lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200102092611.GB22327@unicorn.suse.cz>
Date:   Thu, 2 Jan 2020 10:26:11 +0100
From:   Michal Kubecek <mkubecek@...e.cz>
To:     Naresh Kamboju <naresh.kamboju@...aro.org>
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Sasha Levin <sashal@...nel.org>,
        Eric Dumazet <edumazet@...gle.com>,
        Firo Yang <firo.yang@...e.com>,
        Jakub Kicinski <jakub.kicinski@...ronome.com>,
        rcu@...r.kernel.org, Netdev <netdev@...r.kernel.org>,
        lkft-triage@...ts.linaro.org
Subject: Re: stable-rc-4.19.93-rc1/4e040169e8b7 : kernel panic RIP:
 0010:__inet_lookup_listener

On Thu, Jan 02, 2020 at 12:24:35PM +0530, Naresh Kamboju wrote:
> Results from Linaro’s test farm.
> Regressions on arm64, arm, x86_64, and i386.
> 
> While running LTP syscalls accept* test cases on stable-rc-4.19 branch kernel.
> This report log extracted from qemu_x86_64.
> 
> metadata:
>   git branch: linux-4.19.y
>   git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
>   git commit: 4e040169e8b7f4e1c50ceb0f6596015ecc67a052
>   git describe: v4.19.92-112-g4e040169e8b7
>   make_kernelversion: 4.19.93-rc1
>   kernel-config:
> http://snapshots.linaro.org/openembedded/lkft/lkft/sumo/intel-corei7-64/lkft/linux-stable-rc-4.19/396/config
> 
> Crash log,
> 
> BUG: unable to handle kernel paging request at 0000000040000001
> [   23.578222] PGD 138f25067 P4D 138f25067 PUD 0
> er run is 0h 15m[   23.578222] Oops: 0000 [#1] SMP NOPTI
> [   23.578222] CPU: 1 PID: 2216 Comm: accept02 Not tainted 4.19.93-rc1 #1
> [   23.578222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
> BIOS 1.12.0-1 04/01/2014
> [   23.578222] RIP: 0010:__inet_lookup_listener+0x12d/0x300
>  00s
> [ts t_buffe r 23.578222] Code: 18 48 85 db 0f 84 fe 00 00 00 48 83 eb
> 68 0f 84 f4 00 00 00 0f b7 75 d0 44 8b 55 10 45 89 f1 45 31 ff 31 c0
> 45 89 de 89 75 b0 <4c> 3b 63 30 75 43 66 44 3b 6b 0e 75 3c 0f b6 73 13
> 40 f6 c6 20 75
> [   23.578222] RSP: 0018:ffff9e0dbba83c38 EFLAGS: 00010206
> [   23.578222] RAX: ffff9e0db6ff8a80 RBX: 000000003fffffd1 RCX: 0000000000000000
> [   23.578222] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 00000000ffffffff
> [   23.578222] RBP: ffff9e0dbba83c88 R08: 000000000100007f R09: 0000000000000000
> [   23.578222] R10: 000000000100007f R11: 0000000000000000 R12: ffffffffbeb2fe40
> [   23.578222] R13: 000000000000d59f R14: 0000000000000000 R15: 0000000000000006
> [   23.578222] FS:  00007fbb30e57700(0000) GS:ffff9e0dbba80000(0000)
> knlGS:0000000000000000
> [   23.578222] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [   23.578222] CR2: 0000000040000001 CR3: 000000013276c000 CR4: 00000000003406e0
> [   23.578222] Call Trace:
> [   23.578222]  <IRQ>
> [   23.578222]  tcp_v4_rcv+0x4fe/0xc80
> [   23.578222]  ip_local_deliver_finish+0xaf/0x390
> [   23.578222]  ip_local_deliver+0x1a1/0x200
> [   23.578222]  ? ip_sublist_rcv+0x420/0x420
> [   23.578222]  ip_rcv_finish+0x88/0xd0
> s.c:55: INFO: Te[   23.578222]  ip_rcv+0x142/0x200
> [   23.578222]  ? ip_rcv_finish_core.isra.18+0x4e0/0x4e0
> st is[ us ing guar  23.578222]  ? process_backlog+0x6d/0x230
> [   23.578222]  __netif_receive_skb_one_core+0x57/0x80
> ded [bu ffe rs
>  ac2c3.578222]  __netif_receive_skb+0x18/0x60
> [   23.578222]  process_backlog+0xd4/0x230
> [   23.578222]  net_rx_action+0x13e/0x420
> [   23.578222]  ? __do_softirq+0x9b/0x426
> [   23.578222]  __do_softirq+0xc7/0x426
> [   23.578222]  ? ip_finish_output2+0x255/0x660
> [   23.578222]  do_softirq_own_stack+0x2a/0x40
> [   23.578222]  </IRQ>
> [   23.578222]  do_softirq.part.19+0x4d/0x60
> [   23.578222]  __local_bh_enable_ip+0xd9/0xf0
> [   23.578222]  ip_finish_output2+0x27e/0x660
> [   23.578222]  ip_finish_output+0x235/0x370
> [   23.578222]  ? ip_finish_output+0x235/0x370
> [   23.578222]  ip_output+0x76/0x250
> [   23.578222]  ? ip_fragment.constprop.50+0x80/0x80
> [   23.578222]  ip_local_out+0x3f/0x70
> [   23.578222]  __ip_queue_xmit+0x1ea/0x5f0
> [   23.578222]  ? __lock_is_held+0x5a/0xa0
> [   23.578222]  ip_queue_xmit+0x10/0x20
> [   23.578222]  __tcp_transmit_skb+0x57c/0xb60
> [   23.578222]  tcp_connect+0xccd/0x1030
> [   23.578222]  tcp_v4_connect+0x515/0x550
> [   23.578222]  __inet_stream_connect+0x249/0x390
> [   23.578222]  ? __local_bh_enable_ip+0x7f/0xf0
> [   23.578222]  inet_stream_connect+0x3b/0x60
> [   23.578222]  __sys_connect+0xa3/0x120
> [   23.578222]  ? kfree+0x203/0x240
> [   23.578222]  ? syscall_trace_enter+0x1e3/0x350
> [   23.578222]  ? trace_hardirqs_off_caller+0x22/0xf0
> [   23.578222]  ? do_syscall_64+0x17/0x1a0
> [   23.578222]  ? lockdep_hardirqs_on+0xef/0x180
> [   23.578222]  ? do_syscall_64+0x17/0x1a0
> [   23.578222]  __x64_sys_connect+0x1a/0x20
> [   23.578222]  do_syscall_64+0x55/0x1a0
> [   23.578222]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> [   23.578222] RIP: 0033:0x7fbb31a1c927
> [   23.578222] Code: 44 00 00 41 54 41 89 d4 55 48 89 f5 53 89 fb 48
> 83 ec 10 e8 0b f9 ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2a 00 00
> 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 89 44 24 0c e8 45 f9 ff ff
> 8b 44

In __inet_lookup_listener(), we need to replace

	sk_for_each_rcu(sk, &ilb->head) 

by

	sk_nulls_for_each_rcu(sk2, node, &ilb->nulls_head)

This loop was eliminated in mainline 5.0-rc1 by commit d9fbc7f6431f
("net: tcp: prefer listeners bound to an address"). I'll have to check
if there are more places in stable-4.14 and stable-4.19 which also need
to be updated.

This also makes me think... AFAICS, since commit d9fbc7f6431f, only the
(addr,port) hashtable is used for listener lookup and the traditional
port only hashtable is only used to iterate through all listening
sockets for netlink dumps and /proc/net/tcp. Maybe we could switch these
two also to the (addr,port) hashtable and keep only one listener
hashtable.

Michal Kubecek

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ