[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-10-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-66.108

---
linux (3.13.0-66.108) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1503713

  [ Andy Whitcroft ]

  * Revert "SAUCE: aufs3: mmap: Fix races in madvise_remove() and
sys_msync()"
- LP: #1503655

  [ Ben Hutchings ]

  * SAUCE: aufs3: mmap: Fix races in madvise_remove() and sys_msync()
- LP: #1503655
- CVE-2015-7312

linux (3.13.0-66.107) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1503021

  [ Ben Hutchings ]

  * SAUCE: aufs3: mmap: Fix races in madvise_remove() and sys_msync()
- CVE-2015-7312

  [ John Johansen ]

  * SAUCE: (no-up) apparmor: fix mount not handling disconnected paths
- LP: #1496430

  [ Upstream Kernel Changes ]

  * mmc: sdhci-pci: set the clear transfer mode register quirk for O2Micro
- LP: #1472843
  * mmc: sdhci: Add a quirk for AMD SDHC transfer mode register need to be
cleared for cmd without data
- LP: #1472843
  * n_tty: Fix poll() when TIME_CHAR and MIN_CHAR == 0
- LP: #1397976
  * net: make skb_gso_segment error handling more robust
- LP: #1497048
  * net: gso: use feature flag argument in all protocol gso handlers
- LP: #1497048
  * md/raid10: always set reshape_safe when initializing reshape_position.
- LP: #1500810
  * md: flush ->event_work before stopping array.
- LP: #1500810
  * ipv6: addrconf: validate new MTU before applying it
- LP: #1500810
  * virtio-net: drop NETIF_F_FRAGLIST
- LP: #1500810
  * RDS: verify the underlying transport exists before creating a
connection
- LP: #1500810
  * xen/gntdev: convert priv->lock to a mutex
- LP: #1500810
  * xen/gntdevt: Fix race condition in gntdev_release()
- LP: #1500810
  * PCI: Restore PCI_MSIX_FLAGS_BIRMASK definition
- LP: #1500810
  * nfsd: Drop BUG_ON and ignore SECLABEL on absent filesystem
- LP: #1500810
  * crypto: ixp4xx - Remove bogus BUG_ON on scattered dst buffer
- LP: #1500810
  * xen-blkfront: don't add indirect pages to list when !feature_persistent
- LP: #1500810
  * xen-blkback: replace work_pending with work_busy in
purge_persistent_gnt()
- LP: #1500810
  * USB: sierra: add 1199:68AB device ID
- LP: #1500810
  * regmap: regcache-rbtree: Clean new present bits on present bitmap
resize
- LP: #1500810
  * target/iscsi: Fix double free of a TUR followed by a solicited NOPOUT
- LP: #1500810
  * rbd: fix copyup completion race
- LP: #1500810
  * md/raid1: extend spinlock to protect raid1_end_read_request against
inconsistencies
- LP: #1500810
  * target: REPORT LUNS should return LUN 0 even for dynamic ACLs
- LP: #1500810
  * MIPS: Fix sched_getaffinity with MT FPAFF enabled
- LP: #1500810
  * xhci: fix off by one error in TRB DMA address boundary check
- LP: #1500810
  * perf: Fix fasync handling on inherited events
- LP: #1500810
  * mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations
- LP: #1500810
  * MIPS: Make set_pte() SMP safe.
- LP: #1500810
  * ipc: modify message queue accounting to not take kernel data structures
into account
- LP: #1500810
  * ocfs2: fix BUG in ocfs2_downconvert_thread_do_work()
- LP: #1500810
  * fsnotify: fix oops in fsnotify_clear_marks_by_group_flags()
- LP: #1500810
  * KVM: x86: Use adjustment in guest cycles when handling
MSR_IA32_TSC_ADJUST
- LP: #1500810
  * localmodconfig: Use Kbuild files too
- LP: #1500810
  * dm thin metadata: delete btrees when releasing metadata snapshot
- LP: #1500810
  * dm btree: add ref counting ops for the leaves of top level btrees
- LP: #1500810
  * drm/radeon: add new OLAND pci id
- LP: #1500810
  * libiscsi: Fix host busy blocking during connection teardown
- LP: #1500810
  * libfc: Fix fc_exch_recv_req() error path
- LP: #1500810
  * libfc: Fix fc_fcp_cleanup_each_cmd()
- LP: #1500810
  * EDAC, ppc4xx: Access mci->csrows array elements properly
- LP: #1500810
  * crypto: caam - fix memory corruption in ahash_final_ctx
- LP: #1500810
  * mm/hwpoison: fix page refcount of unknown non LRU page
- LP: #1500810
  * ipc,sem: fix use after free on IPC_RMID after a task using same
semaphore set exits
- LP: #1500810
  * ipc/sem.c: change memory barrier in sem_lock() to smp_rmb()
- LP: #1500810
  * ipc/sem.c: update/correct memory barriers
- LP: #1500810
  * Add factory recertified Crucial M500s to blacklist
- LP: #1500810
  * arm64: KVM: Fix host crash when injecting a fault into a 32bit guest
- LP: #1500810
  * batman-adv: protect tt_local_entry from concurrent delete events
- LP: #1500810
  * ip6_gre: release cached dst on tunnel removal
- LP: #1500810
  * net: Fix RCU splat in af_key
- LP: #1500810
  * rds: fix an integer overflow test in rds_info_getsockopt()
- LP: #1500810
  * udp: fix dst races with multicast early demux
- LP: #1500810
  

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-10-15 Thread Mathew Hodson
** Changed in: linux (Ubuntu Trusty)
Milestone: None => trusty-updates

** Changed in: linux (Ubuntu)
Milestone: trusty-updates => None

** Changed in: linux (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-10-13 Thread Dave Chiluk
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  88203fce3cb8 a015e5a1 0010 
81cdab00
  [415165.657955] Call Trace:
  [415165.665405]  
  [415165.665500]
  

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-10-13 Thread Dave Chiluk
An external user reported that this, resolved their issue.  So I'm
marking this verification-done-trusty.  Unfortunately there is no easy
way to reproduce this.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  88203fce3cb8 a015e5a1 0010 
81cdab00
  

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-10-08 Thread Luis Henriques
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-09-23 Thread Luis Henriques
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  New

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  88203fce3cb8 a015e5a1 0010 
81cdab00
  [415165.657955] 

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-09-23 Thread Luis Henriques
** Changed in: linux (Ubuntu Trusty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  88203fce3cb8 a015e5a1 0010 
81cdab00
  [415165.657955] Call Trace:
  [415165.665405]  
  [415165.665500]
  [415165.672684]  [] 

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-09-23 Thread Dave Chiluk
** Changed in: linux (Ubuntu Trusty)
 Assignee: (unassigned) => Dave Chiluk (chiluk)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  88203fce3cb8 a015e5a1 0010 
81cdab00
  [415165.657955] Call Trace:
  [415165.665405]  
  [415165.665500]
  

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-09-22 Thread Dave Chiluk
** Changed in: linux (Ubuntu)
   Status: Incomplete => In Progress

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497048

Title:
  Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0
  [openvswitch]

Status in linux package in Ubuntu:
  In Progress

Bug description:
  [Impact]

   * With certain complicated network configurations as occur in
  Openstack clouds the kernel crashes with the below stack trace.

   * We have observed kernel panics when an openvswitch bridge is
  populated with virtual devices (veth, for example) that have expansive
  feature sets that include NETIF_F_GSO_GRE.

  The failure occurs when foreign GRE encapsulated traffic
  (explicitly not including the initial packets of a connection) arrives at
  the system (likely via a switch flood event).  The packets are GRO
  accumulated, and passed to the OVS receive processing.  As the connection
  is not in the OVS kernel datapath table, the call path is:

  ovs_dp_upcall ->
queue_gso_packets ->
__skb_gso_segment(skb, NETIF_F_SG, false)

  Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
  returns NULL,as the features from the device (including _GSO_GRE) are
  used in place of the _SG feature supplied to the call.  The kernel
  panics on a subsequent dereference of the NULL pointer in
  queue_userspace_packet().

  
  [Test Case]

   * We have no easy reproduce procedure.

  [Regression Potential]

   * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
  Stable threads 
  http://marc.info/?l=linux-netdev=143631594021618=2
  http://marc.info/?l=linux-netdev=143951671004053=2

   * This patch has been in place in a large cloud where the issue used
  to occur frequently now for 50 days without related incident.

  [Other Info]
   
   * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
  
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
  [415165.418073] PGD 0
  [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  88203fce3cb8 a015e5a1 0010 
81cdab00
  [415165.657955] Call Trace:
  [415165.665405]  
  [415165.665500]
  

[Kernel-packages] [Bug 1497048] Re: Trusty - Null pointer dereference at queue_userspace_packet+0x1f/0x2d0 [openvswitch]

2015-09-17 Thread Dave Chiluk
** Description changed:

- A user has reported to us the following crash stack trace.
+ [Impact]
  
- 
_
- [415165.417433] BUG: unable to handle kernel NULL pointer dereference at 
00a3
+  * With certain complicated network configurations as occur in Openstack
+ clouds the kernel crashes with the below stack trace.
+ 
+  * We have observed kernel panics when an openvswitch bridge is
+ populated with virtual devices (veth, for example) that have expansive
+ feature sets that include NETIF_F_GSO_GRE.
+ 
+ The failure occurs when foreign GRE encapsulated traffic
+ (explicitly not including the initial packets of a connection) arrives at
+ the system (likely via a switch flood event).  The packets are GRO
+ accumulated, and passed to the OVS receive processing.  As the connection
+ is not in the OVS kernel datapath table, the call path is:
+ 
+ ovs_dp_upcall ->
+   queue_gso_packets ->
+   __skb_gso_segment(skb, NETIF_F_SG, false)
+ 
+ Without 1e16aa3ddf863c6b9f37eddf52503230a62dedb3, __skb_gso_segment
+ returns NULL,as the features from the device (including _GSO_GRE) are
+ used in place of the _SG feature supplied to the call.  The kernel
+ panics on a subsequent dereference of the NULL pointer in
+ queue_userspace_packet().
+ 
+ 
+ [Test Case]
+ 
+  * We have no easy reproduce procedure.
+ 
+ [Regression Potential]
+ 
+  * Both patches are pulled from upstream, but not accepted nor rejected as 
stable patches.
+ Stable threads 
+ http://marc.info/?l=linux-netdev=143631594021618=2
+ http://marc.info/?l=linux-netdev=143951671004053=2
+ 
+  * This patch has been in place in a large cloud where the issue used to
+ occur frequently now for 50 days without related incident.
+ 
+ [Other Info]
+  
+  * 330966e501ffe282d7184fde4518d5e0c24bc7f8 is included as well, as it 
obviously avoids possible NULL dereferences in similar areas of code.  As such 
we'd like to see both patches included.  
+ 
[415165.417433]
 BUG: unable to handle kernel NULL pointer dereference at 00a3
  [415165.417759] IP: [] queue_userspace_packet+0x1f/0x2d0 
[openvswitch]
- [415165.418073] PGD 0 
- [415165.418161] Oops:  [#1] SMP 
+ [415165.418073] PGD 0
+ [415165.418161] Oops:  [#1] SMP
  [415165.418299] Modules linked in: l2tp_eth l2tp_netlink l2tp_core vhost_net 
vhost macvtap macvlan xt_conntrack ipt_REJECT dccp_diag dccp tcp_diag udp_diag 
inet_diag unix_diag veth xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp 
ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser 
rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp 
libiscsi scsi_transport_iscsi openvswitch gre vxlan ip_tunnel dm_crypt gpio_ich 
dm_multipath bridge scsi_dh stp llc intel_rapl x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel joydev kvm shpchp sb_edac ipmi_si edac_core 
acpi_power_meter lpc_ich mac_hid xfs btrfs xor raid6_pq libcrc32c ses enclosure 
hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
  [415165.421570]  aesni_intel ixgbe igb aes_x86_64 lrw dca gf128mul 
glue_helper ptp ablk_helper usbhid cryptd megaraid_sas pps_core hid mdio 
i2c_algo_bit wmi
  [415165.427942] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-53-generic 
#89-Ubuntu
  [415165.440183] Hardware name: Cisco Systems Inc UCSC-C240-M3S/UCSC-C240-M3S, 
BIOS C240M3.2.0.1a.0.042820140036 04/28/2014
  [415165.452693] task: 882012d01800 ti: 882012cfc000 task.ti: 
882012cfc000
  [415165.465847] RIP: 0010:[]  [] 
queue_userspace_packet+0x1f/0x2d0 [openvswitch]
  [415165.480003] RSP: 0018:88203fce3b88  EFLAGS: 00010296
  [415165.487411] RAX:  RBX: 88203fce3ce8 RCX: 
88203fce3ce8
  [415165.502430] RDX:  RSI: 000e RDI: 
81cdab00
  [415165.517448] RBP: 88203fce3bc8 R08: 0001 R09: 

  [415165.532701] R10: 0041 R11: 0f9365e3 R12: 
88203fce3ce8
  [415165.548698] R13:  R14:  R15: 
000e
  [415165.564653] FS:  () GS:88203fce() 
knlGS:
  [415165.580681] CS:  0010 DS:  ES:  CR0: 80050033
  [415165.588725] CR2: 00a3 CR3: 01c0e000 CR4: 
000427e0
  [415165.604495] Stack:
  [415165.612127]  81d1ca68 881fbd6c6c00 0009 

  [415165.627360]  88203fce3ce8  000e 

  [415165.642642]  88203fce3cb8 a015e5a1 0010 
81cdab00
  [415165.657955] Call Trace:
- [415165.665405]   
- [415165.665500] 
+ [415165.665405]  
+ [415165.665500]
  [415165.672684]  [] queue_gso_packets+0xa1/0x1f0 
[openvswitch]