lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <y2kb9800b71004220705s4db40c4csb3923b61f9ae8321@mail.gmail.com> Date: Thu, 22 Apr 2010 16:05:13 +0200 From: Martín Ferrari <martin.ferrari@...il.com> To: "Eric W. Biederman" <ebiederm@...ssion.com> Cc: Ben Hutchings <ben@...adent.org.uk>, 577640@...s.debian.org, netdev <netdev@...r.kernel.org>, "Eric W. Biederman" <ebiederm@...stanetworks.com>, Alexey Dobriyan <adobriyan@...il.com>, Mathieu Lacage <mathieu.lacage@...hia.inria.fr> Subject: Re: Bug#577640: linux-image-2.6.33-2-amd64: Kernel warnings in netns thread On Thu, Apr 22, 2010 at 04:38, Eric W. Biederman <ebiederm@...ssion.com> wrote: >>> > $ sudo ./startns bash >>> > # ip l a type veth >>> > # ip l s veth0 netns 1 >>> > # exit > Then I should ask what is startns? That's just a simple C program that calls unshare(CLONE_NEWNET) and execs a shell. > Either that is doing something different from my equivalent program, or I have > patches to fix this, that just haven't been merged yet. I have just downloaded and compiled 2.6.32-2 and 2.6.34-rc5 from kernel.org using the .config from the debian package, and the oops is reproducible in both. This small C file reproduces the error every time: $ cat netnsoops.c #include <stdio.h> #include <stdlib.h> #define _GNU_SOURCE #include <sched.h> int main(int argc, char *argv[]) { int c; unsigned long flags = CLONE_NEWNET; if(unshare(flags) == -1) { perror("unshare"); return 1; } system("ip link add name FOO type veth peer name BAR"); system("ip link set FOO netns 1"); system("ip link show"); return 0; } -- Martín Ferrari -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists