lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 14 Apr 2017 09:59:57 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     David Miller <davem@...emloft.net>
Cc:     michael.chan@...adcom.com, netdev@...r.kernel.org,
        xdp-newbies@...r.kernel.org, lkp@...org
Subject: [lkp-robot] [net]  d1dff7db3b:
 net/core/dev.c:#suspicious_rcu_dereference_check()usage


FYI, we noticed the following commit:

commit: d1dff7db3b97af1049d4e56c202baac378ddba16 ("net: Generic XDP")
url: https://github.com/0day-ci/linux/commits/David-Miller/net-Generic-XDP/20170414-055635


in testcase: trinity
with following parameters:

	runtime: 300s

test-description: Trinity is a linux system call fuzz tester.
test-url: http://codemonkey.org.uk/projects/trinity/


on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -m 512M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+---------------------------------------------------------+------------+------------+
|                                                         | 7ed14d973f | d1dff7db3b |
+---------------------------------------------------------+------------+------------+
| boot_successes                                          | 7          | 0          |
| boot_failures                                           | 2          | 34         |
| invoked_oom-killer:gfp_mask=0x                          | 2          | 4          |
| Mem-Info                                                | 2          | 4          |
| Out_of_memory:Kill_process                              | 2          | 4          |
| net/core/dev.c:#suspicious_rcu_dereference_check()usage | 0          | 34         |
+---------------------------------------------------------+------------+------------+



[   10.378933] 
[   10.379514] ===============================
[   10.380555] [ ERR: suspicious RCU usage.  ]
[   10.381634] 4.11.0-rc5-01380-gd1dff7d #123 Not tainted
[   10.382843] -------------------------------
[   10.383880] net/core/dev.c:7947 suspicious rcu_dereference_check() usage!
[   10.385890] 
[   10.385890] other info that might help us debug this:
[   10.385890] 
[   10.401128] 
[   10.401128] rcu_scheduler_active = 2, debug_locks = 0
[   10.404033] no locks held by swapper/0/1.
[   10.405279] 
[   10.405279] stack backtrace:
[   10.406721] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.11.0-rc5-01380-gd1dff7d #123
[   10.408842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.9.3-20161025_171302-gandalf 04/01/2014
[   10.411424] Call Trace:
[   10.412265]  dump_stack+0x82/0xb8
[   10.413279]  lockdep_rcu_suspicious+0xf7/0x100
[   10.414508]  free_netdev+0xf0/0x135
[   10.428607]  sbni_probe+0x287/0x2ba
[   10.429697]  ? set_debug_rodata+0x12/0x12
[   10.430837]  net_olddevs_init+0x14/0x72
[   10.431937]  ? probe_list2+0x50/0x50
[   10.432998]  do_one_initcall+0x90/0x142
[   10.434114]  ? set_debug_rodata+0x12/0x12
[   10.435247]  kernel_init_freeable+0x1d0/0x258
[   10.436451]  ? rest_init+0x13b/0x13b
[   10.437507]  kernel_init+0xe/0xf5
[   10.438536]  ret_from_fork+0x31/0x40
[   10.454986] tun: Universal TUN/TAP device driver, 1.6
[   10.456481] arcnet: arcnet loaded
[   10.457414] arcnet:rfc1201: RFC1201 "standard" (`a') encapsulation support loaded
[   10.459237] arcnet:rfc1051: RFC1051 "simple standard" (`s') encapsulation support loaded
[   10.498532] arcnet:arc_rawmode: raw mode (`r') encapsulation support loaded


To reproduce:

        git clone https://github.com/01org/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email



Thanks,
Xiaolong

View attachment "config-4.11.0-rc5-01380-gd1dff7d" of type "text/plain" (159303 bytes)

View attachment "job-script" of type "text/plain" (3946 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (60216 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ