[Bug 528] New: OOPS: nf_nat + device removal
bugzilla-daemon at bugzilla.netfilter.org
bugzilla-daemon at bugzilla.netfilter.org
Tue Jan 2 22:40:34 CET 2007
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=528
Summary: OOPS: nf_nat + device removal
Product: netfilter/iptables
Version: linux-2.6.x
Platform: i386
OS/Version: All
Status: NEW
Severity: critical
Priority: P2
Component: nf_conntrack
AssignedTo: yasuyuki.kozakai at toshiba.co.jp
ReportedBy: berni at birkenwald.de
[ I sent this by mail to netfilter-devel a few hours ago but it did not come
through yet ]
On 2.6.20-rc3 with nf_nat the following kernel OOPS appears when my PPPoE device
is killed (regular 24h disconnect or manual disconnect by killing pppd)
heimdall:~# killall -HUP pppd
heimdall:~# Oops: 0000 [#1]
Modules linked in: sit sch_red sch_htb pppoe pppox ppp_generic slhc xt_CLASSIFY
ipt_TOS xt_length ipt_tos ipt_TCPMSS xt_tcpudp ipt_MASQUERADE xt_state iptabk
CPU: 0
EIP: 0060:[<ce89807c>] Not tainted VLI
EFLAGS: 00010206 (2.6.20-rc3 #2)
EIP is at device_cmp+0x1c/0x30 [ipt_MASQUERADE]
eax: cd27e000 ebx: 00000000 ecx: cdf491e0 edx: 00000004
esi: 00000004 edi: 00000128 ebp: 00000025 esp: cd27fe98
ds: 007b es: 007b ss: 0068
Process pppd (pid: 1855, ti=cd27e000 task=cde26a70 task.ti=cd27e000)
Stack: ccc3f64c ccc3f684 ce823972 00000004 ce898060 ce8b9e40 ce898778 ccc83400
00000002 ce898052 c0119b19 ccc83400 000010d0 00001291 cd00c48c c021743c
ccc83400 c0216a3a ccf99be0 cd27ff21 ccf99c0c cd00c48c c0250d13 cd27ff3c
Call Trace:
[<ce823972>] nf_ct_iterate_cleanup+0x62/0xe0 [nf_conntrack]
[<ce898060>] device_cmp+0x0/0x30 [ipt_MASQUERADE]
[<ce898052>] masq_device_event+0x12/0x20 [ipt_MASQUERADE]
[<c0119b19>] notifier_call_chain+0x19/0x30
[<c021743c>] dev_close+0x5c/0x60
[<c0216a3a>] dev_change_flags+0x4a/0xf0
[<c0250d13>] devinet_ioctl+0x223/0x560
[<c020df75>] sock_ioctl+0x195/0x1c0
[<c028019a>] schedule+0x48a/0x4f0
[<c020dde0>] sock_ioctl+0x0/0x1c0
[<c014a3f9>] do_ioctl+0x19/0x50
[<c014a60b>] vfs_ioctl+0x1db/0x1f0
[<c014a655>] sys_ioctl+0x35/0x50
[<c01028c0>] syscall_call+0x7/0xb
=======================
Code: ff 31 c0 c3 8d 74 26 00 8d bc 27 00 00 00 00 56 53 89 d6 f6 80 9c 00 00 00
02 75 04 31 db eb 06 8d 98 d8 00 00 00 e8 14 b7 87 f1 <39> 73 1c 0f 94 c0 0
EIP: [<ce89807c>] device_cmp+0x1c/0x30 [ipt_MASQUERADE] SS:ESP 0068:cd27fe98
<0>Kernel panic - not syncing: Fatal exception in interrupt
<0>Rebooting in 20 seconds..<4>atkbd.c: Spurious ACK on isa0060/serio0. Some
program might be trying access hardware directly.
The rules are pretty much basic, some port forwardings using DNAT, MASQUERADE
for connections going out to ppp0, stateful filters for IPv4. An IPv6-in-IPv4 is
configured as well for IPv6 connectivity.
Regards,
Bernhard
--
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the netfilter-buglog
mailing list