netfilter.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Kernel panic
@ 2003-04-16 12:45 Allshouse, Brian M (Sabre)
  0 siblings, 0 replies; 7+ messages in thread
From: Allshouse, Brian M (Sabre) @ 2003-04-16 12:45 UTC (permalink / raw)
  To: 'netfilter@lists.netfilter.org'

I'm having problems with kernel panics. I set up my firewall with the
latest and greatest version of iptables and the latest stable kernel. I'm
running slackware 8.1, and ever since I put it on the network for testing I
get kernel panics that crash the machine I tried the previous kernel
version (2.4.18) and also tried the latest patches for Iptables. I posted 
this problem here a few weeks ago and someone suggested using ksymoops to 
track down what is causing the kernel panic. I finally have been able to do
that, but not being a kernel programmer I don't know what to make of it. I'm
pasting the output from ksymoops below. If anyone knows what to make of this
or where I can find out what this means I would greatly appreciate it. I'm
on 
the verge of missing my deadline to have this box in place. Thanks.

<-------------------------Start ksymoops
output----------------------------------------->

ksymoops 2.4.9 on i586 2.4.20.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.20/ (default)
     -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c0272a86>]   Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax:  00000080  ebx:  00000000  ecx:  7354e5cc  edx:  000007ff
esi:  0000008c  edi:  ffffffea  ebp:  c0351e5c  esp:  c0351e0c
ds:  0018  es:  0018 ss:  0018
Process swapper (pid: 0, stackpage=c0351000)
Stack: 00000000 00000002 5750e58c 00000000 00000000 000004e8 00000000
00000000
       cb8fb990 cb8fb990 00000000 7d56e58c 00000000 fd010015 cb919920
5750e58c
       7354e48c 00000002 00000000 00000000 7354e58c c0272fbc cbe1cee0
5750e58c
Call Trace:   [<c0272fbc>] [<c0290c4b>] [<c026cf4a>] [<c0290f8f>]
[<c029aa8f>]
 [<c026745b>] [<c02674ee>] [<c0267604>] [<c0119c5a>] [<c0109aae>]
[<c0106d00>]
 [<c010bf38>] [<c0106d00>] [<c0106d23>] [<c0106d87>] [<c0105000>]
[<c0105027>]
Code: 03 00 83 f8 7f 0f 84 f0 03 00 00 8d 7d ec 8d 5d e4 a1 bc


>>EIP; c0272a86 <ip_route_input_slow+12e/558>   <=====

>>ebp; c0351e5c <init_task_union+1e5c/2000>
>>esp; c0351e0c <init_task_union+1e0c/2000>

Trace; c0272fbc <ip_route_input+10c/114>
Trace; c0290c4b <arp_process+1a3/44c>
Trace; c026cf4a <nf_hook_slow+132/188>
Trace; c0290f8f <arp_rcv+9b/c4>
Trace; c029aa8f <unix_dgram_sendmsg+35f/364>
Trace; c026745b <netif_receive_skb+14f/178>
Trace; c02674ee <process_backlog+6a/110>
Trace; c0267604 <net_rx_action+70/114>
Trace; c0119c5a <do_softirq+5a/a4>
Trace; c0109aae <do_IRQ+96/a8>
Trace; c0106d00 <default_idle+0/28>
Trace; c010bf38 <call_do_IRQ+5/d>
Trace; c0106d00 <default_idle+0/28>
Trace; c0106d23 <default_idle+23/28>
Trace; c0106d87 <cpu_idle+3f/54>
Trace; c0105000 <_stext+0/0>
Trace; c0105027 <rest_init+27/28>

Code;  c0272a86 <ip_route_input_slow+12e/558>
00000000 <_EIP>:
Code;  c0272a86 <ip_route_input_slow+12e/558>   <=====
   0:   03 00                     add    (%eax),%eax   <=====
Code;  c0272a88 <ip_route_input_slow+130/558>
   2:   83 f8 7f                  cmp    $0x7f,%eax
Code;  c0272a8b <ip_route_input_slow+133/558>
   5:   0f 84 f0 03 00 00         je     3fb <_EIP+0x3fb> c0272e81
<ip_route_input_slow+529/558>
Code;  c0272a91 <ip_route_input_slow+139/558>
   b:   8d 7d ec                  lea    0xffffffec(%ebp),%edi
Code;  c0272a94 <ip_route_input_slow+13c/558>
   e:   8d 5d e4                  lea    0xffffffe4(%ebp),%ebx
Code;  c0272a97 <ip_route_input_slow+13f/558>
  11:   a1 bc 00 00 00            mov    0xbc,%eax

 <0>Kernel panic: Aiee, killing interrupt handler!

1 warning issued.  Results may not be reliable.

<----------------------------------End ksymoops
output------------------------------------------->



Sincerely,

Brian Allshouse
UNIX Systems Administrator
Sabre Systems Inc.
mailto:allshousebm@navair.navy.mil
(301) 342-7034



^ permalink raw reply	[flat|nested] 7+ messages in thread

* kernel panic
@ 2006-03-31  4:31 Samuel Díaz García
  2006-04-01  6:21 ` Samuel Díaz García
  0 siblings, 1 reply; 7+ messages in thread
From: Samuel Díaz García @ 2006-03-31  4:31 UTC (permalink / raw)
  To: netfilter

Iptables 1.3.5
kernel 2.6.15.6

Any help?

Mar 30 00:31:01 fraile kernel: [17181150.312000] ip_nat_pptp version 3.0 
unloaded
Mar 30 00:31:01 fraile kernel: [17181150.492000] ctnetlink: 
unregistering from nfnetlink.
Mar 30 00:31:01 fraile kernel: [17181150.524000] ip_conntrack_pptp 
version 3.1 unloaded
Mar 30 00:31:01 fraile kernel: [17181150.688000] ctnetlink v0.90: 
registering with nfnetlink.
Mar 30 00:31:01 fraile kernel: [17181150.688000] Unable to handle kernel 
paging request at virtual address e0c76e54
Mar 30 00:31:01 fraile kernel: [17181150.688000]  printing eip:
Mar 30 00:31:01 fraile kernel: [17181150.688000] c012a309
Mar 30 00:31:01 fraile kernel: [17181150.688000] *pde = 1c9ac067
Mar 30 00:31:01 fraile kernel: [17181150.688000] Oops: 0000 [#1]
Mar 30 00:31:01 fraile kernel: [17181150.688000] Modules linked in: 
ip_conntrack_netlink ip_conntrack_netbios_ns ip_conntrack_irc 
ip_conntrack_h323 ip_conntrack_ftp ip_conntrack_amanda ipt_ipp2p 
parport_pc lp parport ipt_mac ipt_connlimit iptable_filter 
ipt_MASQUERADE iptable_nat ip_nat ipt_layer7 ipt_state ipt_MARK ipt_mark 
ipt_CONNMARK ip_conntrack nfnetlink ipt_comment iptable_mangle ip_tables 
police autofs4 it87 hwmon_vid hwmon eeprom i2c_isa bluetooth sunrpc 
dm_mod video thermal processor fan container button battery ac ohci_hcd 
shpchp i2c_sis630 i2c_sis96x i2c_core snd_intel8x0 snd_ac97_codec 
snd_ac97_bus snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq 
snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd soundcore 
snd_page_alloc sis900 8139too 3c59x mii floppy ext3 jbd aacraid sd_mod 
scsi_mod
Mar 30 00:31:01 fraile kernel: [17181150.688000] CPU:    0
Mar 30 00:31:01 fraile kernel: [17181150.688000] EIP: 
0060:[<c012a309>]    Tainted: GF     VLI
Mar 30 00:31:01 fraile kernel: [17181150.688000] EFLAGS: 00010282 
(2.6.15.6-ArcosCom)
Mar 30 00:31:01 fraile kernel: [17181150.688000] EIP is at 
notifier_chain_register+0x19/0x50
Mar 30 00:31:01 fraile kernel: [17181150.688000] eax: e0c76e4c   ebx: 
e0c114c0   ecx: ffffffff   edx: 00000000
Mar 30 00:31:01 fraile kernel: [17181150.688000] esi: e0c40e4c   edi: 
0805e218   ebp: d174e000   esp: d174ff8c
Mar 30 00:31:02 fraile kernel: [17181150.688000] ds: 007b   es: 007b 
ss: 0068
Mar 30 00:31:02 fraile kernel: [17181150.688000] Process modprobe (pid: 
4432, threadinfo=d174e000 task=d363f570)
Mar 30 00:31:02 fraile kernel: [17181150.688000] Stack: 00000000 
0805e1f8 e0c2a05c e0c3f4c4 e0c2a0db e0c40f00 c0138a87 b7e9c008
Mar 30 00:31:02 fraile kernel: [17181150.688000]        0805e1f8 
b7e9c008 0805e1f8 c0103055 b7e9c008 00034380 0805e1f8 0805e1f8
Mar 30 00:31:02 fraile kernel: [17181150.688000]        0805e218 
bfd130b8 ffffffda 0000007b 0000007b 00000080 ffffe410 00000073
Mar 30 00:31:02 fraile kernel: [17181150.688000] Call Trace:
Mar 30 00:31:02 fraile kernel: [17181150.688000]  [<e0c2a05c>] 
ctnetlink_init+0x5c/0xdb [ip_conntrack_netlink]
Mar 30 00:31:02 fraile kernel: [17181150.688000]  [<c0138a87>] 
sys_init_module+0xc7/0x1d0
Mar 30 00:31:02 fraile kernel: [17181150.688000]  [<c0103055>] 
syscall_call+0x7/0xb
Mar 30 00:31:03 fraile kernel: [17181150.688000] Code: 00 e8 5c 54 24 00 
b8 fe fd ff ff c3 90 90 90 90 90 90 56 89 d6 53 89 c3 b8 18 3c 3d c0 e8 
70 6b 24 00 8b 03 85 c0 74 1a 8b 56 08 <3b> 50 08 7f 12 89 f6 8d 58 04 
8b 40 04 85 c0 74 06 39 50 08 7d
Mar 30 00:31:03 fraile kernel: [17181150.688000]  ip_conntrack_pptp 
version 3.1 loaded
Mar 30 00:31:03 fraile kernel: [17181150.840000] ip_nat_pptp version 3.0 
loaded
Mar 30 00:31:30 fraile kernel: [17181179.176000] ip_nat_pptp version 3.0 
unloaded
Mar 30 00:31:30 fraile kernel: [17181179.388000] ip_conntrack_pptp 
version 3.1 unloaded
Mar 30 00:31:30 fraile kernel: [17181179.556000] ip_conntrack_pptp 
version 3.1 loaded


-- 
    Samuel Díaz García


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: kernel panic
  2006-03-31  4:31 Samuel Díaz García
@ 2006-04-01  6:21 ` Samuel Díaz García
  0 siblings, 0 replies; 7+ messages in thread
From: Samuel Díaz García @ 2006-04-01  6:21 UTC (permalink / raw)
  To: Samuel Díaz García; +Cc: netfilter

Any idea at least?

Samuel Díaz García escribió:
> Iptables 1.3.5
> kernel 2.6.15.6
> 
> Any help?
> 
> Mar 30 00:31:01 fraile kernel: [17181150.312000] ip_nat_pptp version 3.0 
> unloaded
> Mar 30 00:31:01 fraile kernel: [17181150.492000] ctnetlink: 
> unregistering from nfnetlink.
> Mar 30 00:31:01 fraile kernel: [17181150.524000] ip_conntrack_pptp 
> version 3.1 unloaded
> Mar 30 00:31:01 fraile kernel: [17181150.688000] ctnetlink v0.90: 
> registering with nfnetlink.
> Mar 30 00:31:01 fraile kernel: [17181150.688000] Unable to handle kernel 
> paging request at virtual address e0c76e54
> Mar 30 00:31:01 fraile kernel: [17181150.688000]  printing eip:
> Mar 30 00:31:01 fraile kernel: [17181150.688000] c012a309
> Mar 30 00:31:01 fraile kernel: [17181150.688000] *pde = 1c9ac067
> Mar 30 00:31:01 fraile kernel: [17181150.688000] Oops: 0000 [#1]
> Mar 30 00:31:01 fraile kernel: [17181150.688000] Modules linked in: 
> ip_conntrack_netlink ip_conntrack_netbios_ns ip_conntrack_irc 
> ip_conntrack_h323 ip_conntrack_ftp ip_conntrack_amanda ipt_ipp2p 
> parport_pc lp parport ipt_mac ipt_connlimit iptable_filter 
> ipt_MASQUERADE iptable_nat ip_nat ipt_layer7 ipt_state ipt_MARK ipt_mark 
> ipt_CONNMARK ip_conntrack nfnetlink ipt_comment iptable_mangle ip_tables 
> police autofs4 it87 hwmon_vid hwmon eeprom i2c_isa bluetooth sunrpc 
> dm_mod video thermal processor fan container button battery ac ohci_hcd 
> shpchp i2c_sis630 i2c_sis96x i2c_core snd_intel8x0 snd_ac97_codec 
> snd_ac97_bus snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq 
> snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd soundcore 
> snd_page_alloc sis900 8139too 3c59x mii floppy ext3 jbd aacraid sd_mod 
> scsi_mod
> Mar 30 00:31:01 fraile kernel: [17181150.688000] CPU:    0
> Mar 30 00:31:01 fraile kernel: [17181150.688000] EIP: 
> 0060:[<c012a309>]    Tainted: GF     VLI
> Mar 30 00:31:01 fraile kernel: [17181150.688000] EFLAGS: 00010282 
> (2.6.15.6-ArcosCom)
> Mar 30 00:31:01 fraile kernel: [17181150.688000] EIP is at 
> notifier_chain_register+0x19/0x50
> Mar 30 00:31:01 fraile kernel: [17181150.688000] eax: e0c76e4c   ebx: 
> e0c114c0   ecx: ffffffff   edx: 00000000
> Mar 30 00:31:01 fraile kernel: [17181150.688000] esi: e0c40e4c   edi: 
> 0805e218   ebp: d174e000   esp: d174ff8c
> Mar 30 00:31:02 fraile kernel: [17181150.688000] ds: 007b   es: 007b ss: 
> 0068
> Mar 30 00:31:02 fraile kernel: [17181150.688000] Process modprobe (pid: 
> 4432, threadinfo=d174e000 task=d363f570)
> Mar 30 00:31:02 fraile kernel: [17181150.688000] Stack: 00000000 
> 0805e1f8 e0c2a05c e0c3f4c4 e0c2a0db e0c40f00 c0138a87 b7e9c008
> Mar 30 00:31:02 fraile kernel: [17181150.688000]        0805e1f8 
> b7e9c008 0805e1f8 c0103055 b7e9c008 00034380 0805e1f8 0805e1f8
> Mar 30 00:31:02 fraile kernel: [17181150.688000]        0805e218 
> bfd130b8 ffffffda 0000007b 0000007b 00000080 ffffe410 00000073
> Mar 30 00:31:02 fraile kernel: [17181150.688000] Call Trace:
> Mar 30 00:31:02 fraile kernel: [17181150.688000]  [<e0c2a05c>] 
> ctnetlink_init+0x5c/0xdb [ip_conntrack_netlink]
> Mar 30 00:31:02 fraile kernel: [17181150.688000]  [<c0138a87>] 
> sys_init_module+0xc7/0x1d0
> Mar 30 00:31:02 fraile kernel: [17181150.688000]  [<c0103055>] 
> syscall_call+0x7/0xb
> Mar 30 00:31:03 fraile kernel: [17181150.688000] Code: 00 e8 5c 54 24 00 
> b8 fe fd ff ff c3 90 90 90 90 90 90 56 89 d6 53 89 c3 b8 18 3c 3d c0 e8 
> 70 6b 24 00 8b 03 85 c0 74 1a 8b 56 08 <3b> 50 08 7f 12 89 f6 8d 58 04 
> 8b 40 04 85 c0 74 06 39 50 08 7d
> Mar 30 00:31:03 fraile kernel: [17181150.688000]  ip_conntrack_pptp 
> version 3.1 loaded
> Mar 30 00:31:03 fraile kernel: [17181150.840000] ip_nat_pptp version 3.0 
> loaded
> Mar 30 00:31:30 fraile kernel: [17181179.176000] ip_nat_pptp version 3.0 
> unloaded
> Mar 30 00:31:30 fraile kernel: [17181179.388000] ip_conntrack_pptp 
> version 3.1 unloaded
> Mar 30 00:31:30 fraile kernel: [17181179.556000] ip_conntrack_pptp 
> version 3.1 loaded
> 
> 

-- 
    Samuel Díaz García


^ permalink raw reply	[flat|nested] 7+ messages in thread

* kernel panic
@ 2006-09-07 16:42 Miha Verlic
  0 siblings, 0 replies; 7+ messages in thread
From: Miha Verlic @ 2006-09-07 16:42 UTC (permalink / raw)
  To: netfilter

Hello,

today one of the servers I administer crashed for the third time due to 
kernel panic. Folks at colocation site provided me with the following 
"screenshot": http://miha.krneki.org/netfilter/kernelpanic.jpg

I'm not sure whether this is related with netfilter/iptables, tg3 or 
something else, but the screenshot is full of netfilter messagess, so I 
tried this list first.

Funny thing is that /proc/sys/kernel/panic was set to 60 seconds, yet 
the machine did not reboot itself after the crash and colocation people 
said machine was not responding to keyboard, so they could not provide 
the whole trace.

Another interesting thing - machine is heavily loaded (apache+php+mysql) 
- pushing around 35-45mbit/s througout the whole day. After midnight 
utilization gets very low and yet all 3 crashes occured at around 2AM 
local time. There are no cron scripts at that time that would cause any 
cpu/network hammering, system is virtually idle.

Server is Dual Opteron 250 with 4gb ECC RAM and Adaptec 2015S SCSI 
controller (2x RAID1).

At the time of crash, system was using:
OS: (32bit) slackware-based with:
glibc 2.3.6 (NPTL), gcc 3.3.6,
iptables 1.3.4 (upgraded to 1.3.5 after crash)
kernel 2.6.17.8 with the following patches:
   - grsecurity 2.1.9 (200608012135)
   - dpt_i2o-2.5.0-2426 driver from adaptec
SMP and PAE are enabled, config file is located at:
http://miha.krneki.org/netfilter/config-2.6.17.8+d1

If anyone has any clue, don't hesitate to contact me.

Cheers
--
Miha



^ permalink raw reply	[flat|nested] 7+ messages in thread

* kernel panic
@ 2006-09-25 12:32 Jacques Rodary
  0 siblings, 0 replies; 7+ messages in thread
From: Jacques Rodary @ 2006-09-25 12:32 UTC (permalink / raw)
  To: netfilter

Hi Miha
I first didn't see your post, and posted independently on the same
subject (with a typo). I have the same message than yours, but not
always, but it always ends with "Fatal exception in interrupt", includes
sometimes "common_interrupt+0x1a/0x20" and sometimes
"ip_nat_fn..[iptables_nat]". And I never had this before I used NAT on a
SMP box (2 dual-core Xeons).
Also in my logs I found these kernel errors: e1000: eth0: e1000_up:
Unable to allocate interrupt Error: -16 ...:  5 Time(s), but it's
perhaps unrelated.
Finally I can obtain this kernel panic by trying to connect to vncserver
from outside.

Have you got any answer? Thanks in advance.
	Jacques Rodary
P.S.: You Can see my config in the post Kernet (sic) panic with NAT.



^ permalink raw reply	[flat|nested] 7+ messages in thread

* kernel panic
@ 2010-05-17  8:55 senthilkumaar2021
  0 siblings, 0 replies; 7+ messages in thread
From: senthilkumaar2021 @ 2010-05-17  8:55 UTC (permalink / raw)
  To: netfilter

HI


I am using iptables version 1.43 and getting the following error in 
machine while using squid in tproxy.we are using Linux machine as bridge too

i was able to capture part of the error only please help me in solving 
the issue


  [<ffffffffa03933c2>] ? nf_nat_fn+0x138/0x14e [iptable_nat]
  [<ffffffffa0393585>] ? nf_nat_in+0x2f/0x6e [iptable_nat]
  [<ffffffffa027edaa>] ? br_nf_pre_routing_finish+0x0/
0x2c4 [bridge]
  [<ffffffffa027edfa>] br_nf_pre_routing_finish+0x50/
0x2c4 [bridge]
  [<ffffffffa027edaa>] ? br_nf_pre_routing_finish+0x0/0x2c4 [bridge]
  [<ffffffff81339a50>] ? nf_hook_slow+0x68/0xc8
  [<ffffffffa027edaa>] ? br_nf_pre_routing_finish+0x0/0x2c4 [bridge]
  [<ffffffffa027f616>] br_nf_pre_routing+0x5a8/0x5c7 [bridge]
  [<ffffffff813399ab>] nf_iterate+0x48/0x85
  [<ffffffffa027a931>] ? br_handle_frame_finish+0x0/0x154 [bridge]
  [<ffffffff81339a50>] nf_hook_slow+0x68/0xc8
  [<ffffffffa027a931>] ? br_handle_frame_finish+0x0/0x154 [bridge]
  [<ffffffffa027ac36>] br_handle_frame+0x1b1/0x1db [bridge]
  [<ffffffff8131d54b>] netif_receive_skb+0x316/0x434
  [<ffffffff8131dbfb>] napi_gro_receive+0x6e/0x83
  [<ffffffffa0125bfe>] e1000_receive_skb+0x5c/0x65 [e1000e]
  [<ffffffffa0125de8>] e1000_clean_rx_irq+0x1e1/0x28f [e1000e]
  [<ffffffffa012730e>] e1000_clean+0x99/0x24a [e1000e]
  [<ffffffff813bcfc5>] ? _spin_unlock_irqrestore+0x2c/0x43
  [<ffffffff8131ba62>] net_rx_action+0xb8/0x1b4
  [<ffffffff8104ed43>] __do_softirq+0x99/0x152
  [<ffffffff8101284c>] call_softirq+0x1c/0x30
  [<ffffffff81013a02>] do_softirq+0x52/0xb9
  [<ffffffff8104e969>] irq_exit+0x53/0x8d
  [<ffffffff81013d1a>] do_IRQ+0x135/0x157
  [<ffffffff81011f93>] ret_from_intr+0x0/0x2e
  <EOI> [<ffffffff81017e20>] ? mwait_idle+0x9e/0xc7
  [<ffffffff81017e17>] ? mwait_idle+0x95/0xc7
  [<ffffffff813bfd20>] ? atomic_notifier_call_chain+0x13/0x15
  [<ffffffff810102f4>] ? enter_idle+0x27/0x2>

  Regards
senthil

^ permalink raw reply	[flat|nested] 7+ messages in thread

* kernel panic
@ 2010-05-17  9:42 senthilkumaar2021
  0 siblings, 0 replies; 7+ messages in thread
From: senthilkumaar2021 @ 2010-05-17  9:42 UTC (permalink / raw)
  To: marek; +Cc: netfilter

Hi

Thanks for the reply

I was using kernel 2.6.28.5 and 2.6.30.5 but i got kernel panic in both 
versions

my iptable and ebtable are as follows

iptables -t mangle -N DIVERT
iptables -t mangle -A DIVERT -j MARK --set-mark 1
iptables -t mangle -A DIVERT -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY --tproxy-mark 0x1/0x1 --on-port 3129

 ebtables -t broute -A BROUTING -i $CLIENT_IFACE -p ipv4 --ip-proto tcp --ip-dport 80 -j redirect --redirect-target DROP

 ebtables -t broute -A BROUTING -i $INET_IFACE -p ipv4 --ip-proto tcp --ip-sport 80 -j redirect --redirect-target DROP

Regards
senthil

> Hi,
>
> >I am using iptables version 1.43 and getting the following error in
> >machine while using squid in tproxy.we are using Linux machine as
> >bridge too
> >i was able to capture part of the error only please help me in solving
> >the issue
>
> What kernel version are you using? I don't know if it's the same
> problem but I was experiencing kernel panic with tproxy in recent
> kernels if there were any traffic to port 80 to the box itself. I was
> able to workaround the problem using RETURN target on the local traffic
> before "-m socket" match and DIVERT target.
>
> XX.XX.XX.XX in the example is the local box address.
>
> My mangle starts this way:
>
>        IPTM="${IPT} -t mangle"
>        echo $" * Launching mangle RULEZ..."
>
>
>        # Setup a chain DIVERT to mark packets
>        $IPTM -N DIVERT
>        $IPTM -A DIVERT -j MARK --set-mark 1
>        $IPTM -A DIVERT -j ACCEPT
>
>        # Bez przekierowywania na proxy w przypadku polaczen do 
> lokalnego serwera www (videocache)
>        $IPTM -A PREROUTING -p tcp -d XX.XX.XX.XX --dport 80 -j ACCEPT
>
>        # Use DIVERT to prevent existing connections going through 
> TPROXY twice
>        $IPTM -A PREROUTING -p tcp -m socket -j DIVERT --dport 80       
> # regula dla ruchu klienci->swiat
>        $IPTM -A PREROUTING -p tcp -m socket -j DIVERT --sport 80
>
>
> Hope this helps.
>
> Best regards,
> Marek

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2010-05-17  9:42 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-09-25 12:32 kernel panic Jacques Rodary
  -- strict thread matches above, loose matches on Subject: below --
2010-05-17  9:42 senthilkumaar2021
2010-05-17  8:55 senthilkumaar2021
2006-09-07 16:42 Miha Verlic
2006-03-31  4:31 Samuel Díaz García
2006-04-01  6:21 ` Samuel Díaz García
2003-04-16 12:45 Kernel panic Allshouse, Brian M (Sabre)

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).