[Bug 50] New: Kernel panic with netfilter
bugzilla-daemon@netfilter.org
bugzilla-daemon@netfilter.org
Fri, 14 Feb 2003 23:17:58 +0100
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=50
Summary: Kernel panic with netfilter
Product: netfilter/iptables
Version: patch-o-matic
Platform: i386
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: unknown
AssignedTo: laforge@netfilter.org
ReportedBy: georg.wild@gmx.de
CC: netfilter-buglog@lists.netfilter.org
Hello,
I applied netfilter to my openmosix-2.4.20-kernel and now I got a kernel panic.
I wonder whether the error is netfilter-based or not. I think it is because the
kernel panic comes directly after the netfilter message on startup.
Do you know anything about this?
I'll attach the ksymoops and the applied patches.
Thanks
Georg Wild
ksymoops 2.4.8 on i686 2.4.20-openmosix-1. Options used
-V (default)
-K (specified)
-L (specified)
-O (specified)
-m /usr/src/linux/System.map (default)
Unable to handle kernel NULL pointer dereference at virtual address 00000010
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c0474fc9>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010282
eax: 00000000 ebx: c04a05f0 ecx: 00000000 edx: c04a9a88
esi: 00000000 edi: c0105000 ebp: 0008e000 esp: effe9fc8
ds: 0018 es: 0018 ss: 0018
Process swapper (pid: 1, stackpage=effe9000)
Stack: c0105000 c04a05f0 c0456748 c03cb3b9 c0105053 00000000 00010f00 c0455fd0
c0105000 0008e000 c01057be 00000000 c0105040 00090200
Call Trace: [<c0105000>] [<c0105053>] [<c0105000>] [<c01057be>] [<c0105040>]
Code: ff 40 10 a1 50 01 45 c0 83 48 14 18 a1 38 01 45 c0 ff 40 10
>>EIP; c0474fc9 <init+9/80> <=====
>>ebx; c04a05f0 <__initcall_init+0/4>
>>edx; c04a9a88 <irq_stat+8/40>
>>edi; c0105000 <_stext+0/0>
Trace; c0105000 <_stext+0/0>
Trace; c0105053 <init+13/140>
Trace; c0105000 <_stext+0/0>
Trace; c01057be <kernel_thread+2e/40>
Trace; c0105040 <init+0/140>
Code; c0474fc9 <init+9/80>
00000000 <_EIP>:
Code; c0474fc9 <init+9/80> <=====
0: ff 40 10 incl 0x10(%eax) <=====
Code; c0474fcc <init+c/80>
3: a1 50 01 45 c0 mov 0xc0450150,%eax
Code; c0474fd1 <init+11/80>
8: 83 48 14 18 orl $0x18,0x14(%eax)
Code; c0474fd5 <init+15/80>
c: a1 38 01 45 c0 mov 0xc0450138,%eax
Code; c0474fda <init+1a/80>
11: ff 40 10 incl 0x10(%eax)
fuzzy.patch ALREADY APPLIED (0 rejects out of 2 hunks).
iplimit.patch NOT APPLIED ( 2 missing files)
ipt_unclean-ubit.patch NOT APPLIED (1 rejects out of 1 hunks)
ipv4options.patch NOT APPLIED ( 2 missing files)
IPV4OPTSSTRIP.patch NOT APPLIED ( 1 missing files)
mport.patch ALREADY APPLIED (0 rejects out of 2 hunks).
NETLINK.patch NOT APPLIED ( 2 missing files)
NETMAP.patch NOT APPLIED ( 1 missing files)
nth.patch ALREADY APPLIED (0 rejects out of 2 hunks).
pool.patch NOT APPLIED ( 5 missing files)
psd.patch NOT APPLIED ( 2 missing files)
quota.patch ALREADY APPLIED (0 rejects out of 2 hunks).
random.patch ALREADY APPLIED (0 rejects out of 2 hunks).
realm.patch NOT APPLIED ( 2 missing files)
SAME.patch ALREADY APPLIED (0 rejects out of 2 hunks).
time.patch NOT APPLIED ( 2 missing files)
TTL.patch NOT APPLIED ( 2 missing files)
u32.patch ALREADY APPLIED (0 rejects out of 2 hunks).
amanda-conntrack-nat.patch NOT APPLIED ( 3 missing files)
condition.patch NOT APPLIED ( 2 missing files)
CONNMARK.patch ALREADY APPLIED (0 rejects out of 7 hunks).
eggdrop-conntrack.patch NOT APPLIED ( 1 missing files)
h323-conntrack-nat.patch ALREADY APPLIED (0 rejects out of 3 hunks).
ip_conntrack-timeouts.patch NOT APPLIED ( 1 missing files)
ip_tables-proc.patch ALREADY APPLIED (0 rejects out of 5 hunks).
ipt_TARPIT.patch NOT APPLIED ( 1 missing files)
mms-conntrack-nat.patch ALREADY APPLIED (0 rejects out of 3 hunks).
netfilter-docbook.patch ALREADY APPLIED (0 rejects out of 33 hunks).
nfnetlink-ctnetlink-0.11.patch NOT APPLIED ( 4 missing files)
pptp-conntrack-nat.patch NOT APPLIED ( 8 missing files)
quake3-conntrack.patch NOT APPLIED ( 3 missing files)
recent.patch ALREADY APPLIED (0 rejects out of 2 hunks).
ROUTE.patch NOT APPLIED ( 2 missing files)
rpc.patch ALREADY APPLIED (0 rejects out of 5 hunks).
rsh.patch NOT APPLIED ( 2 missing files)
string.patch ALREADY APPLIED (0 rejects out of 2 hunks).
talk-conntrack-nat.patch NOT APPLIED ( 3 missing files)
tcp-window-tracking.patch ALREADY APPLIED (0 rejects out of 32 hunks).
tftp-conntrack-nat.patch ALREADY APPLIED (0 rejects out of 3 hunks).
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.