Package: src:linux Version: 5.10.136-1 Severity: important File: linux-image-5.10.0-17 X-Debbugs-Cc: aljas...@gmail.com
Dear Maintainer, After updating to linux kernel to linux-image-5.10.0-17 from the previous version (apt upgrade and then reboot), wireguard tunnels started randomly "dying" (stopping forwarding traffic in one direction). There are various BUG entries in the kernel log around the time the tunnels break. If isn't possible to down / restart a tunnel, the command to do so just hangs indefinitely. I've included the first two entries from the kernel log since boot, not the last one that the reportbug tool initially added (there are 100s of entries since in the past few hours). -- Package-specific info: ** Version: Linux version 5.10.0-17-amd64 (debian-ker...@lists.debian.org) (gcc-10 (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #1 SMP Debian 5.10.136-1 (2022-08-13) ** Command line: BOOT_IMAGE=/boot/vmlinuz-5.10.0-17-amd64 root=UUID=9c2c93d2-5a5c-4b2b-94e9-b312a1c48884 ro ** Tainted: BD (160) * bad page referenced or some unexpected page flags * kernel died recently, i.e. there was an OOPS or BUG ** Kernel log: [ 3868.023872] general protection fault, probably for non-canonical address 0x50e946745ee400: 0000 [#1] SMP NOPTI [ 3868.023913] CPU: 0 PID: 242001 Comm: ip Not tainted 5.10.0-17-amd64 #1 Debian 5.10.136-1 [ 3868.023938] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019 [ 3868.023981] RIP: 0010:__migration_entry_wait+0xa3/0x100 [ 3868.023999] Code: 48 89 ef e8 53 43 e4 ff 66 90 5b 5d c3 cc cc cc cc 89 fa 48 83 e7 fd 81 e2 fd 0f 00 00 eb a3 49 c1 e0 06 4c 03 05 2d c5 ec 00 <49> 8b 50 08 48 8d 42 ff 83 e2 01 49 0f 44 c0 48 8b 50 08 48 8d 4a [ 3868.024054] RSP: 0000:ffffab158a087db0 EFLAGS: 00010207 [ 3868.024072] RAX: 000000000000001f RBX: ffff96910668fb30 RCX: 000fffffffe00000 [ 3868.024094] RDX: 0000000000000004 RSI: ffff96910668fb30 RDI: fd77f2d85d08de20 [ 3868.024116] RBP: ffffe7a18019a3e8 R08: 0050e946745ee400 R09: ffff9691051cdd80 [ 3868.024138] R10: 000ffffffffff000 R11: 0000000000000000 R12: ffffab158a087e40 [ 3868.024160] R13: 7c01440693d17b90 R14: fff0000000000fff R15: 0000000000000000 [ 3868.024182] FS: 00007f5d6af221c0(0000) GS:ffff969200200000(0000) knlGS:0000000000000000 [ 3868.024206] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3868.024224] CR2: 000055ad37966fc0 CR3: 000000005722c003 CR4: 00000000003706f0 [ 3868.024248] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3868.024271] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3868.024295] Call Trace: [ 3868.024311] do_swap_page+0x677/0x900 [ 3868.024327] handle_mm_fault+0xd95/0x1c10 [ 3868.024343] do_user_addr_fault+0x1b8/0x400 [ 3868.024358] ? switch_fpu_return+0x44/0xc0 [ 3868.024374] exc_page_fault+0x78/0x160 [ 3868.024397] ? asm_exc_page_fault+0x8/0x30 [ 3868.024409] asm_exc_page_fault+0x1e/0x30 [ 3868.024422] RIP: 0033:0x55ad37966fc0 [ 3868.024435] Code: Unable to access opcode bytes at RIP 0x55ad37966f96. [ 3868.024453] RSP: 002b:00007ffe281dc368 EFLAGS: 00010206 [ 3868.024468] RAX: 000000000000007b RBX: 000055ad3971537c RCX: 0000000000000001 [ 3868.024487] RDX: 000055ad3970d2f2 RSI: 0000000000000002 RDI: 0000000000000001 [ 3868.024506] RBP: 00007f5d6b10c6a0 R08: 000000000000007b R09: 0000000000000000 [ 3868.024524] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000020 [ 3868.024543] R13: 00000000000000fe R14: 00007ffe281dc580 R15: 0000000000000000 [ 3868.024563] Modules linked in: xt_multiport xt_nat xt_state nft_chain_nat tun xt_MASQUERADE nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 wireguard libchacha20poly1305 chacha_x86_64 poly1305_x86_64 ip6_udp_tunnel udp_tunnel curve25519_x86_64 libcurve25519_generic libchacha xt_tcpudp nft_compat nft_counter nf_tables libcrc32c nfnetlink ip_vti tunnel4 ip_tunnel intel_rapl_msr intel_rapl_common nfit libnvdimm ghash_clmulni_intel nls_ascii nls_cp437 vfat fat aesni_intel libaes crypto_simd serio_raw cryptd glue_helper rapl pcspkr efi_pstore sg evdev hyperv_keyboard hyperv_fb hv_utils ptp hv_balloon pps_core joydev tcp_bbr sch_fq drm fuse configfs efivarfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic iavf sd_mod t10_pi crc_t10dif crct10dif_generic pci_hyperv pci_hyperv_intf hv_storvsc scsi_transport_fc hid_generic scsi_mod hid_hyperv hid hv_netvsc crct10dif_pclmul crct10dif_common crc32_pclmul crc32c_intel hv_vmbus [ 3868.025236] ---[ end trace 79dc3b37392c3151 ]--- [ 3868.191660] RIP: 0010:__migration_entry_wait+0xa3/0x100 [ 3868.192379] Code: 48 89 ef e8 53 43 e4 ff 66 90 5b 5d c3 cc cc cc cc 89 fa 48 83 e7 fd 81 e2 fd 0f 00 00 eb a3 49 c1 e0 06 4c 03 05 2d c5 ec 00 <49> 8b 50 08 48 8d 42 ff 83 e2 01 49 0f 44 c0 48 8b 50 08 48 8d 4a [ 3868.193787] RSP: 0000:ffffab158a087db0 EFLAGS: 00010207 [ 3868.194830] RAX: 000000000000001f RBX: ffff96910668fb30 RCX: 000fffffffe00000 [ 3868.195590] RDX: 0000000000000004 RSI: ffff96910668fb30 RDI: fd77f2d85d08de20 [ 3868.196269] RBP: ffffe7a18019a3e8 R08: 0050e946745ee400 R09: ffff9691051cdd80 [ 3868.197062] R10: 000ffffffffff000 R11: 0000000000000000 R12: ffffab158a087e40 [ 3868.197719] R13: 7c01440693d17b90 R14: fff0000000000fff R15: 0000000000000000 [ 3868.198362] FS: 00007f5d6af221c0(0000) GS:ffff969200200000(0000) knlGS:0000000000000000 [ 3868.199062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3868.199733] CR2: 000055ad37966f96 CR3: 000000005722c003 CR4: 00000000003706f0 [ 3868.200424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3868.201056] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3868.221284] BUG: Bad page state in process kworker/0:2 pfn:03c84 [ 3868.222084] page:0000000059205976 refcount:-1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3c84 [ 3868.222843] flags: 0xfffffc0000000() [ 3868.223495] raw: 000fffffc0000000 dead000000000100 dead000000000122 0000000000000000 [ 3868.224142] raw: 0000000000000000 0000000000000000 ffffffffffffffff 0000000000000000 [ 3868.224787] page dumped because: nonzero _refcount [ 3868.225484] Modules linked in: xt_multiport xt_nat xt_state nft_chain_nat tun xt_MASQUERADE nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 wireguard libchacha20poly1305 chacha_x86_64 poly1305_x86_64 ip6_udp_tunnel udp_tunnel curve25519_x86_64 libcurve25519_generic libchacha xt_tcpudp nft_compat nft_counter nf_tables libcrc32c nfnetlink ip_vti tunnel4 ip_tunnel intel_rapl_msr intel_rapl_common nfit libnvdimm ghash_clmulni_intel nls_ascii nls_cp437 vfat fat aesni_intel libaes crypto_simd serio_raw cryptd glue_helper rapl pcspkr efi_pstore sg evdev hyperv_keyboard hyperv_fb hv_utils ptp hv_balloon pps_core joydev tcp_bbr sch_fq drm fuse configfs efivarfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic iavf sd_mod t10_pi crc_t10dif crct10dif_generic pci_hyperv pci_hyperv_intf hv_storvsc scsi_transport_fc hid_generic scsi_mod hid_hyperv hid hv_netvsc crct10dif_pclmul crct10dif_common crc32_pclmul crc32c_intel hv_vmbus [ 3868.231403] CPU: 0 PID: 223518 Comm: kworker/0:2 Tainted: G D 5.10.0-17-amd64 #1 Debian 5.10.136-1 [ 3868.232207] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019 [ 3868.233036] Workqueue: wg-crypt-tunnel_hu wg_packet_decrypt_worker [wireguard] [ 3868.233862] Call Trace: [ 3868.234732] <IRQ> [ 3868.235547] dump_stack+0x6b/0x83 [ 3868.236583] bad_page.cold+0x63/0x94 [ 3868.237388] free_pcppages_bulk+0x26c/0x2e0 [ 3868.238276] free_unref_page+0xa4/0xc0 [ 3868.239082] napi_consume_skb+0x5a/0x130 [ 3868.239945] netvsc_poll+0x48f/0x820 [hv_netvsc] [ 3868.240746] net_rx_action+0x142/0x3e0 [ 3868.241520] __do_softirq+0xc2/0x279 [ 3868.242338] asm_call_irq_on_stack+0xf/0x20 [ 3868.243078] </IRQ> [ 3868.243795] do_softirq_own_stack+0x37/0x50 [ 3868.244497] irq_exit_rcu+0x92/0xc0 [ 3868.245219] sysvec_hyperv_callback+0x36/0x80 [ 3868.245889] asm_sysvec_hyperv_callback+0x12/0x20 [ 3868.246560] RIP: 0010:poly1305_blocks_avx2+0x508/0x780 [poly1305_x86_64] [ 3868.247473] Code: 40 c5 85 d4 e4 c5 a5 d4 c0 c5 8d 73 d3 1a c5 e5 db dd c4 c1 5d d4 e6 c5 a5 73 d0 1a c5 fd db c5 c4 c1 1d d4 cb c5 85 73 d4 1a <c5> dd db e5 c4 c1 35 73 d2 04 c5 9d 73 d1 1a c5 f5 db cd c4 c1 6d [ 3868.248894] RSP: 0018:ffffab1589f27600 EFLAGS: 00000202 [ 3868.249613] RAX: ffffab1589f27690 RBX: 0000000000000580 RCX: ffffffffc090a080 [ 3868.250346] RDX: 0000000000000080 RSI: ffff9691514c9e3a RDI: ffffab1589f27a08 [ 3868.251023] RBP: ffff9691514c98fa R08: 000000000fc2332d R09: 223a5cce12d3d772 [ 3868.251699] R10: ffffab1589f27808 R11: 054eeb6009579001 R12: 0000000000000580 [ 3868.252489] R13: ffffab1589f27998 R14: 0000000000000001 R15: 0000000000001000 [ 3868.253181] ? chacha_block_generic+0x6f/0xb0 [ 3868.253920] ? __poly1305_init_avx+0x172/0x200 [poly1305_x86_64] [ 3868.254589] ? poly1305_blocks_avx2+0x263/0x780 [poly1305_x86_64] [ 3868.255252] ? poly1305_simd_blocks+0x186/0x1b0 [poly1305_x86_64] [ 3868.255968] ? poly1305_update_arch+0x49/0x180 [poly1305_x86_64] [ 3868.256748] ? chacha20poly1305_crypt_sg_inplace+0x227/0x570 [libchacha20poly1305] [ 3868.257422] ? chacha20poly1305_decrypt_sg_inplace+0x16/0x2b0 [libchacha20poly1305] [ 3868.258085] ? decrypt_packet+0x102/0x1a0 [wireguard] [ 3868.258748] ? dev_hard_start_xmit+0xc4/0x1f0 [ 3868.259540] ? sch_direct_xmit+0xbb/0x360 [ 3868.260231] ? __qdisc_run+0x85/0x560 [ 3868.260866] ? __dev_queue_xmit+0x37a/0x9a0 [ 3868.261486] ? ip_finish_output2+0x192/0x580 [ 3868.262087] ? do_softirq_own_stack+0x37/0x50 [ 3868.262670] ? irq_exit_rcu+0x3e/0xc0 [ 3868.263234] ? common_interrupt+0x74/0x130 [ 3868.263781] ? asm_common_interrupt+0x1e/0x40 [ 3868.264312] ? update_load_avg+0x7a/0x5d0 [ 3868.264825] ? set_next_entity+0xa7/0x1f0 [ 3868.265319] ? finish_task_switch+0x72/0x260 [ 3868.265799] ? __schedule+0x28a/0x880 [ 3868.266262] ? wg_packet_decrypt_worker+0x64/0x190 [wireguard] [ 3868.266715] ? process_one_work+0x1b3/0x350 [ 3868.267216] ? worker_thread+0x53/0x3e0 [ 3868.267666] ? process_one_work+0x350/0x350 [ 3868.268114] ? kthread+0x118/0x140 [ 3868.268561] ? __kthread_bind_mask+0x60/0x60 [ 3868.269011] ? ret_from_fork+0x1f/0x30 ** Model information sys_vendor: Microsoft Corporation product_name: Virtual Machine product_version: Hyper-V UEFI Release v4.0 chassis_vendor: Microsoft Corporation chassis_version: Hyper-V UEFI Release v4.0 bios_vendor: Microsoft Corporation bios_version: Hyper-V UEFI Release v4.0 board_vendor: Microsoft Corporation board_name: Virtual Machine board_version: Hyper-V UEFI Release v4.0 ** Loaded modules: xt_multiport xt_nat xt_state nft_chain_nat tun xt_MASQUERADE nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 wireguard libchacha20poly1305 chacha_x86_64 poly1305_x86_64 ip6_udp_tunnel udp_tunnel curve25519_x86_64 libcurve25519_generic libchacha xt_tcpudp nft_compat nft_counter nf_tables libcrc32c nfnetlink ip_vti tunnel4 ip_tunnel intel_rapl_msr intel_rapl_common nfit libnvdimm ghash_clmulni_intel nls_ascii nls_cp437 vfat fat aesni_intel libaes crypto_simd serio_raw cryptd glue_helper rapl pcspkr efi_pstore sg evdev hyperv_keyboard hyperv_fb hv_utils ptp hv_balloon pps_core joydev tcp_bbr sch_fq drm fuse configfs efivarfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic iavf sd_mod t10_pi crc_t10dif crct10dif_generic pci_hyperv pci_hyperv_intf hv_storvsc scsi_transport_fc hid_generic scsi_mod hid_hyperv hid hv_netvsc crct10dif_pclmul crct10dif_common crc32_pclmul crc32c_intel hv_vmbus ** PCI devices: c572:00:02.0 Ethernet controller [0200]: Intel Corporation Ethernet Virtual Function 700 Series [8086:37cd] (rev 09) Subsystem: Intel Corporation Ethernet Virtual Function 700 Series [8086:0001] Physical Slot: 1 Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx- Latency: 0 NUMA node: 0 Region 0: Memory at fe0000000 (64-bit, prefetchable) [size=128K] Region 3: Memory at fe0020000 (64-bit, prefetchable) [size=16K] Capabilities: <access denied> Kernel driver in use: iavf Kernel modules: iavf ** USB devices: not available -- System Information: Debian Release: 11.4 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-17-amd64 (SMP w/1 CPU thread) Kernel taint flags: TAINT_BAD_PAGE, TAINT_DIE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages linux-image-5.10.0-17-amd64 depends on: ii initramfs-tools [linux-initramfs-tool] 0.140 ii kmod 28-1 ii linux-base 4.6 Versions of packages linux-image-5.10.0-17-amd64 recommends: ii apparmor 2.13.6-10 ii firmware-linux-free 20200122-1 Versions of packages linux-image-5.10.0-17-amd64 suggests: pn debian-kernel-handbook <none> ii grub-efi-amd64 2.04-20 pn linux-doc-5.10 <none> Versions of packages linux-image-5.10.0-17-amd64 is related to: pn firmware-amd-graphics <none> pn firmware-atheros <none> pn firmware-bnx2 <none> pn firmware-bnx2x <none> pn firmware-brcm80211 <none> pn firmware-cavium <none> pn firmware-intel-sound <none> pn firmware-intelwimax <none> pn firmware-ipw2x00 <none> pn firmware-ivtv <none> pn firmware-iwlwifi <none> pn firmware-libertas <none> pn firmware-linux-nonfree <none> pn firmware-misc-nonfree <none> pn firmware-myricom <none> pn firmware-netxen <none> pn firmware-qlogic <none> pn firmware-realtek <none> pn firmware-samsung <none> pn firmware-siano <none> pn firmware-ti-connectivity <none> pn xen-hypervisor <none> -- no debconf information