L.S., After an upgrade from 2.6.11.12 to 2.6.12.3 I see peculiar messages appearing in my syslog, dmesg and on my console. Before this upgrade I never saw this type of messages.
Googling delivers (as of now) two hits on: "ip_local_deliver: bad skb:" http://www.linuxhq.com/kernel/v2.6/12/net/core/netfilter.c and http://www.linuxhq.com/kernel/v2.6/13-rc1/net/core/netfilter.c So, to me this seems to be something relatively new. Here's a part of my last /var/log/dmesg pcnet32: PCnet/FAST 79C971 at 0xe800, 00 60 b0 c3 cc ea tx_start_pt(0x0c00):~220 bytes, BCR18(9861):BurstWrEn BurstRdEn NoUFlow SRAMSIZE=0x7f00, SRAM_BND=0x3f00, assigned IRQ 10. eth0: registered as PCnet/FAST 79C971 pcnet32: 1 cards_found. eth1: 3c5x9 found at 0x2a0, 10baseT port, address 00 60 8c f7 29 61, IRQ 11. 3c509.c:1.19b 08Nov2002 [EMAIL PROTECTED] http://www.scyld.com/network/3c509.html smc-ultra.c: Presently autoprobing (not recommended) for a single card. smc-ultra.c:v2.02 2/3/98 Donald Becker ([EMAIL PROTECTED]) eth%d: SMC EtherEZ at 0x240, 00 00 C0 AC 5F DD,EEPROM IRQ 5 programmed-I/O mode. kjournald starting. Commit interval 5 seconds EXT3 FS on hda6, internal journal EXT3-fs: mounted filesystem with ordered data mode. eth1: Setting 3c5x9/3c5x9B half-duplex mode if_port: 0, sw_info: 3320 eth1: Setting Rx mode to 1 addresses. eth1: Setting Rx mode to 2 addresses. eth1: Setting Rx mode to 3 addresses. eth1: Setting Rx mode to 4 addresses. eth0: link down eth1: Setting Rx mode to 5 addresses. eth1: Setting Rx mode to 6 addresses. eth0: link up, 100Mbps, full-duplex, lpa 0x45E1 ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING skb: pf=2 (unowned) dev=lo len=60 PROTO=17 44.137.x.y+1:1024 44.137.x.y+1:53 L=60 S=0x00 I=51385 F=0x4000 T=64 ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING skb: pf=2 (unowned) dev=lo len=88 PROTO=1 44.137.x.y+1:0 44.137.x.y+1:0 L=88 S=0xC0 I=27660 F=0x0000 T=64 ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING skb: pf=2 (unowned) dev=lo len=60 PROTO=17 44.137.x.y+1:1024 44.137.x.y+1:53 L=60 S=0x00 I=51386 F=0x4000 T=64 ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING skb: pf=2 (unowned) dev=lo len=88 PROTO=1 44.137.x.y+1:0 44.137.x.y+1:0 L=88 S=0xC0 I=27661 F=0x0000 T=64 ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING skb: pf=2 (unowned) dev=lo len=74 PROTO=17 44.137.x.y+1:1024 44.137.x.y+1:53 L=74 S=0x00 I=51387 F=0x4000 T=64 <etc> <etc> A part of my syslog: [EMAIL PROTECTED] [/home/geurt]> tail -f /var/log/syslog ul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:61005 44.137.x.y+1:53 L=61 S=0x00 I=16725 F=0x4000 T=64 Jul 18 19:19:33 localhost kernel: ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING Jul 18 19:19:33 localhost kernel: skb: pf=2 (unowned) dev=lo len=241 Jul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:53 44.137.x.y+1:61005 L=241 S=0x00 I=200 F=0x4000 T=64 Jul 18 19:19:33 localhost kernel: ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING Jul 18 19:19:33 localhost kernel: skb: pf=2 (unowned) dev=lo len=118 Jul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:61005 44.137.x.y+1:53 L=118 S=0x00 I=16729 F=0x4000 T=64 Jul 18 19:19:33 localhost kernel: ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING Jul 18 19:19:33 localhost kernel: skb: pf=2 (unowned) dev=lo len=331 Jul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:53 44.137.x.y+1:61005 L=331 S=0x00 I=201 F=0x4000 T=64 Because this message seems to origine from netfilter.c, herewith an iptables -L -vnx: [EMAIL PROTECTED] [/home/geurt]> iptables -L -vnx Chain INPUT (policy ACCEPT 101 packets, 7852 bytes) pkts bytes target prot opt in out source destination 344 75631 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 2119 260990 ACCEPT all -- eth0 * 44.137.x.y/28 0.0.0.0/0 396083 39074573 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 267 13104 REJECT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445,1025,1080,1433,2745,3127,3128,61 29,17300,27374 reject-with tcp-reset 139 27217 REJECT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 multiport dports 37,135,137,445,524,666,1026,1027,1028,1029 r eject-with icmp-port-unreachable 4 304 DROP udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp spt:666 1 44 REJECT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:37 reject-with tcp-reset 5 280 DROP icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 13 1 104 DROP icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 3 0 0 DROP icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 1 3 312 DROP icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 10 0 0 DROP icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW icmp type 8 length 121:65535 1552 60896 DROP all -- eth1 * 193.41.181.254 0.0.0.0/0 0 0 ACCEPT udp -- eth0 * 0.0.0.0 255.255.255.255 udp spt:68 dpt:67 783 40884 ACCEPT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:0x16/0x02 limit: avg 8/sec burst 10 multi port dports 22,53,80,113 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpts:33400:33600 4 514 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW limit: avg 5/sec burst 10 multiport dports 53 0 0 ACCEPT tcp -- eth2 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp spts:1024:65535 flags:0x16/0x02 limit: avg 8/se c burst 10 multiport dports 22,53,80,113 0 0 ACCEPT icmp -- eth2 * 0.0.0.0/0 0.0.0.0/0 355331 27005636 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp dpt:123 2820 236216 ACCEPT icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW limit: avg 100/min burst 5 length 1:120 126 7287 LOG !icmp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix `---INPUT REJECT---:' 126 7287 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 reject-with icmp-port-unreachable 3 184 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix `---INPUT DROP!---:' 3 184 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 1552 60896 DROP all -- eth1 * 193.41.181.254 0.0.0.0/0 0 0 ACCEPT udp -- eth0 * 0.0.0.0 255.255.255.255 udp spt:68 dpt:67 783 40884 ACCEPT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:0x16/0x02 limit: avg 8/sec burst 10 multi port dports 22,53,80,113 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpts:33400:33600 4 514 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW limit: avg 5/sec burst 10 multiport dports 53 0 0 ACCEPT tcp -- eth2 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp spts:1024:65535 flags:0x16/0x02 limit: avg 8/se c burst 10 multiport dports 22,53,80,113 0 0 ACCEPT icmp -- eth2 * 0.0.0.0/0 0.0.0.0/0 355331 27005636 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp dpt:123 2820 236216 ACCEPT icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW limit: avg 100/min burst 5 length 1:120 126 7287 LOG !icmp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix `---INPUT REJECT---:' 126 7287 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 reject-with icmp-port-unreachable 3 184 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix `---INPUT DROP!---:' 3 184 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 10.1.0.0/29 state RELATED,ESTABLISHED 0 0 ACCEPT all -- * * 10.1.0.0/29 !44.137.x.y/28 state NEW,RELATED,ESTABLISHED,UNTRACKED 0 0 REJECT all -- * * 10.1.0.0/29 44.137.x.y/28 state INVALID,NEW reject-with icmp-port-unreachable 485 27428 TCPMSS tcp -- * * 0.0.0.0/0 44.137.x.y/28 tcp flags:0x06/0x02 TCPMSS clamp to PMTU 701895 1039697893 ACCEPT all -- * * 0.0.0.0/0 44.137.x.y/28 state RELATED,ESTABLISHED 482535 26062411 ACCEPT all -- * * 44.137.x.y/28 0.0.0.0/0 state NEW,RELATED,ESTABLISHED,UNTRACKED 0 0 ACCEPT tcp -- * * 0.0.0.0/0 44.137.x.y/28 state NEW tcp flags:0x16/0x02 limit: avg 3/sec burst 5 multipor t dports 22,113 0 0 ACCEPT icmp -- * * 0.0.0.0/0 44.137.x.y/28 state NEW limit: avg 100/min burst 5 length 1:120 0 0 ACCEPT udp -- * * 0.0.0.0/0 44.137.x.y/28 state NEW udp dpt:53 limit: avg 100/min burst 5 0 0 LOG all -- * * 0.0.0.0/0 44.137.x.y/28 limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix `---FORWARD DROP---:' 0 0 REJECT tcp -- * * 0.0.0.0/0 44.137.x.y/28 limit: avg 1/sec burst 5 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 44.137.x.y/28 limit: avg 1/sec burst 5 reject-with icmp-port-unreachable 7 340 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 755631 packets, 58600128 bytes) pkts bytes target prot opt in out source destination 22 880 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID [EMAIL PROTECTED] [/usr/src/linux]> Anyone a clue what's going on? Kind regards, Remco den Besten - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html