Anybody who has time to look into this?

///jon


On 02/19/2016 06:41 PM, Jon Maloy wrote:
> The compatibility functionality has been broken, and causes a crash as
> shown below:
>
> Bisecting seems to indicate that the culprit is:
>
> commit 263ea09084d172cac6e40459a690babe8de8e448
> ("Revert "genl: Add genlmsg_new_unicast() for unicast message allocation")
>
> ///jon
>
> ------------------------------------
>
> Ubuntu 14.04.1 LTS tipc2 ttyS0
>
> tipc2 login: [   64.412751] tipc: Activated (version 2.0.0)
> [   64.413921] NET: Registered protocol family 30
> [   64.415318] tipc: Started in single node mode
> [   64.418909] BUG: unable to handle kernel NULL pointer dereference at
> 0000000000000030
> [   64.419909] IP: [<ffffffffa0018717>] tipc_nl_net_set+0x17/0xe0 [tipc]
> [   64.420019] PGD 3e1a8067 PUD 3e298067 PMD 0
> [   64.420019] Oops: 0000 [#1] SMP
> [   64.420019] Modules linked in: tipc ip6_udp_tunnel udp_tunnel
> [   64.420019] CPU: 1 PID: 1833 Comm: tipc-config Not tainted 4.5.0-rc2+ #21
> [   64.420019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
> BIOS Bochs 01/01/2011
> [   64.420019] task: ffff88003d550a40 ti: ffff88003d9b4000 task.ti:
> ffff88003d9b4000
> [   64.420019] RIP: 0010:[<ffffffffa0018717>] [<ffffffffa0018717>]
> tipc_nl_net_set+0x17/0xe0 [tipc]
> [   64.420019] RSP: 0018:ffff88003d9b7af8  EFLAGS: 00010292
> [   64.420019] RAX: 0000000000000000 RBX: 0000000000000008 RCX:
> 0000000000000000
> [   64.420019] RDX: ffff88003e169ec0 RSI: ffff88003d9b7b38 RDI:
> ffff880037d92500
> [   64.420019] RBP: ffff88003d9b7b28 R08: 0000000000000ec0 R09:
> 0000000000001100
> [   64.420019] R10: ffff880037f8bc10 R11: 0000000000000008 R12:
> ffff88003d9b7bd8
> [   64.420019] R13: ffff88003d9b7bb0 R14: ffff88003d87d240 R15:
> ffff880037d92500
> [   64.420019] FS:  00007ffb5e045740(0000) GS:ffff88003fc80000(0000)
> knlGS:0000000000000000
> [   64.420019] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [   64.420019] CR2: 0000000000000030 CR3: 000000003d9c2000 CR4:
> 00000000000006a0
> [   64.420019] Stack:
> [   64.420019]  00ff88003d87d240 ffff880037d92c00 ffff88003d9b7bd8
> ffff880037d92c00
> [   64.420019]  ffff88003d9b7bd8 ffff88003d9b7bb0 ffff88003d9b7ba0
> ffffffffa0019924
> [   64.420019]  0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> [   64.420019] Call Trace:
> [   64.420019]  [<ffffffffa0019924>] tipc_nl_compat_doit+0x134/0x1a0 [tipc]
> [   64.420019]  [<ffffffffa0019bfb>] tipc_nl_compat_recv+0x26b/0x4e0 [tipc]
> [   64.420019]  [<ffffffffa0018700>] ? tipc_nl_net_dump+0x190/0x190 [tipc]
> [   64.420019]  [<ffffffffa0019e70>] ? tipc_nl_compat_recv+0x4e0/0x4e0
> [tipc]
> [   64.420019]  [<ffffffff81367697>] genl_family_rcv_msg+0x1b7/0x370
> [   64.420019]  [<ffffffff81367850>] ? genl_family_rcv_msg+0x370/0x370
> [   64.420019]  [<ffffffff813678cb>] genl_rcv_msg+0x7b/0xc0
> [   64.420019]  [<ffffffff81366ca9>] netlink_rcv_skb+0x99/0xb0
> [   64.420019]  [<ffffffff813672b3>] genl_rcv+0x23/0x40
> [   64.420019]  [<ffffffff813666ce>] netlink_unicast+0x14e/0x220
> [   64.420019]  [<ffffffff81366ab9>] netlink_sendmsg+0x319/0x350
> [   64.420019]  [<ffffffff8132c9b9>] sock_write_iter+0x79/0xe0
> [   64.420019]  [<ffffffff8113abe5>] __vfs_write+0xa5/0xe0
> [   64.420019]  [<ffffffff8113b7a9>] vfs_write+0x99/0x180
> [   64.420019]  [<ffffffff8113c231>] SyS_write+0x41/0xa0
> [   64.420019]  [<ffffffff8142d96e>] entry_SYSCALL_64_fastpath+0x12/0x71
> [   64.420019] Code: 8b 83 c8 00 00 00 eb 85 66 66 66 2e 0f 1f 84 00 00
> 00 00 00 55 48 89 e5 41 55 41 54 53 48 83 ec 18 48 8b 47 18 8b 1d 8d de
> 00 00 <4c> 8b 68 30 8d 53 ff 48 63 d2 49 8b 85 80 06 00 00 4c 8b 64 d0
> [   64.420019] RIP  [<ffffffffa0018717>] tipc_nl_net_set+0x17/0xe0 [tipc]
> [   64.420019]  RSP <ffff88003d9b7af8>
> [   64.420019] CR2: 0000000000000030
> [   64.464333] ---[ end trace bb2702e8370958ec ]---
> [  125.288791] random: nonblocking pool is initialized
>
>
> --------------------------------------------------------------------
>
>
> (gdb) list *(tipc_nl_net_set+0x17)
> 0xa747 is in tipc_nl_net_set (include/net/net_namespace.h:259).
> 254     }
> 255
> 256     static inline struct net *read_pnet(const possible_net_t *pnet)
> 257     {
> 258     #ifdef CONFIG_NET_NS
> 259             return pnet->net;
> 260     #else
> 261             return &init_net;
> 262     #endif
> 263     }
> (gdb)
>
>
>
>
>
> ------------------------------------------------------------------------------
> Site24x7 APM Insight: Get Deep Visibility into Application Performance
> APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
> Monitor end-to-end web transactions and take corrective actions now
> Troubleshoot faster and improve end-user experience. Signup Now!
> http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
> _______________________________________________
> tipc-discussion mailing list
> tipc-discussion@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/tipc-discussion


------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
_______________________________________________
tipc-discussion mailing list
tipc-discussion@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tipc-discussion

Reply via email to