Hello Jon,
On 8 Jan 2022, at 19:59, Jon Murphy jcmurphy26@gmail.com wrote:
I found this kernel error from last night. Do you want to know about these?
Yes, I think we know about this one. It looks very similar to what Mathias has been reporting a couple of times and it is connected to the NFQUEUE module that we use for the IPS. It does not seem to be connected at all to the hardware.
Should I be adding these to bugzilla? Or post in the Community?
If there isn’t a ticket, yet, please open one. Things like this should never go to Community. That is for support questions and the bug tracker is for bugs :)
-Michael
Best regards, Jon
========
System versions
IPFire version IPFire 2.27 (x86_64) - core162 Pakfire version 2.27-x86_64 Kernel version Linux ipfire.localdomain 5.15.6-ipfire #1 SMP Sun Dec 19 10:54:26 GMT 2021 x86_64 AMD GX-412TC SOC AuthenticAMD GNU/Linux
==============
Jan 7 22:09:40 ipfire kernel: ------------[ cut here ]------------ Jan 7 22:09:40 ipfire kernel: refcount_t: underflow; use-after-free. Jan 7 22:09:40 ipfire kernel: WARNING: CPU: 1 PID: 17992 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 Jan 7 22:09:40 ipfire kernel: Modules linked in: ledtrig_netdev ledtrig_heartbeat tun nfnetlink_queue xt_NFQUEUE xt_MASQUERADE cfg80211 rfkill 8021q garp xt_ipp2p(O) compat_xtables(O) xt_geoip(O) xt_multiport xt_mac xt_REDIRECT xt_hashlimit xt_policy xt_TCPMSS xt_conntrack xt_comment ipt_REJECT nf_reject_ipv4 xt_LOG xt_limit xt_mark xt_connmark nf_log_syslog iptable_raw iptable_mangle iptable_filter vfat fat amd64_edac edac_mce_amd kvm_amd sch_fq_codel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcspkr sp5100_tco fam15h_power k10temp i2c_piix4 igb ptp pps_core dca ccp i2c_algo_bit i2c_core leds_gpio pinctrl_amd gpio_keys acpi_cpufreq lp parport_pc parport video sdhci_pci cqhci sdhci mmc_core Jan 7 22:09:40 ipfire kernel: CPU: 1 PID: 17992 Comm: W-NFQ#1 Tainted: G O 5.15.6-ipfire #1 Jan 7 22:09:40 ipfire kernel: Hardware name: PC Engines apu4/apu4, BIOS v4.15.0.1 11/23/2021 Jan 7 22:09:40 ipfire kernel: RIP: 0010:refcount_warn_saturate+0xba/0x110 Jan 7 22:09:40 ipfire kernel: Code: 01 01 e8 32 91 59 00 0f 0b 31 f6 89 f7 c3 80 3d 14 8d 39 01 00 75 85 48 c7 c7 98 f6 f3 8b c6 05 04 8d 39 01 01 e8 0f 91 59 00 <0f> 0b 31 f6 89 f7 c3 80 3d ef 8c 39 01 00 0f 85 5e ff ff ff 48 c7 Jan 7 22:09:40 ipfire kernel: RSP: 0018:ffffb583c8c4f868 EFLAGS: 00010246 Jan 7 22:09:40 ipfire kernel: RAX: 0000000000000000 RBX: ffffa0f9c1bf8200 RCX: 0000000000000000 Jan 7 22:09:40 ipfire kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 Jan 7 22:09:40 ipfire kernel: RBP: ffffa0f9c1bf8200 R08: 0000000000000000 R09: 0000000000000000 Jan 7 22:09:40 ipfire kernel: R10: 0000000000000000 R11: 0000000000000000 R12: ffffa0f9c1bf8200 Jan 7 22:09:40 ipfire kernel: R13: 0000000000000000 R14: 0000000000000005 R15: ffffa0f9c3b12100 Jan 7 22:09:40 ipfire kernel: FS: 000079dc0ba4e640(0000) GS:ffffa0f9eac80000(0000) knlGS:0000000000000000 Jan 7 22:09:40 ipfire kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Jan 7 22:09:40 ipfire kernel: CR2: 0000716fa42b7bc8 CR3: 0000000103486000 CR4: 00000000000406e0 Jan 7 22:09:40 ipfire kernel: Call Trace: Jan 7 22:09:40 ipfire kernel: <TASK> Jan 7 22:09:40 ipfire kernel: nf_queue_entry_release_refs+0x8b/0xa0 Jan 7 22:09:40 ipfire kernel: nf_reinject+0x7a/0x1e0 Jan 7 22:09:40 ipfire kernel: nfqnl_recv_verdict+0x303/0x4f0 [nfnetlink_queue] Jan 7 22:09:40 ipfire kernel: nfnetlink_rcv_msg+0x251/0x310 Jan 7 22:09:40 ipfire kernel: ? nfnetlink_net_init+0xa0/0xa0 Jan 7 22:09:40 ipfire kernel: netlink_rcv_skb+0x5b/0x110 Jan 7 22:09:40 ipfire kernel: netlink_unicast+0x215/0x2e0 Jan 7 22:09:40 ipfire kernel: netlink_sendmsg+0x233/0x480 Jan 7 22:09:40 ipfire kernel: ? netlink_unicast+0x2e0/0x2e0 Jan 7 22:09:40 ipfire kernel: ____sys_sendmsg+0x2a6/0x2e0 Jan 7 22:09:40 ipfire kernel: ___sys_sendmsg+0xa3/0x100 Jan 7 22:09:40 ipfire kernel: __sys_sendmsg+0x81/0xe0 Jan 7 22:09:40 ipfire kernel: do_syscall_64+0x5c/0x90 Jan 7 22:09:40 ipfire kernel: ? syscall_exit_to_user_mode+0x23/0x50 Jan 7 22:09:40 ipfire kernel: ? __x64_sys_recvfrom+0x20/0x40 Jan 7 22:09:40 ipfire kernel: ? do_syscall_64+0x69/0x90 Jan 7 22:09:40 ipfire kernel: entry_SYSCALL_64_after_hwframe+0x44/0xae Jan 7 22:09:40 ipfire kernel: RIP: 0033:0x79dc0e2eb62d Jan 7 22:09:40 ipfire kernel: Code: 28 89 54 24 1c 48 89 74 24 10 89 7c 24 08 e8 fa ee ff ff 8b 54 24 1c 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 48 89 44 24 08 e8 4e ef ff ff 48 Jan 7 22:09:40 ipfire kernel: RSP: 002b:000079dc0ba4bf40 EFLAGS: 00000293 ORIG_RAX: 000000000000002e Jan 7 22:09:40 ipfire kernel: RAX: ffffffffffffffda RBX: 000079dbfc268dd0 RCX: 000079dc0e2eb62d Jan 7 22:09:40 ipfire kernel: RDX: 0000000000000000 RSI: 000079dc0ba4bf80 RDI: 0000000000000006 Jan 7 22:09:40 ipfire kernel: RBP: 000079dc0ba4bfe0 R08: 0000000000000000 R09: 000079dc0d9c9de0 Jan 7 22:09:40 ipfire kernel: R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 Jan 7 22:09:40 ipfire kernel: R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000080 Jan 7 22:09:40 ipfire kernel: </TASK> Jan 7 22:09:40 ipfire kernel: ---[ end trace 9676210543ac4447 ]---