Mandriva 2008.1 problem z uruchominiem na laptopie MSI CR610


(2kkedzior) #1

Hej witam. Kupiłam sobie nowy laptop bez systemu i chce na n nim zainstalować Mandrivę 2008.1. Jednak mam nie mały problem, gdyż podczas pierwszej próby uruchomienia po instalacji zatrzymuje się i wywala taki błąd:

Uruchamianie demona HAL:

Compiling ... 

Compiling /etc/shorewall/ zones... 

ERROR: No network interfaces defined

Uruchomianie demona mandi: unable to open white list file nl_bind_socket: No such file or directory bind failed

unable to init netlink

unable to init "Interactive Firewall" plugin

Wyskakuje on jeszcze podczas wczytywania sytemu. Płytkę z Mandrivą mam z gazetki EasyLinuxa z płtką DVD dwu warstwowa na jednej stronie jest wersja 32 bitowa, a na drugiej 64bitowa. Laptop to MSI CR610 z procesorem AMD Athlon i kartą graficzną ATI. Tryb bezpieczny się wczytuje. Próbowałam już odinstalowywać demona mandi ale nic z tego zostaje jeszcze

Uruchamianie demona HAL:

Compiling ... 

Compiling /etc/shorewall/ zones..

ERROR: No network interfaces defined

I mnie dalej nie puszcza.

Posiadam już Mandrivę na stacjonarnym komputerze i wszystko jest OK.


(Evil Coca Cola) #2

Spróbuj zgrać na inną płytkę może zadziała.


(2kkedzior) #3

Hmm nie ma teraz takiej możliwości nie mam żadnej DVD :frowning: a po za tym zapomniałam dodać (miałam to napisać, ale coś mi się zapomniało) Oprócz Mandrivy 2008.1 próbowałam instalować MDV 2009.1 i tam też to samo się dzieje też się zatrzymuje na demonie tylko nie wiem na jakim :confused: bo tam tak szybko przelatuje ten komunikat, że nie ma szans na przepisanie, a nawet przeczytanie o co chodzi... chyba Avahi lub HAL


(roobal) #4

Nigdy nie korzystałem z takiego wynalazku jakim jest Shorewall ale z błędu wnioskuję, że Firewall jest źle skonfigurowany i nie może rozpoznać karty sieciowej:

Compiling /etc/shorewall/ zones..

ERROR: No network interfaces defined

Pokaż konfigurację Shorewalla (prawdopodobnie w pliku /etc/shorewall, musisz poszukać) i pokaż wyniki poleceń:

su -c 'iptables -L'

su -c 'iptables-save'

Tak poza tym najświeższa Mandriva to 2010.

Pozdrawiam!


(2kkedzior) #5

Aha, dzięki zaraz sprawdzę. Uzupełniając do powyższego to udało mi się uruchomić system w trybie graficznym. Problem tkwi w sterowniku do karty graficznej ATI Mobility Radeon™ HD4200 której 2008.1 jeszcze nie obsługuje. Udało mi się uruchomić system na sterowniku vesa po komendzie XFdrake .Oczywiście przepisuje z forum Mandrivy, bo tam też szukałam pomocy, gdyż nie wiedziałam gdzie szybciej ją dostanę :slight_smile: , ale to też sprawdzę.

Wiem, wiem, ale ja w tym momencie nie mam przy sobie tej wersji, a ściągać z neta nie ma czasu, bo jutro wyjeżdżam, a chcę cokolwiek zainstalować żeby tak tylko było.

Wynik:

[katharine@localhost ~]$ su

Hasło:

[root@localhost katharine]# -c 'iptables -L'

bash: -c: command not found

[root@localhost katharine]# su -c 'iptables -L'

Chain INPUT (policy DROP)

target prot opt source destination

Ifw all -- anywhere anywhere

ppp0_in all -- anywhere anywhere

ACCEPT all -- anywhere anywhere

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

Reject all -- anywhere anywhere

LOG all -- anywhere anywhere LOG level info pref

ix `Shorewall:INPUT:REJECT:'

reject all -- anywhere anywhere


Chain FORWARD (policy DROP)

target prot opt source destination

ppp0_fwd all -- anywhere anywhere

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

Reject all -- anywhere anywhere

LOG all -- anywhere anywhere LOG level info pref

ix `Shorewall:FORWARD:REJECT:'

reject all -- anywhere anywhere


Chain OUTPUT (policy DROP)

target prot opt source destination

ppp0_out all -- anywhere anywhere

ACCEPT all -- anywhere anywhere

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

Reject all -- anywhere anywhere

LOG all -- anywhere anywhere LOG level info pref

ix `Shorewall:OUTPUT:REJECT:'

reject all -- anywhere anywhere


Chain Drop (1 references)

target prot opt source destination

reject tcp -- anywhere anywhere tcp dpt:113

dropBcast all -- anywhere anywhere

ACCEPT icmp -- anywhere anywhere icmp fragmentation-

needed

ACCEPT icmp -- anywhere anywhere icmp time-exceeded

dropInvalid all -- anywhere anywhere

DROP udp -- anywhere anywhere multiport dports 13

5,445

DROP udp -- anywhere anywhere udp dpts:137:139

DROP udp -- anywhere anywhere udp spt:137 dpts:10

24:65535

DROP tcp -- anywhere anywhere multiport dports 13

5,139,445

DROP udp -- anywhere anywhere udp dpt:1900

dropNotSyn tcp -- anywhere anywhere

DROP udp -- anywhere anywhere udp spt:53


Chain Ifw (1 references)

target prot opt source destination

RETURN all -- anywhere anywhere set ifw_wl src

DROP all -- anywhere anywhere set ifw_bl src

IFWLOG all -- anywhere anywhere state INVALID,NEW p

sd weight-threshold: 10 delay-threshold: 10000 lo-ports-weight: 2 hi-ports-weigh

t: 1 IFWLOG prefix 'SCAN'


Chain Reject (6 references)

target prot opt source destination

reject tcp -- anywhere anywhere tcp dpt:113

dropBcast all -- anywhere anywhere

ACCEPT icmp -- anywhere anywhere icmp fragmentation-

needed

ACCEPT icmp -- anywhere anywhere icmp time-exceeded

dropInvalid all -- anywhere anywhere

reject udp -- anywhere anywhere multiport dports 13

5,445

reject udp -- anywhere anywhere udp dpts:137:139

reject udp -- anywhere anywhere udp spt:137 dpts:10

24:65535

reject tcp -- anywhere anywhere multiport dports 13

5,139,445

DROP udp -- anywhere anywhere udp dpt:1900

dropNotSyn tcp -- anywhere anywhere

DROP udp -- anywhere anywhere udp spt:53


Chain all2fw (0 references)

target prot opt source destination

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

Reject all -- anywhere anywhere

LOG all -- anywhere anywhere LOG level info pref

ix `Shorewall:all2fw:REJECT:'

reject all -- anywhere anywhere


Chain all2net (0 references)

target prot opt source destination

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

Reject all -- anywhere anywhere

LOG all -- anywhere anywhere LOG level info pref

ix `Shorewall:all2net:REJECT:'

reject all -- anywhere anywhere


Chain dropBcast (2 references)

target prot opt source destination

DROP all -- anywhere anywhere ADDRTYPE match dst-

type BROADCAST

DROP all -- anywhere 224.0.0.0/4


Chain dropInvalid (2 references)

target prot opt source destination

DROP all -- anywhere anywhere state INVALID


Chain dropNotSyn (2 references)

target prot opt source destination

DROP tcp -- anywhere anywhere tcp flags:!FIN,SYN,

RST,ACK/SYN


Chain dynamic (2 references)

target prot opt source destination


Chain fw2all (0 references)

target prot opt source destination

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

Reject all -- anywhere anywhere

LOG all -- anywhere anywhere LOG level info pref

ix `Shorewall:fw2all:REJECT:'

reject all -- anywhere anywhere


Chain fw2net (1 references)

target prot opt source destination

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

ACCEPT all -- anywhere anywhere


Chain logdrop (0 references)

target prot opt source destination

DROP all -- anywhere anywhere


Chain logreject (0 references)

target prot opt source destination

reject all -- anywhere anywhere


Chain net2fw (1 references)

target prot opt source destination

ACCEPT all -- anywhere anywhere state RELATED,ESTAB

LISHED

Drop all -- anywhere anywhere

LOG all -- anywhere anywhere LOG level info pref

ix `Shorewall:net2fw:DROP:'

DROP all -- anywhere anywhere


Chain ppp0_fwd (1 references)

target prot opt source destination

dynamic all -- anywhere anywhere state INVALID,NEW


Chain ppp0_in (1 references)

target prot opt source destination

dynamic all -- anywhere anywhere state INVALID,NEW

net2fw all -- anywhere anywhere


Chain ppp0_out (1 references)

target prot opt source destination

fw2net all -- anywhere anywhere


Chain reject (13 references)

target prot opt source destination

DROP all -- anywhere anywhere ADDRTYPE match src-

type BROADCAST

DROP all -- 224.0.0.0/4 anywhere

REJECT tcp -- anywhere anywhere reject-with tcp-res et

REJECT udp -- anywhere anywhere reject-with icmp-po rt-unreachable

REJECT icmp -- anywhere anywhere reject-with icmp-ho st-unreachable

REJECT all -- anywhere anywhere reject-with icmp-ho st-prohibited


Chain shorewall (0 references)

target prot opt source destination


Chain smurfs (0 references)

target prot opt source destination

RETURN all -- default anywhere

LOG all -- anywhere anywhere ADDRTYPE match src- type BROADCAST LOG level info prefix `Shorewall:smurfs:DROP:'

DROP all -- anywhere anywhere ADDRTYPE match src- type BROADCAST

LOG all -- 224.0.0.0/4 anywhere LOG level info pref ix `Shorewall:smurfs:DROP:'

DROP all -- 224.0.0.0/4 anywhere

[root@localhost katharine]#


[katharine@localhost ~]$ su

Hasło:

[root@localhost katharine]# su -c 'iptables-save'

# Generated by iptables-save v1.4.0 on Sun Jul 4 00:33:32 2010

*raw

:PREROUTING ACCEPT [72]

:OUTPUT ACCEPT [72]

COMMIT

# Completed on Sun Jul 4 00:33:32 2010

# Generated by iptables-save v1.4.0 on Sun Jul 4 00:33:32 2010

*nat

:PREROUTING ACCEPT [0]

:POSTROUTING ACCEPT [36]

:OUTPUT ACCEPT [36]

COMMIT

# Completed on Sun Jul 4 00:33:32 2010

# Generated by iptables-save v1.4.0 on Sun Jul 4 00:33:32 2010

*mangle

:PREROUTING ACCEPT [72]

:INPUT ACCEPT [72]

:FORWARD ACCEPT [0]

:OUTPUT ACCEPT [72]

:POSTROUTING ACCEPT [72]

:tcfor - [0]

:tcout - [0]

:tcpost - [0]

:tcpre - [0]

-A PREROUTING -j tcpre

-A FORWARD -j tcfor

-A OUTPUT -j tcout

-A POSTROUTING -j tcpost

COMMIT

# Completed on Sun Jul 4 00:33:32 2010

# Generated by iptables-save v1.4.0 on Sun Jul 4 00:33:32 2010

*filter

:INPUT DROP [0]

:FORWARD DROP [0]

:OUTPUT DROP [0]

:Drop - [0]

:Ifw - [0]

:Reject - [0]

:all2fw - [0]

:all2net - [0]

:dropBcast - [0]

:dropInvalid - [0]

:dropNotSyn - [0]

:dynamic - [0]

:fw2all - [0]

:fw2net - [0]

:logdrop - [0]

:logreject - [0]

:net2fw - [0]

:ppp0_fwd - [0]

:ppp0_in - [0]

:ppp0_out - [0]

:reject - [0]

:shorewall - [0]

:smurfs - [0]

-A INPUT -j Ifw

-A INPUT -i ppp0 -j ppp0_in

-A INPUT -i lo -j ACCEPT

-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -j Reject

-A INPUT -j LOG --log-prefix "Shorewall:INPUT:REJECT:" --log-level 6

-A INPUT -j reject

-A FORWARD -i ppp0 -j ppp0_fwd

-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

-A FORWARD -j Reject

-A FORWARD -j LOG --log-prefix "Shorewall:FORWARD:REJECT:" --log-level 6

-A FORWARD -j reject

-A OUTPUT -o ppp0 -j ppp0_out

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

-A OUTPUT -j Reject

-A OUTPUT -j LOG --log-prefix "Shorewall:OUTPUT:REJECT:" --log-level 6

-A OUTPUT -j reject

-A Drop -p tcp -m tcp --dport 113 -j reject

-A Drop -j dropBcast

-A Drop -p icmp -m icmp --icmp-type 3/4 -j ACCEPT

-A Drop -p icmp -m icmp --icmp-type 11 -j ACCEPT

-A Drop -j dropInvalid

-A Drop -p udp -m multiport --dports 135,445 -j DROP

-A Drop -p udp -m udp --dport 137:139 -j DROP

-A Drop -p udp -m udp --sport 137 --dport 1024:65535 -j DROP

-A Drop -p tcp -m multiport --dports 135,139,445 -j DROP

-A Drop -p udp -m udp --dport 1900 -j DROP

-A Drop -p tcp -j dropNotSyn

-A Drop -p udp -m udp --sport 53 -j DROP

-A Ifw -m set --set ifw_wl src -j RETURN

-A Ifw -m set --set ifw_bl src -j DROP

-A Ifw -m state --state INVALID,NEW -m psd --psd-weight-threshold 10 --psd-delay-threshold 10000 --psd-lo-ports-weight 2 --psd-hi-ports-weight 1 -j IFWLOG --log-prefix "SCAN"

-A Reject -p tcp -m tcp --dport 113 -j reject

-A Reject -j dropBcast

-A Reject -p icmp -m icmp --icmp-type 3/4 -j ACCEPT

-A Reject -p icmp -m icmp --icmp-type 11 -j ACCEPT

-A Reject -j dropInvalid

-A Reject -p udp -m multiport --dports 135,445 -j reject

-A Reject -p udp -m udp --dport 137:139 -j reject

-A Reject -p udp -m udp --sport 137 --dport 1024:65535 -j reject

-A Reject -p tcp -m multiport --dports 135,139,445 -j reject

-A Reject -p udp -m udp --dport 1900 -j DROP

-A Reject -p tcp -j dropNotSyn

-A Reject -p udp -m udp --sport 53 -j DROP

-A all2fw -m state --state RELATED,ESTABLISHED -j ACCEPT

-A all2fw -j Reject

-A all2fw -j LOG --log-prefix "Shorewall:all2fw:REJECT:" --log-level 6

-A all2fw -j reject

-A all2net -m state --state RELATED,ESTABLISHED -j ACCEPT

-A all2net -j Reject

-A all2net -j LOG --log-prefix "Shorewall:all2net:REJECT:" --log-level 6

-A all2net -j reject

-A dropBcast -m addrtype --dst-type BROADCAST -j DROP

-A dropBcast -d 224.0.0.0/4 -j DROP

-A dropInvalid -m state --state INVALID -j DROP

-A dropNotSyn -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP

-A fw2all -m state --state RELATED,ESTABLISHED -j ACCEPT

-A fw2all -j Reject

-A fw2all -j LOG --log-prefix "Shorewall:fw2all:REJECT:" --log-level 6

-A fw2all -j reject

-A fw2net -m state --state RELATED,ESTABLISHED -j ACCEPT

-A fw2net -j ACCEPT

-A logdrop -j DROP

-A logreject -j reject

-A net2fw -m state --state RELATED,ESTABLISHED -j ACCEPT

-A net2fw -j Drop

-A net2fw -j LOG --log-prefix "Shorewall:net2fw:DROP:" --log-level 6

-A net2fw -j DROP

-A ppp0_fwd -m state --state INVALID,NEW -j dynamic

-A ppp0_in -m state --state INVALID,NEW -j dynamic

-A ppp0_in -j net2fw

-A ppp0_out -j fw2net

-A reject -m addrtype --src-type BROADCAST -j DROP

-A reject -s 224.0.0.0/4 -j DROP

-A reject -p tcp -j REJECT --reject-with tcp-reset

-A reject -p udp -j REJECT --reject-with icmp-port-unreachable

-A reject -p icmp -j REJECT --reject-with icmp-host-unreachable

-A reject -j REJECT --reject-with icmp-host-prohibited

-A smurfs -s 0.0.0.0/32 -j RETURN

-A smurfs -m addrtype --src-type BROADCAST -j LOG --log-prefix "Shorewall:smurfs:DROP:" --log-level 6

-A smurfs -m addrtype --src-type BROADCAST -j DROP

-A smurfs -s 224.0.0.0/4 -j LOG --log-prefix "Shorewall:smurfs:DROP:" --log-level 6

-A smurfs -s 224.0.0.0/4 -j DROP

COMMIT

# Completed on Sun Jul 4 00:33:32 2010

[root@localhost katharine]#

(roobal) #6

Reguły ustawione są dla interfejsu sieciowego ppp0 , domniemam że korzystasz z jakiegoś modemu DSL/Adsl?

Pozdrawiam!

PS. Jak używasz su -c polecenie to nie trzeba się już logować na roota, bo to polecenie będzie jednorazowo wykonane z prawami roota, dlatego specjalnie tak podałem :wink: