lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20190113202414.230ec28c@hermes.lan>
Date:   Sun, 13 Jan 2019 20:24:14 -0800
From:   Stephen Hemminger <stephen@...workplumber.org>
To:     netdev@...r.kernel.org
Subject: Fw: [Bug 202249] New: WARNING: CPU: 1 PID: 3904 at
 net/ipv4/raw_diag.c:28 raw_get_hashinfo.isra.0+0x1a/0x30

This problem was not reported previously. Looks like ss hitting bug  in raw_diag.c

Begin forwarded message:

Date: Sun, 13 Jan 2019 09:52:12 +0000
From: bugzilla-daemon@...zilla.kernel.org
To: stephen@...workplumber.org
Subject: [Bug 202249] New: WARNING: CPU: 1 PID: 3904 at net/ipv4/raw_diag.c:28 raw_get_hashinfo.isra.0+0x1a/0x30


https://bugzilla.kernel.org/show_bug.cgi?id=202249

            Bug ID: 202249
           Summary: WARNING: CPU: 1 PID: 3904 at net/ipv4/raw_diag.c:28
                    raw_get_hashinfo.isra.0+0x1a/0x30
           Product: Networking
           Version: 2.5
    Kernel Version: 4.20.2
          Hardware: Intel
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: high
          Priority: P1
         Component: IPV4
          Assignee: stephen@...workplumber.org
          Reporter: micron10@...il.com
        Regression: No

Machine boot 5 min after that :

[  173.180430] raw_diag: Unexpected inet family 10
[  173.181035] WARNING: CPU: 1 PID: 3904 at net/ipv4/raw_diag.c:28
raw_get_hashinfo.isra.0+0x1a/0x30 [raw_diag]
[  173.181936] Modules linked in: raw_diag unix_diag af_packet_diag sch_hfsc
iptable_filter iptable_mangle xt_addrtype xt_nat iptable_nat nf_nat_ipv4
ip_tables bpfilter sch_fq_codel netconsole ifb tg3 libphy e1000e e1000 igb
i2c_algo_bit ixgbe mdio ixgb nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp
nf_conntrack_proto_gre nf_nat_tftp nf_conntrack_tftp nf_nat_ftp
nf_conntrack_ftp nf_nat nf_conntrack nf_defrag_ipv4 pppoe pptp gre pppox
sha1_ssse3 sha1_generic arc4 ppp_mppe ppp_generic slhc tun
[  173.185512] CPU: 1 PID: 3904 Comm: ss Tainted: G           O      4.20.1 #1
[  173.185997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)/Standard
PC (i440FX + PIIX, 1996), BIOS
[  173.186955] RIP: 0010:raw_get_hashinfo.isra.0+0x1a/0x30 [raw_diag]
[  173.187477] Code: e8 01 89 46 3c c3 66 2e 0f 1f 84 00 00 00 00 00 48 c7 c0
60 92 2b 82 40 80 ff 02 74 16 80 3d d8 1f 00 00 00 0f 84 d3 03 00 00 <0f> 0b 48
c7 c0 ea ff ff ff c3 66 66 2e 0f 1f 84 00 00 00 00 00 90
[  173.189058] RSP: 0018:ffffc9000314fa88 EFLAGS: 00010246
[  173.189576] RAX: 0000000000000023 RBX: ffffffffa02680c0 RCX:
ffffffff81e2ca38
[  173.190131] RDX: 0000000000000000 RSI: 0000000000000082 RDI:
ffffffff82212fe4
[  173.190683] RBP: ffff8880a2e32e10 R08: 00000000000001f7 R09:
0000000000000000
[  173.191228] R10: 0000000000000000 R11: ffff8880a0c92000 R12:
ffff8880a39d0af0
[  173.191765] R13: ffff8880a39d0af0 R14: 0000000000000000 R15:
0000000000000001
[  173.192306] FS:  00007fa50cf6c540(0000) GS:ffff8880a5c80000(0000)
knlGS:0000000000000000
[  173.193366] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  173.193926] CR2: 000000000042af28 CR3: 000000005e160000 CR4:
00000000000006e0
[  173.194494] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[  173.195075] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[  173.195632] Call Trace:
[  173.196212]  raw_diag_dump+0x37/0x1b0 [raw_diag]
[  173.196773]  ? __kmalloc_reserve.isra.9+0x24/0x70
[  173.197325]  __inet_diag_dump+0x36/0x80
[  173.197881]  netlink_dump+0x16d/0x360
[  173.198423]  __netlink_dump_start+0x13e/0x1a0
[  173.198942]  inet_diag_handler_cmd+0xb2/0xc0
[  173.199455]  ? inet_diag_dump_compat+0xe0/0xe0
[  173.199943]  sock_diag_rcv_msg+0x106/0x130
[  173.200428]  ? sock_diag_bind+0x50/0x50
[  173.200892]  netlink_rcv_skb+0x44/0x120
[  173.201354]  sock_diag_rcv+0x1f/0x30
[  173.201800]  netlink_unicast+0x188/0x250
[  173.202230]  netlink_sendmsg+0x1c0/0x3e0
[  173.202646]  sock_sendmsg+0xb/0x20
[  173.203066]  ___sys_sendmsg+0x238/0x260
[  173.203502]  ? filemap_map_pages+0x13c/0x310
[  173.203769]  ? page_add_new_anon_rmap+0x6a/0xa0
[  173.204027]  ? __handle_mm_fault+0xa6a/0x1340
[  173.204272]  __sys_sendmsg+0x4c/0x90
[  173.204540]  do_syscall_64+0x79/0x210
[  173.204788]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  173.205097] RIP: 0033:0x7fa50cea7404
[  173.205367] Code: 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00
00 00 00 48 8d 05 f9 32 0c 00 8b 00 85 c0 75 13 b8 2e 00 00 00 0f 05 <48> 3d 00
f0 ff ff 77 54 c3 0f 1f 00 41 54 41 89 d4 55 48 89 f5 53
[  173.206035] RSP: 002b:00007fff12231d48 EFLAGS: 00000246 ORIG_RAX:
000000000000002e
[  173.206495] RAX: ffffffffffffffda RBX: 00007fff12231ea0 RCX:
00007fa50cea7404
[  173.206764] RDX: 0000000000000000 RSI: 00007fff12231ef0 RDI:
0000000000000003
[  173.207028] RBP: 000000000000000a R08: 0000000000000000 R09:
0000000000000010
[  173.207286] R10: 0000000000000001 R11: 0000000000000246 R12:
0000000000000003
[  173.207546] R13: 00007fff12231ef0 R14: 00007fff12231e60 R15:
00000000000000ff
[  173.207806] ---[ end trace b5d8d4a1f2d2b8ae ]---

-- 
You are receiving this mail because:
You are the assignee for the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ