lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Dec 2023 14:00:05 +0200
From: Martin Zaharinov <micron10@...il.com>
To: Thomas Gleixner <tglx@...utronix.de>
Cc: peterz@...radead.org,
 netdev <netdev@...r.kernel.org>,
 Paolo Abeni <pabeni@...hat.com>,
 patchwork-bot+netdevbpf@...nel.org,
 Jakub Kicinski <kuba@...nel.org>,
 Stephen Hemminger <stephen@...workplumber.org>,
 kuba+netdrv@...nel.org,
 dsahern@...il.com,
 Eric Dumazet <edumazet@...gle.com>
Subject: Re: Urgent Bug Report Kernel crash 6.5.2

Hi Thomas,

One more report from second machine:

[21299.954952] ------------[ cut here ]------------
[21299.955047] WARNING: CPU: 15 PID: 0 at lib/rcuref.c:294 rcuref_put_slowpath (lib/rcuref.c:294 (discriminator 1))
[21299.955153] Modules linked in: nft_limit nft_ct nft_nat nft_chain_nat nf_tables netconsole coretemp virtio_net net_failover failover virtio_pci virtio_pci_legacy_dev virtio_pci_modern_dev virtio virtio_ring e1000e e1000 vmxnet3 i40e ixgbe mdio bnxt_en nf_nat_sip nf_conntrack_sip nf_nat_pptp nf_conntrack_pptp nf_nat_tftp nf_conntrack_tftp nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rtc_cmos
[21299.955378] CPU: 15 PID: 0 Comm: swapper/15 Tainted: G           O       6.6.8 #1
[21299.955475] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 02/09/2023
[21299.955575] RIP: 0010:rcuref_put_slowpath (lib/rcuref.c:294 (discriminator 1))
[21299.955662] Code: 07 83 f8 ff 75 19 ba 00 00 00 e0 f0 0f b1 17 83 f8 ff 74 04 31 c0 5b c3 b8 01 00 00 00 5b c3 3d ff ff ff bf 77 14 85 c0 78 06 <0f> 0b 31 c0 eb e6 c7 07 00 00 00 a0 31 c0 eb dc 80 3d e2 4e e3 00
All code
========
   0:	07                   	(bad)
   1:	83 f8 ff             	cmp    $0xffffffff,%eax
   4:	75 19                	jne    0x1f
   6:	ba 00 00 00 e0       	mov    $0xe0000000,%edx
   b:	f0 0f b1 17          	lock cmpxchg %edx,(%rdi)
   f:	83 f8 ff             	cmp    $0xffffffff,%eax
  12:	74 04                	je     0x18
  14:	31 c0                	xor    %eax,%eax
  16:	5b                   	pop    %rbx
  17:	c3                   	ret
  18:	b8 01 00 00 00       	mov    $0x1,%eax
  1d:	5b                   	pop    %rbx
  1e:	c3                   	ret
  1f:	3d ff ff ff bf       	cmp    $0xbfffffff,%eax
  24:	77 14                	ja     0x3a
  26:	85 c0                	test   %eax,%eax
  28:	78 06                	js     0x30
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	31 c0                	xor    %eax,%eax
  2e:	eb e6                	jmp    0x16
  30:	c7 07 00 00 00 a0    	movl   $0xa0000000,(%rdi)
  36:	31 c0                	xor    %eax,%eax
  38:	eb dc                	jmp    0x16
  3a:	80                   	.byte 0x80
  3b:	3d e2 4e e3 00       	cmp    $0xe34ee2,%eax

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	31 c0                	xor    %eax,%eax
   4:	eb e6                	jmp    0xffffffffffffffec
   6:	c7 07 00 00 00 a0    	movl   $0xa0000000,(%rdi)
   c:	31 c0                	xor    %eax,%eax
   e:	eb dc                	jmp    0xffffffffffffffec
  10:	80                   	.byte 0x80
  11:	3d e2 4e e3 00       	cmp    $0xe34ee2,%eax
[21299.955793] RSP: 0018:ffff96a7c0578c30 EFLAGS: 00010246
[21299.955879] RAX: 0000000000000000 RBX: ffff8b75d1e49a80 RCX: ffff8b75c6667c80
[21299.955974] RDX: ffff8b84bfbe4f08 RSI: 00000000fffffe01 RDI: ffff8b75d1e49a80
[21299.956070] RBP: ffff8b84bfbe4f08 R08: ffff8b84bfbe4f08 R09: 0000000000000001
[21299.956167] R10: 0000000000028530 R11: 0000000000000001 R12: ffff8b75d1e49a40
[21299.956261] R13: ffff8b75d1e49aa8 R14: ffff8b84bfbe4f08 R15: 00000000c26ab667
[21299.956358] FS:  0000000000000000(0000) GS:ffff8b84bfbc0000(0000) knlGS:0000000000000000
[21299.956457] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[21299.956540] CR2: 00007f2e185c73c8 CR3: 0000000950014003 CR4: 00000000003706e0
[21299.956635] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[21299.956730] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[21299.956826] Call Trace:
[21299.956905]  <IRQ>
[21299.956983] ? __warn (kernel/panic.c:235 kernel/panic.c:673)
[21299.957065] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[21299.957147] ? handle_bug (arch/x86/kernel/traps.c:237)
[21299.957228] ? exc_invalid_op (arch/x86/kernel/traps.c:258 (discriminator 1))
[21299.957308] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:568)
[21299.957393] ? rcuref_put_slowpath (lib/rcuref.c:294 (discriminator 1))
[21299.957476] dst_release (net/core/dst.c:166 (discriminator 1))
[21299.957559] rt_cache_route (net/ipv4/route.c:1499)
[21299.957641] rt_set_nexthop.isra.0 (net/ipv4/route.c:1606 (discriminator 1))
[21299.957722] ip_route_input_slow (./include/net/lwtunnel.h:140 net/ipv4/route.c:1875 net/ipv4/route.c:2154 net/ipv4/route.c:2337)
[21299.957804] ? free_unref_page (./include/linux/list.h:150 (discriminator 1) ./include/linux/list.h:169 (discriminator 1) mm/page_alloc.c:2377 (discriminator 1) mm/page_alloc.c:2428 (discriminator 1))
[21299.957889] ip_route_input_noref (net/ipv4/route.c:2499)
[21299.957972] ip_rcv_finish_core.isra.0 (net/ipv4/ip_input.c:367 (discriminator 1))
[21299.958058] ip_rcv (net/ipv4/ip_input.c:448 ./include/linux/netfilter.h:304 ./include/linux/netfilter.h:298 net/ipv4/ip_input.c:569)
[21299.958139] ? ip_rcv_core (net/ipv4/ip_input.c:436)
[21299.958220] process_backlog (net/core/dev.c:5997)
[21299.958302] __napi_poll (net/core/dev.c:6556)
[21299.958384] net_rx_action (net/core/dev.c:6625 net/core/dev.c:6756)
[21299.958466] __do_softirq (./arch/x86/include/asm/preempt.h:27 kernel/softirq.c:564)
[21299.958549] irq_exit_rcu (kernel/softirq.c:436 kernel/softirq.c:641 kernel/softirq.c:653)
[21299.958631] sysvec_call_function_single (arch/x86/kernel/smp.c:262 (discriminator 47))
[21299.958714]  </IRQ>
[21299.958792]  <TASK>
[21299.958869] asm_sysvec_call_function_single (./arch/x86/include/asm/idtentry.h:656)
[21299.958953] RIP: 0010:acpi_safe_halt (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:72 drivers/acpi/processor_idle.c:113)
[21299.959038] Code: ed c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 65 48 8b 04 25 40 32 02 00 48 8b 00 a8 08 75 0c eb 07 0f 00 2d 57 0f 2c 00 fb f4 <fa> c3 0f 1f 00 0f b6 47 08 3c 01 74 0b 3c 02 74 05 8b 7f 04 eb 9f
All code
========
   0:	ed                   	in     (%dx),%eax
   1:	c3                   	ret
   2:	66 66 2e 0f 1f 84 00 	data16 cs nopw 0x0(%rax,%rax,1)
   9:	00 00 00 00
   d:	66 90                	xchg   %ax,%ax
   f:	65 48 8b 04 25 40 32 	mov    %gs:0x23240,%rax
  16:	02 00
  18:	48 8b 00             	mov    (%rax),%rax
  1b:	a8 08                	test   $0x8,%al
  1d:	75 0c                	jne    0x2b
  1f:	eb 07                	jmp    0x28
  21:	0f 00 2d 57 0f 2c 00 	verw   0x2c0f57(%rip)        # 0x2c0f7f
  28:	fb                   	sti
  29:	f4                   	hlt
  2a:*	fa                   	cli    		<-- trapping instruction
  2b:	c3                   	ret
  2c:	0f 1f 00             	nopl   (%rax)
  2f:	0f b6 47 08          	movzbl 0x8(%rdi),%eax
  33:	3c 01                	cmp    $0x1,%al
  35:	74 0b                	je     0x42
  37:	3c 02                	cmp    $0x2,%al
  39:	74 05                	je     0x40
  3b:	8b 7f 04             	mov    0x4(%rdi),%edi
  3e:	eb 9f                	jmp    0xffffffffffffffdf

Code starting with the faulting instruction
===========================================
   0:	fa                   	cli
   1:	c3                   	ret
   2:	0f 1f 00             	nopl   (%rax)
   5:	0f b6 47 08          	movzbl 0x8(%rdi),%eax
   9:	3c 01                	cmp    $0x1,%al
   b:	74 0b                	je     0x18
   d:	3c 02                	cmp    $0x2,%al
   f:	74 05                	je     0x16
  11:	8b 7f 04             	mov    0x4(%rdi),%edi
  14:	eb 9f                	jmp    0xffffffffffffffb5
[21299.959162] RSP: 0018:ffff96a7c015be80 EFLAGS: 00000246
[21299.959247] RAX: 0000000000004000 RBX: 0000000000000001 RCX: 000000000000001f
[21299.959343] RDX: ffff8b84bfbc0000 RSI: ffff8b75c76ba000 RDI: ffff8b75c76ba064
[21299.959437] RBP: ffffffffae216ea0 R08: ffffffffae216ea0 R09: 0000000000000003
[21299.959533] R10: 0000000000000002 R11: 0000000000000008 R12: 0000000000000001
[21299.959630] R13: ffffffffae216f08 R14: ffffffffae216f20 R15: 0000000000000000
[21299.959725] acpi_idle_enter (drivers/acpi/processor_idle.c:709)
[21299.959807] cpuidle_enter_state (drivers/cpuidle/cpuidle.c:267)
[21299.959890] cpuidle_enter (drivers/cpuidle/cpuidle.c:390 (discriminator 2))
[21299.959975] do_idle (kernel/sched/idle.c:134 kernel/sched/idle.c:215 kernel/sched/idle.c:282)
[21299.960058] cpu_startup_entry (kernel/sched/idle.c:379)
[21299.960140] start_secondary (arch/x86/kernel/smpboot.c:326)
[21299.960223] secondary_startup_64_no_verify (arch/x86/kernel/head_64.S:433)
[21299.960306]  </TASK>
[21299.960384] ---[ end trace 0000000000000000 ]---

> On 22 Dec 2023, at 19:26, Martin Zaharinov <micron10@...il.com> wrote:
> 
> Hi Thomas,
> 
> this is with applyed patch from you.
> See logs
> 
> 
> [43040.198064] ------------[ cut here ]------------
> [43040.198407] WARNING: CPU: 47 PID: 0 at lib/rcuref.c:294 rcuref_put_slowpath+0x2f/0x70
> [43040.198685] Modules linked in: pppoe pppox ppp_generic slhc nft_limit nft_ct nft_nat nft_chain_nat nf_tables netconsole tg3 igb i2c_algo_bit e1000e bnxt_en mlx5_core mlxfw mlx4_en mlx4_core i40e ixgbe mdio nf_nat_sip nf_conntrack_sip nf_nat_pptp nf_conntrack_pptp nf_nat_tftp nf_conntrack_tftp nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ipmi_devintf ipmi_msghandler rtc_cmos
> [43040.199478] CPU: 47 PID: 0 Comm: swapper/47 Tainted: G           O       6.6.8 #1
> [43040.199660] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
> [43040.199886] RIP: 0010:rcuref_put_slowpath+0x2f/0x70
> [43040.200028] Code: 07 83 f8 ff 75 19 ba 00 00 00 e0 f0 0f b1 17 83 f8 ff 74 04 31 c0 5b c3 b8 01 00 00 00 5b c3 3d ff ff ff bf 77 14 85 c0 78 06 <0f> 0b 31 c0 eb e6 c7 07 00 00 00 a0 31 c0 eb dc 80 3d e2 4e e3 00
> [43040.200387] RSP: 0018:ffffa39d83e88c30 EFLAGS: 00010246
> [43040.200528] RAX: 0000000000000000 RBX: ffff9c58e966b840 RCX: ffff9c5bc4e35680
> [43040.200700] RDX: ffff9c5fafde4f08 RSI: 00000000fffffe01 RDI: ffff9c58e966b840
> [43040.200871] RBP: ffff9c5fafde4f08 R08: ffff9c5fafde4f08 R09: 0000000000000001
> [43040.201044] R10: 00000000000286e0 R11: 0000000000000001 R12: ffff9c58e966b800
> [43040.201255] R13: ffff9c58e966b868 R14: ffff9c5fafde4f08 R15: 000000008f5de42b
> [43040.201439] FS:  0000000000000000(0000) GS:ffff9c5fafdc0000(0000) knlGS:0000000000000000
> [43040.201642] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [43040.201799] CR2: 00007f1401217714 CR3: 0000000464b94003 CR4: 00000000001706e0
> [43040.201994] Call Trace:
> [43040.202095]  <IRQ>
> [43040.202187]  ? __warn+0x6c/0x130
> [43040.202301]  ? report_bug+0x1b8/0x200
> [43040.202418]  ? handle_bug+0x36/0x70
> [43040.202534]  ? exc_invalid_op+0x17/0x1a0
> [43040.202652]  ? asm_exc_invalid_op+0x16/0x20
> [43040.202781]  ? rcuref_put_slowpath+0x2f/0x70
> [43040.202909]  dst_release+0x1c/0x40
> [43040.203026]  rt_cache_route+0xbd/0xf0
> [43040.203143]  rt_set_nexthop.isra.0+0x1b6/0x450
> [43040.203272]  ip_route_input_slow+0x5d9/0xcc0
> [43040.203401]  ? nf_conntrack_udp_packet+0x17c/0x240 [nf_conntrack]
> [43040.203581]  ip_route_input_noref+0xe0/0xf0
> [43040.203704]  ip_rcv_finish_core.isra.0+0xbb/0x440
> [43040.203855]  ip_rcv+0xd5/0x110
> [43040.203962]  ? ip_rcv_core+0x360/0x360
> [43040.204079]  process_backlog+0x107/0x210
> [43040.204201]  __napi_poll+0x20/0x180
> [43040.204315]  net_rx_action+0x29f/0x380
> [43040.204432]  __do_softirq+0xd0/0x202
> [43040.204549]  irq_exit_rcu+0x82/0xa0
> [43040.204667]  common_interrupt+0x7a/0xa0
> [43040.204786]  </IRQ>
> [43040.204876]  <TASK>
> [43040.204965]  asm_common_interrupt+0x22/0x40
> [43040.205090] RIP: 0010:acpi_safe_halt+0x1b/0x20
> [43040.205220] Code: ed c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 65 48 8b 04 25 40 32 02 00 48 8b 00 a8 08 75 0c eb 07 0f 00 2d 57 0f 2c 00 fb f4 <fa> c3 0f 1f 00 0f b6 47 08 3c 01 74 0b 3c 02 74 05 8b 7f 04 eb 9f
> [43040.205578] RSP: 0018:ffffa39d8234fe80 EFLAGS: 00000246
> [43040.205718] RAX: 0000000000004000 RBX: 0000000000000001 RCX: 000000000000001f
> [43040.205890] RDX: ffff9c5fafdc0000 RSI: ffff9c5882e95800 RDI: ffff9c5882e95864
> [43040.206063] RBP: ffffffffa9216ea0 R08: ffffffffa9216ea0 R09: 0000000000000003
> [43040.206246] R10: 0000000000000002 R11: 0000000000000008 R12: 0000000000000001
> [43040.206419] R13: ffffffffa9216f08 R14: ffffffffa9216f20 R15: 0000000000000000
> [43040.206593]  acpi_idle_enter+0x77/0xc0
> [43040.206711]  cpuidle_enter_state+0x69/0x6a0
> [43040.206835]  cpuidle_enter+0x24/0x40
> [43040.206954]  do_idle+0x1a7/0x210
> [43040.207066]  cpu_startup_entry+0x21/0x30
> [43040.207188]  start_secondary+0xe1/0xf0
> [43040.207310]  secondary_startup_64_no_verify+0x166/0x16b
> [43040.207451]  </TASK>
> [43040.207542] ---[ end trace 0000000000000000 ]---
> 
> 
> 
> [43040.198064] ------------[ cut here ]------------
> [43040.198407] WARNING: CPU: 47 PID: 0 at lib/rcuref.c:294 rcuref_put_slowpath (lib/rcuref.c:294 (discriminator 1))
> [43040.198685] Modules linked in: pppoe pppox ppp_generic slhc nft_limit nft_ct nft_nat nft_chain_nat nf_tables netconsole tg3 igb i2c_algo_bit e1000e bnxt_en mlx5_core mlxfw mlx4_en mlx4_core i40e ixgbe mdio nf_nat_sip nf_conntrack_sip nf_nat_pptp nf_conntrack_pptp nf_nat_tftp nf_conntrack_tftp nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ipmi_devintf ipmi_msghandler rtc_cmos
> [43040.199478] CPU: 47 PID: 0 Comm: swapper/47 Tainted: G           O       6.6.8 #1
> [43040.199660] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
> [43040.199886] RIP: 0010:rcuref_put_slowpath (lib/rcuref.c:294 (discriminator 1))
> [43040.200028] Code: 07 83 f8 ff 75 19 ba 00 00 00 e0 f0 0f b1 17 83 f8 ff 74 04 31 c0 5b c3 b8 01 00 00 00 5b c3 3d ff ff ff bf 77 14 85 c0 78 06 <0f> 0b 31 c0 eb e6 c7 07 00 00 00 a0 31 c0 eb dc 80 3d e2 4e e3 00
> All code
> ========
>   0: 07                    (bad)
>   1: 83 f8 ff              cmp    $0xffffffff,%eax
>   4: 75 19                 jne    0x1f
>   6: ba 00 00 00 e0        mov    $0xe0000000,%edx
>   b: f0 0f b1 17           lock cmpxchg %edx,(%rdi)
>   f: 83 f8 ff              cmp    $0xffffffff,%eax
>  12: 74 04                 je     0x18
>  14: 31 c0                 xor    %eax,%eax
>  16: 5b                    pop    %rbx
>  17: c3                    ret
>  18: b8 01 00 00 00        mov    $0x1,%eax
>  1d: 5b                    pop    %rbx
>  1e: c3                    ret
>  1f: 3d ff ff ff bf        cmp    $0xbfffffff,%eax
>  24: 77 14                 ja     0x3a
>  26: 85 c0                 test   %eax,%eax
>  28: 78 06                 js     0x30
>  2a:* 0f 0b                 ud2     <-- trapping instruction
>  2c: 31 c0                 xor    %eax,%eax
>  2e: eb e6                 jmp    0x16
>  30: c7 07 00 00 00 a0     movl   $0xa0000000,(%rdi)
>  36: 31 c0                 xor    %eax,%eax
>  38: eb dc                 jmp    0x16
>  3a: 80                    .byte 0x80
>  3b: 3d e2 4e e3 00        cmp    $0xe34ee2,%eax
> 
> Code starting with the faulting instruction
> ===========================================
>   0: 0f 0b                 ud2
>   2: 31 c0                 xor    %eax,%eax
>   4: eb e6                 jmp    0xffffffffffffffec
>   6: c7 07 00 00 00 a0     movl   $0xa0000000,(%rdi)
>   c: 31 c0                 xor    %eax,%eax
>   e: eb dc                 jmp    0xffffffffffffffec
>  10: 80                    .byte 0x80
>  11: 3d e2 4e e3 00        cmp    $0xe34ee2,%eax
> [43040.200387] RSP: 0018:ffffa39d83e88c30 EFLAGS: 00010246
> [43040.200528] RAX: 0000000000000000 RBX: ffff9c58e966b840 RCX: ffff9c5bc4e35680
> [43040.200700] RDX: ffff9c5fafde4f08 RSI: 00000000fffffe01 RDI: ffff9c58e966b840
> [43040.200871] RBP: ffff9c5fafde4f08 R08: ffff9c5fafde4f08 R09: 0000000000000001
> [43040.201044] R10: 00000000000286e0 R11: 0000000000000001 R12: ffff9c58e966b800
> [43040.201255] R13: ffff9c58e966b868 R14: ffff9c5fafde4f08 R15: 000000008f5de42b
> [43040.201439] FS:  0000000000000000(0000) GS:ffff9c5fafdc0000(0000) knlGS:0000000000000000
> [43040.201642] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [43040.201799] CR2: 00007f1401217714 CR3: 0000000464b94003 CR4: 00000000001706e0
> [43040.201994] Call Trace:
> [43040.202095]  <IRQ>
> [43040.202187] ? __warn (kernel/panic.c:235 kernel/panic.c:673)
> [43040.202301] ? report_bug (lib/bug.c:180 lib/bug.c:219)
> [43040.202418] ? handle_bug (arch/x86/kernel/traps.c:237)
> [43040.202534] ? exc_invalid_op (arch/x86/kernel/traps.c:258 (discriminator 1))
> [43040.202652] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:568)
> [43040.202781] ? rcuref_put_slowpath (lib/rcuref.c:294 (discriminator 1))
> [43040.202909] dst_release (net/core/dst.c:166 (discriminator 1))
> [43040.203026] rt_cache_route (net/ipv4/route.c:1499)
> [43040.203143] rt_set_nexthop.isra.0 (net/ipv4/route.c:1606 (discriminator 1))
> [43040.203272] ip_route_input_slow (./include/net/lwtunnel.h:140 net/ipv4/route.c:1875 net/ipv4/route.c:2154 net/ipv4/route.c:2337)
> [43040.203401] ? nf_conntrack_udp_packet (net/netfilter/nf_conntrack_proto_udp.c:124) nf_conntrack
> [43040.203581] ip_route_input_noref (net/ipv4/route.c:2499)
> [43040.203704] ip_rcv_finish_core.isra.0 (net/ipv4/ip_input.c:367 (discriminator 1))
> [43040.203855] ip_rcv (net/ipv4/ip_input.c:448 ./include/linux/netfilter.h:304 ./include/linux/netfilter.h:298 net/ipv4/ip_input.c:569)
> [43040.203962] ? ip_rcv_core (net/ipv4/ip_input.c:436)
> [43040.204079] process_backlog (net/core/dev.c:5997)
> [43040.204201] __napi_poll (net/core/dev.c:6556)
> [43040.204315] net_rx_action (net/core/dev.c:6625 net/core/dev.c:6756)
> [43040.204432] __do_softirq (./arch/x86/include/asm/preempt.h:27 kernel/softirq.c:564)
> [43040.204549] irq_exit_rcu (kernel/softirq.c:436 kernel/softirq.c:641 kernel/softirq.c:653)
> [43040.204667] common_interrupt (arch/x86/kernel/irq.c:247 (discriminator 47))
> [43040.204786]  </IRQ>
> [43040.204876]  <TASK>
> [43040.204965] asm_common_interrupt (./arch/x86/include/asm/idtentry.h:640)
> [43040.205090] RIP: 0010:acpi_safe_halt (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:72 drivers/acpi/processor_idle.c:113)
> [43040.205220] Code: ed c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 65 48 8b 04 25 40 32 02 00 48 8b 00 a8 08 75 0c eb 07 0f 00 2d 57 0f 2c 00 fb f4 <fa> c3 0f 1f 00 0f b6 47 08 3c 01 74 0b 3c 02 74 05 8b 7f 04 eb 9f
> All code
> ========
>   0: ed                    in     (%dx),%eax
>   1: c3                    ret
>   2: 66 66 2e 0f 1f 84 00 data16 cs nopw 0x0(%rax,%rax,1)
>   9: 00 00 00 00
>   d: 66 90                 xchg   %ax,%ax
>   f: 65 48 8b 04 25 40 32 mov    %gs:0x23240,%rax
>  16: 02 00
>  18: 48 8b 00              mov    (%rax),%rax
>  1b: a8 08                 test   $0x8,%al
>  1d: 75 0c                 jne    0x2b
>  1f: eb 07                 jmp    0x28
>  21: 0f 00 2d 57 0f 2c 00 verw   0x2c0f57(%rip)        # 0x2c0f7f
>  28: fb                    sti
>  29: f4                    hlt
>  2a:* fa                    cli     <-- trapping instruction
>  2b: c3                    ret
>  2c: 0f 1f 00              nopl   (%rax)
>  2f: 0f b6 47 08           movzbl 0x8(%rdi),%eax
>  33: 3c 01                 cmp    $0x1,%al
>  35: 74 0b                 je     0x42
>  37: 3c 02                 cmp    $0x2,%al
>  39: 74 05                 je     0x40
>  3b: 8b 7f 04              mov    0x4(%rdi),%edi
>  3e: eb 9f                 jmp    0xffffffffffffffdf
> 
> Code starting with the faulting instruction
> ===========================================
>   0: fa                    cli
>   1: c3                    ret
>   2: 0f 1f 00              nopl   (%rax)
>   5: 0f b6 47 08           movzbl 0x8(%rdi),%eax
>   9: 3c 01                 cmp    $0x1,%al
>   b: 74 0b                 je     0x18
>   d: 3c 02                 cmp    $0x2,%al
>   f: 74 05                 je     0x16
>  11: 8b 7f 04              mov    0x4(%rdi),%edi
>  14: eb 9f                 jmp    0xffffffffffffffb5
> [43040.205578] RSP: 0018:ffffa39d8234fe80 EFLAGS: 00000246
> [43040.205718] RAX: 0000000000004000 RBX: 0000000000000001 RCX: 000000000000001f
> [43040.205890] RDX: ffff9c5fafdc0000 RSI: ffff9c5882e95800 RDI: ffff9c5882e95864
> [43040.206063] RBP: ffffffffa9216ea0 R08: ffffffffa9216ea0 R09: 0000000000000003
> [43040.206246] R10: 0000000000000002 R11: 0000000000000008 R12: 0000000000000001
> [43040.206419] R13: ffffffffa9216f08 R14: ffffffffa9216f20 R15: 0000000000000000
> [43040.206593] acpi_idle_enter (drivers/acpi/processor_idle.c:709)
> [43040.206711] cpuidle_enter_state (drivers/cpuidle/cpuidle.c:267)
> [43040.206835] cpuidle_enter (drivers/cpuidle/cpuidle.c:390 (discriminator 2))
> [43040.206954] do_idle (kernel/sched/idle.c:134 kernel/sched/idle.c:215 kernel/sched/idle.c:282)
> [43040.207066] cpu_startup_entry (kernel/sched/idle.c:379)
> [43040.207188] start_secondary (arch/x86/kernel/smpboot.c:326)
> [43040.207310] secondary_startup_64_no_verify (arch/x86/kernel/head_64.S:433)
> [43040.207451]  </TASK>
> [43040.207542] ---[ end trace 0000000000000000 ]---
> 
>> On 19 Dec 2023, at 16:26, Thomas Gleixner <tglx@...utronix.de> wrote:
>> 
>> On Tue, Dec 19 2023 at 11:25, Martin Zaharinov wrote:
>>>> On 12 Dec 2023, at 20:16, Thomas Gleixner <tglx@...utronix.de> wrote:
>>>> Btw, how easy is this to reproduce?
>>> 
>>> Its not easy this report is generate on machine with 5-6k users , with
>>> traffic and one time is show on 1 day , other show after 4-5 days…
>> 
>> I love those bugs ...
>> 
>>> Apply this patch and will upload image on one machine as fast as
>>> possible and when get any reports will send you.
>> 
>> Let's see how that goes!
>> 
>> Thanks,
>> 
>>       tglx
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ