On 01/29/2008 12:18 PM, Patrick McHardy wrote: > Chuck Ebbert wrote: >> nf_nat_move_storage(): >> /usr/src/debug/kernel-2.6.23/linux-2.6.23.i686/net/ipv4/netfilter/nf_nat_core.c:612 >> >> 87: f7 47 64 80 01 00 00 testl $0x180,0x64(%edi) >> 8e: 74 39 je c9 >> <nf_nat_move_storage+0x65> >> >> line 612: >> if (!(ct->status & IPS_NAT_DONE_MASK)) >> return; >> >> ct is NULL > > The current kernel (and 2.6.23-stable) have: > > if (!ct || !(ct->status & IPS_NAT_DONE_MASK)) > return; > > so it seems you're using an old version. Sorry, I re-used the analysis from before that change went in. I now have an oops report from 2.6.23.14 on x86_64. It is oopsing there, and only on x86_64 now, because x86_64 refuses to use a non-canonical address. ct contains what appears to be ASCII data. i386 might be dereferencing some random address instead of oopsing... 0: 48 f7 45 78 80 01 00 testq $0x180,0x78(%rbp) 7: 00 8: 74 4c je 0x56 a: 48 c7 c7 e0 18 28 88 mov $0xffffffff882818e0,%rdi %rbp has a bogus (non-canonical) address. On i386 there is no such test possible so it will just dereference the address if it is mapped. %rbp contains 8 valid ASCII chars: "salcf x\" - To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html