Bug 75131 - Kernel OOPS on Kernel 3.14.2
Summary: Kernel OOPS on Kernel 3.14.2
Status: RESOLVED CODE_FIX
Alias: None
Product: Networking
Classification: Unclassified
Component: Netfilter/Iptables (show other bugs)
Hardware: x86-64 Linux
: P1 blocking
Assignee: networking_netfilter-iptables@kernel-bugs.osdl.org
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-30 06:45 UTC by Flow86
Modified: 2014-06-16 08:49 UTC (History)
2 users (show)

See Also:
Kernel Version: 3.14.2
Subsystem:
Regression: No
Bisected commit-id:


Attachments
Photo of Kernel Trace (807.33 KB, image/jpeg)
2014-04-30 06:45 UTC, Flow86
Details

Description Flow86 2014-04-30 06:45:32 UTC
Created attachment 134401 [details]
Photo of Kernel Trace

Hi,

I hope this is the correct bug trac for my problem.

I recently installed kernel 3.14.2 (http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.14.2-utopic/) since then, my computer crashes after a
while (mostly after 5-10h)

I attached the display image of one of the kernel traces.

My hardware:
Intel i7 2600, 32GB RAM

My iptables rules:
```
# Generated by iptables-save v1.4.12 on Wed Apr 30 08:32:15 2014
*mangle
:PREROUTING ACCEPT [120268:39582217]
:INPUT ACCEPT [97074:20313634]
:FORWARD ACCEPT [23188:19268180]
:OUTPUT ACCEPT [78654:99152988]
:POSTROUTING ACCEPT [102502:118656625]
-A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss
1400:1536 -j TCPMSS --clamp-mss-to-pmtu
COMMIT

# Completed on Wed Apr 30 08:32:15 2014
# Generated by iptables-save v1.4.12 on Wed Apr 30 08:32:15 2014
*nat
:PREROUTING ACCEPT [1969:200322]
:INPUT ACCEPT [1521:108728]
:OUTPUT ACCEPT [3534:337479]
:POSTROUTING ACCEPT [1075:141120]
:UPNP - [0:0]
-A PREROUTING -j UPNP
-A POSTROUTING -o eth1 -j MASQUERADE
COMMIT

# Completed on Wed Apr 30 08:32:15 2014
# Generated by iptables-save v1.4.12 on Wed Apr 30 08:32:15 2014
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:TCP - [0:0]
:UDP - [0:0]
:UPNP - [0:0]

-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -m conntrack --ctstate INVALID -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -s 10.0.0.0/8 -i eth0 -j LOG --log-prefix "fw-in   "
-A INPUT -s 10.0.0.0/8 -i eth0 -j REJECT --reject-with icmp-port-unreachable
-A INPUT -i eth0 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8 -m conntrack --ctstate NEW -j ACCEPT
-A INPUT -p udp -m conntrack --ctstate NEW -j UDP
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate
NEW -j TCP
-A INPUT -m limit --limit 1/sec -j LOG --log-prefix "fw-in   "
-A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable
-A INPUT -p tcp -j REJECT --reject-with tcp-reset
-A INPUT -p ipv6 -j REJECT --reject-with icmp-proto-unreachable
-A INPUT -j REJECT --reject-with icmp-proto-unreachable

-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m conntrack --ctstate INVALID -j DROP
-A FORWARD -i eth0 -o eth1 -j ACCEPT
-A FORWARD -j UPNP
-A FORWARD -m limit --limit 1/sec -j LOG --log-prefix "fw-fwd  "
-A FORWARD -p udp -j REJECT --reject-with icmp-port-unreachable
-A FORWARD -p tcp -j REJECT --reject-with tcp-reset
-A FORWARD -p ipv6 -j REJECT --reject-with icmp-proto-unreachable
-A FORWARD -j REJECT --reject-with icmp-proto-unreachable

-A OUTPUT -p ipv6 -j LOG --log-prefix "fw-o41  "
-A OUTPUT -p ipv6 -j REJECT --reject-with icmp-proto-unreachable
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o eth0 -j ACCEPT
-A OUTPUT -o eth1 -j ACCEPT
-A OUTPUT -m limit --limit 1/sec -j LOG --log-prefix "fw-out  "
-A OUTPUT -p udp -j REJECT --reject-with icmp-port-unreachable
-A OUTPUT -p tcp -j REJECT --reject-with tcp-reset
-A OUTPUT -j REJECT --reject-with icmp-proto-unreachable

-A TCP -i eth1 -p tcp -m tcp --dport 22 -j ACCEPT
-A TCP -i eth1 -p tcp -m tcp --dport 23 -j REJECT --reject-with
icmp-port-unreachable
-A TCP -i eth1 -p tcp -m tcp --dport 53 -j ACCEPT
-A TCP -i eth1 -p tcp -m tcp --dport 80 -j ACCEPT
-A TCP -i eth1 -p tcp -m tcp -j UPNP
-A TCP -j RETURN

-A UDP -i eth1 -p udp -m udp --dport 53 -j ACCEPT
-A UDP -i eth1 -p udp -m udp -j UPNP
-A UDP -j RETURN
COMMIT
# Completed on Wed Apr 30 08:32:15 2014
```

Since the crashes are not recorded on disk/logfile, I can only provide that
image.

Thank you!
Comment 1 Alan 2014-05-19 12:22:01 UTC
Please post the relevant information to netdev@vger.kernel.org, bugzilla is mostly just used for knowing bugs exist, netdev is used for actually discussing/chasing/fixing work.
Comment 2 Vincent Tondellier 2014-06-15 13:49:40 UTC
Fixed in 3.14.5 and 3.15 by

commit 223b02d923ecd7c84cf9780bb3686f455d279279
netfilter: nf_conntrack: reserve two bytes for nf_ct_ext->len

See also
http://thread.gmane.org/gmane.comp.security.firewalls.netfilter.devel/52821

Note You need to log in before you can comment on or make changes to this bug.