Closed morphyno closed 9 years ago
Not sure if this is a netmap or tcreplay issue. I came across this while running tcreplay 4.0.5.
Had to reboot the machine to recover.
Jan 2 12:49:51 UTraffic22 kernel: [2581528.462246] device em1 left promiscuous mode Jan 2 15:11:19 UTraffic22 kernel: [2590022.510916] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) Jan 2 15:11:19 UTraffic22 kernel: [2590022.513238] BUG: unable to handle kernel paging request at ffff8808016baa58 Jan 2 15:11:19 UTraffic22 kernel: [2590022.515450] IP: [<ffff8808016baa58>] 0xffff8808016baa58 Jan 2 15:11:19 UTraffic22 kernel: [2590022.517102] PGD 1fe1067 PUD 801540063 PMD 8017a3063 PTE 80000008016ba163 Jan 2 15:11:19 UTraffic22 kernel: [2590022.519288] Oops: 0011 [#1] SMP Jan 2 15:11:19 UTraffic22 kernel: [2590022.520355] Modules linked in: btrfs raid6_pq xor ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c ixgbe(OX) netmap(OX) binfmt_misc gpio_ich dcdbas x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel joydev aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd btusb bluetooth shpchp sb_edac edac_core lpc_ich mei_me mei wmi ipmi_si acpi_power_meter lp mac_hid parport ses enclosure hid_generic usbhid hid ahci tg3 libahci dca ptp megaraid_sas mdio pps_core [last unloaded: ixgbe] Jan 2 15:11:19 UTraffic22 kernel: [2590022.537092] CPU: 0 PID: 8147 Comm: tcpreplay Tainted: G OX 3.13.0-40-generic #69-Ubuntu Jan 2 15:11:19 UTraffic22 kernel: [2590022.539836] Hardware name: Dell Inc. PowerEdge R720/0X3D66, BIOS 2.2.2 01/16/2014 Jan 2 15:11:19 UTraffic22 kernel: [2590022.542167] task: ffff8807f3bac800 ti: ffff8807f4838000 task.ti: ffff8807f4838000 Jan 2 15:11:19 UTraffic22 kernel: [2590022.544486] RIP: 0010:[<ffff8808016baa58>] [<ffff8808016baa58>] 0xffff8808016baa58 Jan 2 15:11:19 UTraffic22 kernel: [2590022.546898] RSP: 0018:ffff8807f4839c90 EFLAGS: 00010246 Jan 2 15:11:19 UTraffic22 kernel: [2590022.548550] RAX: 0000000000000000 RBX: ffff8807ffcc7800 RCX: c086473b0788ffff Jan 2 15:11:19 UTraffic22 kernel: [2590022.550762] RDX: c086473b0788ffff RSI: ffff8810034f8598 RDI: ffff8810034f8620 Jan 2 15:11:19 UTraffic22 kernel: [2590022.552974] RBP: ffffffff811bf514 R08: 0000000000000000 R09: 0000000000000000 Jan 2 15:11:19 UTraffic22 kernel: [2590022.555186] R10: ffff8808016baa58 R11: ffff8807ffcc7810 R12: 0000000000000008 Jan 2 15:11:19 UTraffic22 kernel: [2590022.557398] R13: ffff8807f4839c78 R14: ffffffffa020841a R15: ffff8807f4839cc0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.559610] FS: 00007f26ef6db740(0000) GS:ffff88080fa00000(0000) knlGS:0000000000000000 Jan 2 15:11:19 UTraffic22 kernel: [2590022.562115] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Jan 2 15:11:19 UTraffic22 kernel: [2590022.563901] CR2: ffff8808016baa58 CR3: 0000000001c0e000 CR4: 00000000001407f0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.566113] Stack: Jan 2 15:11:19 UTraffic22 kernel: [2590022.566752] ffff8807ffcc7810 0000000000000000 ffffffff81ebb640 ffff8807f3bace20 Jan 2 15:11:19 UTraffic22 kernel: [2590022.569151] ffff8807f3bac800 ffff8807f3bac800 ffff8807f4839cd0 ffffffff811bf6de Jan 2 15:11:19 UTraffic22 kernel: [2590022.571549] ffff8807f4839d00 ffffffff81088314 ffff8807f3bace50 ffff88080169ad80 Jan 2 15:11:19 UTraffic22 kernel: [2590022.573948] Call Trace: Jan 2 15:11:19 UTraffic22 kernel: [2590022.574727] [<ffffffff811bf6de>] ? ____fput+0xe/0x10 Jan 2 15:11:19 UTraffic22 kernel: [2590022.576299] [<ffffffff81088314>] ? task_work_run+0xc4/0xe0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.578030] [<ffffffff81069d38>] ? do_exit+0x2b8/0xa50 Jan 2 15:11:19 UTraffic22 kernel: [2590022.579654] [<ffffffff8106a54f>] ? do_group_exit+0x3f/0xa0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.581388] [<ffffffff8107a1d0>] ? get_signal_to_deliver+0x1d0/0x6f0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.583387] [<ffffffff81013448>] ? do_signal+0x48/0xa40 Jan 2 15:11:19 UTraffic22 kernel: [2590022.585039] [<ffffffff811d0bf0>] ? do_vfs_ioctl+0x2e0/0x4c0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.586798] [<ffffffff8101b689>] ? read_tsc+0x9/0x20 Jan 2 15:11:19 UTraffic22 kernel: [2590022.588370] [<ffffffff810cd978>] ? ktime_get_ts+0x48/0xe0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.590075] [<ffffffff81013ea9>] ? do_notify_resume+0x69/0xb0 Jan 2 15:11:19 UTraffic22 kernel: [2590022.591888] [<ffffffff8172ffea>] ? int_signal+0x12/0x17 Jan 2 15:11:19 UTraffic22 kernel: [2590022.593538] Code: 00 00 00 30 aa 6b 01 08 88 ff ff 30 aa 6b 01 08 88 ff ff 40 aa 6b 01 08 88 ff ff 40 aa 6b 01 08 88 ff ff 00 00 00 00 00 00 00 00 <80> 21 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Jan 2 15:11:19 UTraffic22 kernel: [2590022.601080] RIP [<ffff8808016baa58>] 0xffff8808016baa58 Jan 2 15:11:19 UTraffic22 kernel: [2590022.602771] RSP <ffff8807f4839c90> Jan 2 15:11:19 UTraffic22 kernel: [2590022.603864] CR2: ffff8808016baa58 Jan 2 15:11:19 UTraffic22 kernel: [2590022.768778] ---[ end trace 9b5cb8b9f25f0dc9 ]--- Jan 2 15:11:19 UTraffic22 kernel: [2590022.850723] Fixing recursive fault but reboot is needed!
From the call stack, it appears to be coming from an interrupt, and not touching any tcpreplay code. I suggest posting the trace on the netmap support site.
Not sure if this is a netmap or tcreplay issue. I came across this while running tcreplay 4.0.5.
Had to reboot the machine to recover.