From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: kernel error from CU 162, PC Engines apu4 Date: Sun, 09 Jan 2022 15:24:02 +0000 Message-ID: <01040876-EFDE-4597-96FE-7447BA5E9DEC@ipfire.org> In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============8501491943792054848==" List-Id: --===============8501491943792054848== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hello Jon, > On 8 Jan 2022, at 19:59, Jon Murphy wrote: >=20 > I found this kernel error from last night. Do you want to know about these? Yes, I think we know about this one. It looks very similar to what Mathias ha= s been reporting a couple of times and it is connected to the NFQUEUE module = that we use for the IPS. It does not seem to be connected at all to the hardw= are. > Should I be adding these to bugzilla? Or post in the Community? If there isn=E2=80=99t a ticket, yet, please open one. Things like this shoul= d never go to Community. That is for support questions and the bug tracker is= for bugs :) -Michael >=20 > Best regards, > Jon >=20 >=20 > =3D=3D=3D=3D=3D=3D=3D=3D >=20 >=20 > System versions >=20 > IPFire version IPFire 2.27 (x86_64) - core162 > Pakfire version 2.27-x86_64 > Kernel version Linux ipfire.localdomain 5.15.6-ipfire #1 SMP Sun Dec 19 10:= 54:26 GMT 2021 x86_64 AMD GX-412TC SOC AuthenticAMD GNU/Linux >=20 >=20 > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >=20 > Jan 7 22:09:40 ipfire kernel: ------------[ cut here ]------------ > Jan 7 22:09:40 ipfire kernel: refcount_t: underflow; use-after-free. > Jan 7 22:09:40 ipfire kernel: WARNING: CPU: 1 PID: 17992 at lib/refcount.c= :28 refcount_warn_saturate+0xba/0x110 > Jan 7 22:09:40 ipfire kernel: Modules linked in: ledtrig_netdev ledtrig_he= artbeat tun nfnetlink_queue xt_NFQUEUE xt_MASQUERADE cfg80211 rfkill 8021q ga= rp xt_ipp2p(O) compat_xtables(O) xt_geoip(O) xt_multiport xt_mac xt_REDIRECT = xt_hashlimit xt_policy xt_TCPMSS xt_conntrack xt_comment ipt_REJECT nf_reject= _ipv4 xt_LOG xt_limit xt_mark xt_connmark nf_log_syslog iptable_raw iptable_m= angle iptable_filter vfat fat amd64_edac edac_mce_amd kvm_amd sch_fq_codel kv= m irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcspkr sp5100_t= co fam15h_power k10temp i2c_piix4 igb ptp pps_core dca ccp i2c_algo_bit i2c_c= ore leds_gpio pinctrl_amd gpio_keys acpi_cpufreq lp parport_pc parport video = sdhci_pci cqhci sdhci mmc_core > Jan 7 22:09:40 ipfire kernel: CPU: 1 PID: 17992 Comm: W-NFQ#1 Tainted: G = O 5.15.6-ipfire #1 > Jan 7 22:09:40 ipfire kernel: Hardware name: PC Engines apu4/apu4, BIOS v4= .15.0.1 11/23/2021 > Jan 7 22:09:40 ipfire kernel: RIP: 0010:refcount_warn_saturate+0xba/0x110 > Jan 7 22:09:40 ipfire kernel: Code: 01 01 e8 32 91 59 00 0f 0b 31 f6 89 f7= c3 80 3d 14 8d 39 01 00 75 85 48 c7 c7 98 f6 f3 8b c6 05 04 8d 39 01 01 e8 0= f 91 59 00 <0f> 0b 31 f6 89 f7 c3 80 3d ef 8c 39 01 00 0f 85 5e ff ff ff 48 c7 > Jan 7 22:09:40 ipfire kernel: RSP: 0018:ffffb583c8c4f868 EFLAGS: 00010246 > Jan 7 22:09:40 ipfire kernel: RAX: 0000000000000000 RBX: ffffa0f9c1bf8200 = RCX: 0000000000000000 > Jan 7 22:09:40 ipfire kernel: RDX: 0000000000000000 RSI: 0000000000000000 = RDI: 0000000000000000 > Jan 7 22:09:40 ipfire kernel: RBP: ffffa0f9c1bf8200 R08: 0000000000000000 = R09: 0000000000000000 > Jan 7 22:09:40 ipfire kernel: R10: 0000000000000000 R11: 0000000000000000 = R12: ffffa0f9c1bf8200 > Jan 7 22:09:40 ipfire kernel: R13: 0000000000000000 R14: 0000000000000005 = R15: ffffa0f9c3b12100 > Jan 7 22:09:40 ipfire kernel: FS: 000079dc0ba4e640(0000) GS:ffffa0f9eac80= 000(0000) knlGS:0000000000000000 > Jan 7 22:09:40 ipfire kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 00000000800= 50033 > Jan 7 22:09:40 ipfire kernel: CR2: 0000716fa42b7bc8 CR3: 0000000103486000 = CR4: 00000000000406e0 > Jan 7 22:09:40 ipfire kernel: Call Trace: > Jan 7 22:09:40 ipfire kernel: > Jan 7 22:09:40 ipfire kernel: nf_queue_entry_release_refs+0x8b/0xa0 > Jan 7 22:09:40 ipfire kernel: nf_reinject+0x7a/0x1e0 > Jan 7 22:09:40 ipfire kernel: nfqnl_recv_verdict+0x303/0x4f0 [nfnetlink_q= ueue] > Jan 7 22:09:40 ipfire kernel: nfnetlink_rcv_msg+0x251/0x310 > Jan 7 22:09:40 ipfire kernel: ? nfnetlink_net_init+0xa0/0xa0 > Jan 7 22:09:40 ipfire kernel: netlink_rcv_skb+0x5b/0x110 > Jan 7 22:09:40 ipfire kernel: netlink_unicast+0x215/0x2e0 > Jan 7 22:09:40 ipfire kernel: netlink_sendmsg+0x233/0x480 > Jan 7 22:09:40 ipfire kernel: ? netlink_unicast+0x2e0/0x2e0 > Jan 7 22:09:40 ipfire kernel: ____sys_sendmsg+0x2a6/0x2e0 > Jan 7 22:09:40 ipfire kernel: ___sys_sendmsg+0xa3/0x100 > Jan 7 22:09:40 ipfire kernel: __sys_sendmsg+0x81/0xe0 > Jan 7 22:09:40 ipfire kernel: do_syscall_64+0x5c/0x90 > Jan 7 22:09:40 ipfire kernel: ? syscall_exit_to_user_mode+0x23/0x50 > Jan 7 22:09:40 ipfire kernel: ? __x64_sys_recvfrom+0x20/0x40 > Jan 7 22:09:40 ipfire kernel: ? do_syscall_64+0x69/0x90 > Jan 7 22:09:40 ipfire kernel: entry_SYSCALL_64_after_hwframe+0x44/0xae > Jan 7 22:09:40 ipfire kernel: RIP: 0033:0x79dc0e2eb62d > Jan 7 22:09:40 ipfire kernel: Code: 28 89 54 24 1c 48 89 74 24 10 89 7c 24= 08 e8 fa ee ff ff 8b 54 24 1c 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 2e 00 0= 0 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 48 89 44 24 08 e8 4e ef ff ff 48 > Jan 7 22:09:40 ipfire kernel: RSP: 002b:000079dc0ba4bf40 EFLAGS: 00000293 = ORIG_RAX: 000000000000002e > Jan 7 22:09:40 ipfire kernel: RAX: ffffffffffffffda RBX: 000079dbfc268dd0 = RCX: 000079dc0e2eb62d > Jan 7 22:09:40 ipfire kernel: RDX: 0000000000000000 RSI: 000079dc0ba4bf80 = RDI: 0000000000000006 > Jan 7 22:09:40 ipfire kernel: RBP: 000079dc0ba4bfe0 R08: 0000000000000000 = R09: 000079dc0d9c9de0 > Jan 7 22:09:40 ipfire kernel: R10: 0000000000000000 R11: 0000000000000293 = R12: 0000000000000000 > Jan 7 22:09:40 ipfire kernel: R13: 0000000000000000 R14: 0000000000000001 = R15: 0000000000000080 > Jan 7 22:09:40 ipfire kernel: > Jan 7 22:09:40 ipfire kernel: ---[ end trace 9676210543ac4447 ]--- >=20 --===============8501491943792054848==--