lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 25 Sep 2013 08:31:52 +0000 (UTC)
From:	Konstantin Kuzov <master.nosferatu@...il.com>
To:	netdev@...r.kernel.org
Subject: Re: BUG: MARK in OUTPUT + ip_tunnel causes kernel panic

Kristian Evensen <kristian.evensen <at> gmail.com> writes:

> When trying to tunnel traffic originating from the same machine as the
> tunnel endpoint, I am experiencing kernel panics for some types of
> traffic (ICMP and UDP). TCP seems not to be affected by this, at least
> I have not been able to trigger the panic.
> 
> I have one tunnel (without an IP address) and use policy routing to
> steer some traffic through the tunnels.
[...]
> An interesting thing is that I have seen different kernel panics being
> triggered. The other one I have seen has RIP pointing to
> e1000_xmit_frame() and the message "protocol 0800 is buggy". However,
> the one I have posted is by far the most common.
I'm experiencing the same issue on two different machines. It happens on any 
kernel starting from 3.10 when ip_tunnel/ip_tunnel_core were introduced.

But in my configuration I have addresses on tunnel interfaces and only doing 
masquerading on postrouting...

Same as you it triggers different kernel panics depends on which kernel 
modules involved (nic, vbox, etc...) here are some samples:
http://nosferatu.g0x.ru/pub/kerneloops/

But most common one looks like that:

[   81.797190] skbuff: skb_under_panic: text:ffffffff8170307f len:142 put:14 
head:ffff88040cd12a00 data:ffff88040cd129ee tail:0x7c end:0xc0 dev:v33
[   81.797240] ------------[ cut here ]------------
[   81.797256] kernel BUG at net/core/skbuff.c:126!
[   81.797272] invalid opcode: 0000 [#1] SMP 
[   81.797291] Modules linked in: ext2
[   81.797309] CPU: 0 PID: 4654 Comm: ffmpeg Not tainted 3.11.1 #3
[   81.797328] Hardware name: Gigabyte Technology Co., Ltd. Z68A-D3H-
B3/Z68A-D3H-B3, BIOS F13 03/20/2012
[   81.797356] task: ffff88040cd5bc80 ti: ffff880407c38000 task.ti: 
ffff880407c38000
[   81.797380] RIP: 0010:[<ffffffff81881a55>]  [<ffffffff81881a55>] 
skb_panic+0x5e/0x60
[   81.797411] RSP: 0000:ffff88041fa03898  EFLAGS: 00010296
[   81.797428] RAX: 0000000000000084 RBX: ffff88040a2bd300 RCX: 
0000000000000000
[   81.797450] RDX: ffff88041fa0eb48 RSI: ffff88041fa0d258 RDI: 
ffff88041fa0d258
[   81.797472] RBP: ffff88041fa038b8 R08: 0000000000000000 R09: 
00000000000003ca
[   81.797494] R10: 0000000000000001 R11: 0000000000aaaaaa R12: 
ffff88040b90aed8
[   81.797516] R13: 000000000000000e R14: ffff88040b90aee8 R15: 
0000000000000000
[   81.797538] FS:  00007ff3002a0740(0000) GS:ffff88041fa00000(0000) 
knlGS:0000000000000000
[   81.797564] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   81.797582] CR2: 0000000008212000 CR3: 000000040a097000 CR4: 
00000000000407f0
[   81.797604] Stack:
[   81.797613]  ffff88040cd129ee 000000000000007c 00000000000000c0 
ffff88040c71e000
[   81.797643]  ffff88041fa038c8 ffffffff816971d5 ffff88041fa03928 
ffffffff8170307f
[   81.797673]  ffffffff81ee10a0 ffff88040c71e000 ffff88040d79dfc0 
fe971fac81ee10a0
[   81.797703] Call Trace:
[   81.797713]  <IRQ> 
[   81.797721] 
[   81.797730]  [<ffffffff816971d5>] skb_push+0x35/0x40
[   81.797745]  [<ffffffff8170307f>] ip_finish_output+0x2af/0x3a0
[   81.797765]  [<ffffffff81703a98>] ip_output+0x88/0x90
[   81.797782]  [<ffffffff81703214>] ip_local_out+0x24/0x30
[   81.797801]  [<ffffffff8174291b>] iptunnel_xmit+0x17b/0x1b0
[   81.797820]  [<ffffffff81744560>] ip_tunnel_xmit+0x2e0/0x7d0
[   81.797839]  [<ffffffff8174a9ec>] ipip_tunnel_xmit+0x5c/0x70
[   81.797859]  [<ffffffff816a8240>] dev_hard_start_xmit+0x300/0x510
[   81.798750]  [<ffffffff81758668>] ? nf_nat_ipv4_out+0x58/0x100
[   81.799648]  [<ffffffff816a8718>] dev_queue_xmit+0x2c8/0x460
[   81.800543]  [<ffffffff816ae14c>] neigh_direct_output+0xc/0x10
[   81.801434]  [<ffffffff81702f7f>] ip_finish_output+0x1af/0x3a0
[   81.802337]  [<ffffffff81703a98>] ip_output+0x88/0x90
[   81.803243]  [<ffffffff81703214>] ip_local_out+0x24/0x30
[   81.804143]  [<ffffffff817044f4>] ip_send_skb+0x14/0x50
[   81.805040]  [<ffffffff81704562>] ip_push_pending_frames+0x32/0x40
[   81.805950]  [<ffffffff8172e1ae>] icmp_push_reply+0xee/0x120
[   81.806851]  [<ffffffff8172e969>] icmp_send+0x419/0x490
[   81.807750]  [<ffffffff816a6082>] ? __netif_receive_skb_core+0x622/0x7f0
[   81.808651]  [<ffffffff81077c00>] ? update_curr+0x10/0x160
[   81.809552]  [<ffffffff816b00e0>] ? neigh_invalidate+0x120/0x120
[   81.810445]  [<ffffffff816f933d>] ipv4_link_failure+0x1d/0x70
[   81.811333]  [<ffffffff8172c50d>] arp_error_report+0x2d/0x40
[   81.812217]  [<ffffffff816b004c>] neigh_invalidate+0x8c/0x120
[   81.813102]  [<ffffffff816b0316>] neigh_timer_handler+0x236/0x2a0
[   81.813989]  [<ffffffff8104fb3a>] call_timer_fn+0x3a/0x110
[   81.814883]  [<ffffffff816b00e0>] ? neigh_invalidate+0x120/0x120
[   81.815787]  [<ffffffff81050ea0>] run_timer_softirq+0x1c0/0x2a0
[   81.816695]  [<ffffffff81048ee9>] __do_softirq+0xe9/0x230
[   81.817605]  [<ffffffff81049185>] irq_exit+0x95/0xa0
[   81.818513]  [<ffffffff8102da75>] smp_apic_timer_interrupt+0x45/0x60
[   81.819431]  [<ffffffff8188feca>] apic_timer_interrupt+0x6a/0x70
[   81.820355]  <EOI> 
[   81.820363] 
[   81.821277]  [<ffffffff8188f312>] ? system_call_fastpath+0x16/0x1b
[   81.822208] Code: 00 00 48 89 44 24 10 8b 87 d0 00 00 00 48 89 44 24 08 
48 8b 87 e0 00 00 00 48 c7 c7 80 fa c5 81 48 89 04 24 31 c0 e8 94 95 ff ff 
<0f> 0b 55 48 89 e5 0f 0b 55 48 89 e5 0f 0b 55 48 89 e5 0f 0b 55 
[   81.823365] RIP  [<ffffffff81881a55>] skb_panic+0x5e/0x60
[   81.824409]  RSP <ffff88041fa03898>

I also can't trace why that happens and strangely I can't reproduce that 
issue on virtualbox. Have you discovered anything more about this issue in 
past month?

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ