[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#648004: linux-image-2.6.32-5-xen-amd64: tc(8) Oopses, unable to establish new connections afterwards



On Tue, Nov 08, 2011 at 01:29:34PM +0100, Bastian Blank wrote:
>severity 648004 normal
>thanks
>
>On Tue, Nov 08, 2011 at 10:15:33AM +0100, Bernhard Reutner-Fischer wrote:
>> On debian 6.0.2 i am running a XEN guest with 2.6.32-5-xen-amd64
>> from linux-image-2.6.32-5-xen-amd64 (version 2.6.32-35).
>
>This is neither the latest version (2.6.32-38 is it) nor is it
>supported (use the non -xen variant).

Works fine with 3.0.0-1-amd64 (linux-image-3.0.0-1-amd64 v3.0.0-3) from
testing.

Same thing happens with current, stable version (2.6.32-38) of linux-image-2.6.32-5-xen-amd64

[  382.049709] HTB: quantum of class 10666 is big. Consider r2q change.
[  382.086646] u32 classifier
[  382.086652]     Performance counters on
[  382.086655]     input device check on 
[  382.086658]     Actions configured 
[  382.097749] BUG: unable to handle kernel NULL pointer dereference at (null)
[  382.097760] IP: [<(null)>] (null)
[  382.097765] PGD fdcc3067 PUD fdcf6067 PMD 0 
[  382.097772] Oops: 0010 [#1] SMP 
[  382.097777] last sysfs file: /sys/devices/virtual/net/lo/operstate
[  382.097782] CPU 0 
[  382.097786] Modules linked in: act_police cls_u32 sch_sfq sch_htb snd_pcm snd_timer snd soundcore snd_page_alloc evdev pcspkr ext4 mbcache jbd2 crc16 xen_netfront xen_blkfront
[  382.097812] Pid: 1036, comm: tc Not tainted 2.6.32-5-xen-amd64 #1 
[  382.097817] RIP: e030:[<0000000000000000>]  [<(null)>] (null)
[  382.097822] RSP: e02b:ffff8800fdce1940  EFLAGS: 00010282
[  382.097827] RAX: ffffffffa0106c80 RBX: ffff8800fea0fe40 RCX: 00000000416e3e1a
[  382.097832] RDX: 0000000000020000 RSI: 0000000000000000 RDI: ffff8800fd8c8000
[  382.097837] RBP: ffff8800ffa4ef00 R08: ffff8800ffc03100 R09: ffff880000009680
[  382.097841] R10: 0000000000000001 R11: 0000000000000001 R12: ffff8800ffa4ea40
[  382.097847] R13: ffff8800fea0fe40 R14: ffff8800fdce19b8 R15: 0000000000000000
[  382.097855] FS:  00007fef5deed700(0000) GS:ffff8800038ad000(0000) knlGS:0000000000000000
[  382.097861] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[  382.097865] CR2: 0000000000000000 CR3: 00000000fe4d9000 CR4: 0000000000002660
[  382.097870] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  382.097875] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[  382.097881] Process tc (pid: 1036, threadinfo ffff8800fdce0000, task ffff880002c10000)
[  382.097886] Stack:
[  382.097889]  ffffffffa010d7b8 ffff8800ffb15ea0 ffffffffa010dabe 000000200040003d
[  382.097896] <0> ffff8800fea0fe40 ffff8800fd348488 0000000080000800 ffff8800ffa4ef00
[  382.097906] <0> ffff8800fdce1aa8 ffff8800ffa4ea40 ffffffffa010db3c 0000000000000002
[  382.097916] Call Trace:
[  382.097922]  [<ffffffffa010d7b8>] ? u32_set_parms+0xbd/0x143 [cls_u32]
[  382.097929]  [<ffffffffa010dabe>] ? u32_change+0x280/0x39c [cls_u32]
[  382.097935]  [<ffffffffa010db3c>] ? u32_change+0x2fe/0x39c [cls_u32]
[  382.097943]  [<ffffffff81276add>] ? tc_ctl_tfilter+0x4ea/0x5af
[  382.097951]  [<ffffffff8100e635>] ? xen_force_evtchn_callback+0x9/0xa
[  382.097957]  [<ffffffff8127b480>] ? netlink_sendmsg+0x162/0x255
[  382.097964]  [<ffffffff81269dc3>] ? rtnetlink_rcv_msg+0x0/0x1f5
[  382.097970]  [<ffffffff8127b040>] ? netlink_rcv_skb+0x34/0x7c
[  382.097976]  [<ffffffff81269dbd>] ? rtnetlink_rcv+0x1f/0x25
[  382.097981]  [<ffffffff8127ae34>] ? netlink_unicast+0xe2/0x148
[  382.097988]  [<ffffffff812588f9>] ? __alloc_skb+0x69/0x15a
[  382.097993]  [<ffffffff8127b560>] ? netlink_sendmsg+0x242/0x255
[  382.098000]  [<ffffffff81251265>] ? sock_sendmsg+0xa3/0xbb
[  382.098006]  [<ffffffff81251169>] ? sock_recvmsg+0xa6/0xbe
[  382.098012]  [<ffffffff81065f86>] ? autoremove_wake_function+0x0/0x2e
[  382.098018]  [<ffffffff81065f86>] ? autoremove_wake_function+0x0/0x2e
[  382.098024]  [<ffffffff81259c64>] ? verify_iovec+0x46/0x96
[  382.098029]  [<ffffffff812514a7>] ? sys_sendmsg+0x22a/0x2b5
[  382.098036]  [<ffffffff8100ecf2>] ? check_events+0x12/0x20
[  382.098043]  [<ffffffff8115453f>] ? cap_file_free_security+0x0/0x1
[  382.098050]  [<ffffffff8130fb26>] ? do_page_fault+0x2e0/0x2fc
[  382.098056]  [<ffffffff81011b42>] ? system_call_fastpath+0x16/0x1b
[  382.098060] Code:  Bad RIP value.
[  382.098068] RIP  [<(null)>] (null)
[  382.098072]  RSP <ffff8800fdce1940>
[  382.098076] CR2: 0000000000000000
[  382.098080] ---[ end trace 68f04f1376e5fcff ]---


>
>> The bug sounds like it comes from the openvirtuozzo patch.
>
>Which is not available in this package.

Are you sure?
The patch contains this hunk in the ChangeLog:
+  [ maximilian attems]
+  * Update openvz patch to feoktistov (ipv6, checkpointing, stability,
+    ipsec, nfs, ppp, tc, ve). (closes: #607041, #613501, #613170)

--- they touch tc! ---^

Maximilian, can you reproduce this?

thanks,



Reply to: