[Bug 22] Linux kernel crashes when incoming/outgoing interfaces differ

bugzilla-daemon@netfilter.org bugzilla-daemon@netfilter.org
Fri, 07 Mar 2003 09:09:45 +0100


https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=22

bowles@ambisys.com changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|RESOLVED                    |REOPENED
         Resolution|FIXED                       |



------- Additional Comments From bowles@ambisys.com  2003-03-07 09:09 -------
Hmm... I'm getting a different kernel oops when the 2.4 patch is applied.

This time my setup is simple: an ADSL PPPoE connection with MSS clamping at 1412
bytes.  The default iptables policy is REJECT.  Telnetting to the box will cause
a TCP reset to be generated, and this causes the OOPS.

I tried the same procedure using an unpatched kernel and the OOPS didn't occur.

Kernel: 2.4.21-pre5
iptables patch-o-matic 20030112 with "23_REJECT-headroom-tcprst.patch"

---

Unable to handle kernel paging request at virtual address 5a5a5a6a
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<d01ad12a>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246
eax: 5a5a5a5a   ebx: 00000000   ecx: c13c9e08   edx: 5a5a5a5a
esi: 00000000   edi: c8e7db14   ebp: c02ebd68   esp: c02ebd24
ds: 0018   es: 0018   ss: 0018
Process swapper (pid: 0, stackpage=c02eb000)
Stack: c02ebd48 0000001c d01bd9a6 c13c9e08 c13c9e08 00000001 d01d28f4 cc0ee200
       cc0ee200 c02ebd78 d01bd796 d01bdae3 d01d2914 c13c9df4 d01d3cbc d01d3c4c
       00000002 c02ebd78 d01ad918 c8e7db14 00000000 c02ebddc d0068398 c02ebe70
Call Trace:    [<d01bd9a6>] [<d01bd796>] [<d01bdae3>] [<d01ad918>] [<d0068398>]
  [<d006b138>] [<d006b138>] [<d006d638>] [<d006d07f>] [<d006d5e0>] [<c022035b>]
  [<c022d2c0>] [<c02206aa>] [<c022d2c0>] [<d006d638>] [<c022d25c>] [<c022d2c0>]
  [<c022c51d>] [<c02206eb>] [<c022c16e>] [<c022c350>] [<c021a34c>] [<c021a473>]
  [<c021a593>] [<c011c16a>] [<c010a35c>] [<c0107140>] [<c010c7f8>] [<c0107140>]
  [<c0107167>] [<c01071e2>] [<c0105000>]
Code: 8b 4a 10 74 03 8b 5a 0c 8a 40 01 89 5d d8 83 e0 1e 89 4d d4

>>EIP; d01ad12a <[ipt_REJECT]send_reset+aa/3f0>   <=====

>>ecx; c13c9e08 <_end+109c150/fcdf3a8>
>>edi; c8e7db14 <_end+8b4fe5c/fcdf3a8>
>>ebp; c02ebd68 <init_task_union+1d68/2000>
>>esp; c02ebd24 <init_task_union+1d24/2000>

Trace; d01bd9a6 <[ipt_LOG].text.end+b6/204>
Trace; d01bd796 <[ipt_LOG]ipt_log_target+d6/1b0>
Trace; d01bdae3 <[ipt_LOG].text.end+1f3/204>
Trace; d01ad918 <[ipt_REJECT]reject+68/70>
Trace; d0068398 <[ip_tables]ipt_do_table+308/430>
Trace; d006b138 <[ip_tables]__kstrtab_ipt_register_table+0/0>
Trace; d006b138 <[ip_tables]__kstrtab_ipt_register_table+0/0>
Trace; d006d638 <[iptable_filter]ipt_ops+18/48>
Trace; d006d07f <[iptable_filter]ipt_hook+1f/30>
Trace; d006d5e0 <[iptable_filter]packet_filter+0/40>
Trace; c022035b <nf_iterate+4b/a0>
Trace; c022d2c0 <ip_forward_finish+0/50>
Trace; c02206aa <nf_hook_slow+8a/1a0>
Trace; c022d2c0 <ip_forward_finish+0/50>
Trace; d006d638 <[iptable_filter]ipt_ops+18/48>
Trace; c022d25c <ip_forward+1ac/210>
Trace; c022d2c0 <ip_forward_finish+0/50>
Trace; c022c51d <ip_rcv_finish+1cd/230>
Trace; c02206eb <nf_hook_slow+cb/1a0>
Trace; c022c16e <ip_rcv+16e/1f0>
Trace; c022c350 <ip_rcv_finish+0/230>
Trace; c021a34c <netif_receive_skb+11c/1d0>
Trace; c021a473 <process_backlog+73/130>
Trace; c021a593 <net_rx_action+63/110>
Trace; c011c16a <do_softirq+aa/b0>
Trace; c010a35c <do_IRQ+bc/e0>
Trace; c0107140 <default_idle+0/40>
Trace; c010c7f8 <call_do_IRQ+5/d>
Trace; c0107140 <default_idle+0/40>
Trace; c0107167 <default_idle+27/40>
Trace; c01071e2 <cpu_idle+42/60>
Trace; c0105000 <_stext+0/0>

Code;  d01ad12a <[ipt_REJECT]send_reset+aa/3f0>
00000000 <_EIP>:
Code;  d01ad12a <[ipt_REJECT]send_reset+aa/3f0>   <=====
   0:   8b 4a 10                  mov    0x10(%edx),%ecx   <=====
Code;  d01ad12d <[ipt_REJECT]send_reset+ad/3f0>
   3:   74 03                     je     8 <_EIP+0x8> d01ad132 <[ipt_REJECT]send
_reset+b2/3f0>
Code;  d01ad12f <[ipt_REJECT]send_reset+af/3f0>
   5:   8b 5a 0c                  mov    0xc(%edx),%ebx
Code;  d01ad132 <[ipt_REJECT]send_reset+b2/3f0>
   8:   8a 40 01                  mov    0x1(%eax),%al
Code;  d01ad135 <[ipt_REJECT]send_reset+b5/3f0>
   b:   89 5d d8                  mov    %ebx,0xffffffd8(%ebp)
Code;  d01ad138 <[ipt_REJECT]send_reset+b8/3f0>
   e:   83 e0 1e                  and    $0x1e,%eax
Code;  d01ad13b <[ipt_REJECT]send_reset+bb/3f0>
  11:   89 4d d4                  mov    %ecx,0xffffffd4(%ebp)

 <0>Kernel panic: Aiee, killing interrupt handler!




------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.