lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20140825144846.57afc899@urahara> Date: Mon, 25 Aug 2014 14:48:46 -0700 From: Stephen Hemminger <stephen@...workplumber.org> To: netdev@...r.kernel.org Subject: Fw: [Bug 80201] general protection fault: 0000 [#1] SMP (while using HTB) Begin forwarded message: Date: Mon, 25 Aug 2014 09:39:23 -0700 From: "bugzilla-daemon@...zilla.kernel.org" <bugzilla-daemon@...zilla.kernel.org> To: "stephen@...workplumber.org" <stephen@...workplumber.org> Subject: [Bug 80201] general protection fault: 0000 [#1] SMP (while using HTB) https://bugzilla.kernel.org/show_bug.cgi?id=80201 --- Comment #12 from Cenek Zach <cenek.zach@...il.com> --- I might have a clue. We are changing the limits imposed by HTB each minute using following command: $TC class change dev "$BL_DEVICE" parent 1: classid 1:1 htb rate "$LIMIT" burst "$BL_BURST" cburst "$BL_CBURST" quantum 60000 And this command was definitely running in 3/4 cases at the time of crash (found him in 'crash> bt -a') -- You are receiving this mail because: You are the assignee for the bug. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists