Re: [net: sock] BUG: unable to handle kernel NULL pointer dereference at 0000000000000007
From: Dave Jones
Date: Wed Dec 10 2014 - 20:48:28 EST
On Wed, Dec 10, 2014 at 03:51:33PM -0800, Alexei Starovoitov wrote:
> On Wed, Dec 10, 2014 at 3:29 PM, Fengguang Wu <fengguang.wu@xxxxxxxxx> wrote:
> > Greetings,
> >
> > 0day kernel testing robot got the below dmesg and the first bad commit is
> >
> > net: sock: allow eBPF programs to be attached to sockets
>
> > [init] Kernel was tainted on startup. Will ignore flags that are already set.
> > [init] Started watchdog process, PID is 9354
> > [main] Main thread is alive.
> > [ 21.233581] BUG: unable to handle kernel NULL pointer dereference at 0000000000000007
> > [ 21.234709] IP: [<ffffffff8156ebda>] sk_attach_bpf+0x39/0xc2
>
> thanks for the report! syscall fuzzer is great.
> I missed an extra check. Working on a fix.
This might be the first time I've seen it trip up the bpf code iirc.
Daniel wrote some pretty nifty bpf generator code in trinity,
(net/bpf.c) that you might want to see if you can think of enhancing.
Though it might be the case that we're not even needing to do anything
that complicated to hit this particular bug..
Dave
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/