lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 29 Jan 2021 17:44:12 +0000
From:   Pierre Cheynier <p.cheynier@...teo.com>
To:     "netdev@...r.kernel.org" <netdev@...r.kernel.org>
CC:     "kuba@...nel.org" <kuba@...nel.org>
Subject: [5.10] i40e/udp_tunnel: RTNL: assertion failed at
 net/ipv4/udp_tunnel_nic.c 

Dear list,

I noticed this assertion error recently after upgrading to 5.10.x (latest trial being 5.10.11).
Coming indirectly with my usage of the vxlan module, the assertion output will probably give you the information required to guess my hardware context (i40e).

[    8.842462] ------------[ cut here ]------------
[    8.847081] RTNL: assertion failed at net/ipv4/udp_tunnel_nic.c (557)
[    8.853541] WARNING: CPU: 0 PID: 15 at net/ipv4/udp_tunnel_nic.c:557 __udp_tunnel_nic_reset_ntf+0xde/0xf0 [udp_tunnel]
[    8.864226] Modules linked in: vxlan ip6_udp_tunnel udp_tunnel sg mlx4_en mlx4_core ipvlan i40e(+) ptp pps_core ahci(+) libahci libata ipmi_si ipmi_devintf ipmi_msghandler ip_vs_mh ip_vs nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c crc32c_intel
[    8.886539] CPU: 0 PID: 15 Comm: kworker/0:1 Not tainted 5.10.11-1.el7.x86_64 #1
[    8.893927] Hardware name: Quanta Cloud Technology Inc. QuantaPlex T42S-2U(LBG-2)/T42S-2U MB (Lewisburg-2), BIOS 3A14.Q301 05/03/2019
[    8.905919] Workqueue: events work_for_cpu_fn
[    8.910283] RIP: 0010:__udp_tunnel_nic_reset_ntf+0xde/0xf0 [udp_tunnel]
[    8.916896] Code: ef 20 00 00 00 0f 85 5f ff ff ff ba 2d 02 00 00 48 c7 c6 32 23 19 c0 48 c7 c7 10 2e 19 c0 c6 05 cf 20 00 00 01 e8 6f f9 74 c3 <0f> 0b e9 39 ff ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00
[    8.935641] RSP: 0018:ffff9afc86447b68 EFLAGS: 00010286
[    8.940868] RAX: 0000000000000000 RBX: ffff8ea4435a6768 RCX: 0000000000000000
[    8.948000] RDX: ffff8ea41fe27a20 RSI: ffff8ea41fe17c40 RDI: ffff8ea41fe17c40
[    8.955133] RBP: ffff8e9cc85ef000 R08: ffff8ea41fe17c40 R09: ffff9afc86447980
[    8.962265] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[    8.969399] R13: 0000000000000000 R14: ffff8ea4435a6008 R15: ffff8ea445320000
[    8.976533] FS:  0000000000000000(0000) GS:ffff8ea41fe00000(0000) knlGS:0000000000000000
[    8.984617] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.990365] CR2: 00007f3d32b26160 CR3: 000000038d60a001 CR4: 00000000007706f0
[    8.997498] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    9.004639] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[    9.011785] PKRU: 55555554
[    9.014499] Call Trace:
[    9.016968]  i40e_setup_pf_switch+0x3e8/0x5e0 [i40e]
[    9.021949]  i40e_probe.part.0.cold+0x87a/0x11f2 [i40e]
[    9.027175]  ? kmem_cache_alloc+0x39e/0x3f0
[    9.031361]  ? irq_get_irq_data+0xa/0x20
[    9.035286]  ? mp_check_pin_attr+0x13/0xc0
[    9.039399]  ? irq_get_irq_data+0xa/0x20
[    9.043329]  ? mp_map_pin_to_irq+0xd2/0x2f0
[    9.047514]  ? acpi_register_gsi_ioapic+0x90/0x170
[    9.052309]  ? pci_conf1_read+0xa4/0x100
[    9.056235]  ? pci_bus_read_config_word+0x49/0x70
[    9.060938]  ? do_pci_enable_device+0xd0/0x100
[    9.065385]  local_pci_probe+0x42/0x80
[    9.069140]  ? __schedule+0x32f/0x7e0
[    9.072803]  work_for_cpu_fn+0x16/0x20
[    9.076556]  process_one_work+0x1b0/0x350
[    9.080568]  worker_thread+0x1dc/0x3a0
[    9.084322]  ? process_one_work+0x350/0x350
[    9.088510]  kthread+0xfe/0x140
[    9.088513]  ? kthread_park+0x90/0x90
[    9.088516]  ret_from_fork+0x1f/0x30
[    9.088522] ---[ end trace daa573e87ec91564 ]---

Cheers,
-- 
Pierre Cheynier

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ