RHEL 7 crash in vlan module code at vxlan_fdb_destroy+0x46 in a docker environment
Issue
-
A system with RHEL 7.4 series kernel-3.10.0-693.33.1.el7 experienced the following crash:
[173820.295608] general protection fault: 0000 [#1] SMP [173820.295633] Modules linked in: xt_REDIRECT nf_nat_redirect ip_vs_rr xt_ipvs ip_vs vxlan ip6_udp_tunnel udp_tunnel iptable_mangle xt_mark xt_nat veth ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter xt_conntrack nf_nat nf_conntrack br_netfilter bridge stp llc overlay(T) vmw_vsock_vmci_transport vsock sb_edac edac_core iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev vmw_balloon vmw_vmci pcspkr joydev sg i2c_piix4 shpchp parport_pc parport binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod syscopyarea sysfillrect sysimgblt crc_t10dif fb_sys_fops crct10dif_generic ttm ata_piix mptspi scsi_transport_spi [173820.295938] drm crct10dif_pclmul mptscsih crct10dif_common libata crc32c_intel serio_raw mptbase vmxnet3 vmw_pvscsi i2c_core floppy dm_mirror dm_region_hash dm_log dm_mod [173820.295999] CPU: 10 PID: 8824 Comm: dockerd Tainted: G ------------ T 3.10.0-693.33.1.el7.x86_64 #1 [173820.296032] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015 [173820.296065] task: ffff8807d8f8bf40 ti: ffff8807cffbc000 task.ti: ffff8807cffbc000 [173820.296090] RIP: 0010:[<ffffffffc04d5806>] [<ffffffffc04d5806>] vxlan_fdb_destroy+0x46/0xa0 [vxlan] [173820.296123] RSP: 0018:ffff8807cffbf660 EFLAGS: 00010246 [173820.296141] RAX: 0000000000000000 RBX: ffff8805da7a55a0 RCX: 0000000000000001 [173820.296164] RDX: de468b0a81ae0002 RSI: 0000000000000000 RDI: 0000000000000000 [173820.296197] RBP: ffff8807cffbf670 R08: 0000000000000000 R09: 0000000000000000 [173820.296220] R10: 0000008300000000 R11: 0000000000018db4 R12: ffff8806117f88c0 [173820.296242] R13: 0000000000000000 R14: ffff8806117f89d0 R15: 0000000000000000 [173820.296265] FS: 00007fb3b1fff700(0000) GS:ffff88081f480000(0000) knlGS:0000000000000000 [173820.296301] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [173820.297025] CR2: 00007f6663ffecf8 CR3: 0000000815e4a000 CR4: 00000000000607e0 [173820.297728] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [173820.298415] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [173820.299076] Call Trace: [173820.299723] [<ffffffffc04dad88>] vxlan_stop+0xf8/0x32b [vxlan] [173820.300368] [<ffffffff8158d4c8>] __dev_close_many+0xa8/0x110 [173820.301004] [<ffffffff8158d585>] __dev_close+0x55/0x90 [173820.301641] [<ffffffff81595b23>] __dev_change_flags+0xa3/0x180 [173820.302279] [<ffffffff81595c29>] dev_change_flags+0x29/0x60 [173820.302847] [<ffffffff815a688e>] do_setlink+0x36e/0xe50 [173820.303489] [<ffffffff8132a5db>] ? idr_for_each+0xbb/0x120 [173820.304111] [<ffffffff81353b30>] ? __nla_put+0x20/0x30 [173820.304787] [<ffffffff811e7d2d>] ? __kmalloc_node_track_caller+0x15d/0x290 [173820.305546] [<ffffffff8157e54a>] ? pskb_expand_head+0x6a/0x290 [173820.306337] [<ffffffff8157ca21>] ? __kmalloc_reserve.isra.31+0x31/0x90 [173820.307092] [<ffffffff8165172a>] ? inet6_fill_link_af+0x1a/0x30 [173820.307786] [<ffffffff815a9032>] rtnl_newlink+0x522/0x860 [173820.308486] [<ffffffff815a8c03>] ? rtnl_newlink+0xf3/0x860 [173820.309209] [<ffffffff812b83fe>] ? security_capable+0x1e/0x20 [173820.309922] [<ffffffff810992a9>] ? ns_capable+0x29/0x50 [173820.310639] [<ffffffff815a4227>] rtnetlink_rcv_msg+0xa7/0x270 [173820.311369] [<ffffffff811e7d2d>] ? __kmalloc_node_track_caller+0x15d/0x290 [173820.312089] [<ffffffff815c5620>] ? __netlink_lookup+0xc0/0x110 [173820.312836] [<ffffffff815a4180>] ? rtnetlink_rcv+0x30/0x30 [173820.313602] [<ffffffff815c82ab>] netlink_rcv_skb+0xab/0xc0 [173820.314284] [<ffffffff815a4178>] rtnetlink_rcv+0x28/0x30 [173820.315046] [<ffffffff815c7988>] netlink_unicast+0xf8/0x1c0 [173820.315816] [<ffffffff815c7d6f>] netlink_sendmsg+0x31f/0x6a0 [173820.316598] [<ffffffff81574396>] sock_sendmsg+0xb6/0xf0 [173820.317288] [<ffffffff81574901>] SYSC_sendto+0x121/0x1c0 [173820.318047] [<ffffffff816bc551>] ? __do_page_fault+0x171/0x450 [173820.318730] [<ffffffff816c167b>] ? system_call_after_swapgs+0xc8/0x160 [173820.319384] [<ffffffff816c166f>] ? system_call_after_swapgs+0xbc/0x160 [173820.320003] [<ffffffff816c167b>] ? system_call_after_swapgs+0xc8/0x160 [173820.320608] [<ffffffff816c166f>] ? system_call_after_swapgs+0xbc/0x160 [173820.321161] [<ffffffff816c167b>] ? system_call_after_swapgs+0xc8/0x160 [173820.321691] [<ffffffff816c166f>] ? system_call_after_swapgs+0xbc/0x160 [173820.322198] [<ffffffff816c167b>] ? system_call_after_swapgs+0xc8/0x160 [173820.322682] [<ffffffff8157538e>] SyS_sendto+0xe/0x10 [173820.323146] [<ffffffff816c172f>] system_call_fastpath+0x1c/0x21 [173820.323620] [<ffffffff816c167b>] ? system_call_after_swapgs+0xc8/0x160 [173820.324087] Code: 41 83 ac 24 14 01 00 00 01 b9 1d 00 00 00 48 89 de 48 8b 43 30 4c 89 e7 48 8d 50 d8 e8 c4 fe ff ff 48 8b 03 48 8b 53 08 48 85 c0 <48> 89 02 74 04 48 89 50 08 48 b8 00 02 00 00 00 00 ad de 48 8d [173820.325182] RIP [<ffffffffc04d5806>] vxlan_fdb_destroy+0x46/0xa0 [vxlan] [173820.325703] RSP <ffff8807cffbf660>
Environment
- Red Hat Enterprise Linux 7
- kernel-3.10.0-683.33.1.el7
- Third-party docker-ee package?
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.