lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 02 Feb 2008 02:23:36 -0800
From:	Corey Hickey <bugfood-ml@...ooh.org>
To:	Denys Fedoryshchenko <denys@...p.net.lb>
CC:	netdev@...r.kernel.org
Subject: Re: kernel panic on 2.6.24 with esfq patch applied

Denys Fedoryshchenko wrote:
> Hi
> 
> Probably bug related to ESFQ, now i will unload module and will test more. 
> But probably not related, so if not difficult, please take a look.
> 
> Feb  1 09:08:50 SERVER [12380.067104] BUG: unable to handle kernel NULL 
> pointer dereference
> Feb  1 09:08:50 SERVER at virtual address 00000008
> Feb  1 09:08:50 SERVER [12380.067140] printing eip: c01f10ed
> Feb  1 09:08:50 SERVER *pde = 00000000
> Feb  1 09:08:50 SERVER
> Feb  1 09:08:50 SERVER [12380.067162] Oops: 0000 [#1]
> Feb  1 09:08:50 SERVER SMP
> Feb  1 09:08:50 SERVER
> Feb  1 09:08:50 SERVER [12380.067181] Modules linked in:
> Feb  1 09:08:50 SERVER netconsole
> Feb  1 09:08:50 SERVER configfs
> Feb  1 09:08:50 SERVER iTCO_wdt
> Feb  1 09:08:50 SERVER nf_nat_pptp
> Feb  1 09:08:50 SERVER nf_conntrack_pptp
> Feb  1 09:08:50 SERVER nf_conntrack_proto_gre
> Feb  1 09:08:50 SERVER nf_nat_proto_gre
> Feb  1 09:08:50 SERVER sch_esfq

I'd rather you were using my recent patches to SFQ instead of ESFQ. I
was able to crash a 2.6.24 user-mode Linux with ESFQ as well; I don't
know if that's what you encountered, but the SFQ patches should be
better anyway.

http://fatooh.org/esfq-2.6/sfq-2.6.24.tar.bz2
http://fatooh.org/esfq-2.6/

-Corey
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ