[Bug 1247] New: Module crash due to broken count

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Mon Apr 23 19:50:41 CEST 2018


https://bugzilla.netfilter.org/show_bug.cgi?id=1247

            Bug ID: 1247
           Summary: Module crash due to broken count
           Product: netfilter/iptables
           Version: unspecified
          Hardware: other
                OS: other
            Status: NEW
          Severity: blocker
          Priority: P5
         Component: unknown
          Assignee: netfilter-buglog at lists.netfilter.org
          Reporter: netfilternetfilter at gmail.com

The configuration I use is a NixOS keepalived setup on AWS (which uses Xen)
configured with per packet round robin routing in a direct routing setup, which
in turn uses ipvs.

Symptoms are ksoftirqd using 100% of the CPU resulting in what looks like a DoS
attack on the machine. 

The module repeatedly crashes when in this mode with a message similar to the
one below.

[root at keepalive:~]# uname -a
Linux keepalive 4.15.17 #1-NixOS SMP Thu Apr 12 10:31:21 UTC 2018 x86_64
GNU/Linux

It is the same problem as described on
https://github.com/NixOS/nixpkgs/issues/39078. 

[  782.525457] ------------[ cut here ]------------                             
[  782.525467] refcount_t hit zero at ip_vs_conn_put+0x31/0x40 [ip_vs] in
sh[15519], uid/euid: 497/497                                                    
[  782.525477] WARNING: CPU: 0 PID: 15519 at ../kernel/panic.c:657
refcount_error_report+0x94/0x9e
[  782.525477] Modules linked in: ip_vs_rr cirrus ttm sb_edac edac_core
drm_kms_helper crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc mousedev
drm aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse evdev
input_leds led_class intel_agp fb_sys_fops syscopyarea sysfillrect
intel_rapl_perf mac_hid intel_gtt serio_raw sysimgblt agpgart i2c_piix4
i2c_core ata_generic pata_acpi floppy cfg80211 rfkill button loop macvlan ip_vs
nf_conntrack libcrc32c crc32c_generic ip_tables x_tables ipv6 crc_ccitt autofs4
ext4 crc16 mbcache jbd2 fscrypto ata_piix libata atkbd libps2 scsi_mod
crc32c_intel i8042 rtc_cmos serio af_packet dm_mod dax fuse xen_netfront
xen_blkfront
[  782.525532] CPU: 0 PID: 15519 Comm: sh Tainted: G        W        4.15.17
#1-NixOS
[  782.525533] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006
[  782.525535] RIP: 0010:refcount_error_report+0x94/0x9e
[  782.525536] RSP: 0000:ffffa344dde039c8 EFLAGS: 00010296
[  782.525537] RAX: 0000000000000057 RBX: ffffffff92f20e06 RCX:
0000000000000006
[  782.525541] RDX: 0000000000000007 RSI: 0000000000000086 RDI:
ffffa344dde165c0
[  782.525541] RBP: ffffa344dde03b08 R08: 0000000000000218 R09:
0000000000000004
[  782.525542] R10: ffffffff93006a80 R11: 0000000000000001 R12:
ffffa344d68cd100
[  782.525543] R13: 00000000000001f1 R14: ffffffff92f12fb0 R15:
0000000000000004
[  782.525544] FS:  00007fc9d2040fc0(0000) GS:ffffa344dde00000(0000)
knlGS:0000000000000000
[  782.525545] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  782.525546] CR2: 000000000262a000 CR3: 0000000016a0c004 CR4:
00000000001606f0
[  782.525548] Call Trace:
[  782.525551]  <IRQ>
[  782.525557]  ex_handler_refcount+0x4e/0x80
[  782.525558]  fixup_exception+0x33/0x40
[  782.525563]  do_trap+0x83/0x140
[  782.525565]  do_error_trap+0x83/0xf0
[  782.525568]  ? ip_vs_conn_drop_conntrack+0x120/0x1a5 [ip_vs]
[  782.525574]  ? ip_finish_output2+0x29c/0x390
[  782.525575]  ? ip_finish_output2+0x1a2/0x390
[  782.525580]  invalid_op+0x1b/0x40
[  782.525582] RIP: 0010:ip_vs_conn_put+0x31/0x40 [ip_vs]
[  782.525583] RSP: 0000:ffffa344dde03bb8 EFLAGS: 00010246
[  782.525584] RAX: 0000000000000001 RBX: ffffa344df31cf00 RCX:
ffffa344d7450198
[  782.525585] RDX: 0000000000000003 RSI: 00000000fffffe01 RDI:
ffffa344d7450140
[  782.525586] RBP: 0000000000000002 R08: 0000000000000476 R09:
0000000000000000
[  782.525587] R10: ffffa344dde03b28 R11: ffffa344df200000 R12:
ffffa344d7d09000
[  782.525587] R13: ffffa344def3a980 R14: ffffffffc04f6e20 R15:
0000000000000008
[  782.525591]  ip_vs_in.part.29.constprop.36+0x34f/0x640 [ip_vs]
[  782.525593]  ? ip_vs_conn_out_get+0xe0/0xe0 [ip_vs]
[  782.525596]  ip_vs_remote_request4+0x47/0xa0 [ip_vs]
[  782.525598]  ? ip_vs_in.part.29.constprop.36+0x640/0x640 [ip_vs]
[  782.525600]  nf_hook_slow+0x43/0xc0
[  782.525602]  ip_local_deliver+0xac/0xc0
[  782.525604]  ? ip_rcv_finish+0x400/0x400
[  782.525606]  ip_rcv+0x26c/0x380
[  782.525610]  __netif_receive_skb_core+0x3a0/0xb10
[  782.525629]  ? inet_gro_receive+0x23c/0x2b0
[  782.525631]  ? netif_receive_skb_internal+0x24/0xb0
[  782.525633]  netif_receive_skb_internal+0x24/0xb0
[  782.525635]  napi_gro_receive+0xb8/0xe0
[  782.525638]  xennet_poll+0x676/0xb40 [xen_netfront]
[  782.525641]  net_rx_action+0x139/0x3a0
[  782.525644]  __do_softirq+0xde/0x2b4
[  782.525646]  irq_exit+0xae/0xb0
[  782.525651]  xen_evtchn_do_upcall+0x2c/0x40
[  782.525653]  xen_hvm_callback_vector+0x7d/0x90
[  782.525654]  </IRQ>
[  782.525656] RIP: 0033:0x7fc9d11c91f9
[  782.525656] RSP: 002b:00007ffebe8a2ea0 EFLAGS: 00000202 ORIG_RAX:
ffffffffffffff0c
[  782.525658] RAX: 00000000ffffffff RBX: 0000000002609808 RCX:
0000000000000054
[  782.525658] RDX: 0000000000000001 RSI: 0000000002605440 RDI:
00000000025f940e
[  782.525659] RBP: 00000000025f940e R08: 000000000260213d R09:
1999999999999999
[  782.525660] R10: 000000000262a808 R11: 00000000025f942d R12:
00000000025f940e
[  782.525661] R13: 00007fc9d1301e20 R14: 00000000025f9408 R15:
00007fc9d1302720
[  782.525662] Code: 48 8b 95 80 00 00 00 41 55 49 8d 8c 24 e0 05 00 00 45 8b
84 24 38 04 00 00 41 89 c1 48 89 de 48 c7 c7 a8 2f f2 92 e8 7c fa ff ff <0f> 0b
58 5b 5d 41 5c 41 5d c3 0f 1f 44 00 00 55 48 89 e5 41 56 
[  782.525684] ---[ end trace 429a7a27ee858cfb ]---

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20180423/0209d4c7/attachment.html>


More information about the netfilter-buglog mailing list