lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Sat, 21 Nov 2015 17:34:57 +0500
From:	"Eugene A. Kravtsov" <ek@...rona.net>
To:	netdev@...r.kernel.org
CC:	Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
	Guillaume Nault <g.nault@...halink.fr>
Subject: Linux 3.16.7: WARNING at kernfs_get+0x2a/0x30() and ida_remove+0xdd/0x120() in loop


Last week I have a problem with kernel update my PPPoE BRAS server
from Linux 3.2.0-4-686-pae #1 SMP Debian 3.2.68-1+deb7u1 i686 GNU/Linux
to  3.16.0-4-686-pae #1 Debian  3.16.7-ckt11-1+deb8u5.
At  any  time,  for  no reason, at any load server downed to oops with following
trace http://spec.oborona.net/bras_panic

Server  software  is:  rp-pppoe + pppoe + tc htb shapers on ppp interfaces
called  from  ip-ip  script.  No  special  settings are not using.

I tried to install new debian kernel 4.2.6, but the problem is not solved,
everything became worse, server worked with 4.2.6 about 15 minutes and downed to panic
(no trace - network rsyslog is empty).

After that, i decide to try stable kernel from kernel.org - 4.2.3,
and saw the same panic with no network logs as with 4.2.6.

Many  technical  staff from Russia and UA ISP confirmed these problems
with ppp in all new kernels (accell-ppp and rp-pppoe).
https://translate.google.ru/translate?hl=ru&sl=ru&tl=en&u=http%3A%2F%2Fforum.nag.ru%2Fforum%2Findex.php%3Fshowtopic%3D45266%26st%3D6220
This is the same our problem from UA colleague http://www.spinics.net/lists/netdev/msg352992.html

Last  kernel with no problem, for me - 3.2.68-1+deb7u1 i686 GNU/Linux.
With 3.2 kerel server uptime is infinite.

Can i help with additional information?


--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ