| 
James Morris wrote:
 
On Tue, 16 May 2006, Matt Ayres wrote:
 
My ruleset is pretty bland.  2 rules in the raw table to tell the system
to
only track my forwarded ports, 2 rules in the nat table for forwarding
(intercepting) 2 ports, and then in the FORWARD tables 2 rules per VM to
just
account traffic.
 
Can you try using a different NIC?
 
This happens on 30 different hosts.  Using the same kernel I get varying
uptime of "hasn't crashed since the upgrade to 2.6.16" to "crashes every day".
All are Tyan S2882D boards w/ integrated Tigon3.  The trace I posted to this
thread indicate tg3, but in many other traces I have the trace doesn't include
any driver calls.  They all panic in ipt_do_table.  I would have pasted the
others, but I didn't save the System.map for either of them and they are all
pretty similar.
 
I'm trying to suggest eliminating this driver & possible interaction with 
Xen network changes as a cause.  If you can find a different type of NIC 
to plug in and use, or even try and change all of the params for the tg3 
with ethtool, it'll help. 
 
Hi,
Thank you for the assistance. Which parameters do you suggest changing? 
 TSO/flow control off? 
Here is my ruleset for those interested:
# iptables -t raw -L -v
Chain OUTPUT (policy ACCEPT 27441 packets, 4832K bytes)
pkts bytes target     prot opt in     out     source 
destination 
Chain PREROUTING (policy ACCEPT 195M packets, 156G bytes)
pkts bytes target     prot opt in     out     source 
destination
1332K  144M NOTRACK   !tcp  --  any    any     anywhere 
anywhere
   54  5293 ACCEPT     tcp  --  any    any     anywhere 
anywhere            tcp dpt:7373
 4564  223K ACCEPT     tcp  --  any    any     anywhere 
anywhere            tcp dpt:7322
 194M  156G NOTRACK    tcp  --  any    any     anywhere 
anywhere            tcp dpt:!7373
 194M  156G NOTRACK    tcp  --  any    any     anywhere 
anywhere            tcp dpt:!7322 
# iptables -t nat -L -v
Chain OUTPUT (policy ACCEPT 2114 packets, 155K bytes)
pkts bytes target     prot opt in     out     source 
destination 
Chain POSTROUTING (policy ACCEPT 2114 packets, 155K bytes)
pkts bytes target     prot opt in     out     source 
destination 
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target     prot opt in     out     source 
destination
    6   344 DNAT       tcp  --  eth0   any     anywhere 
anywhere            tcp dpt:7373 to:host.ip.address:443
    8   408 DNAT       tcp  --  eth0   any     anywhere 
anywhere            tcp dpt:7322 to:host.ip.address:22 
iptables -L -v just shows 2 rules per Virtual Machine for accounting. 
This averages about 100 rules in the FORWARD chain.  Example: 
# iptables -L -v
Chain FORWARD (policy ACCEPT 195M packets, 156G bytes)
pkts bytes target     prot opt in     out     source 
destination
    0     0            all  --  any    any     xx.xx.xx.xx 
 anywhere
    0     0            all  --  any    any     anywhere 
xx.xx.xx.xx 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 |