lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 19 Mar 2024 10:00:08 +0100
From: Igor Raits <igor@...ddata.com>
To: kvm@...r.kernel.org, virtualization@...ts.linux.dev, 
	netdev@...r.kernel.org
Cc: Stefano Garzarella <sgarzare@...hat.com>, Stefan Hajnoczi <stefanha@...hat.com>, 
	Jaroslav Pulchart <jaroslav.pulchart@...ddata.com>
Subject: REGRESSION: RIP: 0010:skb_release_data+0xb8/0x1e0 in vhost/tun

Hello,

We have started to observe kernel crashes on 6.7.y kernels (atm we
have hit the issue 5 times on 6.7.5 and 6.7.10). On 6.6.9 where we
have nodes of cluster it looks stable. Please see stacktrace below. If
you need more information please let me know.

We do not have a consistent reproducer but when we put some bigger
network load on a VM, the hypervisor's kernel crashes.

Help is much appreciated! We are happy to test any patches.

[62254.167584] stack segment: 0000 [#1] PREEMPT SMP NOPTI
[62254.173450] CPU: 63 PID: 11939 Comm: vhost-11890 Tainted: G
   E      6.7.10-1.gdc.el9.x86_64 #1
[62254.183743] Hardware name: Dell Inc. PowerEdge R7525/0H3K7P, BIOS
2.14.1 12/17/2023
[62254.192083] RIP: 0010:skb_release_data+0xb8/0x1e0
[62254.197357] Code: 48 83 c3 01 39 d8 7e 54 48 89 d8 48 c1 e0 04 41
80 7d 7e 00 49 8b 6c 04 30 79 0f 44 89 f6 48 89 ef e8 4c e4 ff ff 84
c0 75 d0 <48> 8b 45 08 a8 01 0f 85 09 01 00 00 e9 d9 00 00 00 0f 1f 44
00 00
[62254.217013] RSP: 0018:ffffa975a0247ba8 EFLAGS: 00010206
[62254.222692] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000785
[62254.230263] RDX: 0000000000000016 RSI: 0000000000000002 RDI: ffff989862b32b00
[62254.237878] RBP: 4f2b318c69a8b0f9 R08: 000000000001fe4d R09: 000000000000003a
[62254.245417] R10: 0000000000000000 R11: 0000000000001736 R12: ffff9880b819aec0
[62254.252963] R13: ffff989862b32b00 R14: 0000000000000000 R15: 0000000000000002
[62254.260591] FS:  00007f6cf388bf80(0000) GS:ffff98b85fbc0000(0000)
knlGS:0000000000000000
[62254.269061] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[62254.275170] CR2: 000000c002236020 CR3: 000000387d37a002 CR4: 0000000000770ef0
[62254.282733] PKRU: 55555554
[62254.285911] Call Trace:
[62254.288884]  <TASK>
[62254.291549]  ? die+0x33/0x90
[62254.294769]  ? do_trap+0xe0/0x110
[62254.298405]  ? do_error_trap+0x65/0x80
[62254.302471]  ? exc_stack_segment+0x35/0x50
[62254.306884]  ? asm_exc_stack_segment+0x22/0x30
[62254.311637]  ? skb_release_data+0xb8/0x1e0
[62254.316047]  kfree_skb_list_reason+0x6d/0x210
[62254.320697]  ? free_unref_page_commit+0x80/0x2f0
[62254.325700]  ? free_unref_page+0xe9/0x130
[62254.330013]  skb_release_data+0xfc/0x1e0
[62254.334261]  consume_skb+0x45/0xd0
[62254.338077]  tun_do_read+0x68/0x1f0 [tun]
[62254.342414]  tun_recvmsg+0x7e/0x160 [tun]
[62254.346696]  handle_rx+0x3ab/0x750 [vhost_net]
[62254.351488]  vhost_worker+0x42/0x70 [vhost]
[62254.355934]  vhost_task_fn+0x4b/0xb0
[62254.359758]  ? finish_task_switch.isra.0+0x8f/0x2a0
[62254.364882]  ? __pfx_vhost_task_fn+0x10/0x10
[62254.369390]  ? __pfx_vhost_task_fn+0x10/0x10
[62254.373888]  ret_from_fork+0x2d/0x50
[62254.377687]  ? __pfx_vhost_task_fn+0x10/0x10
[62254.382169]  ret_from_fork_asm+0x1b/0x30
[62254.386310]  </TASK>
[62254.388705] Modules linked in: nf_tables(E) nf_conntrack_netlink(E)
vhost_net(E) vhost(E) vhost_iotlb(E) tap(E) tun(E) mptcp_diag(E)
xsk_diag(E) udp_diag(E) raw_diag(E) unix_diag(E) af_packet_diag(E)
netlink_diag(E) tcp_diag(E) inet_diag(E) rpcsec_gss_krb5(E)
auth_rpcgss(E) nfsv4(E) dns_resolver(E) nfs(E) lockd(E) grace(E)
fscache(E) netfs(E) netconsole(E) ib_core(E) scsi_transport_iscsi(E)
sch_ingress(E) target_core_user(E) uio(E) target_core_pscsi(E)
target_core_file(E) target_core_iblock(E) iscsi_target_mod(E)
target_core_mod(E) 8021q(E) garp(E) mrp(E) bonding(E) tls(E)
nfnetlink_cttimeout(E) nfnetlink(E) openvswitch(E) nf_conncount(E)
nf_nat(E) binfmt_misc(E) dell_rbu(E) sunrpc(E) vfat(E) fat(E)
dm_service_time(E) dm_multipath(E) btrfs(E) xor(E) zstd_compress(E)
raid6_pq(E) ipmi_ssif(E) intel_rapl_msr(E) intel_rapl_common(E)
amd64_edac(E) edac_mce_amd(E) kvm_amd(E) kvm(E) irqbypass(E)
dell_smbios(E) acpi_ipmi(E) dcdbas(E) dell_wmi_descriptor(E)
wmi_bmof(E) rapl(E) ipmi_si(E) acp
Mar 19 09:40:16 10.12.17.70 i_cpufreq(E) ipmi_devintf(E)
[62254.388751]  mgag200(E) i2c_algo_bit(E) ptdma(E) wmi(E)
i2c_piix4(E) k10temp(E) ipmi_msghandler(E) acpi_power_meter(E) fuse(E)
zram(E) ext4(E) mbcache(E) jbd2(E) dm_crypt(E) sd_mod(E) t10_pi(E)
sg(E) ice(E) crct10dif_pclmul(E) crc32_pclmul(E) polyval_clmulni(E)
polyval_generic(E) ahci(E) libahci(E) ghash_clmulni_intel(E)
sha512_ssse3(E) libata(E) megaraid_sas(E) ccp(E) gnss(E) sp5100_tco(E)
dm_mirror(E) dm_region_hash(E) dm_log(E) dm_mod(E) nf_conntrack(E)
libcrc32c(E) crc32c_intel(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E)
br_netfilter(E) bridge(E) stp(E) llc(E)
[62254.480070] Unloaded tainted modules: fjes(E):2 padlock_aes(E):3
[62254.537711] ---[ end trace 0000000000000000 ]---

Thanks in advance!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ