lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 21 Oct 2011 20:51:50 +0000
From:	"Woodhouse, David" <david.woodhouse@...el.com>
To:	Sjur Braendeland <sjur.brandeland@...ricsson.com>
CC:	"netdev@...r.kernel.org" <netdev@...r.kernel.org>
Subject: caif BUG() with network namespaces

When Chrome initialises its sandbox, we get a BUG:

[   63.674528] ------------[ cut here ]------------
[   63.674540] kernel BUG at net/caif/caif_dev.c:66!
[   63.674547] invalid opcode: 0000 [#1] PREEMPT SMP 
[   63.674556] Modules linked in: iwlagn serio_raw [last unloaded: battery]
[   63.674568] 
[   63.674575] Pid: 801, comm: chrome-sandbox Not tainted 3.0.0-4.1-adaptation-pc #1 Intel Corporation Cedartrail platform/To be filled by O.E.M.
[   63.674589] EIP: 0060:-[<c0baaf8c>] EFLAGS: 00210246 CPU: 1
[   63.674602] EIP is at caif_device_list+0x4c/0x50
[   63.674608] EAX: 00000000 EBX: 00000000 ECX: e1482800 EDX: 00000010
[   63.674614] ESI: e14133c0 EDI: 00000010 EBP: e141dda0 ESP: e141dd98
[   63.674620]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[   63.674627] Process chrome-sandbox (pid: 801, ti=e141c000 task=e52a8ff0 task.ti=e141c000)
[   63.674632] Stack:
[   63.674636]  e1482800 00000000 e141ddd8 c0bab291 c04da339 e141ddd8 c0ad64ff 00000011
[   63.674655]  e14133c0 e141ddd8 c0b335cd e1482800 00000010 c0f612bc 00000000 fffffff3
[   63.674672]  e141de08 c046e6e7 e141dde8 c0bcda38 e141de20 e1482800 00000010 c0f58ac0
[   63.674690] Call Trace:
[   63.674700]  [<c0bab291>] caif_device_notify+0x21/0x2d0
[   63.674710]  [<c04da339>] ? pcpu_alloc_area+0x109/0x250
[   63.674720]  [<c0ad64ff>] ? inetdev_event+0x1f/0x3a0
[   63.674728]  [<c0b335cd>] ? packet_notifier+0x8d/0x180
[   63.674738]  [<c046e6e7>] notifier_call_chain+0x47/0x90
[   63.674747]  [<c0bcda38>] ? mutex_unlock+0x8/0x10
[   63.674756]  [<c046e77b>] raw_notifier_call_chain+0x1b/0x20
[   63.674766]  [<c0a7d938>] call_netdevice_notifiers+0x28/0x60
[   63.674773]  [<c04dac6a>] ? __alloc_percpu+0xa/0x10
[   63.674782]  [<c0a80c6d>] register_netdevice+0xed/0x210
[   63.674790]  [<c0bcdd0e>] ? mutex_lock+0x1e/0x30
[   63.674797]  [<c0a80da2>] register_netdev+0x12/0x20
[   63.674807]  [<c0868ec3>] loopback_net_init+0x43/0x90
[   63.674815]  [<c0a7864f>] ops_init+0x2f/0x80
[   63.674822]  [<c0a7877f>] setup_net+0x4f/0xe0
[   63.674830]  [<c0a78ccc>] copy_net_ns+0x6c/0xe0
[   63.674838]  [<c046de31>] create_new_namespaces+0xc1/0x150
[   63.674847]  [<c046df82>] copy_namespaces+0x72/0xb0
[   63.674856]  [<c0448efe>] copy_process+0x60e/0xc70
[   63.674864]  [<c04df3c1>] ? handle_mm_fault+0x141/0x250
[   63.674872]  [<c04495ef>] do_fork+0x5f/0x300

Is this already known/fixed?

https://bugs.meego.com/show_bug.cgi?id=23540

-- 
                   Sent with MeeGo's ActiveSync support.

David Woodhouse                            Open Source Technology Centre
David.Woodhouse@...el.com                              Intel Corporation



Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (4370 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ