lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.0810082329250.7599@wrl-59.cs.helsinki.fi>
Date:	Wed, 8 Oct 2008 23:44:39 +0300 (EEST)
From:	"Ilpo Järvinen" <ilpo.jarvinen@...sinki.fi>
To:	Thomas Gleixner <tglx@...utronix.de>
cc:	"Dâniel Fraga" <fragabr@...il.com>,
	David Miller <davem@...emloft.net>,
	Netdev <netdev@...r.kernel.org>
Subject: Re: [PATCH] tcp FRTO: in-order-only "TCP proxy" fragility workaround
 (fwd)

On Wed, 8 Oct 2008, Thomas Gleixner wrote:

> On Wed, 8 Oct 2008, Dâniel Fraga wrote:
> 
> > On Sun, 5 Oct 2008 20:09:22 +0200 (CEST)
> > Thomas Gleixner <tglx@...utronix.de> wrote:
> > 
> > > The cat /debug/tracing/tracing_enabled == 1 might be just a user space
> > > interface thingy.
> > > 
> > > Thanks,
> > 
> > 	Thomas, Ilpo etc, I got a trace exactly after the patch
> > provided by Thomas detected the stall:
> > 
> > http://www.abusar.org/ftrace/trace-final.txt.bz2
> > 
> > 	Thomas, since you didn't reply to the previous messages, I
> > assume the previous traces were invalid. But could you please check
> > this one?
>
> Will do. Sorry was distracted. Steven Rostedt posted a patch to stop
> the tracer really from the kernel, I need to verify that it works on
> .27. Will do tomorrow when my brain is more awake than now.

I hope we're not chasing a partial ghost btw since there seem to be,
after all, two "independent" failures which look similar, one at the 
server and the other at the client. So the strace we were looking earlier 
_might_ actually be from a case where the client was stalling instead of 
the server (we don't have /proc/net/tcp of that case so I cannot 
decide for sure though I might as well be wrong and it was a valid 
server case straced)... Anyway, this ftrace may still reveal something as 
it's clearly triggering due to server side listenoverflow which is known 
to happen during the server side event but the thing we want to find might 
be something else than what strace was giving.

Is there some compatible kd tool for ftrace that got included? I only 
found one from a kft patch but I suppose the format is different or 
something as I got no output from it, or I'm just stupid and don't 
understand how I'm supposed to use it with the logs Daniel gathered :-).

I'll try to take a look as well tomorrow or Friday but I'm pretty busy
already and will be travelling starting from Sunday to Wednesday so my 
responses might get a bit delayed.


-- 
 i.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ