BUG: soft lockup in ip_rcv (3)

10 views
Skip to first unread message

syzbot

unread,
May 7, 2022, 6:08:21 AM5/7/22
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: e3a56aaade89 Linux 4.14.277
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1122b422f00000
kernel config: https://syzkaller.appspot.com/x/.config?x=24efab1c7c06be56
dashboard link: https://syzkaller.appspot.com/bug?extid=a17e7f7bd5aff5b3f964
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+a17e7f...@syzkaller.appspotmail.com

watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [syz-executor.0:11507]
Modules linked in:
irq event stamp: 5698021
hardirqs last enabled at (5698020): [<ffffffff87400976>] restore_regs_and_return_to_kernel+0x0/0x2a
hardirqs last disabled at (5698021): [<ffffffff874018ae>] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793
softirqs last enabled at (5694296): [<ffffffff8760068b>] __do_softirq+0x68b/0x9ff kernel/softirq.c:314
softirqs last disabled at (5694299): [<ffffffff81321cf3>] invoke_softirq kernel/softirq.c:368 [inline]
softirqs last disabled at (5694299): [<ffffffff81321cf3>] irq_exit+0x193/0x240 kernel/softirq.c:409
CPU: 1 PID: 11507 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff888098286580 task.stack: ffff888097c88000
RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:41 [inline]
RIP: 0010:stack_access_ok arch/x86/kernel/unwind_orc.c:276 [inline]
RIP: 0010:deref_stack_reg+0x8d/0x1a0 arch/x86/kernel/unwind_orc.c:286
RSP: 0018:ffff8880ba506bb8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10
RAX: dffffc0000000000 RBX: 1ffff110174a0d78 RCX: ffffffff8a69e408
RDX: 1ffff110174a0db2 RSI: ffff8880ba506df8 RDI: ffff8880ba506d90
RBP: ffff8880ba506df8 R08: 0000000000000001 R09: 0000000000000001
R10: ffff8880ba506e08 R11: 0000000000000001 R12: ffff8880ba506d88
R13: ffff8880ba506dc8 R14: ffff8880ba506dd8 R15: ffff8880ba506d88
FS: 00007f188bac5700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555556589848 CR3: 00000000a5ba5000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
unwind_next_frame+0xfcc/0x17d0 arch/x86/kernel/unwind_orc.c:474
__unwind_start+0x594/0x930 arch/x86/kernel/unwind_orc.c:583
unwind_start arch/x86/include/asm/unwind.h:60 [inline]
__save_stack_trace+0x63/0x160 arch/x86/kernel/stacktrace.c:43
save_stack mm/kasan/kasan.c:447 [inline]
set_track mm/kasan/kasan.c:459 [inline]
kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551
kmem_cache_alloc_node_trace+0x153/0x400 mm/slab.c:3661
__do_kmalloc_node mm/slab.c:3681 [inline]
__kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3696
__kmalloc_reserve net/core/skbuff.c:137 [inline]
pskb_expand_head+0x128/0xd30 net/core/skbuff.c:1471
__skb_cow include/linux/skbuff.h:2973 [inline]
skb_cow_head include/linux/skbuff.h:3007 [inline]
ip_tunnel_xmit+0xe3e/0x33e0 net/ipv4/ip_tunnel.c:792
sit_tunnel_xmit__ net/ipv6/sit.c:1006 [inline]
sit_tunnel_xmit+0x1ab/0x2130 net/ipv6/sit.c:1019
__netdev_start_xmit include/linux/netdevice.h:4054 [inline]
netdev_start_xmit include/linux/netdevice.h:4063 [inline]
xmit_one net/core/dev.c:3005 [inline]
dev_hard_start_xmit+0x188/0x890 net/core/dev.c:3021
__dev_queue_xmit+0x1d7f/0x2480 net/core/dev.c:3521
neigh_output include/net/neighbour.h:500 [inline]
ip_finish_output2+0xba6/0x1340 net/ipv4/ip_output.c:237
ip_finish_output+0x37c/0xc50 net/ipv4/ip_output.c:325
NF_HOOK_COND include/linux/netfilter.h:239 [inline]
ip_output+0x1cd/0x510 net/ipv4/ip_output.c:413
dst_output include/net/dst.h:470 [inline]
ip_local_out+0x93/0x170 net/ipv4/ip_output.c:125
nf_dup_ipv4 net/ipv4/netfilter/nf_dup_ipv4.c:91 [inline]
nf_dup_ipv4+0x4bb/0x680 net/ipv4/netfilter/nf_dup_ipv4.c:53
tee_tg4+0x109/0x160 net/netfilter/xt_TEE.c:36
ipt_do_table+0xa9d/0x16f0 net/ipv4/netfilter/ip_tables.c:353
iptable_filter_hook+0x172/0x1e0 net/ipv4/netfilter/iptable_filter.c:47
nf_hook_entry_hookfn include/linux/netfilter.h:108 [inline]
nf_hook_slow+0xb0/0x1a0 net/netfilter/core.c:468
nf_hook include/linux/netfilter.h:205 [inline]
NF_HOOK include/linux/netfilter.h:248 [inline]
ip_local_deliver+0x28c/0x460 net/ipv4/ip_input.c:257
dst_input include/net/dst.h:476 [inline]
ip_rcv_finish+0x6e3/0x19f0 net/ipv4/ip_input.c:396
NF_HOOK include/linux/netfilter.h:250 [inline]
ip_rcv+0x8a7/0xf10 net/ipv4/ip_input.c:493
__netif_receive_skb_core+0x15ee/0x2a30 net/core/dev.c:4474
__netif_receive_skb+0x27/0x1a0 net/core/dev.c:4512
process_backlog+0x218/0x6f0 net/core/dev.c:5195
napi_poll net/core/dev.c:5604 [inline]
net_rx_action+0x466/0xfd0 net/core/dev.c:5670
__do_softirq+0x24d/0x9ff kernel/softirq.c:288
invoke_softirq kernel/softirq.c:368 [inline]
irq_exit+0x193/0x240 kernel/softirq.c:409
exiting_irq arch/x86/include/asm/apic.h:638 [inline]
smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106
apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793
</IRQ>
RIP: 0010:pte_val arch/x86/include/asm/paravirt.h:384 [inline]
RIP: 0010:pte_pfn arch/x86/include/asm/pgtable.h:194 [inline]
RIP: 0010:_vm_normal_page+0x78/0x3b0 mm/memory.c:855
RSP: 0018:ffff888097c8f778 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10
RAX: 1ffff11012f91ef5 RBX: dffffc0000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 00007f188c536000 RDI: ffff88809cee3b98
RBP: 1ffff11012f91ef1 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000000000 R11: ffff888098286580 R12: 8000000095231007
R13: ffff88809cee3b98 R14: 00007f188c536000 R15: ffff888097c8f7a8
zap_pte_range mm/memory.c:1348 [inline]
zap_pmd_range mm/memory.c:1479 [inline]
zap_pud_range mm/memory.c:1508 [inline]
zap_p4d_range mm/memory.c:1529 [inline]
unmap_page_range+0xcdf/0x1d90 mm/memory.c:1550
unmap_single_vma+0x147/0x2b0 mm/memory.c:1595
unmap_vmas+0x9d/0x160 mm/memory.c:1625
exit_mmap+0x270/0x4d0 mm/mmap.c:3058
__mmput kernel/fork.c:931 [inline]
mmput kernel/fork.c:952 [inline]
mmput+0xfa/0x420 kernel/fork.c:947
exit_mm kernel/exit.c:548 [inline]
do_exit+0x984/0x2850 kernel/exit.c:855
do_group_exit+0x100/0x2e0 kernel/exit.c:965
get_signal+0x38d/0x1ca0 kernel/signal.c:2412
do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792
exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
prepare_exit_to_usermode+0x1af/0x210 arch/x86/entry/common.c:199
retint_user+0x8/0x18
RIP: 0033:0x7f188d0f6fcd
RSP: 002b:00007f188bac5190 EFLAGS: 00010206
RAX: 00000000000034d0 RBX: 00007f188d262f60 RCX: 00007f188d1aa08d
RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000005
RBP: 00007f188d1aa08d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd8b88bf1f R14: 00007f188bac5300 R15: 0000000000022000
Code: 08 3c 03 0f 8e fa 00 00 00 41 8b 04 24 85 c0 74 62 49 8d 7c 24 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 <0f> 85 e6 00 00 00 49 8d 7c 24 10 4d 8b 74 24 08 48 b8 00 00 00
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 11525 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff888092166280 task.stack: ffff8880b4e60000
RIP: 0010:__sanitizer_cov_trace_pc+0x15/0x50 kernel/kcov.c:65
RSP: 0018:ffff8880ba4073e8 EFLAGS: 00000082
RAX: ffff888092166280 RBX: ffffffff88f091e0 RCX: 0000000000000000
RDX: 0000000000010301 RSI: 0000000000000000 RDI: ffffffff88f091e0
RBP: fffffbfff11e1310 R08: ffffffff8b9d7858 R09: 0000000000000003
R10: 0000000000000000 R11: ffff888092166280 R12: dffffc0000000000
R13: 1ffffffff11e1312 R14: 0000000000006f80 R15: 00000026dc2d2b68
FS: 00007fb830d0a700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000056004c8f18c8 CR3: 00000000b078a000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
debug_smp_processor_id+0x5/0x20 lib/smp_processor_id.c:57
kvm_clock_read+0xc/0x30 arch/x86/kernel/kvmclock.c:86
tk_clock_read kernel/time/timekeeping.c:144 [inline]
timekeeping_get_delta kernel/time/timekeeping.c:238 [inline]
timekeeping_get_ns kernel/time/timekeeping.c:344 [inline]
ktime_get+0x15e/0x2c0 kernel/time/timekeeping.c:762
clockevents_program_event+0x108/0x2d0 kernel/time/clockevents.c:331
tick_program_event+0x78/0xd0 kernel/time/tick-oneshot.c:47
hrtimer_interrupt+0x336/0x5e0 kernel/time/hrtimer.c:1334
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1079 [inline]
smp_apic_timer_interrupt+0x117/0x5e0 arch/x86/kernel/apic/apic.c:1104
apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:779 [inline]
RIP: 0010:slab_alloc_node mm/slab.c:3327 [inline]
RIP: 0010:kmem_cache_alloc_node_trace+0x304/0x400 mm/slab.c:3659
RSP: 0018:ffff8880ba407620 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff10
RAX: 0000000000000007 RBX: 0000000001090220 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff888092166b58 RDI: 0000000000000286
RBP: ffff88813fe74c40 R08: ffffffff8b9dcb88 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff888065e41480
R13: 0000000001090220 R14: 0000000000000480 R15: ffff88813fe74c40
__do_kmalloc_node mm/slab.c:3681 [inline]
__kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3696
__kmalloc_reserve net/core/skbuff.c:137 [inline]
__alloc_skb+0x96/0x510 net/core/skbuff.c:205
__pskb_copy_fclone+0x100/0xc90 net/core/skbuff.c:1395
__pskb_copy include/linux/skbuff.h:1034 [inline]
pskb_copy include/linux/skbuff.h:2932 [inline]
nf_dup_ipv4 net/ipv4/netfilter/nf_dup_ipv4.c:65 [inline]
nf_dup_ipv4+0x105/0x680 net/ipv4/netfilter/nf_dup_ipv4.c:53
tee_tg4+0x109/0x160 net/netfilter/xt_TEE.c:36
ipt_do_table+0xa9d/0x16f0 net/ipv4/netfilter/ip_tables.c:353
iptable_filter_hook+0x172/0x1e0 net/ipv4/netfilter/iptable_filter.c:47
nf_hook_entry_hookfn include/linux/netfilter.h:108 [inline]
nf_hook_slow+0xb0/0x1a0 net/netfilter/core.c:468
nf_hook include/linux/netfilter.h:205 [inline]
NF_HOOK include/linux/netfilter.h:248 [inline]
ip_local_deliver+0x28c/0x460 net/ipv4/ip_input.c:257
dst_input include/net/dst.h:476 [inline]
ip_rcv_finish+0x6e3/0x19f0 net/ipv4/ip_input.c:396
NF_HOOK include/linux/netfilter.h:250 [inline]
ip_rcv+0x8a7/0xf10 net/ipv4/ip_input.c:493
__netif_receive_skb_core+0x15ee/0x2a30 net/core/dev.c:4474
__netif_receive_skb+0x27/0x1a0 net/core/dev.c:4512
process_backlog+0x218/0x6f0 net/core/dev.c:5195
napi_poll net/core/dev.c:5604 [inline]
net_rx_action+0x466/0xfd0 net/core/dev.c:5670
__do_softirq+0x24d/0x9ff kernel/softirq.c:288
invoke_softirq kernel/softirq.c:368 [inline]
irq_exit+0x193/0x240 kernel/softirq.c:409
exiting_irq arch/x86/include/asm/apic.h:638 [inline]
smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106
apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793
</IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:779 [inline]
RIP: 0010:qlink_free mm/kasan/quarantine.c:150 [inline]
RIP: 0010:qlist_free_all+0xfc/0x140 mm/kasan/quarantine.c:166
RSP: 0018:ffff8880b4e67778 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff10
RAX: 0000000000000007 RBX: ffff8880af2dc040 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff888092166b08 RDI: 0000000000000286
RBP: 0000000000000000 R08: 0000000000000060 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88809b8e3580
R13: ffff8880b4e677b0 R14: ffff88813fe74ac0 R15: 0000000000000286
quarantine_reduce+0x185/0x200 mm/kasan/quarantine.c:259
kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:536
slab_post_alloc_hook mm/slab.h:442 [inline]
slab_alloc mm/slab.c:3390 [inline]
kmem_cache_alloc+0x111/0x3c0 mm/slab.c:3550
kmem_cache_zalloc include/linux/slab.h:651 [inline]
taskstats_tgid_alloc kernel/taskstats.c:579 [inline]
taskstats_exit+0x5f3/0xb50 kernel/taskstats.c:618
do_exit+0x52c/0x2850 kernel/exit.c:853
do_group_exit+0x100/0x2e0 kernel/exit.c:965
get_signal+0x38d/0x1ca0 kernel/signal.c:2412
do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792
exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7fb8323950e9
RSP: 002b:00007fb830d0a168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: 00000000000034d0 RBX: 00007fb8324a7f60 RCX: 00007fb8323950e9
RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000005
RBP: 00007fb8323ef08d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fffb2538fbf R14: 00007fb830d0a300 R15: 0000000000022000
Code: 29 00 e9 2c fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 65 48 8b 04 25 c0 7f 02 00 48 85 c0 74 1a 65 8b 15 9b 38 ad 7e <81> e2 00 01 1f 00 75 0b 8b 90 58 13 00 00 83 fa 01 74 01 c3 48
----------------
Code disassembly (best guess):
0: 08 3c 03 or %bh,(%rbx,%rax,1)
3: 0f 8e fa 00 00 00 jle 0x103
9: 41 8b 04 24 mov (%r12),%eax
d: 85 c0 test %eax,%eax
f: 74 62 je 0x73
11: 49 8d 7c 24 08 lea 0x8(%r12),%rdi
16: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
1d: fc ff df
20: 48 89 fa mov %rdi,%rdx
23: 48 c1 ea 03 shr $0x3,%rdx
27: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
* 2b: 0f 85 e6 00 00 00 jne 0x117 <-- trapping instruction
31: 49 8d 7c 24 10 lea 0x10(%r12),%rdi
36: 4d 8b 74 24 08 mov 0x8(%r12),%r14
3b: 48 rex.W
3c: b8 .byte 0xb8
3d: 00 00 add %al,(%rax)


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jul 5, 2022, 7:06:23 PM7/5/22
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: ed2e96e11936 Linux 4.14.286
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=13749bbc080000
kernel config: https://syzkaller.appspot.com/x/.config?x=d9ccbaec7c54db8b
dashboard link: https://syzkaller.appspot.com/bug?extid=a17e7f7bd5aff5b3f964
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15eaac20080000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=149f11ec080000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+a17e7f...@syzkaller.appspotmail.com

syz-executor245 (8210) used greatest stack depth: 23176 bytes left
ip_tables: iptables: counters copy to user failed while replacing table
ip_tables: iptables: counters copy to user failed while replacing table
watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [ksoftirqd/1:18]
Modules linked in:
irq event stamp: 4331513
hardirqs last enabled at (4331512): [<ffffffff817ec390>] slab_alloc_node mm/slab.c:3327 [inline]
hardirqs last enabled at (4331512): [<ffffffff817ec390>] kmem_cache_alloc_node_trace+0x2f0/0x400 mm/slab.c:3659
hardirqs last disabled at (4331513): [<ffffffff874018ae>] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793
softirqs last enabled at (608060): [<ffffffff8760068b>] __do_softirq+0x68b/0x9ff kernel/softirq.c:314
softirqs last disabled at (608065): [<ffffffff81321920>] run_ksoftirqd+0x50/0x1a0 kernel/softirq.c:670
CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.14.286-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
task: ffff8880b54a64c0 task.stack: ffff8880b54b0000
RIP: 0010:deref_stack_reg+0x28/0x1a0 arch/x86/kernel/unwind_orc.c:285
RSP: 0018:ffff8880b54b61e0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff10
RAX: dffffc0000000000 RBX: 1ffff11016a96c52 RCX: ffffffff8acde3ce
RDX: ffff8880b54b6360 RSI: ffff8880b54b74d8 RDI: ffff8880b54b6318
RBP: ffff8880b54b74d8 R08: ffffffff8acde3d2 R09: ffffffff8acde3d3
R10: 0000000000112a23 R11: 0000000000000001 R12: ffff8880b54b6318
R13: ffff8880b54b6360 R14: ffff8880b54b6368 R15: ffff8880b54b6318
FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020618000 CR3: 000000009d772000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
unwind_next_frame+0xc98/0x17d0 arch/x86/kernel/unwind_orc.c:425
__save_stack_trace+0x90/0x160 arch/x86/kernel/stacktrace.c:44
save_stack mm/kasan/kasan.c:447 [inline]
set_track mm/kasan/kasan.c:459 [inline]
kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551
slab_post_alloc_hook mm/slab.h:442 [inline]
slab_alloc_node mm/slab.c:3333 [inline]
kmem_cache_alloc_node_trace+0x13d/0x400 mm/slab.c:3659
__do_kmalloc_node mm/slab.c:3681 [inline]
__kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3696
__kmalloc_reserve net/core/skbuff.c:137 [inline]
__alloc_skb+0x96/0x510 net/core/skbuff.c:205
skb_segment+0x677/0x2e60 net/core/skbuff.c:3683
sctp_gso_segment net/sctp/offload.c:76 [inline]
sctp_gso_segment+0x204/0x810 net/sctp/offload.c:43
inet_gso_segment+0x487/0x10f0 net/ipv4/af_inet.c:1272
inet_gso_segment+0x487/0x10f0 net/ipv4/af_inet.c:1272
skb_mac_gso_segment+0x240/0x4c0 net/core/dev.c:2745
__skb_gso_segment+0x302/0x600 net/core/dev.c:2818
skb_gso_segment include/linux/netdevice.h:4005 [inline]
validate_xmit_skb+0x49c/0x9f0 net/core/dev.c:3071
validate_xmit_skb_list+0xaf/0x110 net/core/dev.c:3122
sch_direct_xmit+0x2dc/0x500 net/sched/sch_generic.c:181
qdisc_restart net/sched/sch_generic.c:249 [inline]
__qdisc_run+0x25d/0xe00 net/sched/sch_generic.c:257
__dev_xmit_skb net/core/dev.c:3231 [inline]
__dev_queue_xmit+0x13ac/0x2480 net/core/dev.c:3489
neigh_hh_output include/net/neighbour.h:490 [inline]
neigh_output include/net/neighbour.h:498 [inline]
ip_finish_output2+0x9db/0x1340 net/ipv4/ip_output.c:237
ip_finish_output+0x37c/0xc50 net/ipv4/ip_output.c:325
NF_HOOK_COND include/linux/netfilter.h:239 [inline]
ip_output+0x1cd/0x510 net/ipv4/ip_output.c:413
dst_output include/net/dst.h:470 [inline]
ip_local_out+0x93/0x170 net/ipv4/ip_output.c:125
iptunnel_xmit+0x5cc/0x950 net/ipv4/ip_tunnel_core.c:91
ip_tunnel_xmit+0xedc/0x33e0 net/ipv4/ip_tunnel.c:799
run_ksoftirqd+0x50/0x1a0 kernel/softirq.c:670
smpboot_thread_fn+0x5c1/0x920 kernel/smpboot.c:164
kthread+0x30d/0x420 kernel/kthread.c:232
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Code: 00 00 00 48 b8 00 00 00 00 00 fc ff df 41 56 41 55 49 89 d5 41 54 49 89 fc 55 48 89 f5 53 48 83 ec 48 48 c7 44 24 08 b3 8a b5 41 <48> 8d 5c 24 08 48 c7 44 24 10 68 5d b5 88 48 c1 eb 03 48 c7 44
----------------
Code disassembly (best guess), 1 bytes skipped:
0: 00 00 add %al,(%rax)
2: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
9: fc ff df
c: 41 56 push %r14
e: 41 55 push %r13
10: 49 89 d5 mov %rdx,%r13
13: 41 54 push %r12
15: 49 89 fc mov %rdi,%r12
18: 55 push %rbp
19: 48 89 f5 mov %rsi,%rbp
1c: 53 push %rbx
1d: 48 83 ec 48 sub $0x48,%rsp
21: 48 c7 44 24 08 b3 8a movq $0x41b58ab3,0x8(%rsp)
28: b5 41
* 2a: 48 8d 5c 24 08 lea 0x8(%rsp),%rbx <-- trapping instruction
2f: 48 c7 44 24 10 68 5d movq $0xffffffff88b55d68,0x10(%rsp)
36: b5 88
38: 48 c1 eb 03 shr $0x3,%rbx
3c: 48 rex.W
3d: c7 .byte 0xc7
3e: 44 rex.R

Reply all
Reply to author
Forward
0 new messages