lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20081016050810.GA8240@samad.com.au>
Date:	Thu, 16 Oct 2008 16:08:10 +1100
From:	Alex Samad <alex@...ad.com.au>
To:	David Miller <davem@...emloft.net>
Cc:	linux-net@...r.kernel.org, netdev@...r.kernel.org,
	herbert@...dor.apana.org.au
Subject: Re: kernel oops when system under network stress

On Wed, Oct 15, 2008 at 09:55:36PM -0700, David Miller wrote:
> From: Alex Samad <alex@...ad.com.au>
> Date: Thu, 16 Oct 2008 14:04:16 +1100
> 
> [ Kernel network developers don't read linux-net, which is for
>   user discussion.  They read netdev@...r.kernel.org instead
>   which I've added to the CC:, please maintain this in all
>   follow ups and replys. ]
> 
> > I seems to be getting lots of crashes when my system is under network
> > load, I was moving 1/4T of data over a 1G link and I got lots and lots
> > of these
> 
> What kernel version?

Sorry I put this at the bottom of the email.  its a stock debian 2.6.26
(-8) kernel, nothing special on my side

> 
> How is your system configured?

 lspci -s 0a.0 -vv
00:0a.0 Ethernet controller: nVidia Corporation Device 0760 (rev a2)
	Subsystem: Giga-byte Technology Device e000
	Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop-
ParErr- Stepping- SERR- FastB2B- DisINTx+
	Status: Cap+ 66MHz+ UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort-
<TAbort- <MAbort- >SERR- <PERR- INTx-
	Latency: 0 (250ns min, 5000ns max)
	Interrupt: pin A routed to IRQ 1277
	Region 0: Memory at f8007000 (32-bit, non-prefetchable)
[size=4K]
	Region 1: I/O ports at d800 [size=8]
	Region 2: Memory at f8008000 (32-bit, non-prefetchable)
[size=256]
	Region 3: Memory at f8009000 (32-bit, non-prefetchable)
[size=16]
	Capabilities: <access denied>
	Kernel driver in use: forcedeth
	Kernel modules: forcedeth

I have eth0 bridged to brhme1.

I have seen this problem when doing rsync/ssh of large files and whilst
doing transfer of files with nfs (udp & tcp thought more issues arise
with udp), also tried different mtu's as well and that was worst of all.

The thing to note was (for example), when I was doing a nfs transfer, it
would not be nfs that would crash, it would be other network based
application that would cause the problem, for ex sshd, apache etc


> 
> Otherwise it is harder for us to analyze this report.
> 
> Thanks.
> 

[snip]

> > somebody if it would help.
> > 
> > Is this a bug or ?
> > 
> > I am running debian 2.6.26-8 
> > Linux max 2.6.26-1-amd64 #1 SMP Thu Oct 9 14:16:53 UTC 2008 x86_64
> > GNU/Linux
> > 
> > 
> > I have eth0 bridges to brhme1 (so that I can attach virtual box machines
> > there - none attached currently)
> > 
> > and I have some firewall rules as well.  That really about it to the
> > changes I have made
> > 
> > 
> > 
> > Thanks
> > Alex 
> > 
> > PS can you cc me on the replay, in the process of registering
> > 
> > 
> > -- 
> > "Columbia carried in its payroll classroom experiments from some of our students in America."
> > 
> > 	- George W. Bush
> > 02/03/2003
> > Bethesda, MD
> --
> To unsubscribe from this list: send the line "unsubscribe linux-net" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 

-- 
"If there's a leak out of my administration, I want to know who it is. If the person has violated law, that person will be taken care of."

	- George W. Bush
09/30/2003
Washington, DC
Commenting on the CIA leak that he and Cheney later admitted they approved

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ