I'm still skeptical, we loaded the Samsung 3.4 kernels and never saw any
issues... However given the infrequency perhaps it slipped through. Can you
reproduce on an AOSP device so the community can assist in debugging?
On Oct 2, 2013 6:11 PM, "Satya Durga Srinivasu Prabhala" <
sat...@codeaurora.org> wrote:

> Hi, ****
>
> ** **
>
> We observed these issues very very rarely and hard to reproduce – one
> failures per 5,000-10,000 of intensive stress tests. ****
>
> We don’t have any code changes in the areas these crashes have occurred,
> so, wondering, these could be corner-cases not previously been encountered.
> ****
>
> ** **
>
> Issue 1 mentioned below seems to be a race condition from the logs. Other
> issues even pointing to SELinux stack. So, just wanted to check if there
> are any hidden issue/s.****
>
> ** **
>
> Thanks & Regards,****
>
> Satya****
>
> ** **
>
> Employee of the Qualcomm Innovation Center, Inc.
> The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum,
> hosted by Linux Foundation****
>
> ** **
>
> *From:* owner-seandroid-l...@tycho.nsa.gov [mailto:
> owner-seandroid-l...@tycho.nsa.gov] *On Behalf Of *William Roberts
> *Sent:* Wednesday, October 02, 2013 12:35 PM
> *To:* Satya Durga Srinivasu Prabhala
> *Cc:* seandroid-list@tycho.nsa.gov
> *Subject:* Re: Observing multiple issues after enabling SELinux on JB_MR2
> release****
>
> ** **
>
> Typically if your kernel freaks out when you turn on selinux YOUR kernel
> is broken. Many SoC vendors carry out of tree changes and break kernels.**
> **
>
> On Oct 2, 2013 2:59 PM, "Satya Durga Srinivasu Prabhala" <
> sat...@codeaurora.org> wrote:****
>
>
> Hi,
>
> We are observing multiple issues after enabling SELinux on Android JB_MR2
> release with 3.4 Kernel on different SOCs. Are there any known issue/s and
> needs to pull some changes from upstream Kernel?
> Can  you please advise on how to get these addressed?
>
> Issue 1:  Kernel panic due to NULL pointer dereference
>
>     <3>[  130.940912] Attempt to release alive inet socket dc030000
>     <1>[  131.050907] Unable to handle kernel NULL pointer dereference at
> virtual address 00000000
>     <1>[  131.050969] >>> l2esr = 0x0
>     <1>[  131.050999] >>> l2esynr0 = 0x8112
>     <1>[  131.051030] >>> l2esynr1 = 0x235084
>     <1>[  131.051060] >>> l2ear0 = 0x50412204
>     <1>[  131.051091] >>> l2ear1 = 0x3
>     <1>[  131.051121] pgd = e0850000
>     <1>[  131.051121] [00000000] *pgd=00000000
>     <0>[  131.051182] [0:IntentService[M: 4416] Internal error: Oops: 5
> [#1]
> PREEMPT SMP
>     <4>[  131.051243] [0:IntentService[M: 4416] Modules linked in: dhd
> vpnclient
>     <4>[  131.051304] [0:IntentService[M: 4416] CPU: 0    Tainted: G
> W    (3.0.31-1726116 #1)
>     <4>[  131.051396] [0:IntentService[M: 4416] PC is at
> sock_has_perm+0x38/0xac
>     <4>[  131.051426] [0:IntentService[M: 4416] LR is at
> sock_has_perm+0x38/0xac
>     <4>[  131.051487] [0:IntentService[M: 4416] pc : [<c0330998>]    lr :
> [<c0330998>]    psr: 60000013
>     <4>[  131.051548] [0:IntentService[M: 4416] sp : dac55ef0  ip :
> 00000002
> fp : 5e75cc84
>     <4>[  131.051609] [0:IntentService[M: 4416] r10: 00000000  r9 :
> dac54000
> r8 : 00000115
>     <4>[  131.051670] [0:IntentService[M: 4416] r7 : 00004000  r6 :
> dffda080
> r5 : dc030000  r4 : 00000000
>     <4>[  131.051732] [0:IntentService[M: 4416] r3 : 00000000  r2 :
> dac55ee8
> r1 : dc030000  r0 : dffda080
>     <4>[  131.051793] [0:IntentService[M: 4416] Flags: nZCv  IRQs on  FIQs
> on  Mode SVC_32  ISA ARM  Segment user
>     <4>[  131.051854] [0:IntentService[M: 4416] Control: 10c5787d  Table:
> a7b5006a  DAC: 00000015
>     .
>     .
>     <4>[  131.061040] [0:IntentService[M: 4416] [<c0330998>]
> (sock_has_perm+0x38/0xac) from [<c032d148>]
> (security_socket_getsockopt+0x14/0x1c)
>     <4>[  131.061162] [0:IntentService[M: 4416] [<c032d148>]
> (security_socket_getsockopt+0x14/0x1c) from [<c061abe0>]
> (sys_getsockopt+0x34/0xa8)
>     <4>[  131.061254] [0:IntentService[M: 4416] [<c061abe0>]
> (sys_getsockopt+0x34/0xa8) from [<c0105a40>] (ret_fast_syscall+0x0/0x30)
>     <0>[  131.061345] [0:IntentService[M: 4416] Code: e59631f0 e5933058
> e5938004 ebf9ee24 (e5943000)
>     <4>[  131.521501] [1:IntentService[M: 4416] ---[ end trace
> da227214a82491bb ]---
>     <0>[  131.521562] [1:IntentService[M: 4416] Kernel panic - not syncing:
> Fatal exception
>
> This seem to be due to race condition, where sock_has_perm called in a
> thread and is trying to access sksec->sid without checking sksec. Just
> before that, sk->sk_security was set to NULL by selinux_sk_free_security
> through sk_free in other thread.
>
> Issue 2: Kernel panic due to memory scribbling
>
>     15.530394:   <7> SELinux: initialized (dev fuse, type fuse), uses
> genfs_contexts
>     15.622083:   <6> alarm_set_rtc: Failed to set RTC, time will be lost on
> reboot
>     16.177727:   <3> pagealloc: single bit error
>     16.180582:   <3> ec55402e: 5d
> ]
>     16.187528:   <6> [<c010c09c>] (unwind_backtrace+0x0/0x11c) from
> [<c024a030>] (kernel_map_pages+0xfc/0x17c)
>     16.187622:   <6> [<c024a030>] (kernel_map_pages+0xfc/0x17c) from
> [<c021e210>] (get_page_from_freelist+0x404/0x4c8)
>     16.188024:   <6> [<c021e210>] (get_page_from_freelist+0x404/0x4c8) from
> [<c021ee84>] (__alloc_pages_nodemask+0x208/0x8f4)
>     16.188106:   <6> [<c021ee84>] (__alloc_pages_nodemask+0x208/0x8f4) from
> [<c0222238>] (__do_page_cache_readahead+0xd8/0x1f0)
>     16.188237:   <6> [<c0222238>] (__do_page_cache_readahead+0xd8/0x1f0)
> from [<c0222574>] (ra_submit+0x20/0x24)
>     16.188400:   <6> [<c0222574>] (ra_submit+0x20/0x24) from [<c0222848>]
> (page_cache_sync_readahead+0x58/0x60)
>     16.188497:   <6> [<c0222848>] (page_cache_sync_readahead+0x58/0x60)
> from
> [<c02cbcd0>] (ext4_readdir+0x650/0x670)
>     16.188585:   <6> [<c02cbcd0>] (ext4_readdir+0x650/0x670) from
> [<c0263580>] (vfs_readdir+0x7c/0xb0)
>     16.188704:   <6> [<c0263580>] (vfs_readdir+0x7c/0xb0) from [<c02636d0>]
> (sys_getdents64+0x58/0xb8)
>     16.188801:   <6> [<c02636d0>] (sys_getdents64+0x58/0xb8) from
> [<c0106140>] (ret_fast_syscall+0x0/0x30)
>
> This issue is observed just after SELinux initialization done for the fuse.
>
> Issue 3: Kernel panic due to stack corruption
>
>  10047.154074:   <1> Unable to handle kernel paging request at virtual
> address c0a4bc44
>  10047.160300:   <1> pgd = d9d44000
>  10047.162991:   <1> [c0a4bc44] *pgd=00a1941e(bad)
>  10047.166994:   <0> Internal error: Oops: 8000000d [#1] PREEMPT SMP ARM
>  10047.172884:   <6> Modules linked in: adsprpc
>  10047.176625:   <6> CPU: 0    Not tainted  (3.4.0-g67fed0b-00018-g19ea2b0
> #1)
>  10047.183056:   <6> PC is at iw_priv_type_size+0xb22e4/0x283a88
>  10047.188262:   <6> LR is at security_file_permission+0x94/0x9c
>  10047.193472:   <6> pc : [<c0a4bc44>]    lr : [<c0335ba4>]    psr:
> 60000013
>  10047.193491:   <6> sp : e97cbf20  ip : 00000000  fp : 00001400
>  10047.204921:   <6> r10: ea6be780  r9 : e97ca000  r8 : 00001400
>  10047.210130:   <6> r7 : e97cbf88  r6 : b8bbd4f0  r5 : 00000000  r4 :
> 00000000
>  10047.216638:   <6> r3 : 00000000  r2 : 00000000  r1 : 00020000  r0 :
> 00000000
>  10047.223153:   <6> Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM
> Segment user
>  10047.230271:   <6> Control: 10c5387d  Table: 1dd4406a  DAC: 00000015
>  .
>  .
>  11285.714555:   <4> ---[ end trace 508eef886fcd4369 ]---
>  11285.719840:   <0> Kernel panic - not syncing: Fatal exception
>
> security_file_permission seem be called and when returned stack is being
> corrupted.
>
>
>
> Thanks & Regards,
> Satya
>
> Employee of the Qualcomm Innovation Center, Inc.
> The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum,
> hosted by Linux Foundation
>
>
> --
> This message was distributed to subscribers of the seandroid-list mailing
> list.
> If you no longer wish to subscribe, send mail to majord...@tycho.nsa.govwith
> the words "unsubscribe seandroid-list" without quotes as the message.****
>

Reply via email to