appneta / tcpreplay

Pcap editing and replay tools for *NIX and Windows - Users please download source from
http://tcpreplay.appneta.com/wiki/installation.html#downloads
1.19k stars 270 forks source link

netmap crash with tcpreplay #168

Closed morphyno closed 9 years ago

morphyno commented 9 years ago

Not sure if this is a netmap or tcreplay issue. I came across this while running tcreplay 4.0.5.

Had to reboot the machine to recover.

Jan  2 12:49:51 UTraffic22 kernel: [2581528.462246] device em1 left promiscuous mode
Jan  2 15:11:19 UTraffic22 kernel: [2590022.510916] kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
Jan  2 15:11:19 UTraffic22 kernel: [2590022.513238] BUG: unable to handle kernel paging request at ffff8808016baa58
Jan  2 15:11:19 UTraffic22 kernel: [2590022.515450] IP: [<ffff8808016baa58>] 0xffff8808016baa58
Jan  2 15:11:19 UTraffic22 kernel: [2590022.517102] PGD 1fe1067 PUD 801540063 PMD 8017a3063 PTE 80000008016ba163
Jan  2 15:11:19 UTraffic22 kernel: [2590022.519288] Oops: 0011 [#1] SMP
Jan  2 15:11:19 UTraffic22 kernel: [2590022.520355] Modules linked in: btrfs raid6_pq xor ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c ixgbe(OX) netmap(OX) binfmt_misc gpio_ich dcdbas x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel joydev aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd btusb bluetooth shpchp sb_edac edac_core lpc_ich mei_me mei wmi ipmi_si acpi_power_meter lp mac_hid parport ses enclosure hid_generic usbhid hid ahci tg3 libahci dca ptp megaraid_sas mdio pps_core [last unloaded: ixgbe]
Jan  2 15:11:19 UTraffic22 kernel: [2590022.537092] CPU: 0 PID: 8147 Comm: tcpreplay Tainted: G           OX 3.13.0-40-generic #69-Ubuntu
Jan  2 15:11:19 UTraffic22 kernel: [2590022.539836] Hardware name: Dell Inc. PowerEdge R720/0X3D66, BIOS 2.2.2 01/16/2014
Jan  2 15:11:19 UTraffic22 kernel: [2590022.542167] task: ffff8807f3bac800 ti: ffff8807f4838000 task.ti: ffff8807f4838000
Jan  2 15:11:19 UTraffic22 kernel: [2590022.544486] RIP: 0010:[<ffff8808016baa58>]  [<ffff8808016baa58>] 0xffff8808016baa58
Jan  2 15:11:19 UTraffic22 kernel: [2590022.546898] RSP: 0018:ffff8807f4839c90  EFLAGS: 00010246
Jan  2 15:11:19 UTraffic22 kernel: [2590022.548550] RAX: 0000000000000000 RBX: ffff8807ffcc7800 RCX: c086473b0788ffff
Jan  2 15:11:19 UTraffic22 kernel: [2590022.550762] RDX: c086473b0788ffff RSI: ffff8810034f8598 RDI: ffff8810034f8620
Jan  2 15:11:19 UTraffic22 kernel: [2590022.552974] RBP: ffffffff811bf514 R08: 0000000000000000 R09: 0000000000000000
Jan  2 15:11:19 UTraffic22 kernel: [2590022.555186] R10: ffff8808016baa58 R11: ffff8807ffcc7810 R12: 0000000000000008
Jan  2 15:11:19 UTraffic22 kernel: [2590022.557398] R13: ffff8807f4839c78 R14: ffffffffa020841a R15: ffff8807f4839cc0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.559610] FS:  00007f26ef6db740(0000) GS:ffff88080fa00000(0000) knlGS:0000000000000000
Jan  2 15:11:19 UTraffic22 kernel: [2590022.562115] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan  2 15:11:19 UTraffic22 kernel: [2590022.563901] CR2: ffff8808016baa58 CR3: 0000000001c0e000 CR4: 00000000001407f0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.566113] Stack:
Jan  2 15:11:19 UTraffic22 kernel: [2590022.566752]  ffff8807ffcc7810 0000000000000000 ffffffff81ebb640 ffff8807f3bace20
Jan  2 15:11:19 UTraffic22 kernel: [2590022.569151]  ffff8807f3bac800 ffff8807f3bac800 ffff8807f4839cd0 ffffffff811bf6de
Jan  2 15:11:19 UTraffic22 kernel: [2590022.571549]  ffff8807f4839d00 ffffffff81088314 ffff8807f3bace50 ffff88080169ad80
Jan  2 15:11:19 UTraffic22 kernel: [2590022.573948] Call Trace:
Jan  2 15:11:19 UTraffic22 kernel: [2590022.574727]  [<ffffffff811bf6de>] ? ____fput+0xe/0x10
Jan  2 15:11:19 UTraffic22 kernel: [2590022.576299]  [<ffffffff81088314>] ? task_work_run+0xc4/0xe0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.578030]  [<ffffffff81069d38>] ? do_exit+0x2b8/0xa50
Jan  2 15:11:19 UTraffic22 kernel: [2590022.579654]  [<ffffffff8106a54f>] ? do_group_exit+0x3f/0xa0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.581388]  [<ffffffff8107a1d0>] ? get_signal_to_deliver+0x1d0/0x6f0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.583387]  [<ffffffff81013448>] ? do_signal+0x48/0xa40
Jan  2 15:11:19 UTraffic22 kernel: [2590022.585039]  [<ffffffff811d0bf0>] ? do_vfs_ioctl+0x2e0/0x4c0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.586798]  [<ffffffff8101b689>] ? read_tsc+0x9/0x20
Jan  2 15:11:19 UTraffic22 kernel: [2590022.588370]  [<ffffffff810cd978>] ? ktime_get_ts+0x48/0xe0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.590075]  [<ffffffff81013ea9>] ? do_notify_resume+0x69/0xb0
Jan  2 15:11:19 UTraffic22 kernel: [2590022.591888]  [<ffffffff8172ffea>] ? int_signal+0x12/0x17
Jan  2 15:11:19 UTraffic22 kernel: [2590022.593538] Code: 00 00 00 30 aa 6b 01 08 88 ff ff 30 aa 6b 01 08 88 ff ff 40 aa 6b 01 08 88 ff ff 40 aa 6b 01 08 88 ff ff 00 00 00 00 00 00 00 00 <80> 21 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Jan  2 15:11:19 UTraffic22 kernel: [2590022.601080] RIP  [<ffff8808016baa58>] 0xffff8808016baa58
Jan  2 15:11:19 UTraffic22 kernel: [2590022.602771]  RSP <ffff8807f4839c90>
Jan  2 15:11:19 UTraffic22 kernel: [2590022.603864] CR2: ffff8808016baa58
Jan  2 15:11:19 UTraffic22 kernel: [2590022.768778] ---[ end trace 9b5cb8b9f25f0dc9 ]---
Jan  2 15:11:19 UTraffic22 kernel: [2590022.850723] Fixing recursive fault but reboot is needed!
fklassen commented 9 years ago

From the call stack, it appears to be coming from an interrupt, and not touching any tcpreplay code. I suggest posting the trace on the netmap support site.