Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752665Ab0GNG4Z (ORCPT ); Wed, 14 Jul 2010 02:56:25 -0400 Received: from elasmtp-kukur.atl.sa.earthlink.net ([209.86.89.65]:42895 "EHLO elasmtp-kukur.atl.sa.earthlink.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751380Ab0GNG4X (ORCPT ); Wed, 14 Jul 2010 02:56:23 -0400 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=mindspring.com; b=OqQ0JoIUXWijWna5b7mMJMwDbiBfjjpANkIn4iqU7UdhyT2UioNxZa5fje1ORkYS; h=Received:Date:From:To:Cc:Subject:Message-Id:In-Reply-To:References:X-Mailer:Mime-Version:Content-Type:Content-Transfer-Encoding:X-ELNK-Trace:X-Originating-IP; Date: Wed, 14 Jul 2010 02:56:18 -0400 From: Bill Fink To: Felipe W Damasio Cc: Eric Dumazet , Avi Kivity , David Miller , Patrick McHardy , linux-kernel@vger.kernel.org, netdev Subject: Re: [PATCH] tproxy: nf_tproxy_assign_sock() can handle tw sockets Message-Id: <20100714025618.181eacc5.billfink@mindspring.com> In-Reply-To: References: <1278695580.2696.55.camel@edumazet-laptop> <1278742649.2538.17.camel@edumazet-laptop> <4C395459.6080407@redhat.com> <1278835332.2538.51.camel@edumazet-laptop> <1279032023.2634.384.camel@edumazet-laptop> <1279036193.2634.468.camel@edumazet-laptop> <1279077678.2444.95.camel@edumazet-laptop> <1279078985.2444.105.camel@edumazet-laptop> X-Mailer: Sylpheed 2.6.0 (GTK+ 2.16.6; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-ELNK-Trace: c598f748b88b6fd49c7f779228e2f6aeda0071232e20db4d27eaa24b7a6d093a462792c66386c9c9350badd9bab72f9c350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 71.166.62.12 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1739 Lines: 45 On Wed, 14 Jul 2010, Felipe W Damasio wrote: > Hi, > > 2010/7/14 Eric Dumazet : > >> I can, but my bosses will kick my ass if I bring down the ISP again :) > > > > I have no guarantee at all, even if we find the bug. > > Ok :-) > > >> If you think it's the only way to find the problem I'll tell them that > >> I need to do it. In this case, please tell me what other config > >> options/tools I can use to get as much info as possible...since I'll > >> probably be able to test this only once more on the production > >> environment for debugging purposes. > > > > You really should try to setup a lab to trigger the bug, and not doing > > experiments on production :) > > Right, I'm trying. > > The thing is: The ISP is a 200Mbps network with 10,000 users. The > first time it took around 2 minutes to trigger the bug. The second > time it took around 17 minutes. > > So I *think* it's some TCP flag with some weird content...but I can't > find out what it is so I can trigger it on the lab. > > So my only guess is to enable every possible debug flag I can think of > to track the bug down on the production environment. Any hints here > would be appreciated :) Is it possible for you to mirror the production traffic to another port, and then do a tcpdump capture to a series of files, so that you might possibly be able to correlate the kernel crash to the actual packets on the wire (and the Invalid Request squid errors)? Just a suggestion. -Bill -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/