Re: A kernel panic issue of docker snap

2016-12-21 Thread Peng Liu
Thanks, Seth.
Yes, I agree it might be the same issue as bug 1586997.
My reproduce is complicated because we found the issue in our project
development, so I tried to simulate the whole process to reproduce it.

I will report a bug again source package 'linux'.
Thanks!
Peng

On Wed, Dec 21, 2016 at 10:21 PM, Seth Arnold 
wrote:

> On Wed, Dec 21, 2016 at 09:52:11PM -0600, Peng Liu wrote:
> > I found a kernel panic issue when I was using pipework to config the
> > network of a docker container on an x86 board with all-snap image. The
> > issue is related to the auditing module of Linux kernel. So it should be
> an
> > issue of pc-kernel-snap.
>
> Please file the bug against source package 'linux'.
>
> This looks vaguely related to:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508737
> and:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1586997
>
> (Your reproducer looks very different, taking a trip through AppArmor
> first, but it looks to me like it's the kernel trying to audit unix domain
> sockets that falls over, regardless of the path taken to get there.)
>
> But it's hard for me to confirm/deny this wild suspicion at this point.
>
> Thanks
>
> --
> Snapcraft mailing list
> Snapcraft@lists.snapcraft.io
> Modify settings or unsubscribe at: https://lists.ubuntu.com/
> mailman/listinfo/snapcraft
>
>
-- 
Snapcraft mailing list
Snapcraft@lists.snapcraft.io
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/snapcraft


Re: A kernel panic issue of docker snap

2016-12-21 Thread Seth Arnold
On Wed, Dec 21, 2016 at 09:52:11PM -0600, Peng Liu wrote:
> I found a kernel panic issue when I was using pipework to config the
> network of a docker container on an x86 board with all-snap image. The
> issue is related to the auditing module of Linux kernel. So it should be an
> issue of pc-kernel-snap.

Please file the bug against source package 'linux'.

This looks vaguely related to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508737
and:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1586997

(Your reproducer looks very different, taking a trip through AppArmor
first, but it looks to me like it's the kernel trying to audit unix domain
sockets that falls over, regardless of the path taken to get there.)

But it's hard for me to confirm/deny this wild suspicion at this point.

Thanks


signature.asc
Description: PGP signature
-- 
Snapcraft mailing list
Snapcraft@lists.snapcraft.io
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/snapcraft


Re: A kernel panic issue of docker snap

2016-12-21 Thread Peng Liu
I just found a similar issue, but in an older version kernel.
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360

On Wed, Dec 21, 2016 at 9:52 PM, Peng Liu  wrote:

> Hi Folks,
>
> I found a kernel panic issue when I was using pipework to config the
> network of a docker container on an x86 board with all-snap image. The
> issue is related to the auditing module of Linux kernel. So it should be an
> issue of pc-kernel-snap.
>
> I created a simple test snap to reproduce the issue and upload it to
> github.
> https://github.com/pliu6/docker-snap-test
>
> The log is below:
> [  504.783341] BUG: unable to handle kernel paging request at
> fff3
> [  504.867186] IP: [] strlen+0x0/0x20
> [  504.926879] PGD 1e0d067 PUD 1e0f067 PMD 0
> [  504.976588] Oops:  [#1] SMP
> [  505.015690] Modules linked in: veth xt_addrtype br_netfilter
> ipt_REJECT nf_reject_ipv4 ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_comment
> xt_conntrack
> iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat
> nf_conntrack bridge stp llc overlay aufs arc4 ath9k ath9k_common ath9k_hw
> ath mac80211 c
> fg80211 kvm_amd uas kvm irqbypass k10temp r8169 mii sp5100_tco mac_hid
> i2c_piix4 shpchp iptable_filter ip_tables ip6table_filter ip6_tables
> x_tables aut
> ofs4 mmc_block sdhci_acpi sdhci_pci sdhci virtio_scsi nls_iso8859_1
> usb_storage ahci libahci
> [  505.599099] CPU: 1 PID: 2414 Comm: snap-confine Not tainted
> 4.4.0-53-generic #74-Ubuntu
> [  505.694977] Hardware name: PC Engines APU, BIOS
> SageBios_PCEngines_APU-45 04/05/2014
> [  505.787738] task: 880037637080 ti: 880061a7 task.ti:
> 880061a7
> [  505.877382] RIP: 0010:[]  []
> strlen+0x0/0x20
> [  505.966192] RSP: 0018:880061a73a20  EFLAGS: 00010246
> [  506.029835] RAX: 880061a73b20 RBX: fff3 RCX:
> 
> [  506.115320] RDX: 014e RSI: fff3 RDI:
> fff3
> [  506.200802] RBP: 880061a73a38 R08: 88005c835138 R09:
> 880061a73a94
> [  506.286283] R10: 000e R11: 88005c835131 R12:
> 88007aff0480
> [  506.371767] R13: 880037637080 R14: 81399fc0 R15:
> fff3
> [  506.457251] FS:  7fa9f36aa740() GS:88007df0()
> knlGS:
> [  506.554170] CS:  0010 DS:  ES:  CR0: 80050033
> [  506.623014] CR2: fff3 CR3: 7853e000 CR4:
> 06e0
> [  506.708497] Stack:
> [  506.732624]  81122a1a 88007aff0480 880061a73b00
> 880061a73a60
> [  506.822056]  8139a028 88007aff0480 880061a73b00
> 880037637080
> [  506.911490]  880061a73ad8 8136f088 812285c0
> 880061a73af0
> [  507.000926] Call Trace:
> [  507.030263]  [] ? audit_log_untrustedstring+0x1a/0x30
> [  507.109502]  [] audit_cb+0x68/0x3f0
> [  507.170027]  [] common_lsm_audit+0x1b8/0x740
> [  507.239910]  [] ? alloc_inode+0x50/0x90
> [  507.304593]  [] ? prepend_path+0xc6/0x2a0
> [  507.371358]  [] aa_audit+0x5f/0x170
> [  507.431880]  [] audit_mount+0x152/0x160
> [  507.496567]  [] match_mnt_path_str+0x1dd/0x490
> [  507.568529]  [] ? dentry_path+0x18/0x70
> [  507.633213]  [] match_mnt+0xda/0x150
> [  507.694776]  [] aa_bind_mount+0x100/0x180
> [  507.761540]  [] wrap_apparmor_sb_mount+0x1c0/0x270
> [  507.837664]  [] security_sb_mount+0x57/0x80
> [  507.906506]  [] do_mount+0xab/0xde0
> [  507.967032]  [] ? __kmalloc_track_caller+0x1b4/0x250
> [  508.045236]  [] ? hrtimer_try_to_cancel+0xd1/0x130
> [  508.121361]  [] ? memdup_user+0x42/0x70
> [  508.186042]  [] SyS_mount+0x9f/0x100
> [  508.247607]  [] entry_SYSCALL_64_fastpath+0x16/0x71
> [  508.324765] Code: 89 f8 48 89 e5 f6 82 a0 05 a5 81 20 74 10 48 83 c0
> 01 0f b6 10 f6 82 a0 05 a5 81 20 75 f0 5d c3 90 66 2e 0f 1f 84 00 00 00 00
> 00 <8
> 0> 3f 00 55 48 89 e5 74 11 48 89 f8 48 83 c0 01 80 38 00 75 f7
> [  508.564156] RIP  [] strlen+0x0/0x20
> [  508.624889]  RSP 
> [  508.96] CR2: fff3
> [  508.706425] ---[ end trace 9a8196367a1a3630 ]---
>
> Who should I report this bug to? I notice Olive seems to be working on
> pc-kernel-snap, so I copy this email to him.
>
> Thanks.
>
> Peng
>
>
>
-- 
Snapcraft mailing list
Snapcraft@lists.snapcraft.io
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/snapcraft