Translated message

A translation of this page exists in English.

RHEL8: mm/slub.c:373 处的内核 BUG! 带有技术预览: kTLS

Solution In Progress - Updated -

Issue

  • 带有日志的内核 panic:
[457445.818862] IPv6: ADDRCONF(NETDEV_UP): 440aefcc0779759: link is not ready
[457445.822822] IPv6: ADDRCONF(NETDEV_CHANGE): 440aefcc0779759: link becomes ready
[457445.922704] device 440aefcc0779759 entered promiscuous mode
[457520.287287] TECH PREVIEW: kTLS may not be fully supported.
                Please review provided documentation for limitations.
[457612.922283] ------------[ cut here ]------------
[457612.922287] kernel BUG at mm/slub.c:373!
[457612.922363] invalid opcode: 0000 [#1] SMP NOPTI
[457612.922392] CPU: 28 PID: 3621 Comm: handler164 Kdump: loaded Tainted: G               X --------- -  - 4.18.0-372.73.1.el8_6.x86_64 #1
[457612.922454] Hardware name: Nokia Solutions and Networks AE-SER1U-A/AF1801.02/AE-SER1U-A/AF1801.02, BIOS 3B30 07/01/2021
[457612.922494] RIP: 0010:__slab_free+0x19e/0x340
[457612.922521] Code: 1f 44 00 00 eb 9c 41 f7 46 08 00 0d 21 00 0f 85 16 ff ff ff 4d 85 ed 0f 85 0d ff ff ff 80 4c 24 5b 80 45 31 ff e9 57 ff ff ff <0f> 0b 49 3b 54 24 28 75 c4 49 89 5c 24 20 49 89 4c 24 28 49 0f ba
[457612.922577] RSP: 0018:ffffbf00cd144a40 EFLAGS: 00010246
[457612.922596] RAX: ffff9e8570db0700 RBX: ffff9e8570db0600 RCX: ffff9e8570db0600
[457612.922619] RDX: 0000000080200013 RSI: fffff71846c36c00 RDI: ffff9e84c0005180
[457612.922642] RBP: ffffbf00cd144ae0 R08: 0000000000000001 R09: ffffffffba9f1e02
[457612.922664] R10: ffff9e8570db0600 R11: 0000000000000001 R12: fffff71846c36c00
[457612.922687] R13: ffff9e8570db0600 R14: ffff9e84c0005180 R15: ffff9e896b3b4700
[457612.922709] FS:  00007eff87dfe700(0000) GS:ffff9eb340b00000(0000) knlGS:0000000000000000
[457612.922735] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[457612.922754] CR2: 000000c005acd000 CR3: 00000001e17a2005 CR4: 00000000007706a0
[457612.922777] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[457612.922799] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[457612.922821] PKRU: 55555554
[457612.922832] Call Trace:
[457612.922842]  <IRQ>
[457612.922852]  ? kfree_skb+0x32/0xa0
[457612.922869]  kfree+0x1d8/0x200
[457612.922883]  ? skb_release_data+0xb4/0x180
[457612.922898]  kfree_skb+0x32/0xa0
[457612.922912]  skb_release_data+0xb4/0x180
[457612.922927]  consume_skb+0x27/0x90
[457612.922942]  ovs_dp_process_packet+0x167/0x200 [openvswitch]
[457612.922969]  ovs_vport_receive+0x6c/0xc0 [openvswitch]
[457612.923724]  ? tcp_rcv_established+0x307/0x5d0
[457612.924421]  ? sk_filter_trim_cap+0x49/0x210
[457612.925317]  ? tcp_v6_do_rcv+0xe1/0x3c0
[457612.926402]  ? tcp_v6_rcv+0xbba/0xbe0
[457612.927080]  netdev_frame_hook+0xc0/0x180 [openvswitch]
[457612.927744]  __netif_receive_skb_core+0x2d6/0xcc0
[457612.928398]  ? enqueue_task_fair+0x96/0x580
[457612.929018]  ? remove_entity_load_avg+0x31/0x80
[457612.929635]  process_backlog+0xaa/0x170
[457612.930282]  __napi_poll+0x2d/0x130
[457612.930867]  net_rx_action+0x257/0x320
[457612.931445]  __do_softirq+0xd7/0x2c8
[457612.932026]  irq_exit_rcu+0xd7/0xe0
[457612.932622]  irq_exit+0xa/0x10
[457612.933205]  call_function_single_interrupt+0xf/0x20
[457612.933804]  </IRQ>
[457612.934454] RIP: 0010:veth_stats_rx+0x70/0xd0 [veth]
[457612.935076] Code: 54 45 31 c0 31 c9 31 d2 55 53 48 63 c2 83 c2 01 48 8d 1c 80 48 8d 04 58 48 c1 e0 06 48 03 86 d8 0a 00 00 4c 8b a8 50 01 00 00 <4c> 8b a0 28 01 00 00 48 8b a8 30 01 00 00 48 8b 98 20 01 00 00 48
[457612.936520] RSP: 0018:ffffbf00e295b868 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff04
[457612.937172] RAX: ffff9e8ae9be0000 RBX: 0000000000000000 RCX: 0000000000000000
[457612.937806] RDX: 0000000000000001 RSI: ffff9e89421df000 RDI: ffffbf00e295b8a0
[457612.938433] RBP: ffff9e89421df000 R08: 0000000000000000 R09: 0000000000000000
[457612.939038] R10: 0000000000000000 R11: 0000000000000000 R12: ffffbf00e295b898
[457612.939637] R13: 0000000000000000 R14: ffffffffbbf2fdc0 R15: ffff9e89421dc000
[457612.940232]  ? veth_stats_tx.isra.38+0x5a/0x80 [veth]
[457612.940799]  veth_get_stats64+0xb7/0x100 [veth]
[457612.941361]  ? vlan_dev_get_stats64+0x6d/0x90 [8021q]
[457612.941920]  dev_get_stats+0x5b/0xc0
[457612.942487]  ovs_vport_get_stats+0x2e/0xa0 [openvswitch]
[457612.943132]  ovs_vport_cmd_fill_info+0x14f/0x200 [openvswitch]
[457612.943754]  ovs_vport_cmd_dump+0xe1/0x150 [openvswitch]
[457612.944358]  netlink_dump+0x18e/0x380
[457612.944903]  __netlink_dump_start+0x186/0x1f0
[457612.945444]  genl_family_rcv_msg_dumpit.isra.15+0x8e/0x130
[457612.945988]  ? __check_object_size+0xac/0x173
[457612.946546]  ? genl_family_rcv_msg_attrs_parse.isra.16+0xe0/0xe0
[457612.947096]  ? ovs_vport_cmd_fill_info+0x200/0x200 [openvswitch]
[457612.947667]  ? genl_rcv+0x40/0x40
[457612.948230]  genl_family_rcv_msg+0x101/0x170
[457612.948801]  ? ovs_vport_cmd_set+0x150/0x150 [openvswitch]
[457612.949390]  ? ovs_vport_cmd_fill_info+0x200/0x200 [openvswitch]
[457612.949993]  genl_rcv_msg+0x47/0xa0
[457612.950569]  ? genl_family_rcv_msg+0x170/0x170
[457612.951161]  netlink_rcv_skb+0x4c/0x130
[457612.951738]  genl_rcv+0x24/0x40
[457612.952313]  netlink_unicast+0x19a/0x230
[457612.952883]  netlink_sendmsg+0x204/0x3d0
[457612.953465]  sock_sendmsg+0x50/0x60
[457612.954037]  __sys_sendto+0xee/0x160
[457612.954617]  ? syscall_trace_enter+0x1ff/0x2d0
[457612.955247]  ? __audit_syscall_exit+0x24d/0x2b0
[457612.955982]  __x64_sys_sendto+0x24/0x30
[457612.956550]  do_syscall_64+0x5b/0x1b0
[457612.957142]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[457612.957705] RIP: 0033:0x7eff91774eb6
[457612.958390] Code: 49 89 f4 55 53 89 fb 48 83 ec 10 e8 74 f8 ff ff 45 31 c9 45 31 c0 45 89 f2 89 c5 4c 89 ea 4c 89 e6 89 df b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 ef 48 89 44 24 08 e8 a6 f8 ff ff 48 8b
[457612.959623] RSP: 002b:00007eff87db7610 EFLAGS: 00003246 ORIG_RAX: 000000000000002c
[457612.960256] RAX: ffffffffffffffda RBX: 000000000000007f RCX: 00007eff91774eb6
[457612.960906] RDX: 0000000000000018 RSI: 00007efef00a3ac0 RDI: 000000000000007f
[457612.961568] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[457612.962214] R10: 0000000000000000 R11: 0000000000003246 R12: 00007efef00a3ac0
[457612.962874] R13: 0000000000000018 R14: 0000000000000000 R15: 00007eff87db7768
[457612.963547] Modules linked in: iavf vfio_pci vfio_virqfd vfio_iommu_type1 vfio veth nf_conntrack_netlink ipt_REJECT nf_reject_ipv4 xt_nat xt_CT tcp_diag inet_diag ip6t_MASQUERADE ipt_MASQUERADE xt_mark xt_conntrack xt_comment nft_compat nft_chain_nat overlay nfnetlink_cttimeout openvswitch nf_conncount nf_nat binfmt_misc ext4 mbcache jbd2 intel_rapl_msr iTCO_wdt iTCO_vendor_support intel_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass rapl intel_cstate ast drm_vram_helper drm_ttm_helper ttm intel_uncore drm_kms_helper pcspkr syscopyarea sysfillrect sysimgblt dm_thin_pool fb_sys_fops dm_persistent_data drm i2c_i801 dm_bio_prison dm_bufio ipmi_ssif lpc_ich mei_me mei joydev wmi ioatdma acpi_ipmi ipmi_si acpi_pad acpi_power_meter vhost_net tun vhost vhost_iotlb tap sctp ip6_udp_tunnel udp_tunnel nft_limit nft_ct nft_counter nf_tables_set nf_tables nfnetlink nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_tables ip_gre
[457612.963624]  ip_tunnel ip6_gre gre ip6_tunnel tunnel6 bridge 8021q garp mrp stp llc xfs libcrc32c dm_multipath irdma ice ib_uverbs ib_core sd_mod t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel i40e ahci libahci igb libata cdc_ether usbnet mii i2c_algo_bit dca dm_mirror dm_region_hash dm_log dm_mod be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls(X) libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi ipmi_devintf ipmi_msghandler fuse scsi_transport_iscsi

Environment

  • Red Hat Enterprise Linux 8
  • [TLS] 作为技术预览

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content