[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAJwzM1=HPN92sDXJfq6RTXf1zpPiZxwkQUKukAq-L5POP9YyFw@mail.gmail.com>
Date: Tue, 19 Nov 2019 14:39:34 -0800
From: Avinash Patil <avinashapatil@...il.com>
To: Eric Dumazet <eric.dumazet@...il.com>
Cc: netdev@...r.kernel.org
Subject: Re: Possible bug in TCP retry logic/Kernel crash
Hi Eric,
Thanks for your help so far.
I am in no way suggesting you to debug this issue. I have already said
in first email itself that I am debugging this myself and looking for
pointers from experts for conditions under which this could happen.
BTW, I am also checking about the possibility of sharing my changes to
kernel sources.
Here is another crash I observed today.
[ 139.786529] ===============
[ 139.789445] tcp_rcv_established: sk=8f3eb400, skb=8f3c0c00, len=47
[ 139.795833] tcp_rcv_established: step5 skb=8f3c0c00
[ 139.800814] tcp_queue_rcv: sk=8f3eb400, skb=8f3c0c00, src-port=39620, len=15
[ 139.808199] ===============
[ 139.811033] tcp_rcv_established: sk=8f3eb400, skb=8f3c0900, len=32
[ 139.817409] tcp_rcv_established: slow_path skb=8f3c0900
[ 139.822774] tcp_rcv_established: step5 skb=8f3c0900
[ 139.827753] tcp_queue_rcv: sk=8f3eb400, skb=8f3c0900, src-port=39620, len=0
[ 139.834965] tcp_drop: sk=8f3eb400, skb=8f3c0900
[ 140.846604] TCP: tcp_recvmsg: found a SYN, please report !
[ 140.852198] ------------[ cut here ]------------
[ 140.856948] WARNING: CPU: 0 PID: 1353 at net/ipv4/tcp.c:2039
tcp_recvmsg+0x648/0x9f4
[ 140.864793] TCP recvmsg seq # bug 2: copied F5058AF9, seq 8C96A6D0,
rcvnxt F5058C85, fl 0
[ 140.873073] Modules linked in: wlan_scan_ap(O) wlan_acl(O)
wlan_gcmp_256(O) wlan_gcmp(O) wlan_ccmp_256(O) wlan_wep(O)
wlan_tkip(O) wlan_ccmp(O) wlan_xauth(O) qdrv(O) auc_fw(PO) wlan(O)
radar(PO) i2cbu)
[ 140.904278] CPU: 0 PID: 1353 Comm: qtn_ca Tainted: P O
4.19.35 #135
[ 140.911948]
[ 140.911948] Stack Trace:
[ 140.916040] Firmware build version: avinashp6_bbic5_a-cl103746
[ 140.916040] Firmware configuration: pearl_10gax_config
[ 140.916040] Hardware ID : 65535
[ 140.931150] arc_unwind_core+0xc8/0xe8
[ 140.935127] __warn+0x9c/0xbc
[ 140.938316] warn_slowpath_fmt+0x32/0x3c
[ 140.942385] tcp_recvmsg+0x648/0x9f4
[ 140.946185] inet_recvmsg+0x2a/0x3c
[ 140.949906] __sys_recvfrom+0xba/0x100
[ 140.953903] EV_Trap+0x11c/0x120
[ 140.957263] ---[ end trace 0e4059a49f3521b9 ]---
[ 140.961983]
[ 140.961983] Oops
[ 140.965397] Path: /usr/bin/qtn_ca
[ 140.968815] CPU: 0 PID: 1353 Comm: qtn_ca Tainted: P W O
4.19.35 #135
[ 140.976473]
[ 140.976473] [ECR ]: 0x00220100 => Invalid Read @ 0x00000020 by
insn @ 0x8b39d8a0
[ 140.985651] [EFA ]: 0x00000020
[ 140.985651] [BLINK ]: tcp_recvmsg+0x648/0x9f4
[ 140.985651] [ERET ]: tcp_recvmsg+0x654/0x9f4
[ 140.997675] [STAT32]: 0x00000406 : K E2 E1
[ 141.002648] BTA: 0x8b188843 SP: 0x8f32fe28 FP: 0x00000000
[ 141.008305] LPS: 0x8b2e2942 LPE: 0x8b2e2946 LPC: 0x00000000
[ 141.013990] r00: 0x00000009 r01: 0x00000000 r02: 0x8b5c003c
[ 141.013990] r03: 0xf5058af9 r04: 0x00001001 r05: 0x00000000
[ 141.013990] r06: 0x00000136 r07: 0x00000000 r08: 0x8f32fc90
[ 141.013990] r09: 0x00000011 r10: 0x00000000 r11: 0x00000000
[ 141.013990] r12: 0x0000002d r13: 0x00000000 r14: 0x00000000
[ 141.013990] r15: 0x00000000 r16: 0x00000000 r17: 0x00000000
[ 141.013990] r18: 0x00000000 r19: 0x00000000 r20: 0x00000000
[ 141.013990] r21: 0x00000000 r22: 0x00000000 r23: 0x00000000
[ 141.013990] r24: 0x00000000 r25: 0x00000000
[ 141.013990]
[ 141.013990]
[ 141.066650]
[ 141.066650] Stack Trace:
[ 141.070740] Firmware build version: avinashp6_bbic5_a-cl103746
[ 141.070740] Firmware configuration: pearl_10gax_config
[ 141.070740] Hardware ID : 65535
[ 141.085836] tcp_recvmsg+0x654/0x9f4
[ 141.089634] inet_recvmsg+0x2a/0x3c
[ 141.093350] __sys_recvfrom+0xba/0x100
[ 141.097314] EV_Trap+0x11c/0x120
[ 141.100773]
[ 141.100773] Stack not used for current process: 6200
Thanks,
Avinash
On Fri, Nov 15, 2019 at 6:29 PM Eric Dumazet <eric.dumazet@...il.com> wrote:
>
>
>
> On 11/15/19 6:07 PM, Avinash Patil wrote:
> > No; I am not using an official tree. There are certain changes to
> > arch/arc directory which are specific to Synposys ARC platform.
> > However, there are no changes to TCP module and this is why I suspect
> > crash is generic TCP issue.
>
>
> Please provide a git tree then, and exact line numbers of the stack trace.
>
> Really I can not spend days working on non pristibe kernels, you have to help a bit.
> Thanks.
>
> >
> > Thanks,
> > Avinash
> >
> >
> > On Fri, Nov 15, 2019 at 6:01 PM Eric Dumazet <eric.dumazet@...il.com> wrote:
> >>
> >>
> >>
> >> On 11/15/19 5:52 PM, Avinash Patil wrote:
> >>> Hi Eric,
> >>>
> >>> I integrated all patches till 4.19.83 as per your suggestion.
> >>> Unfortunately, I still see crash.
> >>
> >> What do you mean by integrating patches ?
> >>
> >> Are you using an official/pristine tree ?
> >>
> >>>
> >>> [ 991.291968] [ECR ]: 0x00230400 => Misaligned r/w from 0x00000001
> >>> [ 991.299766] [EFA ]: 0x00000001
> >>> [ 991.299766] [BLINK ]: tcp_clean_rtx_queue+0x2a4/0xc88
> >>> [ 991.299766] [ERET ]: __list_del_entry_valid+0x12/0x1a0
> >>> [ 991.313350] [STAT32]: 0x00000206 : K E2 E1
> >>> [ 991.318323] BTA: 0x8b188843 SP: 0x8f04fcf4 FP: 0x00000000
> >>> [ 991.323977] LPS: 0x8b2e2942 LPE: 0x8b2e2946 LPC: 0x00000000
> >>> [ 991.329660] r00: 0x8cbf2224 r01: 0x8cbf21c0 r02: 0x6e6c53fe
> >>> [ 991.329660] r03: 0x00000001 r04: 0x00000000 r05: 0x39ef6f1d
> >>> [ 991.329660] r06: 0x8f3e3180 r07: 0x00000000 r08: 0x3b14d54c
> >>> [ 991.329660] r09: 0x00000000 r10: 0x0000c0ef r11: 0x00000000
> >>> [ 991.329660] r12: 0x04c80000 r13: 0x8cbf21c0 r14: 0x00000000
> >>> [ 991.329660] r15: 0x00000000 r16: 0x00000001 r17: 0x00000000
> >>> [ 991.329660] r18: 0x8f3e3580 r19: 0x8f3e2d80 r20: 0x00000004
> >>> [ 991.329660] r21: 0x8f04fd7c r22: 0x00000001 r23: 0x3b14d54c
> >>> [ 991.329660] r24: 0x00000000 r25: 0x8f0315c0
> >>> [ 991.329660]
> >>> [ 991.329660]
> >>> [ 991.382333]
> >>> [ 991.382333] Stack Trace:
> >>> [ 991.386374] Firmware build version: avinashp6_bbic5_a-cl103643
> >>> [ 991.386374] Firmware configuration: pearl_10gax_config
> >>> [ 991.386374] Hardware ID : 65535
> >>> [ 991.401461] __list_del_entry_valid+0x12/0x1a0
> >>> [ 991.406125] tcp_clean_rtx_queue+0x2a4/0xc88
> >>> [ 991.410618] tcp_ack+0x484/0x914
> >>> [ 991.414073] tcp_rcv_established+0x538/0x724
> >>> [ 991.418564] tcp_v4_do_rcv+0xda/0x120
> >>> [ 991.422456] tcp_v4_rcv+0x954/0xa7c
> >>> [ 991.426105] ip_local_deliver+0x72/0x208
> >>> [ 991.430257] process_backlog+0xbe/0x1b0
> >>> [ 991.434319] net_rx_action+0x106/0x294
> >>> [ 991.438286] __do_softirq+0xf0/0x218
> >>> [ 991.442014] run_ksoftirqd+0x2a/0x3c
> >>> [ 991.445812] smpboot_thread_fn+0xb4/0x10c
> >>> [ 991.450054] kthread+0xd8/0xdc
> >>> [ 991.453338] ret_from_fork+0x18/0x1c
> >>> [ 991.457067]
> >>>
> >>> Thank you!
> >>>
> >>> -Avinash
> >>>
> >>> On Sun, Nov 10, 2019 at 3:48 PM Eric Dumazet <eric.dumazet@...il.com> wrote:
> >>>>
> >>>>
> >>>>
> >>>> On 11/9/19 9:59 PM, Avinash Patil wrote:
> >>>>> Hi everyone,
> >>>>>
> >>>>> Kernel: Linux 4.19.35 kernel built from linux-stable
> >>>>>
> >>>>
> >>>> This is quite an old version.
> >>>>
> >>>> Please upgrade to the latest one.
> >>>>
> >>>> $ git log --oneline v4.19.35..v4.19.82 -- net/ipv4/tcp*c
> >>>> 3fdcf6a88ded2bb5c3c0f0aabaff253dd3564013 tcp: better handle TCP_USER_TIMEOUT in SYN_SENT state
> >>>> 67fe3b94a833779caf4504ececa7097fba9b2627 tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR
> >>>> 5977bc19ce7f1ed25bf20d09d8e93e56873a9abb tcp: remove empty skb from write queue in error cases
> >>>> 6f3126379879bb2b9148174f0a4b6b65e04dede9 tcp: inherit timestamp on mtu probe
> >>>> 1b200acde418f4d6d87279d3f6f976ebf188f272 tcp: Reset bytes_acked and bytes_received when disconnecting
> >>>> c60f57dfe995172c2f01e59266e3ffa3419c6cd9 tcp: fix tcp_set_congestion_control() use from bpf hook
> >>>> 6323c238bb4374d1477348cfbd5854f2bebe9a21 tcp: be more careful in tcp_fragment()
> >>>> dad3a9314ac95dedc007bc7dacacb396ea10e376 tcp: refine memory limit test in tcp_fragment()
> >>>> 59222807fcc99951dc769cd50e132e319d73d699 tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
> >>>> 7f9f8a37e563c67b24ccd57da1d541a95538e8d9 tcp: add tcp_min_snd_mss sysctl
> >>>> ec83921899a571ad70d582934ee9e3e07f478848 tcp: tcp_fragment() should apply sane memory limits
> >>>> c09be31461ed140976c60a87364415454a2c3d42 tcp: limit payload size of sacked skbs
> >>>> 6728c6174a47b8a04ceec89aca9e1195dee7ff6b tcp: tcp_grow_window() needs to respect tcp_space()
> >>>>
Powered by blists - more mailing lists