lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAKYAXd9BsSACmR1xwsVjCuiMM5to4dECuknTpkOOA8SQw4as8Q@mail.gmail.com>
Date:	Wed, 5 Mar 2014 09:58:19 +0900
From:	Namjae Jeon <linkinjeon@...il.com>
To:	Pablo Neira Ayuso <pablo@...filter.org>,
	netfilter-devel@...r.kernel.org, netfilter@...r.kernel.org,
	coreteam@...filter.org, netdev@...r.kernel.org
Subject: Re: [BUG?] Null pointer dereference in nf_ct_delete_from_lists()

ping ?

2014-03-03 18:50 GMT+09:00, Namjae Jeon <linkinjeon@...il.com>:
> Hi Pablo.
>
> We got the below crash with our kernel(Kernel version: 3.8.13), not
> sure exactly what caused this issue. So, sharing the backtrace.
> Please help if there is any such known issue or any point which can
> help in debugging this issue.
>
> When we check at the address being referenced it is shown '00200200' -
> which is actually the value for LIST_POISON2.
> In this code path, POISON is marked after deletion in
> function->hlist_nulls_del_rcu()
> So, is this a case of deleting, already deleted node? or racy issue ?
>
> It is grateful that you give me any valuable opinon to find the root cause.
> Thanks.
>
> Unable to handle kernel paging request at virtual address 00200200
> pgd = c0003000
> [00200200] *pgd=8000009e004003, *pmd=00000000
>
> CPU: 2    Tainted: P           O  (3.8.13 #1)
>  PC is at nf_ct_delete_from_lists+0x50/0xc0
>  LR is at _raw_spin_lock_bh+0x2c/0x30
>  pc : [<c031d9a0>]    lr : [<c038deac>]    psr: 20000113
>  sp : d90bfe08  ip : d90bfdf0  fp : d90bfe1c
>  r10: d5b24740  r9 : d5b24740  r8 : c031da10
>  r7 : 00000102  r6 : d5b247bc  r5 : c054d3dc  r4 : d5b24740
>  r3 : 00004533  r2 : 00200200  r1 : 00000277  r0 : d5b24740
>  Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
>  Control: 30c5387d  Table: b6b7c800  DAC: 55555555
>  Process swapper/2 (pid: 0, stack limit = 0xd90be238)
>  Stack: (0xd90bfe08 to 0xd90c0000)
>  fe00:                   d5b24740 d90be000 d90bfe34 d90bfe20 c031da40
> c031d95c
>  fe20: d90bfe38 d901c000 d90bfe64 d90bfe38 c004d754 c031da1c 00000000
> d901c000
>  fe40: d901c000 d90be000 d5b247bc c0522084 00000000 c031da10 d90bfeac
> d90bfe68
>  fe60: c004e8c8 c004d720 c04736a0 d901c820 00200200 d90bfe78 d90bfe78
> d90bfe78
>  fe80: c0044d24 00000001 d90be000 00000004 c0522084 c0522088 d90be000
> 00000101
>  fea0: d90bfefc d90bfeb0 c0045074 c004e72c 0000001e 0000000a c061f568
> 00200040
>  fec0: 0000000a 00000002 00000004 00000102 00000008 d90be000 0000001e
> 00000000
>  fee0: c0554cb4 c0396ab0 d90be000 c0536150 d90bff14 d90bff00 c004576c
> c0044f78
>  ff00: d90bff18 c051e2f4 d90bff34 d90bff18 c0013ba0 c00456d0 00000010
> fef92000
>  ff20: c0531478 d90bff58 d90bff54 d90bff38 c00085fc c0013b34 c0013f18
> 60000013
>  ff40: ffffffff d90bff8c d90bffac d90bff58 c038e304 c00085ac ffffffed
> 00f52000
>  ff60: c053290c 00000000 d90be000 c05321b4 d90be000 c0554748 c0396ab0
> d90be000
>  ff80: c0536150 d90bffac d90bffb0 d90bffa0 c0013f2c c0013f18 60000013
> ffffffff
>  ffa0: d90bffdc d90bffb0 c0014184 c0013ee0 00000000 00000002 00000000
> 30c2387d
>  ffc0: c0554a1c 9e007000 412fc0f3 00000000 d90bfff4 d90bffe0 c038236c
> c001408c
>  ffe0: c0381870 b7046340 00000000 d90bfff8 9e381888 c0382238 ffffffff
> ffffffff
>
>  Backtrace:
>  [<c031d950>] (nf_ct_delete_from_lists+0x0/0xc0) from [<c031da40>]
> (death_by_timeout+0x30/0x68)
>   r5 90be000 r4 5b24740
>  [<c031da10>] (death_by_timeout+0x0/0x68) from [<c004d754>]
> (call_timer_fn+0x40/0x158)
>   r4 901c000 r3 90bfe38
>  [<c004d714>] (call_timer_fn+0x0/0x158) from [<c004e8c8>]
> (run_timer_softirq+0x1a8/0x280)
>  [<c004e720>] (run_timer_softirq+0x0/0x280) from [<c0045074>]
> (__do_softirq+0x108/0x2cc)
>  [<c0044f6c>] (__do_softirq+0x0/0x2cc) from [<c004576c>]
> (irq_exit+0xa8/0xb0)
>  [<c00456c4>] (irq_exit+0x0/0xb0) from [<c0013ba0>] (handle_IRQ+0x78/0x108)
>   r4:c051e2f4 r3 90bff18
>  [<c0013b28>] (handle_IRQ+0x0/0x108) from [<c00085fc>]
> (gic_handle_irq+0x5c/0xa4)
>   r6 90bff58 r5:c0531478 r4:fef92000 r3:00000010
>  [<c00085a0>] (gic_handle_irq+0x0/0xa4) from [<c038e304>]
> (__irq_svc+0x44/0x78)
>  Exception stack(0xd90bff58 to 0xd90bffa0)
>  ff40:                                                       ffffffed
> 00f52000
>  ff60: c053290c 00000000 d90be000 c05321b4 d90be000 c0554748 c0396ab0
> d90be000
>  ff80: c0536150 d90bffac d90bffb0 d90bffa0 c0013f2c c0013f18 60000013
> ffffffff
>   r7 90bff8c r6:ffffffff r5:60000013 r4:c0013f18
>  [<c0013ed4>] (default_idle+0x0/0x64) from [<c0014184>]
> (cpu_idle+0x104/0x168)
>  [<c0014080>] (cpu_idle+0x0/0x168) from [<c038236c>]
> (secondary_start_kernel+0x140/0x160)
>  [<c038222c>] (secondary_start_kernel+0x0/0x160) from [<9e381888>]
> (0x9e381888)
>   r4:b7046340 r3:c0381870
> Code: e7821003 e5943014 e5942018 e3130001 (e5823000)
>
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ