lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200808152336.05424.denys@visp.net.lb>
Date:	Fri, 15 Aug 2008 23:36:05 +0300
From:	Denys Fedoryshchenko <denys@...p.net.lb>
To:	Jarek Poplawski <jarkao2@...il.com>
Cc:	netdev@...r.kernel.org
Subject: Re: panic 2.6.27-rc3-git2, qdisc_dequeue_head

On Friday 15 August 2008, Jarek Poplawski wrote:
> Denys Fedoryshchenko wrote, On 08/15/2008 09:09 PM:
> > Aug 15 21:59:54 192.168.20.66 [ 1123.800035] BUG: unable to handle kernel
> > Aug 15 21:59:54 192.168.20.66 NULL pointer dereference
> > Aug 15 21:59:54 192.168.20.66 at 00000004
> > Aug 15 21:59:54 192.168.20.66 [ 1123.800035] IP:
> > Aug 15 21:59:54 192.168.20.66 [<c0272579>] qdisc_dequeue_head+0x29/0x3d
>
> Could you add some details like:
> - device(eth, ppp, ifb...), net driver(s) on that device,
> - types of filters, actions on the path to this tbf queue,
> - were there any config changes done around the time when this happened?
>
> Thanks,
> Jarek P.


TBF on ppp
Probably multiple ppp interfaces coming up. (but tbf applied on each 
separately)

Rules, qdiscs and filters looks like this:

    echo "qdisc del dev $2 root"
    echo "qdisc add dev $2 root handle 1: prio"
    echo "qdisc add dev $2 parent 1:1 handle 2: est 1sec 8sec tbf buffer 
${burst} latency 500ms rate ${rate}bit peakrate ${peakrate}bit mtu 1512"
#    echo "Bypass code"
# !!!!!!!!!!!!!!!!!!WRONG!!!!!!!!!!!!
    echo "qdisc add dev $2 parent 1:1 handle 3: tbf buffer ${burst}kb latency 
500ms rate 1024000"
    echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src 
194.146.153.24/32 flowid 3:1"
    echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src 
194.146.153.26/32 flowid 3:1"
    echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src 
194.146.153.6/32 flowid 3:1"
    echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src 
194.146.153.19/32 flowid 3:1"
    echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src 
2.2.2.102/32 flowid 3:1"
    echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src 
2.2.2.105/32 flowid 3:1"
    echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src 
2.2.2.106/32 flowid 3:1"
#TEMP BYPASS CODE
#    echo "Final rule"
    echo "filter add dev $2 parent 1:0 protocol ip prio 10 u32 match ip dst 
0.0.0.0/0 flowid 2:1"                                                          

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ