[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#506419: kernel trace during IPv6 ssh output



Thanks Aioanei and Ben for your replies. Feels like we are getting
somewhere.



also sprach Aioanei Rares <debian.dev.list@gmail.com> [2008.11.21.1353 +0100]:
> Can you reproduce on another version of the kernel or a vanilla?

also sprach Ben Hutchings <ben@decadent.org.uk> [2008.11.21.1432 +0100]:
> This is a warning from the GSO (like TSO) code which only applies to
> outgoing traffic.

I build vanilla 2.6.26.7 and 2.6.27.7 and tried them (using deb-pkg
target to create the .debs, and mkinitramfs to make the initrd).

With 2.6.26.7, ethtool reports generic segmentation offload (GSO) to
be off, but it's on again with 2.6.27.7! As expected, the problem
does not appear with 2.6.26.7, but it does appear with 2.6.27.7.

Sure enough, turning gso off fixes the problem on the original
Debian kernel too.

> I notice there's bridging code in the call trace, and kvm in the
> modules list.  Were you initiating the IPv6 connections from
> inside a VM?

Not from inside the VM, but from the host, which is connected via
the same bridge.

-- 
 .''`.   martin f. krafft <madduck@debian.org>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems
 
oxymoron: micro$oft works

Attachment: digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)


Reply to: