Re: dst cache overflow

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The log says:

Dec 30 00:52:27 cura kernel: dst cache overflow
Dec 30 00:52:27 cura kernel: MASQUERADE: No route: Rusty's brain broke!
Dec 30 00:52:27 cura kernel: dst cache overflow
Dec 30 00:52:28 cura kernel: zlan0: received tcn bpdu on port 1(eth0)
Dec 30 00:52:28 cura kernel: zlan0: topology change detected, propagating
Dec 30 00:52:28 cura kernel: dst cache overflow
Dec 30 00:52:30 cura kernel: zlan0: received tcn bpdu on port 1(eth0)
Dec 30 00:52:30 cura kernel: zlan0: topology change detected, propagating
Dec 30 00:52:32 cura kernel: zlan0: received tcn bpdu on port 1(eth0)
Dec 30 00:52:32 cura kernel: zlan0: topology change detected, propagating
Dec 30 00:52:32 cura kernel: printk: 15 messages suppressed.
Dec 30 00:52:32 cura kernel: dst cache overflow
Dec 30 00:52:34 cura kernel: zlan0: received tcn bpdu on port 1(eth0)
Dec 30 00:52:34 cura kernel: zlan0: topology change detected, propagating
Dec 30 00:52:36 cura kernel: zlan0: received tcn bpdu on port 1(eth0)
Dec 30 00:52:36 cura kernel: zlan0: topology change detected, propagating
Dec 30 00:52:37 cura kernel: printk: 40 messages suppressed.
Dec 30 00:52:37 cura kernel: dst cache overflow

zlan0 is a bridge (with STP configured) between some LANs.

Thanks

P.D.: I'm a bit desesperated with this error, I changed "MASQUERADE" with
"SNAT" with no sense. Some hours after router is booted up, the network
appears to be UP but all ifaces haven't responses.

El Mar, 2 de Enero de 2007, 23:24, ArcosCom Linux User escribió:
> Hi all, I'm having this problem with this system configuration:
>    1) iptables 1.3.7
>    2) kernel 2.6.19.1
>    3) SMP computer
>    4) 2 external links + 2 internal (bridged).
>
> Some hours after the system is working without any troubles, all network
> devices stop respond.
>
> Anyone could help me to fix this problem?
>
> Googling some ours I detect that this was a problem with old kernels and
> were solved with 2.6.11 kernel version.
>
> Any help will be appretiated.
>
> Regards.
>
> P.D.: With MASQUERADE the problem begans more quickly than with SNAT
> target.




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux