lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d134a3fb58c27abab012aa154401e403e6e46b84.camel@nvidia.com>
Date: Mon, 1 Apr 2024 09:39:43 +0000
From: Jianbo Liu <jianbol@...dia.com>
To: "pablo@...filter.org" <pablo@...filter.org>
CC: "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "fw@...len.de"
	<fw@...len.de>, "netfilter-devel@...r.kernel.org"
	<netfilter-devel@...r.kernel.org>, "davem@...emloft.net"
	<davem@...emloft.net>
Subject: Re: [BUG] kernel warning from br_nf_local_in+0x157/0x180

On Tue, 2024-03-26 at 02:28 +0100, Pablo Neira Ayuso wrote:
> On Sat, Mar 23, 2024 at 10:37:16AM +0000, Jianbo Liu wrote:
> > On Fri, 2024-03-22 at 13:27 +0100, Pablo Neira Ayuso wrote:
> > > Hi Jianbo,
> > > 
> > > On Mon, Mar 18, 2024 at 09:41:46AM +0000, Jianbo Liu wrote:
> > > > Hi Florian and Pablo,
> > > > 
> > > > We hit the following warning from br_nf_local_in+0x157/0x180.
> > > 
> > > Can you give a try to this patch?
> > > 
> > 
> > Sorry, it doesn't fix.
> > It looks fine when running the test manually. But the warning still
> > appeared in our regression tests.
> 
> You mean different test triggers now the warning splat?

It should be the same. The test I run manually was configured by the
scripts I posted in this thread.

> 
> Not sure yet if this is the bug that is triggering the issue in your
> testbed yet, but I find it odd that packets hitting the local_in hook
> because promisc flag is set on can confirm conntrack entries.
> 

This fix seems ok. I didn't see the warning or any other issue.

Thanks!
Jianbo

> Would you please give a try to this patch? Thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ