lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20170904054415.GF13270@yexl-desktop>
Date:   Mon, 4 Sep 2017 13:44:15 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Florian Westphal <fw@...len.de>
Cc:     Pablo Neira Ayuso <pablo@...filter.org>,
        LKML <linux-kernel@...r.kernel.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>, lkp@...org
Subject: [lkp-robot] [netfilter]  d3ad2c17b4:
 WARNING:at_net/netfilter/core.c:#__nf_hook_entries_try_shrink

FYI, we noticed the following commit:

commit: d3ad2c17b4047747bcec074814c08b00795afc85 ("netfilter: core: batch nf_unregister_net_hooks synchronize_net calls")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

in testcase: trinity
with following parameters:

	runtime: 300s

test-description: Trinity is a linux system call fuzz tester.
test-url: http://codemonkey.org.uk/projects/trinity/

on test machine: qemu-system-x86_64 -enable-kvm -m 420M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):

+---------------------------------------------------------------+------------+------------+
|                                                               | 2420b79f8c | d3ad2c17b4 |
+---------------------------------------------------------------+------------+------------+
| boot_successes                                                | 38         | 3          |
| boot_failures                                                 | 0          | 35         |
| WARNING:at_net/netfilter/core.c:#__nf_hook_entries_try_shrink | 0          | 35         |
| EIP:__nf_hook_entries_try_shrink                              | 0          | 35         |
+---------------------------------------------------------------+------------+------------+

[   74.056028] WARNING: CPU: 0 PID: 1244 at net/netfilter/core.c:218 __nf_hook_entries_try_shrink+0x49/0xcd
[   74.059190] CPU: 0 PID: 1244 Comm: fw3 Not tainted 4.13.0-rc1-00404-gd3ad2c1 #1
[   74.061346] task: d678f2c0 task.stack: d936c000
[   74.062656] EIP: __nf_hook_entries_try_shrink+0x49/0xcd
[   74.072788] EFLAGS: 00010246 CPU: 0
[   74.073841] EAX: 00000000 EBX: c202aedc ECX: 00000000 EDX: 00000001
[   74.075593] ESI: 00000001 EDI: d9079f4c EBP: d936dcd8 ESP: d936dcbc
[   74.077333]  DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[   74.078945] CR0: 80050033 CR2: 0805c5ec CR3: 18289800 CR4: 000006b0
[   74.080717] Call Trace:
[   74.081448]  nf_unregister_net_hooks+0x9d/0xf9
[   74.082767]  ipv4_hooks_unregister+0x7c/0x8d
[   74.092797]  nf_ct_netns_put+0x87/0x96
[   74.093870]  conntrack_mt_destroy+0xe/0x10
[   74.095076]  cleanup_match+0x25/0x27
[   74.096130]  cleanup_entry+0x23/0x59
[   74.097139]  translate_table+0x436/0x565
[   74.098261]  ? __might_sleep+0x20/0x68
[   74.099408]  do_ipt_set_ctl+0xcf/0x32b
[   74.100500]  ? nf_setsockopt+0x1a/0x6d
[   74.101562]  nf_setsockopt+0x64/0x6d
[   74.102575]  ip_setsockopt+0x54/0x69
[   74.112795]  raw_setsockopt+0x1b/0x70
[   74.113861]  sock_common_setsockopt+0x13/0x18
[   74.115058]  SyS_setsockopt+0x59/0x77
[   74.116095]  SyS_socketcall+0x13c/0x19e
[   74.117231]  do_int80_syscall_32+0x46/0x8b
[   74.118453]  entry_INT80_32+0x2e/0x2e
[   74.119477] EIP: 0xb7eb4384
[   74.120273] EFLAGS: 00000296 CPU: 0
[   74.121316] EAX: ffffffda EBX: 0000000e ECX: bffd3758 EDX: b7efa000
[   74.142797] ESI: 0806c3e8 EDI: b7f39d6b EBP: bffd37d8 ESP: bffd3748
[   74.144673]  DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b
[   74.146204] Code: 31 c9 31 f6 0f b7 10 8d 7c d0 04 39 d6 73 11 31 c0 81 3c b7 34 0e c5 c1 0f 94 c0 46 01 c1 eb eb 39 d1 89 5d e4 74 76 85 c9 75 06 <0f> ff 31 c0 eb 76 29 ca 0f b7 c2 e8 70 ff ff ff 89 c6 31 c0 85
[   74.151675] ---[ end trace bfab8779f214e2ed ]---

To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email

Thanks,
Xiaolong

View attachment "config-4.13.0-rc1-00404-gd3ad2c1" of type "text/plain" (127535 bytes)

View attachment "job-script" of type "text/plain" (3683 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (18616 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ