![]() |
Kernel update 4.4.132 enables log_ecn_error in sit module by default now, syslog spam
For various network tunnel users, HE, openvpn...
Updated to kernel 4.4.132, rebooted, saw syslog spam: May 23 16:27:36 dns1 kernel:[14781.521951] sit: non-ECT from 31.16.5.81 with TOS=0xe May 23 16:27:38 dns1 kernel:[14783.518102] sit: non-ECT from 31.16.5.81 with TOS=0xe May 23 16:27:40 dns1 kernel:[14785.521994] sit: non-ECT from 31.16.5.81 with TOS=0xe May 23 16:27:42 dns1 kernel:[14787.522471] sit: non-ECT from 31.16.5.81 with TOS=0xe May 23 16:27:44 dns1 kernel:[14789.523235] sit: non-ECT from 31.16.5.81 with TOS=0xe May 23 16:27:46 dns1 kernel:[14791.524710] sit: non-ECT from 31.16.5.81 with TOS=0xe May 23 16:27:48 dns1 kernel:[14793.524595] sit: non-ECT from 31.16.5.81 with TOS=0xe May 23 16:27:50 dns1 kernel:[14795.521521] sit: non-ECT from 31.16.5.81 with TOS=0xe Turns out the default for sit module option log_ecn_error is now enabled by default. sit is loaded for use with Hurricane Electric IPv6 tunnels, and openvpn tunnels. Can be temporarily disabled by: echo N > /sys/module/sit/parameters/log_ecn_error Permanent fix: echo "options sit log_ecn_error=0" > /etc/modprobe.d/sit.conf |
All times are GMT -5. The time now is 05:51 AM. |