lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200808152354.24486.denys@visp.net.lb>
Date:	Fri, 15 Aug 2008 23:54:24 +0300
From:	Denys Fedoryshchenko <denys@...p.net.lb>
To:	Jarek Poplawski <jarkao2@...il.com>
Cc:	netdev@...r.kernel.org
Subject: Re: panic 2.6.27-rc3-git2, qdisc_dequeue_head

Btw, it can happen on deletion also. At that moment there was 600 sessions 
established(and non-stop logging in/off), and it is difficult to tell, what 
was happening at that moment...

On Friday 15 August 2008, Denys Fedoryshchenko wrote:
> On Friday 15 August 2008, Jarek Poplawski wrote:
> > Denys Fedoryshchenko wrote, On 08/15/2008 09:09 PM:
> > > Aug 15 21:59:54 192.168.20.66 [ 1123.800035] BUG: unable to handle
> > > kernel Aug 15 21:59:54 192.168.20.66 NULL pointer dereference
> > > Aug 15 21:59:54 192.168.20.66 at 00000004
> > > Aug 15 21:59:54 192.168.20.66 [ 1123.800035] IP:
> > > Aug 15 21:59:54 192.168.20.66 [<c0272579>] qdisc_dequeue_head+0x29/0x3d
> >
> > Could you add some details like:
> > - device(eth, ppp, ifb...), net driver(s) on that device,
> > - types of filters, actions on the path to this tbf queue,
> > - were there any config changes done around the time when this happened?
> >
> > Thanks,
> > Jarek P.
>
> TBF on ppp
> Probably multiple ppp interfaces coming up. (but tbf applied on each
> separately)
>
> Rules, qdiscs and filters looks like this:
>
>     echo "qdisc del dev $2 root"
>     echo "qdisc add dev $2 root handle 1: prio"
>     echo "qdisc add dev $2 parent 1:1 handle 2: est 1sec 8sec tbf buffer
> ${burst} latency 500ms rate ${rate}bit peakrate ${peakrate}bit mtu 1512"
> #    echo "Bypass code"
> # !!!!!!!!!!!!!!!!!!WRONG!!!!!!!!!!!!
>     echo "qdisc add dev $2 parent 1:1 handle 3: tbf buffer ${burst}kb
> latency 500ms rate 1024000"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src
> 194.146.153.24/32 flowid 3:1"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src
> 194.146.153.26/32 flowid 3:1"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src
> 194.146.153.6/32 flowid 3:1"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src
> 194.146.153.19/32 flowid 3:1"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src
> 2.2.2.102/32 flowid 3:1"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src
> 2.2.2.105/32 flowid 3:1"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 5 u32 match ip src
> 2.2.2.106/32 flowid 3:1"
> #TEMP BYPASS CODE
> #    echo "Final rule"
>     echo "filter add dev $2 parent 1:0 protocol ip prio 10 u32 match ip dst
> 0.0.0.0/0 flowid 2:1"
>
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html


--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ