* Crash in TCP/IP stack
@ 2013-12-17 10:21 Sami Pietikäinen
2014-01-24 12:56 ` Sebastian Andrzej Siewior
0 siblings, 1 reply; 4+ messages in thread
From: Sami Pietikäinen @ 2013-12-17 10:21 UTC (permalink / raw)
To: linux-rt-users@vger.kernel.org; +Cc: Jouko Haapaluoma
Hello,
We have run into a crash in the TCP/IP stack when doing torture tests on our devices.
We have been able to reproduce this issue with Atmel SAMA5D35-EK using 3.6.9-rt21,
3.10.20-rt17 and 3.12.5-rt6 kernels and using Xilinx Zynq Zedboard with 3.8.13-rt15 kernel.
We also tested the Zedboard with vanilla kernel, and the problem does not occur with it.
The crash can be reproduced by spawning a lot of wget (or similar) processes that download a small file.
-> lot of calls to tcp_close inside the stack
while [ 1 ] ; do wget -O - ftp://10.0.0.1/small_file > /dev/null 2>&1; done &
The crash occurs in a matter of seconds when the stress testing is started.
We have been reviewing the rt patch, and at the moment we think that this issue is related to patches
net-use-cpu-light-in-ip-send-unicast-reply.patch and net-flip-lock-dep-thingy.patch.
Any ideas about the root cause or possible fix are welcome.
Please find the stack trace below.
BR,
Sami
Unable to handle kernel NULL pointer dereference at virtual address 00000010
pgd = dec4c000
[00000010] *pgd=3f37a831i, *pte=00000000, *ppte=00000000
Internal error: Oops: 17 [#1] PREEMPT THUMB2
Modules linked in:
CPU: 0 PID: 7292 Comm: wget Not tainted 3.12.5-rt6-custom #1
task: dedfce00 ti: dec1c000 task.ti: dec1c000
PC is at __ip_make_skb+0x200/0x280
LR is at ip_push_pending_frames+0xf/0x24
pc : [<c01989fc>] lr : [<c0198acf>] psr: 60070033
sp : dec1dd70 ip : c0315bc4 fp : dec1dde0
r10: 00000000 r9 : c0315ae0 r8 : c0315d10
r7 : c0315bc4 r6 : 00000024 r5 : df1aab48 r4 : df2a7240
r3 : 00000001 r2 : c0315bc4 r1 : 00000010 r0 : df1aaa10
Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA Thumb Segment user
Control: 50c53c7d Table: 3ec4c059 DAC: 00000015
Process wget (pid: 7292, stack limit = 0xdec1c240)
Stack: (0xdec1dd70 to 0xdec1e000)
dd60: c0315ca8 c0196da1 dec1de70 00000014
dd80: 00000000 df2a7240 df2a7c00 00000024 c0315bc4 00000000 f605000a 000045d2
dda0: 00000000 c0198acf 00000000 c0198cf5 00000014 00000000 dec1ddd0 dec1ddcc
ddc0: 00000040 00000000 00000001 00000000 f605000a dedfce00 00000000 00800000
dde0: 00000003 00000001 00000000 00060000 00000000 ad00000a f605000a 45d21500
de00: dec1c000 c031a440 00000000 00000000 00000000 00000000 00000000 00000001
de20: c031a440 df26d080 00000000 df26d080 00000000 c0175573 df26d080 c01aa3d5
de40: 80000000 00000014 c0314500 dec1de84 ad00000a df26d080 dec1de70 00000001
de60: 0010d358 c01a992d dec1de84 00000014 150045d2 f171548a 00000000 00000450
de80: 00000000 dec1de70 00000014 00000000 a3051a15 00000008 00000000 00000000
dea0: dec1ded7 df2a7c00 df26d080 df391864 00000000 c03199b4 df26d0b8 c01aa491
dec0: 00000001 00000000 df2dc180 00000000 00000002 df26d001 df26d1e0 df2a7c00
dee0: df2a7a80 df26d080 00000000 c0175683 df26d1e0 00000000 df26d080 df26d0b0
df00: df26d0ec 00000004 df27f488 c019f81b c019f6f1 df26d080 df481180 df27f480
df20: 00000000 df489f00 df848550 c01b6b61 c01b6b3d df481180 00000000 c01731db
df40: c01733e5 df4811a0 00080000 c01733ed c01733e5 c0065259 00000000 00000000
df60: dedfd0c0 00000000 dedfce00 c031b800 dec1dfb0 dec1c000 00000000 c002469b
df80: df27f480 dec1c000 dec1c000 dec1c000 c000cca4 c000e3ab 0010d3f0 00000003
dfa0: 00000000 00000006 c000cca4 c000cb53 00000000 00000001 fbad2400 00064340
dfc0: 0010d3f0 00000003 00000000 00000006 00000000 001099b0 0010b060 0010d358
dfe0: 00000000 beda9bc4 00065d44 00064350 60070010 00000003 00000000 00000000
[<c01989fc>] (__ip_make_skb+0x200/0x280) from [<c0198acf>] (ip_push_pending_frames+0xf/0x24)
[<c0198acf>] (ip_push_pending_frames+0xf/0x24) from [<c0198cf5>] (ip_send_unicast_reply+0x179/0x198)
[<c0198cf5>] (ip_send_unicast_reply+0x179/0x198) from [<c01a992d>] (tcp_v4_send_reset+0x10d/0x138)
[<c01a992d>] (tcp_v4_send_reset+0x10d/0x138) from [<c01aa491>] (tcp_v4_do_rcv+0x6d/0x168)
[<c01aa491>] (tcp_v4_do_rcv+0x6d/0x168) from [<c0175683>] (release_sock+0x63/0xe0)
[<c0175683>] (release_sock+0x63/0xe0) from [<c019f81b>] (tcp_close+0x12b/0x33c)
[<c019f81b>] (tcp_close+0x12b/0x33c) from [<c01b6b61>] (inet_release+0x25/0x44)
[<c01b6b61>] (inet_release+0x25/0x44) from [<c01731db>] (sock_release+0xf/0x5c)
[<c01731db>] (sock_release+0xf/0x5c) from [<c01733ed>] (sock_close+0x9/0xc)
[<c01733ed>] (sock_close+0x9/0xc) from [<c0065259>] (__fput+0x5d/0x17c)
[<c0065259>] (__fput+0x5d/0x17c) from [<c002469b>] (task_work_run+0x53/0x78)
[<c002469b>] (task_work_run+0x53/0x78) from [<c000e3ab>] (do_work_pending+0x5f/0x74)
[<c000e3ab>] (do_work_pending+0x5f/0x74) from [<c000cb53>] (work_pending+0x9/0x1a)
Code: 321b 2b01 f63f af65 (f8da) 3010
---[ end trace 0000000000000002 ]---
Kernel panic - not syncing: Fatal exception
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Crash in TCP/IP stack
2013-12-17 10:21 Crash in TCP/IP stack Sami Pietikäinen
@ 2014-01-24 12:56 ` Sebastian Andrzej Siewior
2014-01-25 11:44 ` Nicholas Mc Guire
0 siblings, 1 reply; 4+ messages in thread
From: Sebastian Andrzej Siewior @ 2014-01-24 12:56 UTC (permalink / raw)
To: Sami Pietikäinen; +Cc: linux-rt-users@vger.kernel.org, Jouko Haapaluoma
* Sami Pietikäinen | 2013-12-17 10:21:33 [+0000]:
>Hello,
Hi Sami,
>We have run into a crash in the TCP/IP stack when doing torture tests on our devices.
>We have been able to reproduce this issue with Atmel SAMA5D35-EK using 3.6.9-rt21,
>3.10.20-rt17 and 3.12.5-rt6 kernels and using Xilinx Zynq Zedboard with 3.8.13-rt15 kernel.
>Unable to handle kernel NULL pointer dereference at virtual address 00000010
>CPU: 0 PID: 7292 Comm: wget Not tainted 3.12.5-rt6-custom #1
>[<c01989fc>] (__ip_make_skb+0x200/0x280) from [<c0198acf>] (ip_push_pending_frames+0xf/0x24)
>[<c0198acf>] (ip_push_pending_frames+0xf/0x24) from [<c0198cf5>] (ip_send_unicast_reply+0x179/0x198)
>[<c0198cf5>] (ip_send_unicast_reply+0x179/0x198) from [<c01a992d>] (tcp_v4_send_reset+0x10d/0x138)
>[<c01a992d>] (tcp_v4_send_reset+0x10d/0x138) from [<c01aa491>] (tcp_v4_do_rcv+0x6d/0x168)
>[<c01aa491>] (tcp_v4_do_rcv+0x6d/0x168) from [<c0175683>] (release_sock+0x63/0xe0)
>[<c0175683>] (release_sock+0x63/0xe0) from [<c019f81b>] (tcp_close+0x12b/0x33c)
>[<c019f81b>] (tcp_close+0x12b/0x33c) from [<c01b6b61>] (inet_release+0x25/0x44)
>[<c01b6b61>] (inet_release+0x25/0x44) from [<c01731db>] (sock_release+0xf/0x5c)
>[<c01731db>] (sock_release+0xf/0x5c) from [<c01733ed>] (sock_close+0x9/0xc)
>[<c01733ed>] (sock_close+0x9/0xc) from [<c0065259>] (__fput+0x5d/0x17c)
>[<c0065259>] (__fput+0x5d/0x17c) from [<c002469b>] (task_work_run+0x53/0x78)
>[<c002469b>] (task_work_run+0x53/0x78) from [<c000e3ab>] (do_work_pending+0x5f/0x74)
>[<c000e3ab>] (do_work_pending+0x5f/0x74) from [<c000cb53>] (work_pending+0x9/0x1a)
Just that I have it tagged here properly. This bug seems to exist
since v3.6-rt and Nicholas Mc Guire posted a fix for it.
Sebastian
--
To unsubscribe from this list: send the line "unsubscribe linux-rt-users" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Crash in TCP/IP stack
2014-01-24 12:56 ` Sebastian Andrzej Siewior
@ 2014-01-25 11:44 ` Nicholas Mc Guire
2014-01-27 7:20 ` Sami Pietikäinen
0 siblings, 1 reply; 4+ messages in thread
From: Nicholas Mc Guire @ 2014-01-25 11:44 UTC (permalink / raw)
To: Sebastian Andrzej Siewior
Cc: Sami Pietik??inen, linux-rt-users@vger.kernel.org,
Jouko Haapaluoma
On Fri, 24 Jan 2014, Sebastian Andrzej Siewior wrote:
> * Sami Pietik??inen | 2013-12-17 10:21:33 [+0000]:
>
> >Hello,
> Hi Sami,
>
> >We have run into a crash in the TCP/IP stack when doing torture tests on our devices.
> >We have been able to reproduce this issue with Atmel SAMA5D35-EK using 3.6.9-rt21,
> >3.10.20-rt17 and 3.12.5-rt6 kernels and using Xilinx Zynq Zedboard with 3.8.13-rt15 kernel.
> >Unable to handle kernel NULL pointer dereference at virtual address 00000010
> >CPU: 0 PID: 7292 Comm: wget Not tainted 3.12.5-rt6-custom #1
> >[<c01989fc>] (__ip_make_skb+0x200/0x280) from [<c0198acf>] (ip_push_pending_frames+0xf/0x24)
> >[<c0198acf>] (ip_push_pending_frames+0xf/0x24) from [<c0198cf5>] (ip_send_unicast_reply+0x179/0x198)
> >[<c0198cf5>] (ip_send_unicast_reply+0x179/0x198) from [<c01a992d>] (tcp_v4_send_reset+0x10d/0x138)
> >[<c01a992d>] (tcp_v4_send_reset+0x10d/0x138) from [<c01aa491>] (tcp_v4_do_rcv+0x6d/0x168)
> >[<c01aa491>] (tcp_v4_do_rcv+0x6d/0x168) from [<c0175683>] (release_sock+0x63/0xe0)
> >[<c0175683>] (release_sock+0x63/0xe0) from [<c019f81b>] (tcp_close+0x12b/0x33c)
> >[<c019f81b>] (tcp_close+0x12b/0x33c) from [<c01b6b61>] (inet_release+0x25/0x44)
> >[<c01b6b61>] (inet_release+0x25/0x44) from [<c01731db>] (sock_release+0xf/0x5c)
> >[<c01731db>] (sock_release+0xf/0x5c) from [<c01733ed>] (sock_close+0x9/0xc)
> >[<c01733ed>] (sock_close+0x9/0xc) from [<c0065259>] (__fput+0x5d/0x17c)
> >[<c0065259>] (__fput+0x5d/0x17c) from [<c002469b>] (task_work_run+0x53/0x78)
> >[<c002469b>] (task_work_run+0x53/0x78) from [<c000e3ab>] (do_work_pending+0x5f/0x74)
> >[<c000e3ab>] (do_work_pending+0x5f/0x74) from [<c000cb53>] (work_pending+0x9/0x1a)
>
> Just that I have it tagged here properly. This bug seems to exist
> since v3.6-rt and Nicholas Mc Guire posted a fix for it.
>
yup - and the fix was confirmed to work atleast in the original setup
ref: http://www.spinics.net/lists/linux-rt-users/msg11081.html
ref: http://www.spinics.net/lists/linux-rt-users/msg11101.html
No test/confirmation for v3.6 though - if needed I can give it a spin
thx!
hofrat
^ permalink raw reply [flat|nested] 4+ messages in thread
* RE: Crash in TCP/IP stack
2014-01-25 11:44 ` Nicholas Mc Guire
@ 2014-01-27 7:20 ` Sami Pietikäinen
0 siblings, 0 replies; 4+ messages in thread
From: Sami Pietikäinen @ 2014-01-27 7:20 UTC (permalink / raw)
To: Nicholas Mc Guire, Sebastian Andrzej Siewior
Cc: linux-rt-users@vger.kernel.org, Jouko Haapaluoma
>No test/confirmation for v3.6 though - if needed I can give it a spin
>thx!
>hofrat
I have been using the fix with 3.6.9-rt21 kernel (Atmel SAMA5D35) for a couple of weeks now, and have not encountered the issue. This kernel I am using is, however, from Atmel linux4sam github repository so it is not 100% mainline.
BR,
Sami Pietikäinen
--
To unsubscribe from this list: send the line "unsubscribe linux-rt-users" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2014-01-27 7:20 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-12-17 10:21 Crash in TCP/IP stack Sami Pietikäinen
2014-01-24 12:56 ` Sebastian Andrzej Siewior
2014-01-25 11:44 ` Nicholas Mc Guire
2014-01-27 7:20 ` Sami Pietikäinen
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox