From: Kerin Millar <kerframil@gmail.com>
To: netfilter-devel@vger.kernel.org
Subject: Re: scheduling while atomic followed by oops upon conntrackd -c execution
Date: Mon, 05 Mar 2012 17:19:49 +0000 [thread overview]
Message-ID: <jj2sjo$i8a$1@dough.gmane.org> (raw)
In-Reply-To: <20120304110151.GA22404@1984>
Hi Pablo,
On 04/03/2012 11:01, Pablo Neira Ayuso wrote:
> Hi Kerin,
>
> On Sat, Mar 03, 2012 at 06:47:27PM +0000, Kerin Millar wrote:
>> Hi,
>>
>> On 03/03/2012 13:30, Pablo Neira Ayuso wrote:
>>> I just posted another patch to the ML that is a relative fix to
>>> Jozsef's patch. You have to apply that as well.
>>
>> I've now tested 3.3-rc5 with the addition of the above mentioned
>> follow-on patch. The behaviour during conntrackd -c execution is
>> clearly much improved - in so far as it doesn't generate much noise
>> - but the crash that follows remains. Here's a netconsole capture:-
>>
>> http://paste.pocoo.org/raw/560439/
>
> Great to know :-).
I apologize but I think I may have led you astray on the nf_nat issue.
At the time of submitting my original report, I now believe that the
nf_nat module wasn't loaded prior to starting conntrackd, although it
was definitely available. For all tests that followed, however, I am
entirely certain the the nf_nat module was loaded in advance. The upshot
is that my claim that things had improved may have been premature; I
need to specifically test under both circumstances to be sure that
things are improving. That is, both with and without the module loaded
in advance.
Following my own advice then, I first tried going through my test case
*without* loading nf_nat in advance. Alas, conntrackd -c triggered hard
lockups and didn't return to prompt. Here are the results:-
http://paste.pocoo.org/raw/561350/
In case it matters, the existing ssh session continued to respond to
input but I was no longer able to initiate any new sessions.
>
> Regarding your previous email, I'm sorry, by reading your email I
> thought you were using 2.6.32 which was not the case, your
> configuration is perfectly reasonable.
>
> It seems we still have problems regarding early_drop, but this time
> with reliable event delivery enabled (15 seconds is the time that
> is required to retry sending the destroy event).
>
> If you can test the following patch, I'll appreciate.
Gladly. I applied the patch to my 3.3-rc5 tree, which is still carrying
the two patches discussed earlier in the thread. I then went through my
test case under normal circumstances i.e. all firewall rules in place,
nf_nat confirmed present before conntrackd etc. Again, conntrackd -c did
not return to prompt. Here are the results:-
http://paste.pocoo.org/raw/561354/
Well, at least there was no oops this time. I should also add that the
patch was present for both of the tests mentioned in this email.
---
Incidentally, I found out why the internal cache on the master was
filling up to capacity. It was apparently due to the use of "iptables -I
PREROUTING -t raw -j CT --ctevents assured". Perhaps I'm missing
something but doesn't this stop events such as new and destroy from
being propagated? An inspection with conntrack -E suggests so. Once I
removed the above rule, I could see destroy events being propagated and
the number of active connections in the cache no longer exceeded my
chosen limit of 2097152 ...
# conntrack -S | head -n1; conntrackd -s | head -n2
entries 725826
cache internal:
current active connections: 1409472
Whatever the case, I'm quite happy to go without this rule as these
systems are coping fine with the load incurred by conntrackd.
Cheers,
--Kerin
next prev parent reply other threads:[~2012-03-05 17:20 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-03-02 15:11 scheduling while atomic followed by oops upon conntrackd -c execution Kerin Millar
2012-03-03 13:30 ` Pablo Neira Ayuso
2012-03-03 17:49 ` Kerin Millar
2012-03-03 18:47 ` Kerin Millar
2012-03-04 11:01 ` Pablo Neira Ayuso
2012-03-05 17:19 ` Kerin Millar [this message]
2012-03-06 11:14 ` Pablo Neira Ayuso
2012-03-06 16:42 ` Kerin Millar
2012-03-06 17:23 ` Pablo Neira Ayuso
2012-03-06 22:37 ` Kerin Millar
2012-03-07 14:41 ` Kerin Millar
2012-03-08 1:33 ` Pablo Neira Ayuso
2012-03-08 11:00 ` Kerin Millar
2012-03-08 11:29 ` Kerin Millar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='jj2sjo$i8a$1@dough.gmane.org' \
--to=kerframil@gmail.com \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.