lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-id: <004501cd0d8f$c4e133b0$4ea39b10$%huangpeng@huawei.com> Date: Thu, 29 Mar 2012 17:38:59 +0800 From: "Peter Huang (Peng)" <peter.huangpeng@...wei.com> To: 'Eric Dumazet' <eric.dumazet@...il.com> Cc: linux-kernel@...r.kernel.org, harry.majun@...wei.com, zhoukang7@...wei.com, 'netdev' <netdev@...r.kernel.org> Subject: 答复: 答复: [PATCH] set fake_rtable's dst to NULL to avoid kernel Oops. Thks for your mail. >Check net/bridge/br_netfilter.c and commits e688a6048076 (net: introduce >DST_NOPEER dst flag ) 4adf0af6818f3ea5 (bridge: send correct MTU value >in PMTU (revised)) This patch already included in kernel-3.3, but for our case, virtual tap device's delayed Deletion will also cause kernel oops even in kernel3.3. >Apparently bug is because struct net_bridge is freed while its embedded >fake_rtable is still used by some packets. >I am not sure we are allowed to NULLify skb->dst, it might break >netfilter. Are you familiar with fake_rtable? I search the source, but only find one op that operate on the MTU. >Maybe real fix would be to use a non embedded dst. I agreed with you to, so at least until now this problem still exsits in the latest kernel, I will also look into it, And try to modify it from the root. Thanks again. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists