lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1292773433.18869.153.camel@edumazet-laptop> Date: Sun, 19 Dec 2010 16:43:53 +0100 From: Eric Dumazet <eric.dumazet@...il.com> To: Paweł Staszewski <pstaszewski@...are.pl> Cc: Linux Network Development list <netdev@...r.kernel.org> Subject: Re: Kernel panic eth2 mirred redirect to ifb0 Le dimanche 19 décembre 2010 à 12:35 +0100, Paweł Staszewski a écrit : > Hi all > > I have panic with kernel 2.6.37-rc6-git2 when use iproute2 > mirred/redirect action > > > host1 (kernel 2.6.36.2) > netperf client -> eth3 (82598EB 10-Gigabit AT CX4) - directly connected > to eth2 of host2 > ethtool -k eth3 > Offload parameters for eth3: > rx-checksumming: on > tx-checksumming: on > scatter-gather: on > tcp-segmentation-offload: on > udp-fragmentation-offload: off > generic-segmentation-offload: on > generic-receive-offload: on > large-receive-offload: off > rx-vlan-offload: off > tx-vlan-offload: off > ntuple-filters: off > receive-hashing: off > > ethtool -i eth3 > driver: ixgbe > version: 2.0.84-k2 > firmware-version: 1.12-2 > bus-info: 0000:03:00.1 > > > host2 (kernel-2.6.37-rc6-git2) > netserver -> eth2 (82598EB 10-Gigabit AT CX4) - directly connected to > eth3 of host1 > > ethtool -k eth2 > Offload parameters for eth2: > rx-checksumming: on > tx-checksumming: on > scatter-gather: on > tcp-segmentation-offload: on > udp-fragmentation-offload: off > generic-segmentation-offload: on > generic-receive-offload: on > large-receive-offload: off > rx-vlan-offload: on > tx-vlan-offload: on > ntuple-filters: off > receive-hashing: off > > ethtool -i eth2 > driver: ixgbe > version: 2.0.84-k2 > firmware-version: 1.12-2 > bus-info: 0000:03:00.0 > > > > Normally without ifb and redirect netperf show: > TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 192.168.0.2 > (192.168.0.2) port 0 AF_INET > Recv Send Send > Socket Socket Message Elapsed > Size Size Size Time Throughput > bytes bytes bytes secs. 10^6bits/sec > > 87380 16384 16384 10.00 9042.14 > > > Steps to reproduce panic: > ip link set dev ifb0 up > > tc qdisc add dev eth2 ingress > > tc filter add dev eth2 parent ffff: protocol ip prio 10 u32 \ > match ip src 0.0.0.0/0 flowid 1:1 \ > action mirred egress redirect dev ifb0 > > > After this when i start netperf on host1 I have panic (screenshot in > attached image). Unfortunately, we miss the start of panic messages. Could you try to get them ? -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists