bugzilla-daemon at bugzilla.netfilter.org
2011-Apr-07 12:44 UTC
[Bug 714] New: Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 Summary: Kernel panics in same_src() Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: All Status: NEW Severity: normal Priority: P5 Component: NAT AssignedTo: netfilter-buglog at lists.netfilter.org ReportedBy: d.petuhov at electro-com.ru Estimated Hours: 0.0 Created an attachment (id=353) --> (http://bugzilla.netfilter.org/attachment.cgi?id=353) Kernel config Overview: NATing router server. 2x Intel Xeon X7550, 2x i82599 network adapters. Linux nat9 2.6.32.32 #1 SMP Fri Mar 25 12:32:45 MSK 2011 x86_64 GNU/Linux .config file attached Modules Loaded binfmt_misc ipt_NETFLOW ts_kmp xt_length ipt_REJECT xt_comment xt_state xt_string iptable_filter iptable_nat ip_tables x_tables ext2 nf_nat_pptp nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_proto_gre nf_nat_sip nf_conntrack_sip nf_nat_ftp nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack_ftp nf_conntrack ipmi_devintf ipmi_si ipmi_msghandler loop tpm_tis pcspkr i2c_i801 evdev joydev tpm psmouse processor button i2c_core serio_raw tpm_bios ext3 jbd mbcache dm_mod sd_mod crc_t10dif usbhid hid ahci libata igb scsi_mod uhci_hcd ehci_hcd ixgbe usbcore nls_base dca thermal thermal_sys Single -j SNAT --persistent rule. Related non-default sysctls: net.netfilter.nf_conntrack_max = 6000000 net.netfilter.nf_conntrack_count = 809342 net.netfilter.nf_conntrack_buckets = 1048576 Under some load (currently we have ~1.5+1.0 Gig/200+200kpps -- in+out -- on this server) kernel just panics. Here's some debug I've done on crash dump: crash> bt PID: 0 TASK: ffff88027f1e1560 CPU: 21 COMMAND: "swapper" #0 [ffff880010ba3520] machine_kexec at ffffffff8102a078 #1 [ffff880010ba3580] crash_kexec at ffffffff810952d8 #2 [ffff880010ba3650] oops_end at ffffffff813af0e0 #3 [ffff880010ba3680] no_context at ffffffff81034132 #4 [ffff880010ba36d0] __bad_area_nosemaphore at ffffffff810343b5 #5 [ffff880010ba3720] bad_area_nosemaphore at ffffffff81034483 #6 [ffff880010ba3730] do_page_fault at ffffffff813b0b24 #7 [ffff880010ba3780] page_fault at ffffffff813ae4ef [exception RIP: nf_nat_setup_info+1497] RIP: ffffffffa023bf19 RSP: ffff880010ba3830 RFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff88027a4325c8 RCX: ffff880277fc05f8 RDX: 0000000000000011 RSI: ffffffff816f27c0 RDI: 0000000000000011 RBP: ffff880010ba3910 R8: 0000000000004000 R9: 0000000036551144 R10: 0000000064c1f078 R11: ffff88027e3b8d38 R12: ffff88026b6ba950 R13: 0000000000000000 R14: ffffc9001363b744 R15: ffff880010ba3880 ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 #8 [ffff880010ba3878] do_IRQ at ffffffff813b2dc5 #9 [ffff880010ba3918] ipt_snat_target at ffffffffa02a611f #10 [ffff880010ba3928] ipt_do_table at ffffffffa029e16a #11 [ffff880010ba3ab8] nf_nat_rule_find at ffffffffa02a61d4 #12 [ffff880010ba3ad8] nf_nat_fn at ffffffffa02a6469 #13 [ffff880010ba3b28] nf_nat_out at ffffffffa02a6638 #14 [ffff880010ba3b48] nf_iterate at ffffffff812fd45c #15 [ffff880010ba3b98] nf_hook_slow at ffffffff812fd514 #16 [ffff880010ba3c08] ip_output at ffffffff8130b6f3 #17 [ffff880010ba3c38] ip_forward_finish at ffffffff81306cde #18 [ffff880010ba3c58] ip_forward at ffffffff81306ede #19 [ffff880010ba3c98] ip_rcv_finish at ffffffff81305125 #20 [ffff880010ba3cd8] ip_rcv at ffffffff813056ad #21 [ffff880010ba3d18] netif_receive_skb at ffffffff812d787a #22 [ffff880010ba3d78] napi_skb_finish at ffffffff812d7c68 #23 [ffff880010ba3d98] napi_gro_receive at ffffffff812d8179 #24 [ffff880010ba3db8] ixgbe_poll at ffffffffa00be1cc #25 [ffff880010ba3e68] net_rx_action at ffffffff812d830e #26 [ffff880010ba3ec8] __do_softirq at ffffffff8105c726 #27 [ffff880010ba3f38] call_softirq at ffffffff8100d15c #28 [ffff880010ba3f50] do_softirq at ffffffff8100e995 #29 [ffff880010ba3f70] irq_exit at ffffffff8105c205 #30 [ffff880010ba3f80] do_IRQ at ffffffff813b2dc5 --- <IRQ stack> --- #31 [ffff88047f0bfe38] ret_from_intr at ffffffff8100c9d3 [exception RIP: mwait_idle+113] RIP: ffffffff810140a1 RSP: ffff88047f0bfee8 RFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff88047f0bfef8 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88047f0bffd8 RDI: ffffffff8161f308 RBP: ffffffff8100c9ce R8: 0000000000000000 R9: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff88047f0bfef8 R13: ffffffff8100c9ce R14: ffffffff813abbf8 R15: ffff88047f0bfef8 ORIG_RAX: ffffffffffffff41 CS: 0010 SS: 0018 #32 [ffff88047f0bff00] cpu_idle at ffffffff8100ae7d gdb nf_nat.ko (gdb) l* nf_nat_setup_info+1497 0xf49 is in nf_nat_setup_info (net/ipv4/netfilter/nf_nat_core.c:135). 130 const struct nf_conntrack_tuple *tuple) 131 { 132 const struct nf_conntrack_tuple *t; 133 134 t = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; 135 return (t->dst.protonum == tuple->dst.protonum && 136 t->src.u3.ip == tuple->src.u3.ip && 137 t->src.u.all == tuple->src.u.all); 138 } 139 Steps to Reproduce: I don't really know. It happends in unpredictable periods of time (sometimes few days, sometimes few hours). If I can do or tell something else to help, just ask. -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Jun-01 00:05 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 Jan Engelhardt <jengelh at medozas.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |pablo at netfilter.org, | |jengelh at medozas.de -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Jun-27 19:46 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 Jan Engelhardt <jengelh at medozas.de> changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|netfilter- |pablo at netfilter.org |buglog at lists.netfilter.org | -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Aug-15 13:22 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 Dmitry Petuhov <d.petuhov at electro-com.ru> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |d.petuhov at electro-com.ru --- Comment #1 from Dmitry Petuhov <d.petuhov at electro-com.ru> 2011-08-15 15:22:04 --- Afer some tests I can say that bug appeared in kernel 2.6.32. 2.6.31.14 seems to be not affected. I have 21 crash dumps and debug version of their kernel. But they are approx. 200-400 megabytes each. If You wish I can attach some of them. -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Nov-17 19:10 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 --- Comment #2 from Dmitry Petuhov <d.petuhov at electro-com.ru> 2011-11-17 20:10:27 --- Bad news: seems like 2.6.31.14 also affected. kdump not works for this kernel so I just include kernel panic messsages collected via serizl console: First: BUG: unable to handle kernel NULL pointer dereference at 000000000000003e IP: [<ffffffff812da7c8>] nf_nat_setup_info+0x209/0x54d PGD 27cdfc067 PUD 27789c067 PMD 0 Oops: 0000 [#1] SMP last sysfs file: /sys/module/nf_conntrack/parameters/hashsize CPU 27 Modules linked in: ipv6 ipt_NETFLOW ts_kmp xt_length ipt_REJECT xt_comment xt_state xt_string iptable_filter nf_conntrack_netlink nfnetlink nf_nat_pptp nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_proto_gre nf_nat_sip nf_conntr ack_sip nf_nat_ftp nf_conntrack_ftp loop rtc_cmos i2c_i801 rtc_core button pcspkr joydev rtc_lib i2c_core serio_raw ext3 jbd dm_mod sd_mod igb ahci libata uhci_hcd ixgbe scsi_mod ehci_hcd dca [last unloaded: scsi_wait_scan] Pid: 0, comm: swapper Not tainted 2.6.31.14nat #1 X8QB6 RIP: 0010:[<ffffffff812da7c8>] [<ffffffff812da7c8>] nf_nat_setup_info+0x209/0x54d RSP: 0018:ffffc900036038b0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff88046534ccd0 RCX: 000000007bacdb3c RDX: 0000000000004000 RSI: 0000000000000000 RDI: ffffc90003603940 RBP: ffffc900036039a0 R08: ffff880478881b40 R09: ffff88045e55a04e R10: 000000007ffd2a8e R11: 0000000000000002 R12: ffff88047ac52c54 R13: 0000000000000000 R14: ffff880456d44390 R15: ffffc90003603910 FS: 0000000000000000(0000) GS:ffffc90003600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b CR2: 000000000000003e CR3: 000000047847a000 CR4: 00000000000006e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process swapper (pid: 0, threadinfo ffff88047f29a000, task ffff88027f2d57e0) Stack: ffffc90003603954 ffffc90003603924 ffffc90003603920 0000000000000100 <0> ffff88047ac52c60 ffff88047ac52c62 000030b8ff883b90 000030b8ff883b90 <0> 2f468ad5000240ab ffffc9000360cc40 ffff88047f29be28 0000000000000003 Call Trace: <IRQ> [<ffffffff8101e45c>] ? smp_apic_timer_interrupt+0x89/0x97 [<ffffffff812de512>] ipt_snat_target+0x1a/0x1c [<ffffffff812dc519>] ipt_do_table+0x323/0x39d [<ffffffff8129975d>] ? nf_conntrack_tuple_taken+0x12a/0x135 [<ffffffff812de598>] nf_nat_rule_find+0x18/0x54 [<ffffffff812de7b8>] nf_nat_fn+0x124/0x150 [<ffffffff812de8d3>] nf_nat_out+0x37/0xae [<ffffffff81297af6>] nf_iterate+0x41/0x84 [<ffffffff812aa66e>] ? ip_finish_output+0x0/0x27e [<ffffffff81297b9e>] nf_hook_slow+0x65/0xc6 [<ffffffff812aa66e>] ? ip_finish_output+0x0/0x27e [<ffffffff812aa986>] ip_output+0x9a/0xae [<ffffffff812a6edb>] ip_forward_finish+0x3f/0x43 [<ffffffff812a7199>] ip_forward+0x2ba/0x325 [<ffffffff812a5afc>] ip_rcv_finish+0x338/0x364 [<ffffffff812a5dc1>] ip_rcv+0x299/0x2d1 [<ffffffff8127c3c0>] netif_receive_skb+0x45e/0x483 [<ffffffff8127c529>] napi_skb_finish+0x24/0x38 [<ffffffff8127c96d>] napi_gro_receive+0x2a/0x2f [<ffffffffa004c9fc>] ixgbe_poll+0x91c/0xe50 [ixgbe] [<ffffffff8127ca78>] net_rx_action+0xa4/0x1a3 [<ffffffff810475e6>] __do_softirq+0xd2/0x19c [<ffffffff8100cb5c>] call_softirq+0x1c/0x28 [<ffffffff8100df20>] do_softirq+0x34/0x72 [<ffffffff81047017>] irq_exit+0x3f/0x41 [<ffffffff8100d60b>] do_IRQ+0xa0/0xb7 [<ffffffff8100c3d3>] ret_from_intr+0x0/0xa <EOI> [<ffffffff81011f41>] ? mwait_idle+0xb3/0xea [<ffffffff81312c48>] ? atomic_notifier_call_chain+0x13/0x15 [<ffffffff8100adac>] ? cpu_idle+0x48/0x86 [<ffffffff81308f8d>] ? start_secondary+0x195/0x199 Code: 38 ff ff ff 48 8b 95 30 ff ff ff 4c 89 ff ff 50 18 84 c0 0f 85 3a 03 00 00 4d 8b 36 4d 85 f6 74 17 49 8b 06 49 8b 76 20 0f 18 08 <8a> 46 3e 3a 45 c6 75 e6 e9 51 ff ff ff 48 8d bd 70 ff ff ff 48 RIP [<ffffffff812da7c8>] nf_nat_setup_info+0x209/0x54d RSP <ffffc900036038b0> CR2: 000000000000003e Second: BUG: unable to handle kernel NULL pointer dereference at 000000000000003e IP: [<ffffffff812da7c8>] nf_nat_setup_info+0x209/0x54d PGD 27c030067 PUD 2791e0067 PMD 0 Oops: 0000 [#1] SMP last sysfs file: /sys/module/nf_conntrack/parameters/hashsize CPU 23 Modules linked in: ipv6 ipt_NETFLOW ts_kmp xt_length ipt_REJECT xt_comment xt_state xt_string iptable_filter nf_conntrack_netlink nfnetlink nf_nat_pptp nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_proto_gre nf_nat_sip nf_conntr ack_sip nf_nat_ftp nf_conntrack_ftp loop rtc_cmos rtc_core button pcspkr serio_raw rtc_lib i2c_i801 joydev i2c_core ext3 jbd dm_mod sd_mod igb ahci libata ixgbe uhci_hcd scsi_mod ehci_hcd dca [last unloaded: scsi_wait_scan] Pid: 0, comm: swapper Not tainted 2.6.31.14nat #1 X8QB6 RIP: 0010:[<ffffffff812da7c8>] [<ffffffff812da7c8>] nf_nat_setup_info+0x209/0x54d RSP: 0018:ffffc90002e038b0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff88026b1528b0 RCX: 00000000502b84d3 RDX: 0000000000004000 RSI: 0000000000000000 RDI: ffffc90002e03940 RBP: ffffc90002e039a0 R08: ffff880478d1f240 R09: ffff8802520b604e R10: 000000007ffee284 R11: 0000000000000004 R12: ffff88027b85ac54 R13: 0000000000000000 R14: ffff88046548a290 R15: ffffc90002e03910 FS: 0000000000000000(0000) GS:ffffc90002e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b CR2: 000000000000003e CR3: 00000002791db000 CR4: 00000000000006e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process swapper (pid: 0, threadinfo ffff88047f266000, task ffff88027f2c4760) Stack: ffffc90002e03954 ffffc90002e03924 ffffc90002e038d0 0000000000000100 <0> ffff88027b85ac60 ffff88027b85ac62 00000000000000c1 ffff88027ed4a160 <0> 74e54cb20002898f ffff88027ed4a158 0000000000000282 ffffffff81492578 Call Trace: <IRQ> [<ffffffff812de512>] ipt_snat_target+0x1a/0x1c [<ffffffff812dc519>] ipt_do_table+0x323/0x39d [<ffffffff8129975d>] ? nf_conntrack_tuple_taken+0x12a/0x135 [<ffffffff812de598>] nf_nat_rule_find+0x18/0x54 [<ffffffff812de7b8>] nf_nat_fn+0x124/0x150 [<ffffffff812de8d3>] nf_nat_out+0x37/0xae [<ffffffff81297af6>] nf_iterate+0x41/0x84 [<ffffffff812aa66e>] ? ip_finish_output+0x0/0x27e [<ffffffff81297b9e>] nf_hook_slow+0x65/0xc6 [<ffffffff812aa66e>] ? ip_finish_output+0x0/0x27e [<ffffffff812aa986>] ip_output+0x9a/0xae [<ffffffff812a6edb>] ip_forward_finish+0x3f/0x43 [<ffffffff812a7199>] ip_forward+0x2ba/0x325 [<ffffffff812a5afc>] ip_rcv_finish+0x338/0x364 [<ffffffff812a5dc1>] ip_rcv+0x299/0x2d1 [<ffffffff8127c3c0>] netif_receive_skb+0x45e/0x483 [<ffffffff8127c529>] napi_skb_finish+0x24/0x38 [<ffffffff8127c96d>] napi_gro_receive+0x2a/0x2f [<ffffffffa00579fc>] ixgbe_poll+0x91c/0xe50 [ixgbe] [<ffffffff812999e7>] ? nf_conntrack_free+0x42/0x47 [<ffffffff810776a0>] ? softlockup_tick+0xaf/0x18f [<ffffffff8127ca78>] net_rx_action+0xa4/0x1a3 [<ffffffff810475e6>] __do_softirq+0xd2/0x19c [<ffffffff8100cb5c>] call_softirq+0x1c/0x28 [<ffffffff8100df20>] do_softirq+0x34/0x72 [<ffffffff81047017>] irq_exit+0x3f/0x41 [<ffffffff8100d60b>] do_IRQ+0xa0/0xb7 [<ffffffff8100c3d3>] ret_from_intr+0x0/0xa <EOI> [<ffffffff81011f41>] ? mwait_idle+0xb3/0xea [<ffffffff81312c48>] ? atomic_notifier_call_chain+0x13/0x15 [<ffffffff8100adac>] ? cpu_idle+0x48/0x86 [<ffffffff81308f8d>] ? start_secondary+0x195/0x199 Code: 38 ff ff ff 48 8b 95 30 ff ff ff 4c 89 ff ff 50 18 84 c0 0f 85 3a 03 00 00 4d 8b 36 4d 85 f6 74 17 49 8b 06 49 8b 76 20 0f 18 08 <8a> 46 3e 3a 45 c6 75 e6 e9 51 ff ff ff 48 8d bd 70 ff ff ff 48 RIP [<ffffffff812da7c8>] nf_nat_setup_info+0x209/0x54d RSP <ffffc90002e038b0> CR2: 000000000000003e -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Nov-19 05:41 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 --- Comment #3 from Dmitry Petuhov <d.petuhov at electro-com.ru> 2011-11-19 06:41:49 --- I will try to add some debugging like ----------------- --- nf_nat_core.c.orig 2011-03-08 02:18:15.000000000 +0300 +++ nf_nat_core.c 2011-11-19 09:25:28.000000000 +0400 @@ -132,6 +132,28 @@ const struct nf_conntrack_tuple *t; t = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; + if (tuple == NULL) { + printk(KERN_ERR "nf_nat_core: same_src: NULL tuple passed\n"); + return 0; + } + if (t == NULL) { + printk(KERN_ERR "nf_nat_core: same_src: NULL original tuple in ct " + "for proto %u srcaddr %u.%u.%u.%u dstaddr %u.%u.%u.%u" + "src port %u dst port %u\n", + tuple->dst.protonum, NIPQUAD(tuple->src.u3.ip), + NIPQUAD(tuple->dst.u3.ip),tuple->src.u.all,tuple->dst.u.all); + t = &ct->tuplehash[IP_CT_DIR_REPLY].tuple; + if (t == NULL) { + printk(KERN_ERR "nf_nat_core: same_src: also NULL reply tuple in ct\n"); + } else { + printk(KERN_ERR "nf_nat_core: same_src: reply tuple in ct: " + "proto %u srcaddr %u.%u.%u.%u dstaddr %u.%u.%u.%u" + "src port %u dst port %u\n", + t->dst.protonum, NIPQUAD(t->src.u3.ip), + NIPQUAD(t->dst.u3.ip),t->src.u.all,t->dst.u.all); + } + return 0; + } return (t->dst.protonum == tuple->dst.protonum && t->src.u3.ip == tuple->src.u3.ip && t->src.u.all == tuple->src.u.all); -------------------- to module to see what poiner is null. Can it be helpful? I'm bad C programmer, so it may look ugly or be completely useless... -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2012-Jan-11 06:44 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 --- Comment #4 from Dmitry Petuhov <d.petuhov at electro-com.ru> 2012-01-11 07:44:39 --- Seems like I accidentally fixed it. While debugging I deleted ``static'' and ``inline'' qualifiers from functions same_src() and find_appropriate_src() to take more informational backtraces on crash and... problem vanished. Almost 2 months no reboots. May it be some kind of kernel stack corrupion on IRQ while running inlined function? I've also rewrited same_src() as macros and testing it on 2 other servers. Still no issues, but they are less loaded. After next few moths of testing I'll likely submit patch. -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2012-Mar-07 12:58 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 --- Comment #5 from Dmitry Petuhov <d.petuhov at electro-com.ru> 2012-03-07 13:58:06 CET --- Created attachment 379 --> http://bugzilla.netfilter.org/attachment.cgi?id=379 Patch for 2.6.32.x Seems like this patch fixes problem. I dont know how. I just rewrited same_src() as macro. -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes. You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-17 18:24 UTC
[Bug 714] Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 --- Comment #6 from Dmitry Petuhov <d.petuhov at electro-com.ru> 2012-11-17 19:24:10 CET --- Found workaround. Adding --random to rule by avoiding bugged code. Half year on 8 machines without issues. -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes. You are watching the assignee of the bug. You are watching someone on the CC list of the bug.