lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Wed, 25 Mar 2015 22:41:13 -0700
From:	Tom Herbert <tom@...bertland.com>
To:	Stephen Hemminger <stephen@...workplumber.org>
Cc:	netdev@...r.kernel.org
Subject: Re: Fw: [Bug 95171] New: "hw csum failure" message flood for ppp
 tunnel since upgrade to 3.16

On Wed, Mar 25, 2015 at 5:38 PM, Stephen Hemminger
<stephen@...workplumber.org> wrote:
>
>
> Begin forwarded message:
>
> Date: Fri, 20 Mar 2015 22:30:53 +0000
> From: "bugzilla-daemon@...zilla.kernel.org" <bugzilla-daemon@...zilla.kernel.org>
> To: "shemminger@...ux-foundation.org" <shemminger@...ux-foundation.org>
> Subject: [Bug 95171] New: "hw csum failure" message flood for ppp tunnel since upgrade to 3.16
>

Looks like we need some skb_postpull_rcsum in ppp_generic.c. Should be
pretty straightforward, but I probably won't be able to get to it till
next week...

Tom

>
> https://bugzilla.kernel.org/show_bug.cgi?id=95171
>
>             Bug ID: 95171
>            Summary: "hw csum failure" message flood for ppp tunnel since
>                     upgrade to 3.16
>            Product: Networking
>            Version: 2.5
>     Kernel Version: 3.16
>           Hardware: x86-64
>                 OS: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: IPV4
>           Assignee: shemminger@...ux-foundation.org
>           Reporter: dkocher@...il.com
>         Regression: Yes
>
> Since upgrade from 3.15 to 3.16 the following error is flooding my message
> file:
>
> Oct  1 10:49:23 afftar kernel: [    9.558032] ppp0: hw csum failure
> Oct  1 10:49:23 afftar kernel: [    9.558041] CPU: 1 PID: 1000 Comm: java Not
> tainted 3.16.3-200.fc20.x86_64 #1
> Oct  1 10:49:23 afftar kernel: [    9.558044] Hardware name: System
> manufacturer System Product Name/M3N-H/HDMI, BIOS ASUS M3N-H/HDMI ACPI BIOS
> Revision 2701 09/27/2010
> Oct  1 10:49:23 afftar kernel: [    9.558046]  0000000000000000
> 000000007cd0c47e ffff880127c43b60 ffffffff81707091
> Oct  1 10:49:23 afftar kernel: [    9.558050]  ffff8800bb1a2000
> ffff880127c43b78 ffffffff815f54ea ffff8800cafdbb00
> Oct  1 10:49:23 afftar kernel: [    9.558053]  ffff880127c43ba8
> ffffffff815ecd2a 1763efe1cafdbb00 ffff8800cafdbb00
> Oct  1 10:49:23 afftar kernel: [    9.558056] Call Trace:
> Oct  1 10:49:23 afftar kernel: [    9.558058]  <IRQ>  [<ffffffff81707091>]
> dump_stack+0x45/0x56
> Oct  1 10:49:23 afftar kernel: [    9.558070]  [<ffffffff815f54ea>]
> netdev_rx_csum_fault+0x3a/0x40
> Oct  1 10:49:23 afftar kernel: [    9.558075]  [<ffffffff815ecd2a>]
> __skb_checksum_complete+0xaa/0xb0
> Oct  1 10:49:23 afftar kernel: [    9.558079]  [<ffffffff816874fc>]
> nf_ip_checksum+0xcc/0x100
> Oct  1 10:49:23 afftar kernel: [    9.558095]  [<ffffffffa03fb573>]
> udp_error+0x103/0x200 [nf_conntrack]
> Oct  1 10:49:23 afftar kernel: [    9.558100]  [<ffffffffa0507e30>] ?
> pppol2tp_seq_show+0x2d0/0x2d0 [l2tp_ppp]
> Oct  1 10:49:23 afftar kernel: [    9.558106]  [<ffffffffa03f4873>]
> nf_conntrack_in+0xf3/0xab0 [nf_conntrack]
> Oct  1 10:49:23 afftar kernel: [    9.558111]  [<ffffffff816357b0>] ?
> ip_rcv_finish+0x350/0x350
> Oct  1 10:49:23 afftar kernel: [    9.558114]  [<ffffffff81635460>] ?
> inet_del_offload+0x40/0x40
> Oct  1 10:49:23 afftar kernel: [    9.558119]  [<ffffffffa04312f2>]
> ipv4_conntrack_in+0x22/0x30 [nf_conntrack_ipv4]
> Oct  1 10:49:23 afftar kernel: [    9.558122]  [<ffffffff8162c45a>]
> nf_iterate+0xaa/0xc0
> Oct  1 10:49:23 afftar kernel: [    9.558125]  [<ffffffff81635460>] ?
> inet_del_offload+0x40/0x40
> Oct  1 10:49:23 afftar kernel: [    9.558127]  [<ffffffff8162c4f4>]
> nf_hook_slow+0x84/0x140
> Oct  1 10:49:23 afftar kernel: [    9.558130]  [<ffffffff81635460>] ?
> inet_del_offload+0x40/0x40
> Oct  1 10:49:23 afftar kernel: [    9.558133]  [<ffffffff81635e88>]
> ip_rcv+0x2f8/0x3d0
> Oct  1 10:49:23 afftar kernel: [    9.558136]  [<ffffffff815f82a2>]
> __netif_receive_skb_core+0x562/0x790
> Oct  1 10:49:23 afftar kernel: [    9.558139]  [<ffffffff815f84e8>]
> __netif_receive_skb+0x18/0x60
> Oct  1 10:49:23 afftar kernel: [    9.558142]  [<ffffffff815f91ce>]
> process_backlog+0x9e/0x150
> Oct  1 10:49:23 afftar kernel: [    9.558145]  [<ffffffff815f8989>]
> net_rx_action+0x149/0x240
> Oct  1 10:49:23 afftar kernel: [    9.558149]  [<ffffffff810924d5>]
> __do_softirq+0xf5/0x2a0
> Oct  1 10:49:23 afftar kernel: [    9.558152]  [<ffffffff810928ed>]
> irq_exit+0xbd/0xd0
> Oct  1 10:49:23 afftar kernel: [    9.558156]  [<ffffffff81711408>]
> do_IRQ+0x58/0xf0
> Oct  1 10:49:23 afftar kernel: [    9.558159]  [<ffffffff8170f1ed>]
> common_interrupt+0x6d/0x6d
>
> It did not happen with 3.15.10, and started to happen with 3.16 and all never
> versions (last one checked - 3.18.9).
>
> I was able to determine the commit which introduced it for me:
>
> =====
> commit    5d0c2b95bc57cf8fdc0e7b3e9d7e751eb65ad052
>
> net: Preserve CHECKSUM_COMPLETE at validation
>
> Currently when the first checksum in a packet is validated using
> CHECKSUM_COMPLETE, ip_summed is overwritten to be CHECKSUM_UNNECESSARY so that
> any subsequent checksums in the packet are not correctly validated.
>
> This patch adds csum_valid flag in sk_buff and uses that to indicate validated
> checksum instead of setting CHECKSUM_UNNECESSARY. The bit is set accordingly in
> the skb_checksum_validate_* functions. The flag is checked in
> skb_checksum_complete, so that validation is communicated between checksum_init
> and checksum_complete sequence in TCP and UDP.
>
> Signed-off-by: Tom Herbert <therbert@...gle.com>
> Signed-off-by: David S. Miller <davem@...emloft.net>
> =====
>
> Later there were more fixes related to checksum computation, but neither of
> those fixes mine (related to ppp/l2tp tunnel). All work seems to had been done
> by Tom Herbert so please assign this report to him as possible.
>
> There are several reports for this issue, it's not only me:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1148612
> https://bugzilla.redhat.com/show_bug.cgi?id=1200635
> https://lkml.org/lkml/2015/2/16/472
>
> It is easily reproducible here, feel free to contact me for more information.
>
> --
> You are receiving this mail because:
> You are the assignee for the bug.
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ