56 d6        movzwl -0x2a(%r14),%edx
>   12: 49 8b 46 e8          mov    -0x18(%r14),%rax
> [108431.938044] RSP: 0018:ffffac2509a83e30 EFLAGS: 00010046
> [108431.938050] RAX: ffff9ebeda71ce58 RBX: 0000000000000000 RCX:
> ffff9ebd42b18000
> [108431.938055] RDX: ffff9ebeda71ce58 RSI: 0000000000000006 RDI:
> ffff9ebd42b18000
> [108431.938059] RBP: 0000000000000000 R08: 00000000de58e2a2 R09:
> 0000000000000000
> [108431.938063] R10: ffffffff8b1dd610 R11: 0000000000000000 R12:
> ffff9ebd42b18049
> [108431.938066] R13: ffff9ebd42b18058 R14: ffff9ebc413b42a0 R15:
> ffff9ebc985cc800
> [108431.938191] FS:  0000000000000000(0000) GS:ffff9ebfafac0000(0000)
> knlGS:0000000000000000
> [108431.938304] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.938415] CR2: 0000000000000000 CR3: 000000044b69a000 CR4:
> 00000000003526e0
> [108431.938520] Call Trace:
> [108431.938630]  <TASK>
> [108431.938766] ? __die (arch/x86/kernel/dumpstack.c:421
> arch/x86/kernel/dumpstack.c:434)
> [108431.938906] ? page_fault_oops (arch/x86/mm/fault.c:707)
> [108431.939025] ? exc_page_fault (arch/x86/mm/fault.c:1279
> arch/x86/mm/fault.c:1486 arch/x86/mm/fault.c:1542)
> [108431.939143] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:570)
> [108431.939320] ? flow_offload_fill_dir (net/netfilter/nf_flow_table_core.c:237)
> [108431.939440] ? rht_deferred_worker (lib/rhashtable.c:244
> lib/rhashtable.c:288 lib/rhashtable.c:328 lib/rhashtable.c:432)
> [108431.939580] process_one_work (kernel/workqueue.c:2413)
> [108431.939720] worker_thread (./include/linux/list.h:292
> kernel/workqueue.c:2556)
> [108431.939857] ? rescuer_thread (kernel/workqueue.c:2498)
> [108431.939993] kthread (kernel/kthread.c:379)
> [108431.940128] ? kthread_complete_and_exit (kernel/kthread.c:332)
> [108431.940267] ret_from_fork (arch/x86/entry/entry_64.S:314)
> [108431.940385]  </TASK>
> [108431.940514] Modules linked in: chaoskey
> [108431.940823] CR2: 0000000000000000
> [108431.941035] ---[ end trace 0000000000000000 ]---
> [108431.957494] RIP: 0010:flow_offload_teardown
> (./arch/x86/include/asm/bitops.h:75
> ./include/asm-generic/bitops/instrumented-atomic.h:42
> net/netfilter/nf_flow_table_core.c:362)
> [108431.957615] Code: 00 00 e9 96 fd ff ff 66 0f 1f 44 00 00 48 83 c7
> 08 be 32 00 00 00 e9 82 fd ff ff 66 90 48 8b 87 b0 00 00 00 48 05 81
> 00 00 00 <f0> 80 20 bf f0 80 8f b8 00 00 00 04 48 8b 97 b0 00 00 00 0f
> b6 42
> All code
> ========
>    0: 00 00                add    %al,(%rax)
>    2: e9 96 fd ff ff        jmp    0xfffffffffffffd9d
>    7: 66 0f 1f 44 00 00    nopw   0x0(%rax,%rax,1)
>    d: 48 83 c7 08          add    $0x8,%rdi
>   11: be 32 00 00 00        mov    $0x32,%esi
>   16: e9 82 fd ff ff        jmp    0xfffffffffffffd9d
>   1b: 66 90                xchg   %ax,%ax
>   1d: 48 8b 87 b0 00 00 00 mov    0xb0(%rdi),%rax
>   24: 48 05 81 00 00 00    add    $0x81,%rax
>   2a:* f0 80 20 bf          lock andb $0xbf,(%rax) <-- trapping instruction
>   2e: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>   35: 04
>   36: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   3d: 0f                    .byte 0xf
>   3e: b6 42                mov    $0x42,%dh
> 
> Code starting with the faulting instruction
> ===========================================
>    0: f0 80 20 bf          lock andb $0xbf,(%rax)
>    4: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>    b: 04
>    c: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   13: 0f                    .byte 0xf
>   14: b6 42                mov    $0x42,%dh
> [108431.957727] RSP: 0018:ffffac250ade7e28 EFLAGS: 00010206
> [108431.957940] RAX: 0000000000000081 RBX: ffff9ebc413b42f8 RCX:
> 0000000000000001
> [108431.958048] RDX: 00000001067200c0 RSI: ffff9ebeda71ce58 RDI:
> ffff9ebeda71ce58
> [108431.958155] RBP: ffff9ebc413b4250 R08: ffff9ebc413b4250 R09:
> ffff9ebe3d7fad58
> [108431.958265] R10: 0000000000000000 R11: 0000000000000003 R12:
> ffff9ebfafab0000
> [108431.958372] R13: 0000000000000000 R14: ffff9ebfafab0005 R15:
> ffff9ebd79a0f780
> [108431.958477] FS:  00007f50a75fe6c0(0000) GS:ffff9ebfafc80000(0000)
> knlGS:0000000000000000
> [108431.958587] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.958694] CR2: 0000000000000008 CR3: 0000000109310000 CR4:
> 00000000003526e0
> [108431.977125] RIP: 0010:flow_offload_teardown
> (./arch/x86/include/asm/bitops.h:75
> ./include/asm-generic/bitops/instrumented-atomic.h:42
> net/netfilter/nf_flow_table_core.c:362)
> [108431.977247] Code: 00 00 e9 96 fd ff ff 66 0f 1f 44 00 00 48 83 c7
> 08 be 32 00 00 00 e9 82 fd ff ff 66 90 48 8b 87 b0 00 00 00 48 05 81
> 00 00 00 <f0> 80 20 bf f0 80 8f b8 00 00 00 04 48 8b 97 b0 00 00 00 0f
> b6 42
> All code
> ========
>    0: 00 00                add    %al,(%rax)
>    2: e9 96 fd ff ff        jmp    0xfffffffffffffd9d
>    7: 66 0f 1f 44 00 00    nopw   0x0(%rax,%rax,1)
>    d: 48 83 c7 08          add    $0x8,%rdi
>   11: be 32 00 00 00        mov    $0x32,%esi
>   16: e9 82 fd ff ff        jmp    0xfffffffffffffd9d
>   1b: 66 90                xchg   %ax,%ax
>   1d: 48 8b 87 b0 00 00 00 mov    0xb0(%rdi),%rax
>   24: 48 05 81 00 00 00    add    $0x81,%rax
>   2a:* f0 80 20 bf          lock andb $0xbf,(%rax) <-- trapping instruction
>   2e: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>   35: 04
>   36: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   3d: 0f                    .byte 0xf
>   3e: b6 42                mov    $0x42,%dh
> 
> Code starting with the faulting instruction
> ===========================================
>    0: f0 80 20 bf          lock andb $0xbf,(%rax)
>    4: f0 80 8f b8 00 00 00 lock orb $0x4,0xb8(%rdi)
>    b: 04
>    c: 48 8b 97 b0 00 00 00 mov    0xb0(%rdi),%rdx
>   13: 0f                    .byte 0xf
>   14: b6 42                mov    $0x42,%dh
> [108431.977421] RSP: 0018:ffffac250ade7e28 EFLAGS: 00010206
> [108431.977661] RAX: 0000000000000081 RBX: ffff9ebc413b42f8 RCX:
> 0000000000000001
> [108431.977792] RDX: 00000001067200c0 RSI: ffff9ebeda71ce58 RDI:
> ffff9ebeda71ce58
> [108431.977923] RBP: ffff9ebc413b4250 R08: ffff9ebc413b4250 R09:
> ffff9ebe3d7fad58
> [108431.978054] R10: 0000000000000000 R11: 0000000000000003 R12:
> ffff9ebfafab0000
> [108431.978184] R13: 0000000000000000 R14: ffff9ebfafab0005 R15:
> ffff9ebd79a0f780
> [108431.978317] FS:  0000000000000000(0000) GS:ffff9ebfafac0000(0000)
> knlGS:0000000000000000
> [108431.978430] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [108431.978561] CR2: 0000000000000000 CR3: 000000044b69a000 CR4:
> 00000000003526e0
> [108431.978671] note: kworker/3:1[74552] exited with irqs disabled
> [108433.230657] Shutting down cpus with NMI
> [108434.330988] Kernel Offset: 0x9200000 from 0xffffffff81000000
> (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
> [108434.361885] ---[ end Kernel panic - not syncing: Fatal exception
> in interrupt ]---
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ