On 2003.07.25 21:11, Herbert Xu wrote: > Ranjeet Shetye <ranjeet.shetye2@zultys.com> wrote: > > > > kernel is 2.6.0-test1 from bk (current as of Fri, July 25), talking > to > > a 2.4.21 kernel with IPSec backport. IPSec is tunnel mode, ESP and > AH > > with AES and MD5 for phase 1 and phase 2. PFS is off. default > > lifetimes. no modules loaded on 2.6 kernel. > > > > Starting tetheral (intf going into promiscuous mode ?) triggers this > > > bug consistently. > > When an secpath is COWed, we lose reference to the states. > > Does this patch help? > -- > Debian GNU/Linux 3.0 is out! ( http://www.debian.org/ ) > Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au> > Home Page: http://gondor.apana.org.au/~herbert/ > PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt > -- Hi Herbert, The patch did indeed fix the OOPS. Thanks a bunch. I tested against the following: Linux 2.6.0-test2 (bk) + your patch on one side, and Linux 2.4.21 + IPSec backport on the other. I tested with the following traffic: * ping the 2.4.21 m/c from the 2.6.0-test2 m/c. * flood ping the 2.4.21 m/c from the 2.6.0-test2 m/c. * netserver on 2.4.21 and netperf client on 2.6.0-test2. starting and stopping tethereal multiple times did not crash the 2.6.0- test2 kernel. Dave, the system with the 2.4.21 + your IPsec backport was also very stable thru this test. Thanks a lot guys. Ranjeet. -- Ranjeet Shetye Senior Software Engineer Zultys Technologies Ranjeet dot Shetye2 at Zultys dot com http://www.zultys.com/ -- The views, opinions, and judgements expressed in this message are solely those of the author. The message contents have not been reviewed or approved by Zultys. - : send the line "unsubscribe linux-net" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html