lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <18907.41226.669821.298854@stoffel.org>
Date:	Tue, 7 Apr 2009 14:52:58 -0400
From:	"John Stoffel" <john@...ffel.org>
To:	"John Stoffel" <john@...ffel.org>
Cc:	Jarek Poplawski <jarkao2@...il.com>, linux-kernel@...r.kernel.org,
	netdev@...r.kernel.org, Pete Zaitcev <zaitcev@...hat.com>,
	linux-usb@...r.kernel.org
Subject: usb_mon oops Re: tcpdump crashes 2.6.29.1 (and 2.6.29-rc5)

>>>>> "John" == John Stoffel <john@...ffel.org> writes:

>>>>> "Jarek" == Jarek Poplawski <jarkao2@...il.com> writes:
Jarek> On 07-04-2009 05:03, John Stoffel wrote:
>>> Hi,
Jarek> Hi,

Jarek> Looks more like usb_mon crash, so some Cc added.


John> I'll re-build without USB_MON on my system and see what happens.
John> If it works, I'll start a bisection run back to see where the
John> issue first crops up.

Ok, I've rebuit the system, and in my initial quick remote tests,
tcpdump doesn't crash the system.  Now I also admit that my test box
on the 192.168.2/24 subnet isn't powered on right now, so who knows.

I'll see if I can go back to 2.6.28 with USB_MON compiled in, and see
if that causes a problem.  Who knows...

More later tonight if I'm lucky.


John> But I'm surprised that USB_MON would be the cause when it's a
John> networking tool which is starting up?  *shrug*

>>> 
>>> I've got an AMD64x2 system, x86_64, SMP, PREEMPT, with 4Gb of RAM,
>>> running 2.6.29.1 (most recently running 2.6.29-rc5 for a while before
>>> that) which crashes when I run 'tcpdump host x.y.z.n'.  I'm on
>>> linux-kernel, but not netdev, so please keep me in the headers.
>>> 
>>> I have't tried wireshark or ethereal yet, since I just wanted to see
>>> if packets were getting forwarded.  My main firewall is a m0n0wall
>>> WRAP board, so there's no much to do there debugging wise.  Ping does
>>> seem to work from both the firewall (192.1681.254) to 192.168.2.200
>>> once I put in the proper static route via sail
>>> (192.168.1.3/192.168.2.3).
>>> 
>>> Background: I'm working on setting up a PXE boot environment for a new
>>> box without a CDROM.  My current system, sail, has eth0 on the
>>> 192.168.1.0/24 subnet, with an IP of 192.168.1.3, and my WAN router
>>> (with DHCP) is setup at 192.168.1.254.  So I setup eth1 on the
>>> 192.168.2.0/24 subnet, with a DHCP server on my host, and an IP of
>>> 192.168.2.3 on that subnet.  More details:
>>> 
>>> 
>>> eth0      Link encap:Ethernet  HWaddr 00:1e:8c:45:f3:e5  
>>> inet addr:192.168.1.3  Bcast:192.168.1.255
>>> Mask:255.255.255.0
>>> UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>> RX packets:8663 errors:0 dropped:0 overruns:0 frame:0
>>> TX packets:10088 errors:0 dropped:0 overruns:0 carrier:0
>>> collisions:0 txqueuelen:1000 
>>> RX bytes:3329485 (3.3 MB)  TX bytes:2088101 (2.0 MB)
>>> Interrupt:26 Base address:0xe000 
>>> 
>>> eth1      Link encap:Ethernet  HWaddr 00:1e:8c:46:0e:74  
>>> inet addr:192.168.2.3  Bcast:192.168.2.255
>>> Mask:255.255.255.0
>>> UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>> RX packets:8 errors:0 dropped:0 overruns:0 frame:0
>>> TX packets:71 errors:0 dropped:0 overruns:0 carrier:0
>>> collisions:0 txqueuelen:1000 
>>> RX bytes:1608 (1.6 KB)  TX bytes:11169 (11.1 KB)
>>> Interrupt:27 Base address:0xa000 
>>> 
>>> > cat /proc/sys/net/ipv4/ip_forward 
>>> 1
>>> 
>>> > cat /proc/version 
>>> Linux version 2.6.29.1 (root@...l) (gcc version 4.3.3 (Ubuntu
>>> 4.3.3-5ubuntu4) ) #22 SMP PREEMPT Mon Apr 6 21:41:56 EDT 2009
>>> 
>>> > netstat -nr
>>> Kernel IP routing table
>>> Destination     Gateway         Genmask         Flags   MSS Window
>>> irtt Iface
>>> 192.168.2.0     0.0.0.0         255.255.255.0   U         0 0
>>> 0 eth1
>>> 192.168.1.0     0.0.0.0         255.255.255.0   U         0 0
>>> 0 eth0
>>> 169.254.0.0     0.0.0.0         255.255.0.0     U         0 0
>>> 0 eth1
>>> 0.0.0.0         192.168.1.254   0.0.0.0         UG        0 0
>>> 0 eth0
>>> 
>>> > ip route
>>> 192.168.2.0/24 dev eth1  proto kernel  scope link  src 192.168.2.3 
>>> 192.168.1.0/24 dev eth0  proto kernel  scope link  src 192.168.1.3 
>>> 169.254.0.0/16 dev eth1  scope link  metric 1000 
>>> default via 192.168.1.254 dev eth0  metric 100 
>>> 
>>> 
>>> > tcpdump --version
>>> tcpdump version 3.9.8
>>> libpcap version 1.0.0
>>> 
>>> I don't have any ip_tables stuff loaded, which might be needed for my
>>> setup, but which doesn't seem to be implicated in this crash right
>>> now.
>>> 
>>> I can now PXEboot my client just fine, but connections from the
>>> 192.168.2.200 PXE host don't seem to get properly forwarded out to the
>>> internet so I can continue the network boot and install of Debian.  So
>>> to figure out what I was going wrong, I would try to do 'tcpdump host
>>> 192.168.2.200' on 'sail' and it would instantly hang.  I mucked around
>>> and got netconsole setup and got the following ksymoops.
>>> 
>>> Hopefully they'll be helpful.  I'll be happy to try and bisect this,
>>> and I'll start moving back in versions to see if I can find where this
>>> crash takes place.
>>> 
>>> [ 1396.271782] BUG: unable to handle kernel paging request at ffff880020a15cc0
>>> [ 1396.271809] IP: [<ffffffff803f436b>] memcpy_c+0xb/0x20
>>> [ 1396.271837] PGD 202063 PUD 206063 PMD 20a001e2 
>>> [ 1396.271864] Oops: 0000 [#1] PREEMPT SMP 
>>> [ 1396.271887] last sysfs file: /sys/module/loop/initstate
>>> [ 1396.271896] CPU 1 
>>> [ 1396.271907] Modules linked in: cryptoloop loop kvm_amd netconsole configfs binfmt_misc radeon drm af_packet kvm nfs ftdi_sio usbserial ata_generic pata_jmicron ohci1394 ieee1394 k8temp uvcvideo videodev v4l1_compat v4l2_compat_ioctl32 i2c_nforce2 i2c_core [last unloaded: kvm_amd]
>>> [ 1396.272062] Pid: 0, comm: swapper Not tainted 2.6.29.1 #22 System Product Name
>>> [ 1396.272070] RIP: 0010:[<ffffffff803f436b>]  [<ffffffff803f436b>] memcpy_c+0xb/0x20
>>> [ 1396.272087] RSP: 0018:ffff88011e8b7b00  EFLAGS: 00010002
>>> [ 1396.272095] RAX: ffff8800cac5d2c0 RBX: 0000000000000012 RCX: 0000000000000002
>>> [ 1396.272103] RDX: 0000000000000002 RSI: ffff880020a15cc0 RDI: ffff8800cac5d2c0
>>> [ 1396.272112] RBP: ffff88011e8b7b38 R08: 0000000000000080 R09: 000000000004b000
>>> [ 1396.272120] R10: 0000000000000012 R11: 00000000ffffff82 R12: 00000000000002d2
>>> [ 1396.272129] R13: 0000000000000012 R14: ffff880020a15cc0 R15: 0000000000000012
>>> [ 1396.272138] FS:  00007fe36d6f1700(0000) GS:ffff88011f5d92c0(0000) knlGS:0000000000000000
>>> [ 1396.272146] CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
>>> [ 1396.272155] CR2: ffff880020a15cc0 CR3: 0000000115e14000 CR4: 00000000000006e0
>>> [ 1396.272163] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> [ 1396.272172] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> [ 1396.272181] Process swapper (pid: 0, threadinfo ffff88011e8b0000, task ffff88011e89b820)
>>> [ 1396.272189] Stack:
>>> [ 1396.272195]  ffffffff804e6444 ffff88010aab2ec0 0000000000000000 0000000000000012
>>> [ 1396.272216]  0000000020a15cc0 00000000000002c0 ffff88010aab2ec0 ffff88011e8b7b78
>>> [ 1396.272247]  ffffffff804e760e 0000000000000096 ffff8800cac5d280 ffff88010aab2ec0
>>> [ 1396.272279] Call Trace:
>>> [ 1396.272287]  <IRQ> <0> [<ffffffff804e6444>] ? mon_copy_to_buff+0x74/0xa0
>>> [ 1396.272309]  [<ffffffff804e760e>] mon_dmapeek_vec+0x9e/0x120
>>> [ 1396.272322]  [<ffffffff804e67bf>] mon_bin_event+0x34f/0x3d0
>>> [ 1396.272338]  [<ffffffff804e6850>] mon_bin_complete+0x10/0x20
>>> [ 1396.272350]  [<ffffffff804e4658>] mon_bus_complete+0x48/0x80
>>> [ 1396.272364]  [<ffffffff804e46b4>] mon_complete+0x24/0x40
>>> [ 1396.272376]  [<ffffffff804d400b>] usb_hcd_giveback_urb+0x9b/0xe0
>>> [ 1396.272390]  [<ffffffff804e8416>] ehci_urb_done+0x106/0x130
>>> [ 1396.272404]  [<ffffffff804e9d3a>] qh_completions+0x31a/0x680
>>> [ 1396.272417]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272433]  [<ffffffff804ea183>] ehci_work+0xe3/0xbf0
>>> [ 1396.272446]  [<ffffffff804f1690>] ehci_irq+0x2b0/0x430
>>> [ 1396.272460]  [<ffffffff8026e869>] ? getnstimeofday+0x59/0xe0
>>> [ 1396.272474]  [<ffffffff80269979>] ? ktime_get_ts+0x59/0x60
>>> [ 1396.272489]  [<ffffffff804d399c>] usb_hcd_irq+0x4c/0xb0
>>> [ 1396.272502]  [<ffffffff8028e9d3>] handle_IRQ_event+0x43/0x80
>>> [ 1396.272516]  [<ffffffff802902f2>] handle_fasteoi_irq+0x82/0x100
>>> [ 1396.272532]  [<ffffffff802161a1>] do_IRQ+0x81/0x110
>>> [ 1396.272545]  [<ffffffff80214213>] ret_from_intr+0x0/0x29
>>> [ 1396.272558]  <EOI> <0> [<ffffffff8022ef76>] ? native_safe_halt+0x6/0x10
>>> [ 1396.272580]  [<ffffffff8021ad8d>] ? default_idle+0x4d/0x50
>>> [ 1396.272594]  [<ffffffff8021af41>] ? c1e_idle+0x51/0x120
>>> [ 1396.272607]  [<ffffffff80661291>] ? atomic_notifier_call_chain+0x11/0x20
>>> [ 1396.272620]  [<ffffffff80212679>] ? cpu_idle+0x69/0xd0
>>> [ 1396.272636]  [<ffffffff80656b97>] ? start_secondary+0x182/0x1db
>>> [ 1396.272650] Code: 81 ea d8 1f 00 00 48 3b 42 20 73 07 48 8b 50 f9 31 c0 c3 31 d2 48 c7 c0 f2 ff ff ff c3 90 90 90 48 89 f8 89 d1 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 
>>> [ 1396.272759] RIP  [<ffffffff803f436b>] memcpy_c+0xb/0x20
>>> [ 1396.272759]  RSP <ffff88011e8b7b00>
>>> [ 1396.272759] CR2: ffff880020a15cc0
>>> [ 1396.272759] ---[ end trace 091310ffa51c7f18 ]---
>>> [ 1396.272759] Kernel panic - not syncing: Fatal exception in interrupt
>>> [ 1396.272759] ------------[ cut here ]------------
>>> [ 1396.272759] WARNING: at kernel/smp.c:329 smp_call_function_many+0x231/0x2a0()
>>> [ 1396.272759] Hardware name: System Product Name
>>> [ 1396.272759] Modules linked in: cryptoloop loop kvm_amd netconsole configfs binfmt_misc radeon drm af_packet kvm nfs ftdi_sio usbserial ata_generic pata_jmicron ohci1394 ieee1394 k8temp uvcvideo videodev v4l1_compat v4l2_compat_ioctl32 i2c_nforce2 i2c_core [last unloaded: kvm_amd]
>>> [ 1396.272759] Pid: 0, comm: swapper Tainted: G      D    2.6.29.1 #22
>>> [ 1396.272759] Call Trace:
>>> [ 1396.272759]  <IRQ>  [<ffffffff8024e610>] warn_slowpath+0xd0/0x130
>>> [ 1396.272759]  [<ffffffff803f2fa1>] ? vsnprintf+0x351/0xbb0
>>> [ 1396.272759]  [<ffffffff803f204f>] ? put_dec+0x11f/0x130
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff8048157b>] ? nv_start_xmit_optimized+0x47b/0x5c0
>>> [ 1396.272759]  [<ffffffff8021b030>] ? stop_this_cpu+0x0/0x30
>>> [ 1396.272759]  [<ffffffff805bf535>] ? netpoll_send_udp+0x205/0x220
>>> [ 1396.272759]  [<ffffffff802777f1>] smp_call_function_many+0x231/0x2a0
>>> [ 1396.272759]  [<ffffffff8021b030>] ? stop_this_cpu+0x0/0x30
>>> [ 1396.272759]  [<ffffffff8022feb9>] ? default_spin_lock_flags+0x9/0x10
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff8024eebd>] ? release_console_sem+0x1bd/0x210
>>> [ 1396.272759]  [<ffffffff8024f5b0>] ? vprintk+0x3d0/0x450
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff8065af15>] ? printk+0x67/0x6a
>>> [ 1396.272759]  [<ffffffff8027ef74>] ? crash_kexec+0x74/0x100
>>> [ 1396.272759]  [<ffffffff8022feb9>] ? default_spin_lock_flags+0x9/0x10
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff8024eebd>] ? release_console_sem+0x1bd/0x210
>>> [ 1396.272759]  [<ffffffff8027788f>] smp_call_function+0x2f/0x70
>>> [ 1396.272759]  [<ffffffff80227fd3>] native_smp_send_stop+0x23/0x50
>>> [ 1396.272759]  [<ffffffff8065ade9>] panic+0xbe/0x183
>>> [ 1396.272759]  [<ffffffff8027ef74>] ? crash_kexec+0x74/0x100
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff8024eebd>] ? release_console_sem+0x1bd/0x210
>>> [ 1396.272759]  [<ffffffff8024f195>] ? console_unblank+0x75/0x90
>>> [ 1396.272759]  [<ffffffff8065ee04>] oops_end+0xe4/0xf0
>>> [ 1396.272759]  [<ffffffff806606fa>] do_page_fault+0x22a/0xcd0
>>> [ 1396.272759]  [<ffffffff8025be41>] ? complete_signal+0x121/0x210
>>> [ 1396.272759]  [<ffffffff8025c0fe>] ? send_signal+0x1ce/0x2d0
>>> [ 1396.272759]  [<ffffffff80240aa5>] ? check_preempt_wakeup+0x175/0x190
>>> [ 1396.272759]  [<ffffffff80249a0c>] ? try_to_wake_up+0x16c/0x240
>>> [ 1396.272759]  [<ffffffff804c484b>] ? nv_swncq_host_interrupt+0x17b/0x760
>>> [ 1396.272759]  [<ffffffff802415b8>] ? enqueue_task_fair+0x188/0x1d0
>>> [ 1396.272759]  [<ffffffff8065e145>] page_fault+0x25/0x30
>>> [ 1396.272759]  [<ffffffff803f436b>] ? memcpy_c+0xb/0x20
>>> [ 1396.272759]  [<ffffffff804e6444>] ? mon_copy_to_buff+0x74/0xa0
>>> [ 1396.272759]  [<ffffffff804e760e>] mon_dmapeek_vec+0x9e/0x120
>>> [ 1396.272759]  [<ffffffff804e67bf>] mon_bin_event+0x34f/0x3d0
>>> [ 1396.272759]  [<ffffffff804e6850>] mon_bin_complete+0x10/0x20
>>> [ 1396.272759]  [<ffffffff804e4658>] mon_bus_complete+0x48/0x80
>>> [ 1396.272759]  [<ffffffff804e46b4>] mon_complete+0x24/0x40
>>> [ 1396.272759]  [<ffffffff804d400b>] usb_hcd_giveback_urb+0x9b/0xe0
>>> [ 1396.272759]  [<ffffffff804e8416>] ehci_urb_done+0x106/0x130
>>> [ 1396.272759]  [<ffffffff804e9d3a>] qh_completions+0x31a/0x680
>>> [ 1396.272759]  [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759]  [<ffffffff804ea183>] ehci_work+0xe3/0xbf0
>>> [ 1396.272759]  [<ffffffff804f1690>] ehci_irq+0x2b0/0x430
>>> [ 1396.272759]  [<ffffffff8026e869>] ? getnstimeofday+0x59/0xe0
>>> [ 1396.272759]  [<ffffffff80269979>] ? ktime_get_ts+0x59/0x60
>>> [ 1396.272759]  [<ffffffff804d399c>] usb_hcd_irq+0x4c/0xb0
>>> [ 1396.272759]  [<ffffffff8028e9d3>] handle_IRQ_event+0x43/0x80
>>> [ 1396.272759]  [<ffffffff802902f2>] handle_fasteoi_irq+0x82/0x100
>>> [ 1396.272759]  [<ffffffff802161a1>] do_IRQ+0x81/0x110
>>> [ 1396.272759]  [<ffffffff80214213>] ret_from_intr+0x0/0x29
>>> [ 1396.272759]  <EOI>  [<ffffffff8022ef76>] ? native_safe_halt+0x6/0x10
>>> [ 1396.272759]  [<ffffffff8021ad8d>] ? default_idle+0x4d/0x50
>>> [ 1396.272759]  [<ffffffff8021af41>] ? c1e_idle+0x51/0x120
>>> [ 1396.272759]  [<ffffffff80661291>] ? atomic_notifier_call_chain+0x11/0x20
>>> [ 1396.272759]  [<ffffffff80212679>] ? cpu_idle+0x69/0xd0
>>> [ 1396.272759]  [<ffffffff80656b97>] ? start_secondary+0x182/0x1db
>>> [ 1396.272759] ---[ end trace 091310ffa51c7f19 ]---
>>> [ 1396.272759] ------------[ cut here ]------------
>>> [ 1396.272759] WARNING: at kernel/smp.c:226 smp_call_function_single+0xdf/0x170()
>>> [ 1396.272759] Hardware name: System Product Name
>>> [ 1396.272759] Modules linked in: cryptoloop loop kvm_amd netconsole configfs binfmt_misc radeon drm af_packet kvm nfs ftdi_sio usbserial ata_generic pata_jmicron ohci1394


--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ