L.S.,

After an upgrade from 2.6.11.12 to 2.6.12.3 I see peculiar
messages appearing in my syslog, dmesg and on my console.
Before this upgrade I never saw this type of messages. 

Googling delivers (as of now) two hits on: "ip_local_deliver: bad skb:"

http://www.linuxhq.com/kernel/v2.6/12/net/core/netfilter.c

and

http://www.linuxhq.com/kernel/v2.6/13-rc1/net/core/netfilter.c

So, to me this seems to be something relatively new. 

Here's a part of my last /var/log/dmesg

pcnet32: PCnet/FAST 79C971 at 0xe800, 00 60 b0 c3 cc ea
    tx_start_pt(0x0c00):~220 bytes, BCR18(9861):BurstWrEn BurstRdEn NoUFlow
    SRAMSIZE=0x7f00, SRAM_BND=0x3f00, assigned IRQ 10.
eth0: registered as PCnet/FAST 79C971
pcnet32: 1 cards_found.
eth1: 3c5x9 found at 0x2a0, 10baseT port, address  00 60 8c f7 29 61, IRQ 11.
3c509.c:1.19b 08Nov2002 [EMAIL PROTECTED]
http://www.scyld.com/network/3c509.html
smc-ultra.c: Presently autoprobing (not recommended) for a single card.
smc-ultra.c:v2.02 2/3/98 Donald Becker ([EMAIL PROTECTED])
eth%d: SMC EtherEZ at 0x240, 00 00 C0 AC 5F DD,EEPROM IRQ 5 programmed-I/O mode.
kjournald starting.  Commit interval 5 seconds
EXT3 FS on hda6, internal journal
EXT3-fs: mounted filesystem with ordered data mode.
eth1: Setting 3c5x9/3c5x9B half-duplex mode if_port: 0, sw_info: 3320
eth1: Setting Rx mode to 1 addresses.
eth1: Setting Rx mode to 2 addresses.
eth1: Setting Rx mode to 3 addresses.
eth1: Setting Rx mode to 4 addresses.
eth0: link down
eth1: Setting Rx mode to 5 addresses.
eth1: Setting Rx mode to 6 addresses.
eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING
skb: pf=2 (unowned) dev=lo len=60
PROTO=17 44.137.x.y+1:1024 44.137.x.y+1:53 L=60 S=0x00 I=51385 F=0x4000 T=64
ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING
skb: pf=2 (unowned) dev=lo len=88
PROTO=1 44.137.x.y+1:0 44.137.x.y+1:0 L=88 S=0xC0 I=27660 F=0x0000 T=64
ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING
skb: pf=2 (unowned) dev=lo len=60
PROTO=17 44.137.x.y+1:1024 44.137.x.y+1:53 L=60 S=0x00 I=51386 F=0x4000 T=64
ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING
skb: pf=2 (unowned) dev=lo len=88
PROTO=1 44.137.x.y+1:0 44.137.x.y+1:0 L=88 S=0xC0 I=27661 F=0x0000 T=64
ip_local_deliver: bad skb: PRE_ROUTING LOCAL_IN LOCAL_OUT POST_ROUTING
skb: pf=2 (unowned) dev=lo len=74
PROTO=17 44.137.x.y+1:1024 44.137.x.y+1:53 L=74 S=0x00 I=51387 F=0x4000 T=64

<etc>
<etc>

A part of my syslog:

[EMAIL PROTECTED] [/home/geurt]> tail -f /var/log/syslog
ul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:61005 44.137.x.y+1:53 
L=61 S=0x00 I=16725 F=0x4000 T=64
Jul 18 19:19:33 localhost kernel: ip_local_deliver: bad skb: PRE_ROUTING 
LOCAL_IN LOCAL_OUT POST_ROUTING
Jul 18 19:19:33 localhost kernel: skb: pf=2 (unowned) dev=lo len=241
Jul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:53 44.137.x.y+1:61005 
L=241 S=0x00 I=200 F=0x4000 T=64
Jul 18 19:19:33 localhost kernel: ip_local_deliver: bad skb: PRE_ROUTING 
LOCAL_IN LOCAL_OUT POST_ROUTING
Jul 18 19:19:33 localhost kernel: skb: pf=2 (unowned) dev=lo len=118
Jul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:61005 44.137.x.y+1:53 
L=118 S=0x00 I=16729 F=0x4000 T=64
Jul 18 19:19:33 localhost kernel: ip_local_deliver: bad skb: PRE_ROUTING 
LOCAL_IN LOCAL_OUT POST_ROUTING
Jul 18 19:19:33 localhost kernel: skb: pf=2 (unowned) dev=lo len=331
Jul 18 19:19:33 localhost kernel: PROTO=17 44.137.x.y+1:53 44.137.x.y+1:61005 
L=331 S=0x00 I=201 F=0x4000 T=64

Because this message seems to origine from netfilter.c, herewith an iptables -L 
-vnx:

[EMAIL PROTECTED] [/home/geurt]> iptables -L -vnx
Chain INPUT (policy ACCEPT 101 packets, 7852 bytes)
    pkts      bytes target     prot opt in     out     source               
destination
     344    75631 ACCEPT     all  --  lo     *       0.0.0.0/0            
0.0.0.0/0
    2119   260990 ACCEPT     all  --  eth0   *       44.137.x.y/28      
0.0.0.0/0
  396083 39074573 ACCEPT     all  --  *      *       0.0.0.0/0            
0.0.0.0/0           state RELATED,ESTABLISHED
     267    13104 REJECT     tcp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           multiport dports 
135,139,445,1025,1080,1433,2745,3127,3128,61
29,17300,27374 reject-with tcp-reset
     139    27217 REJECT     udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           multiport dports 37,135,137,445,524,666,1026,1027,1028,1029 
r
eject-with icmp-port-unreachable
       4      304 DROP       udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           udp spt:666
       1       44 REJECT     tcp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           tcp dpt:37 reject-with tcp-reset
       5      280 DROP       icmp --  eth1   *       0.0.0.0/0            
0.0.0.0/0           icmp type 3 code 13
       1      104 DROP       icmp --  eth1   *       0.0.0.0/0            
0.0.0.0/0           icmp type 3 code 3
       0        0 DROP       icmp --  eth1   *       0.0.0.0/0            
0.0.0.0/0           icmp type 3 code 1
       3      312 DROP       icmp --  eth1   *       0.0.0.0/0            
0.0.0.0/0           icmp type 3 code 10
       0        0 DROP       icmp --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW icmp type 8 length 121:65535
    1552    60896 DROP       all  --  eth1   *       193.41.181.254       
0.0.0.0/0
       0        0 ACCEPT     udp  --  eth0   *       0.0.0.0              
255.255.255.255     udp spt:68 dpt:67
     783    40884 ACCEPT     tcp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW tcp flags:0x16/0x02 limit: avg 8/sec burst 10 
multi
port dports 22,53,80,113
       0        0 ACCEPT     udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW udp dpts:33400:33600
       4      514 ACCEPT     udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW limit: avg 5/sec burst 10 multiport dports 53
       0        0 ACCEPT     tcp  --  eth2   *       0.0.0.0/0            
0.0.0.0/0           state NEW tcp spts:1024:65535 flags:0x16/0x02 limit: avg 
8/se
c burst 10 multiport dports 22,53,80,113
       0        0 ACCEPT     icmp --  eth2   *       0.0.0.0/0            
0.0.0.0/0
  355331 27005636 ACCEPT     udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           udp dpt:123
    2820   236216 ACCEPT     icmp --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW limit: avg 100/min burst 5 length 1:120
     126     7287 LOG       !icmp --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix 
`---INPUT
 REJECT---:'
     126     7287 REJECT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 reject-with tcp-reset
       0        0 REJECT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 reject-with icmp-port-unreachable
       3      184 LOG        all  --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix 
`---INPUT
 DROP!---:'
       3      184 DROP       all  --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
    pkts      bytes target     prot opt in     out     source               
destination
    1552    60896 DROP       all  --  eth1   *       193.41.181.254       
0.0.0.0/0
       0        0 ACCEPT     udp  --  eth0   *       0.0.0.0              
255.255.255.255     udp spt:68 dpt:67
     783    40884 ACCEPT     tcp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW tcp flags:0x16/0x02 limit: avg 8/sec burst 10 
multi
port dports 22,53,80,113
       0        0 ACCEPT     udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW udp dpts:33400:33600
       4      514 ACCEPT     udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW limit: avg 5/sec burst 10 multiport dports 53
       0        0 ACCEPT     tcp  --  eth2   *       0.0.0.0/0            
0.0.0.0/0           state NEW tcp spts:1024:65535 flags:0x16/0x02 limit: avg 
8/se
c burst 10 multiport dports 22,53,80,113
       0        0 ACCEPT     icmp --  eth2   *       0.0.0.0/0            
0.0.0.0/0
  355331 27005636 ACCEPT     udp  --  eth1   *       0.0.0.0/0            
0.0.0.0/0           udp dpt:123
    2820   236216 ACCEPT     icmp --  eth1   *       0.0.0.0/0            
0.0.0.0/0           state NEW limit: avg 100/min burst 5 length 1:120
     126     7287 LOG       !icmp --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix 
`---INPUT
 REJECT---:'
     126     7287 REJECT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 reject-with tcp-reset
       0        0 REJECT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 reject-with icmp-port-unreachable
       3      184 LOG        all  --  *      *       0.0.0.0/0            
0.0.0.0/0           limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix 
`---INPUT
 DROP!---:'
       3      184 DROP       all  --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
    pkts      bytes target     prot opt in     out     source               
destination
       0        0 ACCEPT     all  --  *      *       0.0.0.0/0            
10.1.0.0/29         state RELATED,ESTABLISHED
       0        0 ACCEPT     all  --  *      *       10.1.0.0/29         
!44.137.x.y/28     state NEW,RELATED,ESTABLISHED,UNTRACKED
       0        0 REJECT     all  --  *      *       10.1.0.0/29          
44.137.x.y/28     state INVALID,NEW reject-with icmp-port-unreachable
     485    27428 TCPMSS     tcp  --  *      *       0.0.0.0/0            
44.137.x.y/28     tcp flags:0x06/0x02 TCPMSS clamp to PMTU
  701895 1039697893 ACCEPT     all  --  *      *       0.0.0.0/0            
44.137.x.y/28     state RELATED,ESTABLISHED
  482535 26062411 ACCEPT     all  --  *      *       44.137.x.y/28      
0.0.0.0/0           state NEW,RELATED,ESTABLISHED,UNTRACKED
       0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
44.137.x.y/28     state NEW tcp flags:0x16/0x02 limit: avg 3/sec burst 5 
multipor
t dports 22,113
       0        0 ACCEPT     icmp --  *      *       0.0.0.0/0            
44.137.x.y/28     state NEW limit: avg 100/min burst 5 length 1:120
       0        0 ACCEPT     udp  --  *      *       0.0.0.0/0            
44.137.x.y/28     state NEW udp dpt:53 limit: avg 100/min burst 5
       0        0 LOG        all  --  *      *       0.0.0.0/0            
44.137.x.y/28     limit: avg 2/sec burst 5 LOG flags 0 level 6 prefix 
`---FORWARD
 DROP---:'
       0        0 REJECT     tcp  --  *      *       0.0.0.0/0            
44.137.x.y/28     limit: avg 1/sec burst 5 reject-with tcp-reset
       0        0 REJECT     udp  --  *      *       0.0.0.0/0            
44.137.x.y/28     limit: avg 1/sec burst 5 reject-with icmp-port-unreachable
       7      340 DROP       all  --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain OUTPUT (policy ACCEPT 755631 packets, 58600128 bytes)
    pkts      bytes target     prot opt in     out     source               
destination
      22      880 DROP       all  --  *      *       0.0.0.0/0            
0.0.0.0/0           state INVALID
[EMAIL PROTECTED] [/usr/src/linux]>


Anyone a clue what's going on? 

Kind regards,

Remco den Besten 
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to