lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Fri, 19 Jan 2018 23:48:26 +0100
From:   Tomas Charvat <tc@...ello.cz>
To:     Steffen Klassert <steffen.klassert@...unet.com>
Cc:     David Miller <davem@...emloft.net>, fw@...len.de,
        netdev@...r.kernel.org
Subject: Re: flow cache removed = xfrm doesnt work

> Ok I have tried 4.14.14 and got following after 1 hour or so. It was
> not fatal, system kept going.



[ 2833.840452] BUG: unable to handle kernel NULL pointer dereference at
0000000000000018
[ 2833.840549] IP: xfrm_output_resume+0x20a/0x460
[ 2833.840618] PGD 0 P4D 0 
[ 2833.840682] Oops: 0000 [#1] SMP NOPTI
[ 2833.840752] CPU: 81 PID: 121868 Comm: spamd child Not tainted
4.14.14-gentoo #2
[ 2833.840831] Hardware name: Supermicro AS -1123US-TR4/H11DSU-iN, BIOS
1.0a 09/25/2017
[ 2833.840911] task: ffff891d1d5b8600 task.stack: ffff980cde96c000
[ 2833.840987] RIP: 0010:xfrm_output_resume+0x20a/0x460
[ 2833.841058] RSP: 0018:ffff980cde96fb70 EFLAGS: 00010246
[ 2833.841129] RAX: 0000000000000000 RBX: ffff891b1e0a48e0 RCX:
0000000000000000
[ 2833.841207] RDX: 0000000000000005 RSI: 0000000000000000 RDI:
0000000000000000
[ 2833.841285] RBP: ffffffffb1f11300 R08: ffff980cde96fa20 R09:
ffff891b199ba450
[ 2833.841363] R10: ffff891b1d5b30c4 R11: 0000000000000000 R12:
ffff891b1e0f7400
[ 2833.841441] R13: ffff891b1e0f743c R14: 0000000000000020 R15:
000000000001f000
[ 2833.841519] FS:  00007fe90028e700(0000) GS:ffff891b1fc40000(0000)
knlGS:0000000000000000
[ 2833.841601] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 2833.841673] CR2: 0000000000000018 CR3: 0000800dcc944000 CR4:
00000000001406e0
[ 2833.841908] Call Trace:
[ 2833.842141]  ? skb_checksum_help+0x83/0x1b0
[ 2833.842382]  ? xfrm_output+0x1c9/0x210
[ 2833.842626]  xfrm6_output+0x91/0x110
[ 2833.842904]  ? xfrm6_local_rxpmtu+0x80/0x80
[ 2833.843200]  tcp_transmit_skb+0x541/0x990
[ 2833.843488]  tcp_write_xmit+0x1bc/0xf90
[ 2833.843743]  ? _copy_from_iter_full+0x93/0x230
[ 2833.843955]  __tcp_push_pending_frames+0x28/0x90
[ 2833.844115]  tcp_sendmsg_locked+0x65c/0xe40
[ 2833.844351]  tcp_sendmsg+0x2e/0x50
[ 2833.844565]  sock_sendmsg+0x3e/0x50
[ 2833.844784]  sock_write_iter+0x82/0xf0
[ 2833.845011]  __vfs_write+0x129/0x190
[ 2833.845233]  vfs_write+0xc3/0x1c0
[ 2833.845500]  SyS_write+0x5f/0xd0
[ 2833.845709]  entry_SYSCALL_64_fastpath+0x19/0x72
[ 2833.845932] RIP: 0033:0x7fe8ff9b9b80
[ 2833.846148] RSP: 002b:00007ffd441632c8 EFLAGS: 00000246
[ 2833.846148] Code: b0 fe ff ff 31 f6 85 d2 0f 8f a6 fe ff ff 0f 1f 00
e9 af fe ff ff 85 f6 89 f0 0f 85 cc fe ff ff 48 8b 7b 58 48 89 f8 48 83
e0 fe <4c> 8b 68 18 4d 85 ed 0f 84 ad 01 00 00 41 8b 85 80 00 00 00 85 
[ 2833.846987] RIP: xfrm_output_resume+0x20a/0x460 RSP:
ffff980cde96fb70
[ 2833.847280] CR2: 0000000000000018
[ 2833.847532] ---[ end trace 504f6c380fc3f734 ]---
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ