lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+0Zf5Be5JUSvssH9CrDQq=jtETZr=veAPC7jriM8B-FZKbbpg@mail.gmail.com>
Date:	Fri, 14 Oct 2011 10:08:26 +0200
From:	Elmar Vonlanthen <evonlanthen@...il.com>
To:	linux-kernel@...r.kernel.org
Subject: Re: PROBLEM: System call 'sendmsg' of process ospfd (quagga) causes
 kernel oops

Hello again

Kernel 3.0.6 is affected as well.

2011-10-14 09:50:46 chgut11fw01 kernel: skb_over_panic: text:c13059c9
len:64 put:64 head:c730c400 data:c730c450 tail:0xc730c490
end:0xc730c480 dev:<NULL>
2011-10-14 09:50:46 chgut11fw01 kernel: ------------[ cut here ]------------
2011-10-14 09:50:46 chgut11fw01 kernel: kernel BUG at net/core/skbuff.c:128!
2011-10-14 09:50:46 chgut11fw01 kernel: invalid opcode: 0000 [#1] SMP
2011-10-14 09:50:46 chgut11fw01 kernel: Modules linked in: ip_gre gre
authenc xfrm4_mode_transport deflate zlib_deflate ctr twofish_generic
twofish_common serpent cryptd aes_i586 aes_generic blowfish cast5 cbc
ecb rmd160 sha512_generic sha256_generic sha1_generic xfrm_user
xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key tun ipt_LOG
xt_limit ipt_REJECT xt_state ipt_REDIRECT ipt_MASQUERADE xt_policy
xt_TCPMSS xt_tcpmss xt_tcpudp xt_NOTRACK iptable_filter iptable_nat
xt_mark xt_connmark iptable_mangle iptable_raw ip_tables x_tables
nf_conntrack_tftp nf_nat_ftp nf_nat nf_conntrack_ipv4 nf_defrag_ipv4
nf_conntrack_ftp nf_conntrack rtc ppdev parport_pc parport w83792d
i2c_dev i2c_i801 i2c_core pl2303 usbserial coretemp hwmon usbhid
ohci_hcd uhci_hcd ehci_hcd usbcore e1000 e1000e aufs ata_piix libata
2011-10-14 09:50:46 chgut11fw01 kernel:
2011-10-14 09:50:46 chgut11fw01 kernel: Pid: 6299, comm: ospfd Not
tainted 3.0.6-SMP #1    /LakePort
2011-10-14 09:50:46 chgut11fw01 kernel: EIP: 0060:[<c12b6815>] EFLAGS:
00010292 CPU: 0
2011-10-14 09:50:46 chgut11fw01 kernel: EIP is at skb_put+0x85/0x90
2011-10-14 09:50:46 chgut11fw01 kernel: EAX: 00000078 EBX: c13059c9
ECX: 00000096 EDX: ffffff8b
2011-10-14 09:50:46 chgut11fw01 kernel: ESI: deac4a80 EDI: 00000040
EBP: d8979c80 ESP: d8979c58
2011-10-14 09:50:46 chgut11fw01 kernel: DS: 007b ES: 007b FS: 00d8 GS:
0033 SS: 0068
2011-10-14 09:50:46 chgut11fw01 kernel: Process ospfd (pid: 6299,
ti=d8978000 task=de94ee80 task.ti=d8978000)
2011-10-14 09:50:46 chgut11fw01 kernel: Stack:
2011-10-14 09:50:46 chgut11fw01 kernel: c13fd194 c13059c9 00000040
00000040 c730c400 c730c450 c730c490 c730c480
2011-10-14 09:50:46 chgut11fw01 kernel: c13fb21c d897da40 d8979d38
c13059c9 d8979d24 8db04700 00000001 00000001
2011-10-14 09:50:46 chgut11fw01 kernel: d8979ce4 d8979cc8 c121ce7d
00000000 000012b5 d8979ecc dbff0c00 c730c450
2011-10-14 09:50:46 chgut11fw01 kernel: Call Trace:
2011-10-14 09:50:46 chgut11fw01 kernel: [<c13059c9>] ? raw_sendmsg+0x5a9/0x850
2011-10-14 09:50:46 chgut11fw01 kernel: [<c13059c9>] raw_sendmsg+0x5a9/0x850
2011-10-14 09:50:46 chgut11fw01 kernel: [<c121ce7d>] ? extract_entropy+0x5d/0x70
2011-10-14 09:50:46 chgut11fw01 kernel: [<c1027f73>] ?
try_to_wake_up+0x173/0x1f0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12b2700>] ? release_sock+0xb0/0xd0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c130f222>] inet_sendmsg+0x42/0xa0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c1021407>] ?
__wake_up_sync_key+0x47/0x60
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12afc07>] sock_sendmsg+0xa7/0xd0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12b29f3>] ?
sock_def_readable+0x33/0x60
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12afc07>] ? sock_sendmsg+0xa7/0xd0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12b8e83>] ? verify_iovec+0x53/0xb0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12b08e4>] __sys_sendmsg+0x2d4/0x2e0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12afc9e>] ?
sockfd_lookup_light+0x1e/0x70
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12b02fa>] ? sys_sendto+0xaa/0xe0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c102f928>] ? nsecs_to_jiffies+0x8/0x10
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12eaf11>] ? ip_setsockopt+0x41/0xa0
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12b0a36>] sys_sendmsg+0x36/0x60
2011-10-14 09:50:46 chgut11fw01 kernel: [<c12b1669>] sys_socketcall+0xe9/0x280
2011-10-14 09:50:46 chgut11fw01 kernel: [<c133d8c5>] syscall_call+0x7/0xb
2011-10-14 09:50:46 chgut11fw01 kernel: [<c1330000>] ?
packet_recvmsg+0x170/0x440
2011-10-14 09:50:46 chgut11fw01 kernel: Code: 00 00 89 4c 24 14 8b 88
a4 00 00 00 89 54 24 0c 89 4c 24 10 8b 40 50 89 5c 24 04 c7 04 24 94
d1 3f c1 89 44 24 08 e8 b4 4b 08 00 <0f> 0b eb fe b9 1c b2 3f c1 eb ae
55 89 e5 57 56 89 d6 53 89 c3
2011-10-14 09:50:46 chgut11fw01 kernel: EIP: [<c12b6815>]
skb_put+0x85/0x90 SS:ESP 0068:d8979c58
2011-10-14 09:50:46 chgut11fw01 kernel: ---[ end trace ff341104610beeed ]---

This is the output of "decodecode":

whiskey /usr/src/linux-3.0.6 # scripts/decodecode < oops.txt
2011-10-14 09:50:46 chgut11fw01 kernel: Code: 00 00 89 4c 24 14 8b 88
a4 00 00 00 89 54 24 0c 89 4c 24 10 8b 40 50 89 5c 24 04 c7 04 24 94
d1 3f c1 89 44 24 08 e8 b4 4b 08 00 <0f> 0b eb fe b9 1c b2 3f c1 eb ae
55 89 e5 57 56 89 d6 53 89 c3
All code
========
   0:   00 00                   add    %al,(%eax)
   2:   89 4c 24 14             mov    %ecx,0x14(%esp)
   6:   8b 88 a4 00 00 00       mov    0xa4(%eax),%ecx
   c:   89 54 24 0c             mov    %edx,0xc(%esp)
  10:   89 4c 24 10             mov    %ecx,0x10(%esp)
  14:   8b 40 50                mov    0x50(%eax),%eax
  17:   89 5c 24 04             mov    %ebx,0x4(%esp)
  1b:   c7 04 24 94 d1 3f c1    movl   $0xc13fd194,(%esp)
  22:   89 44 24 08             mov    %eax,0x8(%esp)
  26:   e8 b4 4b 08 00          call   0x84bdf
  2b:*  0f 0b                   ud2a        <-- trapping instruction
  2d:   eb fe                   jmp    0x2d
  2f:   b9 1c b2 3f c1          mov    $0xc13fb21c,%ecx
  34:   eb ae                   jmp    0xffffffe4
  36:   55                      push   %ebp
  37:   89 e5                   mov    %esp,%ebp
  39:   57                      push   %edi
  3a:   56                      push   %esi
  3b:   89 d6                   mov    %edx,%esi
  3d:   53                      push   %ebx
  3e:   89 c3                   mov    %eax,%ebx

Code starting with the faulting instruction
===========================================
   0:   0f 0b                   ud2a
   2:   eb fe                   jmp    0x2
   4:   b9 1c b2 3f c1          mov    $0xc13fb21c,%ecx
   9:   eb ae                   jmp    0xffffffb9
   b:   55                      push   %ebp
   c:   89 e5                   mov    %esp,%ebp
   e:   57                      push   %edi
   f:   56                      push   %esi
  10:   89 d6                   mov    %edx,%esi
  12:   53                      push   %ebx
  13:   89 c3                   mov    %eax,%ebx

Could anyone give me a hint, how I can furher proceed to find the error?
Thanks.

Best regards
Elmar
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ