GHammer
Very Senior Member
I created a firewall-start script with two statements, uploaded it to the proper location, restarted the firewall and all was well. I then rebooted the router and it never came up fully.
Eventually, I caught a brief window and was able to delete the firewall-start script file and the router has continued to function normally.
The router accepted the iptables entries on a firewall restart, so why have unrecoverable issues after a reboot?
I'll post a snippet of the syslog and the entire firewall-start script.
If interested, I have the entire syslog saved.
Eventually, I caught a brief window and was able to delete the firewall-start script file and the router has continued to function normally.
The router accepted the iptables entries on a firewall restart, so why have unrecoverable issues after a reboot?
I'll post a snippet of the syslog and the entire firewall-start script.
If interested, I have the entire syslog saved.
Code:
Oct 27 23:16:28 kernel: CPU: 1 PID: 210 Comm: bcmsw_rx Tainted: P W O 4.1.27 #2
Oct 27 23:16:28 kernel: Hardware name: Broadcom-v8A (DT)
Oct 27 23:16:28 kernel: Call trace:
Oct 27 23:16:28 kernel: [<ffffffc0000876d8>] dump_backtrace+0x0/0x150
Oct 27 23:16:28 kernel: [<ffffffc00008783c>] show_stack+0x14/0x20
Oct 27 23:16:28 kernel: [<ffffffc00050389c>] dump_stack+0x90/0xb0
Oct 27 23:16:28 kernel: [<ffffffc000094070>] warn_slowpath_common+0x98/0xd0
Oct 27 23:16:28 kernel: [<ffffffc000094150>] warn_slowpath_null+0x18/0x20
Oct 27 23:16:28 kernel: [<ffffffc0003c2d20>] dst_release+0x68/0x70
Oct 27 23:16:28 kernel: [<ffffffbffcaa42c8>] route.isra.0+0x78/0x118 [ipt_ROUTE]
Oct 27 23:16:28 kernel: [<ffffffbffcaa4410>] ipt_route_target+0xa8/0x4b0 [ipt_ROUTE]
Oct 27 23:16:28 kernel: [<ffffffc00047c658>] ipt_do_table+0x2b0/0x400
Oct 27 23:16:28 kernel: [<ffffffc00047f418>] iptable_mangle_hook+0x38/0x108
Oct 27 23:16:28 kernel: [<ffffffc0003ffc74>] nf_iterate+0x94/0xa8
Oct 27 23:16:28 kernel: [<ffffffc0003ffd38>] nf_hook_slow+0xb0/0x160
Oct 27 23:16:28 kernel: [<ffffffc00042c2ac>] ip_output+0x12c/0x170
Oct 27 23:16:28 kernel: [<ffffffc000427734>] ip_forward_finish+0x6c/0x90
Oct 27 23:16:28 kernel: [<ffffffc000427b04>] ip_forward+0x3ac/0x468
Oct 27 23:16:28 kernel: [<ffffffc000425dbc>] ip_rcv_finish+0x134/0x328
Oct 27 23:16:28 kernel: [<ffffffc000426490>] ip_rcv+0x2d8/0x3b8
Oct 27 23:16:28 kernel: [<ffffffc0003b6690>] __netif_receive_skb_core+0x628/0xa40
Oct 27 23:16:28 kernel: [<ffffffc0003b969c>] __netif_receive_skb+0x2c/0x88
Oct 27 23:16:28 kernel: [<ffffffc0003b9738>] netif_receive_skb_internal+0x40/0xc0
Oct 27 23:16:28 kernel: [<ffffffc0003b97c8>] netif_receive_skb_sk+0x10/0x18
Oct 27 23:16:28 kernel: [<ffffffbffc3689e4>] bcm63xx_enet_rx_thread+0x7b4/0xce0 [bcm_enet]
Oct 27 23:16:28 kernel: [<ffffffc0000af6b0>] kthread+0xd8/0xf0
Oct 27 23:16:28 kernel: ---[ end trace dd9a2b1a17d798ee ]---
Oct 27 23:16:28 kernel: ------------[ cut here ]------------
Oct 27 23:16:30 kernel: WARNING: CPU: 1 PID: 210 at net/core/dst.c:288 dst_release+0x68/0x70()
Oct 27 23:16:30 kernel: Modules linked in: ipt_ROUTE init_addr( (null) - (null)), core_addr(ffffffbffcaa4000 - ffffffbffcaa4838)
Code:
#!/bin/sh
iptables -t mangle -A PREROUTING -s 10.10.100.121 -j ROUTE --tee --gw 10.10.100.115
iptables -t mangle -A POSTROUTING -d 10.10.100.121 -j ROUTE --tee --gw 10.10.100.115