lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160817014310.GA5143@yexl-desktop>
Date:	Wed, 17 Aug 2016 09:43:10 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	kan.liang@...el.com
Cc:	davem@...emloft.net, linux-kernel@...r.kernel.org,
	netdev@...r.kernel.org, mingo@...hat.com, peterz@...radead.org,
	kuznet@....inr.ac.ru, jmorris@...ei.org, yoshfuji@...ux-ipv6.org,
	kaber@...sh.net, akpm@...ux-foundation.org, keescook@...omium.org,
	viro@...iv.linux.org.uk, gorcunov@...nvz.org,
	john.stultz@...aro.org, aduyck@...antis.com, ben@...adent.org.uk,
	decot@...glers.com, fw@...len.de, alexander.duyck@...il.com,
	daniel@...earbox.net, tom@...bertland.com, rdunlap@...radead.org,
	xiyou.wangcong@...il.com, hannes@...essinduktion.org,
	jesse.brandeburg@...el.com, andi@...stfloor.org,
	Kan Liang <kan.liang@...el.com>, lkp@...org
Subject: [lkp] [net/netpolicy]  19e7d15d66: EIP: [<c735077b>]
 netpolicy_unregister+0x23a/0x28a SS:ESP 0068:ceb19d94


FYI, we noticed the following commit:

https://github.com/0day-ci/linux kan-liang-intel-com/net-introduce-NET-policy/20160805-034810
commit 19e7d15d66de8b17e3f2706b786fdc36932bbdbb ("net/netpolicy: limit the total record number")

in testcase: boot

on test machine: 2 threads qemu-system-i386 -enable-kvm with 320M memory

caused below changes:


+-------------------------------------------------------------------------+------------+------------+
|                                                                         | 199cbcce52 | 19e7d15d66 |
+-------------------------------------------------------------------------+------------+------------+
| boot_successes                                                          | 0          | 0          |
| boot_failures                                                           | 292        | 292        |
| INFO:trying_to_register_non-static_key                                  | 292        | 292        |
| backtrace:lock_acquire                                                  | 292        | 292        |
| backtrace:_raw_spin_lock                                                | 292        | 292        |
| backtrace:init_netpolicy                                                | 292        | 292        |
| backtrace:netpolicy_dev_init                                            | 292        | 292        |
| backtrace:netpolicy_net_init                                            | 292        | 292        |
| backtrace:ops_init                                                      | 292        | 292        |
| backtrace:register_pernet_subsys                                        | 292        | 292        |
| backtrace:netpolicy_init                                                | 292        | 292        |
| backtrace:kernel_init_freeable                                          | 292        | 292        |
| BUG:sleeping_function_called_from_invalid_context_at_kernel/workqueue.c | 3          | 1          |
| INFO:lockdep_is_turned_off                                              | 3          | 1          |
| backtrace:cpu_startup_entry                                             | 2          |            |
| invoked_oom-killer:gfp_mask=0x                                          | 2          | 2          |
| Mem-Info                                                                | 2          | 2          |
| BUG:unable_to_handle_kernel                                             | 0          | 9          |
| Oops                                                                    | 0          | 10         |
| EIP_is_at_netpolicy_unregister                                          | 0          | 10         |
| Kernel_panic-not_syncing:Fatal_exception_in_interrupt                   | 0          | 10         |
| backtrace:do_group_exit                                                 | 0          | 9          |
| backtrace:SyS_exit_group                                                | 0          | 9          |
+-------------------------------------------------------------------------+------------+------------+

[   60.668086] BUG: unable to handle kernel NULL pointer dereference at 000005e4
[   60.668237] IP: [<c735077b>] netpolicy_unregister+0x23a/0x28a
[   60.668237] *pdpt = 0000000000000000 *pde = f000ff53f000ff53 
[   60.668237] Oops: 0000 [#1] SMP
[   60.668237] CPU: 1 PID: 719 Comm: trinity-main Not tainted 4.7.0-11575-g19e7d15 #1
[   60.668237] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   60.668237] task: cff11280 task.stack: ceb18000
[   60.668237] EIP: 0060:[<c735077b>] EFLAGS: 00010286 CPU: 1
[   60.668237] EIP is at netpolicy_unregister+0x23a/0x28a
[   60.668237] EAX: 00040025 EBX: d01b8b14 ECX: 00000001 EDX: 000440e4
[   60.668237] ESI: d0ced518 EDI: 00000000 EBP: ceb19e54 ESP: ceb19d94
[   60.668237]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[   60.668237] CR0: 80050033 CR2: 000005e4 CR3: 08683000 CR4: 000006b0
[   60.668237] DR0: 08a96000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   60.668237] DR6: ffff0ff0 DR7: 00000600
[   60.668237] Stack:
[   60.668237]  d397acd0 d30f3e20 ceb19e38 00000001 d397acd0 ceb19e38 c5fab23a 00000246
[   60.668237]  00000001 cd652738 cff11280 00000000 00000000 ceb19dfc 00000046 00000000
[   60.668237]  00000046 00000046 c72dca5a ceb19e0c 00000046 00000046 c72dca5a d01b8c60
[   60.668237] Call Trace:
[   60.668237]  [<c5fab23a>] ? __slab_free+0x78f/0xcfd
[   60.668237]  [<c72dca5a>] ? skb_dequeue+0x20/0xd6
[   60.668237]  [<c72dca5a>] ? skb_dequeue+0x20/0xd6
[   60.668237]  [<c5d80089>] ? do_raw_spin_unlock+0x17e/0x1f2
[   60.668237]  [<c5ce14fb>] ? __local_bh_enable_ip+0x1d7/0x24a
[   60.668237]  [<c7367037>] ? unix_sock_destructor+0x365/0x37b
[   60.668237]  [<c72c8cce>] __sk_destruct+0x302/0x3a3
[   60.668237]  [<c5d80089>] ? do_raw_spin_unlock+0x17e/0x1f2
[   60.668237]  [<c72ca76f>] sk_destruct+0x60/0x70
[   60.668237]  [<c72ca997>] __sk_free+0x218/0x23e
[   60.668237]  [<c72cab29>] sk_free+0x76/0x87
[   60.668237]  [<c73666ff>] unix_release_sock+0x533/0x5aa
[   60.668237]  [<c73667cc>] unix_release+0x56/0x70
[   60.668237]  [<c72c285b>] sock_release+0x52/0x118
[   60.668237]  [<c72c293a>] sock_close+0x19/0x2b
[   60.668237]  [<c5ff7453>] __fput+0x2b2/0x516
[   60.668237]  [<c5ff76cd>] ____fput+0x16/0x26
[   60.668237]  [<c5d17d6b>] task_work_run+0xdb/0x13a
[   60.668237]  [<c5cde511>] do_exit+0x8ec/0x125f
[   60.668237]  [<c5cdf0e2>] do_group_exit+0x1db/0x1db
[   60.668237]  [<c5cdf101>] SyS_exit_group+0x1f/0x1f
[   60.668237]  [<c5c051a0>] do_int80_syscall_32+0xe7/0x216
[   60.668237]  [<c7387767>] entry_INT80_32+0x27/0x27
[   60.668237] Code: 00 83 15 6c dd 88 c9 00 8b 4e 18 8b 56 14 8b 46 10 e8 e1 b7 ff ff 89 f0 83 05 70 dd 88 c9 01 83 15 74 dd 88 c9 00 e8 be 1f c6 fe <8b> 87 e4 05 00 00 83 05 78 dd 88 c9 01 83 15 7c dd 88 c9 00 f0
[   60.668237] EIP: [<c735077b>] netpolicy_unregister+0x23a/0x28a SS:ESP 0068:ceb19d94
[   60.668237] CR2: 00000000000005e4
[   60.668237] ---[ end trace 0a852e6d62e4e5da ]---
[   60.668237] Kernel panic - not syncing: Fatal exception in interrupt
[   60.668237] Kernel Offset: 0x4c00000 from 0xc1000000 (relocation range: 0xc0000000-0xd47dffff)


FYI, raw QEMU command line is:

	qemu-system-i386 -enable-kvm -kernel /pkg/linux/i386-randconfig-b0-08090859/gcc-5/19e7d15d66de8b17e3f2706b786fdc36932bbdbb/vmlinuz-4.7.0-11575-g19e7d15 -append 'ip=::::vm-ivb41-yocto-i386-1::dhcp root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-ivb41-yocto-i386-1/boot-1-yocto-minimal-i386.cgz-19e7d15d66de8b17e3f2706b786fdc36932bbdbb-20160812-47599-1hnwfr3-224.yaml ARCH=i386 kconfig=i386-randconfig-b0-08090859 branch=linux-devel/devel-hourly-2016080906 commit=19e7d15d66de8b17e3f2706b786fdc36932bbdbb BOOT_IMAGE=/pkg/linux/i386-randconfig-b0-08090859/gcc-5/19e7d15d66de8b17e3f2706b786fdc36932bbdbb/vmlinuz-4.7.0-11575-g19e7d15 max_uptime=600 RESULT_ROOT=/result/boot/1/vm-ivb41-yocto-i386/yocto-minimal-i386.cgz/i386-randconfig-b0-08090859/gcc-5/19e7d15d66de8b17e3f2706b786fdc36932bbdbb/224 LKP_SERVER=inn debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 systemd.log_level=err ignore_loglevel earlyprintk=ttyS0,115200 console=ttyS0,115200 console=tty0 vga=normal rw drbd.minor_count=8'  -initrd /fs/sda5/initrd-vm-ivb41-yocto-i386-1 -m 320 -smp 2 -device e1000,netdev=net0 -netdev user,id=net0 -boot order=nc -no-reboot -watchdog i6300esb -watchdog-action debug -rtc base=localtime -drive file=/fs/sda5/disk0-vm-ivb41-yocto-i386-1,media=disk,if=virtio -pidfile /dev/shm/kboot/pid-vm-ivb41-yocto-i386-1 -serial file:/dev/shm/kboot/serial-vm-ivb41-yocto-i386-1 -daemonize -display none -monitor null 





Thanks,
Xiaolong

View attachment "config-4.7.0-11575-g19e7d15" of type "text/plain" (104100 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (24596 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ