lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 26 Oct 2018 15:17:06 +0200
From:   Andre Tomt <andre@...t.net>
To:     Eric Dumazet <edumazet@...gle.com>
Cc:     Eric Dumazet <eric.dumazet@...il.com>,
        Stephen Hemminger <stephen@...workplumber.org>,
        netdev <netdev@...r.kernel.org>, rossi.f@...ind.it,
        Dimitris Michailidis <dmichail@...gle.com>
Subject: Re: Fw: [Bug 201423] New: eth0: hw csum failure

On 26.10.2018 14:59, Eric Dumazet wrote:
> On Fri, Oct 26, 2018 at 5:38 AM Andre Tomt <andre@...t.net> wrote:
>> And it tripped again with that commit; however on another box with a
>> much more complicated setup (VRFs, sch_cake, ifb, conntrack/nat, 6in4
>> tunnel, VF device on mlx4)
>>
>>> [ 8197.348260] wanib: hw csum failure
>>> [ 8197.348288] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 4.19.0-1 #1
>>> [ 8197.348289] Hardware name: Supermicro SYS-5018D-FN8T/X10SDV-TP8F, BIOS 1.3 03/19/2018
>>> [ 8197.348290] Call Trace:
>>> [ 8197.348296]  <IRQ>
>>> [ 8197.348304]  dump_stack+0x5c/0x80
>>> [ 8197.348308]  __skb_checksum_complete+0xac/0xc0
>>> [ 8197.348318]  icmp_error+0x1c8/0x1f0 [nf_conntrack]
>>> [ 8197.348325]  ? ip_output+0x61/0xc0
>>> [ 8197.348328]  ? skb_copy_bits+0x13d/0x220
>>> [ 8197.348334]  nf_conntrack_in+0xd8/0x390 [nf_conntrack]
>>> [ 8197.348339]  ? ___pskb_trim+0x192/0x330
>>> [ 8197.348343]  nf_hook_slow+0x43/0xc0
>>> [ 8197.348346]  ip_rcv+0x90/0xb0
>>> [ 8197.348349]  ? ip_rcv_finish_core.isra.0+0x310/0x310
>>> [ 8197.348354]  __netif_receive_skb_one_core+0x42/0x50
>>> [ 8197.348357]  netif_receive_skb_internal+0x24/0xb0
>>> [ 8197.348361]  ifb_ri_tasklet+0x167/0x260 [ifb]
>>> [ 8197.348365]  tasklet_action_common.isra.3+0x49/0xb0
>>> [ 8197.348369]  __do_softirq+0xe7/0x2d3
>>> [ 8197.348372]  irq_exit+0x96/0xd0
>>> [ 8197.348375]  do_IRQ+0x85/0xd0
>>> [ 8197.348378]  common_interrupt+0xf/0xf
>>> [ 8197.348379]  </IRQ>
>>> [ 8197.348382] RIP: 0010:cpuidle_enter_state+0xb9/0x320
>>> [ 8197.348384] Code: e8 1c 16 bc ff 80 7c 24 0b 00 74 17 9c 58 0f 1f 44 00 00 f6 c4 02 0f 85 3b 02 00 00 31 ff e8 3e fb c0 ff fb 66 0f 1f 44 00 00 <48> b8 ff ff ff ff f3 01 00 00 48 2b 1c 24 ba ff ff ff 7f 48 39 c3
>>> [ 8197.348386] RSP: 0018:ffff9f0441953ea8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffd5
>>> [ 8197.348388] RAX: ffff9759efae0fc0 RBX: 000007749807d911 RCX: 000000000000001f
>>> [ 8197.348390] RDX: 000007749807d911 RSI: 000000003a2e8670 RDI: 0000000000000000
>>> [ 8197.348393] RBP: ffff9759efae98a8 R08: 0000000000000002 R09: 0000000000020840
>>> [ 8197.348396] R10: 00626b4810384abc R11: ffff9759efae01e8 R12: 0000000000000001
>>> [ 8197.348398] R13: ffffffff8d0ac638 R14: 0000000000000001 R15: 0000000000000000
>>> [ 8197.348402]  ? cpuidle_enter_state+0x94/0x320
>>> [ 8197.348407]  do_idle+0x1e4/0x220
>>> [ 8197.348411]  cpu_startup_entry+0x5f/0x70
>>> [ 8197.348415]  start_secondary+0x185/0x1a0
>>> [ 8197.348417]  secondary_startup_64+0xa4/0xb0
> 
> 
> Very different trace , yet another bug to track .
> 
> If you can, try to remove some components from this setup.
> 

Will do. Just remembered I took out the VF stuff a few days ago and that 
netdev is just a normal vlan device now. Going to eliminate VRF and 
cake/ifb as well.

Powered by blists - more mailing lists