[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CANn89iK8BtCDXsH=fwnUg8fzP_tDB-=wmezkc-dCCVpp-FqzxA@mail.gmail.com>
Date: Fri, 9 Dec 2022 09:39:14 +0100
From: Eric Dumazet <edumazet@...gle.com>
To: Breno Leitao <leitao@...ian.org>
Cc: David Miller <davem@...emloft.net>,
Jakub Kicinski <kuba@...nel.org>,
netdev <netdev@...r.kernel.org>, leit@...com,
Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>,
Paolo Abeni <pabeni@...hat.com>,
David Ahern <dsahern@...nel.org>,
LKML <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH RESEND net-next] tcp: socket-specific version of WARN_ON_ONCE()
On Thu, Dec 8, 2022 at 4:44 PM Breno Leitao <leitao@...ian.org> wrote:
>
> On Wed, Dec 07, 2022 at 06:59:38PM +0100, Eric Dumazet wrote:
> > Try to give us symbols with scripts/decode_stacktrace.sh , thanks.
>
> Sorry, here it is:
>
> [749619.538804] WARNING: CPU: 19 PID: 0 at net/ipv4/tcp.c:4552 tcp_sock_warn+0x6/0x20
> [749619.553969] Modules linked in: sch_fq sunrpc bpf_preload tls act_gact cls_bpf tcp_diag inet_diag skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iTCO_wdt iTCO_vendor_support kvm evdev ses irqbypass enclosure i2c_i801 i2c_smbus ipmi_si ipmi_devintf ipmi_msghandler acpi_cpufreq button tpm_crb sch_fq_codel vhost_net tun tap vhost vhost_iotlb virtio_net net_failover failover mpls_gso mpls_iptunnel mpls_router ip_tunnel fou ip6_udp_tunnel udp_tunnel fuse sg nvme mpi3mr scsi_transport_sas nvme_core xhci_pci xhci_hcd loop efivarfs autofs4
> [749619.678066] Hardware name: XXXXX
> [749619.695308] RIP: tcp_sock_warn+0x6/0x20
> [749619.704034] Code: 4d 01 3e 85 c0 0f 84 57 ff ff ff 48 8b 0c 24 44 8b 01 eb 82 e8 eb b7 14 00 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 53 <0f> 0b 48 85 ff 0f 85 77 70 14 00 5b c3 66 66 2e 0f 1f 84 00 00 00
> All code
> ========
> 0: 4d 01 3e add %r15,(%r14)
> 3: 85 c0 test %eax,%eax
> 5: 0f 84 57 ff ff ff je 0xffffffffffffff62
> b: 48 8b 0c 24 mov (%rsp),%rcx
> f: 44 8b 01 mov (%rcx),%r8d
> 12: eb 82 jmp 0xffffffffffffff96
> 14: e8 eb b7 14 00 callq 0x14b804
> 19: 66 66 2e 0f 1f 84 00 data16 nopw %cs:0x0(%rax,%rax,1)
> 20: 00 00 00 00
> 24: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
> 29: 53 push %rbx
> 2a:* 0f 0b ud2 <-- trapping instruction
> 2c: 48 85 ff test %rdi,%rdi
> 2f: 0f 85 77 70 14 00 jne 0x1470ac
> 35: 5b pop %rbx
> 36: c3 retq
> 37: 66 data16
> 38: 66 data16
> 39: 2e cs
> 3a: 0f .byte 0xf
> 3b: 1f (bad)
> 3c: 84 00 test %al,(%rax)
> ...
>
> Code starting with the faulting instruction
> ===========================================
> 0: 0f 0b ud2
> 2: 48 85 ff test %rdi,%rdi
> 5: 0f 85 77 70 14 00 jne 0x147082
> b: 5b pop %rbx
> c: c3 retq
> d: 66 data16
> e: 66 data16
> f: 2e cs
> 10: 0f .byte 0xf
> 11: 1f (bad)
> 12: 84 00 test %al,(%rax)
> ...
> [749619.741779] RSP: 0018:ffffc90000d08988 EFLAGS: 00010246
> [749619.752436] RAX: ffff88814b57f5c0 RBX: ffff8881bd2540c0 RCX: ffffc90000d08a34
> [749619.766900] RDX: 0000000000000000 RSI: 00000000cda8f4af RDI: ffff8881bd2540c0
> [749619.781364] RBP: 0000000000000000 R08: ffffc90000d08a38 R09: 00000000cda8f44f
> [749619.795831] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
> [749619.810300] R13: ffffc90000d08a34 R14: 0000000000011406 R15: 0000000000000000
> [749619.824788] FS: 0000000000000000(0000) GS:ffff88903f8c0000(0000) knlGS:0000000000000000
> [749619.841168] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [749619.852857] CR2: 000000000007c2e9 CR3: 0000000b82412002 CR4: 00000000007706e0
> [749619.867331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [749619.881800] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> [749619.896260] PKRU: 55555554
> [749619.901859] Call Trace:
> [749619.906927] <IRQ>
> [749619.911129] tcp_fastretrans_alert+0x988/0x9e0
> [749619.920222] ? kmem_cache_free+0x33c/0x3d0
> [749619.928606] tcp_ack+0x8b4/0x1360
> [749619.935425] ? __cgroup_bpf_run_filter_skb+0x185/0x440
> [749619.945910] tcp_rcv_established+0x2f3/0x660
> [749619.954639] ? sk_filter_trim_cap+0xbc/0x220
> [749619.963358] tcp_v6_do_rcv+0xbe/0x3e0
> [749619.970863] tcp_v6_rcv+0xc01/0xc90
Still no symbols (file name : line number).
> [749619.978029] ip6_protocol_deliver_rcu+0xbd/0x450
> [749619.987453] ip6_input_finish+0x3d/0x60
> [749619.995313] ip6_input+0xb5/0xc0
> [749620.001958] ip6_sublist_rcv_finish+0x37/0x50
> [749620.010851] ip6_sublist_rcv+0x1dd/0x270
> [749620.018877] ipv6_list_rcv+0x113/0x140
> [749620.026552] __netif_receive_skb_list_core+0x1a0/0x210
> [749620.037025] netif_receive_skb_list_internal+0x186/0x2a0
> [749620.047838] ? napi_gro_complete+0x6c/0xd0
> [749620.056215] gro_normal_list.part.171+0x19/0x40
> [749620.065471] napi_complete_done+0x65/0x150
> [749620.073856] bnxt_poll_p5+0x25b/0x2b0
> [749620.081369] __napi_poll+0x25/0x120
> [749620.088537] net_rx_action+0x189/0x300
> [749620.096224] __do_softirq+0xbb/0x271
> [749620.103571] irq_exit_rcu+0x97/0xa0
> [749620.110732] common_interrupt+0x7f/0xa0
> [749620.118595] </IRQ>
> [749620.122964] asm_common_interrupt+0x1e/0x40
> [749620.131511] RIP: cpuidle_enter_state+0xc2/0x340
> [749620.141621] Code: 48 89 c5 0f 1f 44 00 00 31 ff e8 f9 8d 73 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 38 02 00 00 31 ff e8 b2 36 79 ff fb 45 85 f6 <0f> 88 e8 00 00 00 49 63 d6 48 2b 2c 24 48 6b ca 68 48 8d 04 52 48
Powered by blists - more mailing lists