lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	09 Jan 2007 00:02:30 +0100
From:	Peter Osterlund <petero2@...ia.com>
To:	Patrick McHardy <kaber@...sh.net>
Cc:	Linus Torvalds <torvalds@...l.org>,
	"David S. Miller" <davem@...emloft.net>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Netfilter Development Mailinglist 
	<netfilter-devel@...ts.netfilter.org>
Subject: Re: Linux 2.6.20-rc4

Patrick McHardy <kaber@...sh.net> writes:

> Linus Torvalds wrote:
> > On Sun, 7 Jan 2007, Peter Osterlund wrote:
> > 
> >>I get kernel panics when doing large ethernet transfers. A loop doing

> >>  EFALLGS: 00010206 (2.6.20-rc4 #13)
> >>  EIP is at ipv4_conntrack_help+0x6b/0x83
> >>  eax: c0475e44 ebx: 9f5cea37 ecx: d1dcebb0 edx: 00000014
> >>  esi: d1dcebb0 edi: c0475e44 ebp: c0475dd8 esp: c0475dc4
> > 
> > which is ipv4_conntrack_help():
> > 
> > 	return help->helper->help(pskb,
> > 		(*pskb)->nh.raw - (*pskb)->data
> > 				+ (*pskb)->nh.iph->ihl*4,
> > 		ct, ctinfo);
> > 
> > and that call instruction is the one that oopses because "help->helper" is 
> > corrupt (it's 0x9f5cea37 - not a valid kernel pointer).
> 
> I guess its because of an uninitialized helper field in struct
> nf_conntrack_expect, which is then copied from the expectation to
> the conntrack entry.
> 
> Peter, do you have locally generated netbios ns queries on the machine
> running nf_conntrack?

I have samba running on both machines. I guess that generates some
netbios traffic even though it isn't currently in active use.

> If so, please try this patch.

Thanks, the patch appears to help. The kernel has now survived much
longer with this patch than it used to do without it.

I will recompile with gcc 4.1.1 too just to make sure, but if you
don't hear anything more from me, consider the case closed. :)

-- 
Peter Osterlund - petero2@...ia.com
http://web.telia.com/~u89404340
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ