lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Sun, 9 Feb 2014 20:48:58 +0100
From:	Jochen Striepe <jochen@...ot.escape.de>
To:	linux-kernel@...r.kernel.org
Cc:	stable@...r.kernel.org
Subject: Kernel BUG at net/core/skbuff.c:126

	Hello,

just encountered this (having a config file typo) on my router:

[1777.360153] skbuff: skb_over_panic: text:c1393530 len:24 put:24 head:f4632680 data:f46326c0 tail:0xf46326d8 end:0xf46326c0 dev:tunl0
[1777.360754] ------------[ cut here ]-----------
[1777.361023] kernel BUG at /build/linux-3cqEFp/linux-3.12.6/net/core/skbuff.c:126!
[1777.361405] invalid opcode: 0000 [#1] SMP
[1777.361597] Modules linked in: ipip tunnel3 ip_tunnel xt_nat xt_conntrack ipt_MASQUERADE ipt_REJECT xt_limit xt_tcpudp iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables pppoe pppox ppp_generic slhc joydev arc4 b43 uvcvideo bcma mac80211 acer_wmi iTCO_wdt iTCO_vendor_support sparse_keymap i915 videobuf2_vmalloc videobuf2_momops videobuf2_core cfg80211 [...]

(I hope I got everything right typing this in by hand. I truncated the
list of loaded modules since there seemed to follow only sound modules
and the like. I was able to produce a stack trace only in 1 of about 10
tries, all other oopses ended after the module list. Since this is my
router to the outside world my first idea was to try and see if someone
can reproduce this.)

This is totally reproducable at my machine: booting up, making a pppd
connection to my dsl provider, and entering

# ip tunnel add mode ipip remote 217.13.64.166 local 92.226.241.202 ttl 64
# ip addr add dev tunl0 172.16.2.5 peer 172.16.3.1
# ip link set tunl0 up multicast on

The last command produces the oops.

# uname -a
Linux gomorrha 3.12-1-686-pae #1 SMP Debian 3.12.9-1 (2014-02-01) i686 GNU/Linux

This is the current kernel of Debian Testing.

Is this a known bug? Anyone able to reproduce this? Any ideas? Any more
information you need to reproduce this?


Thanks,
Jochen.

View attachment "config-3.12-1-686-pae" of type "text/plain" (153379 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ