OpenVZ Forum


Home » General » Support » *BUG REPORTED* 2.6.18-ovz028stab033.1 kernel panic
icon9.gif  *BUG REPORTED* 2.6.18-ovz028stab033.1 kernel panic [message #13705] Mon, 04 June 2007 07:46 Go to next message
goeldi
Messages: 92
Registered: June 2006
Member
Yesterday at 4am I got this kernel panic.
This is kernel 2.6.18-ovz028stab033.1 on a CentOS 4.5 system with an AMD Athlon 64 Processor 3200+.

No /var/log/messages entry between 01:13 and 04:02 and then this:

Jun  3 04:40:19 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun  3 04:40:19 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun  3 04:40:19 hn kernel:  [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun  3 04:40:19 hn kernel:  [<c01b287e>] proc_lookup+0xbe/0x240
Jun  3 04:40:19 hn kernel:  [<c0182981>] real_lookup+0xb1/0xe0
Jun  3 04:40:19 hn kernel:  [<c0182d3d>] do_lookup+0xad/0xd0
Jun  3 04:40:19 hn kernel:  [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun  3 04:40:19 hn kernel:  [<c0183d62>] link_path_walk+0x62/0x140
Jun  3 04:40:19 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:19 hn kernel:  [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun  3 04:40:19 hn kernel:  [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun  3 04:40:19 hn kernel:  [<c01843d5>] path_lookup_open+0x35/0x40
Jun  3 04:40:19 hn kernel:  [<c0184da3>] open_namei+0x93/0x740
Jun  3 04:40:19 hn kernel:  [<c017289a>] do_filp_open+0x3a/0x60
Jun  3 04:40:19 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:19 hn kernel:  [<c0172c13>] do_sys_open+0x63/0x110
Jun  3 04:40:19 hn kernel:  [<c0172ce7>] sys_open+0x27/0x30
Jun  3 04:40:19 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  3 04:40:19 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun  3 04:40:20 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun  3 04:40:20 hn kernel:  [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun  3 04:40:20 hn kernel:  [<c01b287e>] proc_lookup+0xbe/0x240
Jun  3 04:40:20 hn kernel:  [<c0182981>] real_lookup+0xb1/0xe0
Jun  3 04:40:20 hn kernel:  [<c0182d3d>] do_lookup+0xad/0xd0
Jun  3 04:40:20 hn kernel:  [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun  3 04:40:20 hn kernel:  [<c0183d62>] link_path_walk+0x62/0x140
Jun  3 04:40:20 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:20 hn kernel:  [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun  3 04:40:20 hn kernel:  [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun  3 04:40:20 hn kernel:  [<c01843d5>] path_lookup_open+0x35/0x40
Jun  3 04:40:20 hn kernel:  [<c0184da3>] open_namei+0x93/0x740
Jun  3 04:40:20 hn kernel:  [<c017289a>] do_filp_open+0x3a/0x60
Jun  3 04:40:20 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:20 hn kernel:  [<c0172c13>] do_sys_open+0x63/0x110
Jun  3 04:40:20 hn kernel:  [<c0172ce7>] sys_open+0x27/0x30
Jun  3 04:40:20 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  3 04:40:20 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun  3 04:40:20 hn kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 0000002c
Jun  3 04:40:20 hn kernel:  printing eip:
Jun  3 04:40:20 hn kernel: c020cb22
Jun  3 04:40:20 hn kernel: *pde = 00000000
Jun  3 04:40:20 hn kernel: Oops: 0000 [#1]
Jun  3 04:40:20 hn kernel: Modules linked in: simfs vzethdev vzrst vzcpt vzdquota af_packet xt_length ipt_ttl xt_tcpmss ipt_TCPMSS xt_multiport xt_limit ipt_tos eeprom vznetdev vzmon vzdev iptable_nat ip_nat iptable_mangle ipt_REJECT xt_state ip_conntrack xt_tcpudp iptable_filter ip_tables x_tables thermal processor fan button battery asus_acpi ac ohci_hcd ehci_hcd usbcore shpchp i2c_nforce2 i2c_core forcedeth
Jun  3 04:40:20 hn kernel: CPU:    0, VCPU: 0.0
Jun  3 04:40:20 hn kernel: EIP:    0060:[<c020cb22>]    Not tainted VLI
Jun  3 04:40:20 hn kernel: EFLAGS: 00010286   (2.6.18-ovz028stab033.1 #1) 
Jun  3 04:40:20 hn kernel: EIP is at journal_clean_one_cp_list+0x32/0x70
Jun  3 04:40:20 hn kernel: eax: 00000000   ebx: 00000000   ecx: 00000000   edx: cf6c0ec0
Jun  3 04:40:20 hn kernel: esi: 00000000   edi: 00000000   ebp: 00000000   esp: c1b6ce34
Jun  3 04:40:20 hn kernel: ds: 007b   es: 007b   ss: 0068
Jun  3 04:40:20 hn kernel: Process kjournald (pid: 6465, veid: 0, ti=c1b6c000 task=c1942150 task.ti=c1b6c000)
Jun  3 04:40:20 hn kernel: Stack: cf6c0ec0 cf6c0ee0 00000000 00000019 00000000 c020cb9c cf6c0ec0 c1b6ce54 
Jun  3 04:40:20 hn kernel:        00000000 00000000 f7cc5180 00000001 cf6c0140 c020a24f f7cc5180 917ba1db 
Jun  3 04:40:20 hn kernel:        00007353 00007353 c0608840 917ba1db 00000000 00000000 c0117343 00000000 
Jun  3 04:40:20 hn kernel:  Call Trace:
Jun  3 04:40:20 hn kernel:  [<c020cb9c>] __journal_clean_checkpoint_list+0x3c/0x90

Jun  3 04:40:20 hn kernel:  [<c020a24f>] journal_commit_transaction+0x41f/0x1840
Jun  3 04:40:20 hn kernel:  [<c0117343>] schedule_vcpu+0x273/0x3e0
Jun  3 04:40:20 hn kernel:  [<c0117b9b>] deactivate_task+0x7b/0x100
Jun  3 04:40:20 hn kernel:  [<c0116ff7>] vcpu_put+0x67/0xd0
Jun  3 04:40:20 hn kernel:  [<c0493fbe>] schedule+0x5ae/0x8b0
Jun  3 04:40:20 hn kernel:  [<c020e67f>] kjournald+0x12f/0x380
Jun  3 04:40:20 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  3 04:40:20 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  3 04:40:20 hn kernel:  [<c020e550>] kjournald+0x0/0x380
Jun  3 04:40:20 hn kernel:  [<c01368fd>] kthread+0xbd/0x100
Jun  3 04:40:20 hn kernel:  [<c0136840>] kthread+0x0/0x100
Jun  3 04:40:20 hn kernel:  [<c0101411>] kernel_thread_helper+0x5/0x14
Jun  3 04:40:20 hn kernel: Code: ec 04 8b 5c 24 18 8b 44 24 1c 89 de c7 00 00 00 00 00 31 c0 85 db 74 3c 8b 7b 30 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 89 f3 <8b> 76 2c 89 1c 24 e8 33 f8 ff ff 85 c0 74 06 45 83 f8 02 74 1a 
Jun  3 04:40:20 hn kernel: EIP: [<c020cb22>] journal_clean_one_cp_list+0x32/0x70 SS:ESP 0068:c1b6ce34
Jun  3 04:40:21 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun  3 04:40:21 hn kernel:  [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun  3 04:40:21 hn kernel:  [<c01b287e>] proc_lookup+0xbe/0x240
Jun  3 04:40:21 hn kernel:  [<c0182981>] real_lookup+0xb1/0xe0
Jun  3 04:40:21 hn kernel:  [<c0182d3d>] do_lookup+0xad/0xd0
Jun  3 04:40:21 hn kernel:  [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun  3 04:40:21 hn kernel:  [<c0183d62>] link_path_walk+0x62/0x140
Jun  3 04:40:21 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:21 hn kernel:  [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun  3 04:40:21 hn kernel:  [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun  3 04:40:21 hn kernel:  [<c01843d5>] path_lookup_open+0x35/0x40
Jun  3 04:40:21 hn kernel:  [<c0184da3>] open_namei+0x93/0x740
Jun  3 04:40:21 hn kernel:  [<c017289a>] do_filp_open+0x3a/0x60
Jun  3 04:40:21 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:21 hn kernel:  [<c0172c13>] do_sys_open+0x63/0x110
Jun  3 04:40:21 hn kernel:  [<c0172ce7>] sys_open+0x27/0x30
Jun  3 04:40:21 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  3 04:40:22 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'

Jun  3 10:49:17 hn kernel: ACPI: Interpreter enabled
Jun  3 10:49:17 hn kernel: ACPI: Using IOAPIC for interrupt routing
Jun  3 10:49:17 hn kernel: ACPI: PCI Root Bridge [PCI0] (0000:00)
Jun  3 10:49:17 hn kernel: PCI: Transparent bridge - 0000:00:10.0
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK1] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK2] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK3] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK4] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK5] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK6] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK7] (IRQs 5 7 9 10 *11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK8] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUBA] (IRQs 5 7 9 *10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUBB] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LMAC] (IRQs *5 7 9 10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LACI] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LAZA] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LPMU] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LMCI] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LSMB] (IRQs 5 7 9 10 *11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUB2] (IRQs *5 7 9 10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LIDE] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LSID] (IRQs 5 7 9 10 *11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LFID] (IRQs 5 7 9 *10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC1] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC2] (IRQs 17) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC3] (IRQs 18) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC4] (IRQs 19) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC5] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC6] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC7] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC8] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCF] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCG] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCH] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCJ] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APMU] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [AAZA] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCK] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCS] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCL] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCM] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCZ] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APSI] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APSJ] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:18 hn kernel: SCSI subsystem initialized
Jun  3 10:49:18 hn kernel: PCI: Using ACPI for IRQ routing
Jun  3 10:49:18 hn kernel: PCI: If a device doesn't work, try "pci=routeirq".  If it helps, post a report
Jun  3 10:49:18 hn kernel: PCI: Bridge: 0000:00:03.0
Jun  3 10:49:18 hn kernel:   IO window: 8000-8fff
Jun  3 10:49:18 hn kernel:   MEM window: disabled.
Jun  3 10:49:18 hn mdmonitor: mdadm succeeded
Jun  3 10:49:18 hn kernel:   PREFETCH window: disabled.
Jun  3 10:49:18 hn kernel: PCI: Bridge: 0000:00:04.0
Jun  3 10:49:18 hn kernel:   IO window: 9000-9fff
Jun  3 10:49:18 hn kernel:   MEM window: disabled.
Jun  3 10:49:18 hn kernel:   PREFETCH window: disabled.
Jun  3 10:49:18 hn kernel: PCI: Bridge: 0000:00:10.0
Jun  3 10:49:18 hn kernel:   IO window: a000-afff
Jun  3 10:49:18 hn kernel:   MEM window: disabled.
Jun  3 10:49:18 hn kernel:   PREFETCH window: disabled.


There was no accident in the user_beancounters

This is my /etc/sysconfig/iptables file:

*filter
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
:OUTPUT ACCEPT [0:0]
-P INPUT ACCEPT 
-P FORWARD ACCEPT 
-P OUTPUT ACCEPT
-A INPUT -j RH-Firewall-1-INPUT
#-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 10000 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -s 212.98.47.70 -m tcp -p tcp --dport 19150 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -s 192.168.2.3 -m tcp -p tcp --dport 19150 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
*mangle
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
*nat
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed

[Updated on: Mon, 04 June 2007 07:56] by Moderator

Report message to a moderator

Re: 2.6.18-ovz028stab033.1 kernel panic [message #13706 is a reply to message #13705] Mon, 04 June 2007 07:56 Go to previous messageGo to next message
Vasily Tarasov is currently offline  Vasily Tarasov
Messages: 1345
Registered: January 2006
Senior Member
Thank you for the info: I filled the bug report http://bugzilla.openvz.org/show_bug.cgi?id=605

Vasily
Re: 2.6.18-ovz028stab033.1 kernel panic [message #13780 is a reply to message #13706] Tue, 05 June 2007 08:30 Go to previous messageGo to next message
goeldi
Messages: 92
Registered: June 2006
Member
Here are more log messages. After these, I switched back to 2.6.9 kernel. Though I have 2.6.18 running on two other machines (Pentium 4 with HT enabled and a Core2Duo) without any problems. Could it be related to the fact, that these errors happen on an AMD CPU?

Jun  4 22:56:12 hn kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 00000000
Jun  4 22:56:12 hn kernel:  printing eip:
Jun  4 22:56:12 hn kernel: c01a1d18
Jun  4 22:56:12 hn kernel: *pde = 00000000
Jun  4 22:56:12 hn kernel: Oops: 0000 [#1]
Jun  4 22:56:12 hn kernel: Modules linked in: vznetdev af_packet loop simfs vzethdev vzrst vzcpt vzdquota xt_length ipt_ttl xt_tcpmss ipt_TCPMS
S xt_multiport xt_limit ipt_tos eeprom vzmon vzdev iptable_nat ip_nat iptable_mangle ipt_REJECT xt_state ip_conntrack xt_tcpudp iptable_filter 
ip_tables x_tables thermal processor fan button battery asus_acpi ac ohci_hcd ehci_hcd usbcore shpchp i2c_nforce2 i2c_core forcedeth
Jun  4 22:56:12 hn kernel: CPU:    0, VCPU: 194.0
Jun  4 22:56:12 hn kernel: EIP:    0060:[<c01a1d18>]    Not tainted VLI
Jun  4 22:56:12 hn kernel: EFLAGS: 00010246   (2.6.18-ovz028stab033.1 #1) 
Jun  4 22:56:12 hn kernel: EIP is at inotify_inode_queue_event+0x88/0x120
Jun  4 22:56:12 hn kernel: eax: cb0433ac   ebx: fffffff8   ecx: c6dbda40   edx: fffffff8
Jun  4 22:56:12 hn kernel: esi: 00000000   edi: cb043264   ebp: cb04338c   esp: c6dcdf1c
Jun  4 22:56:12 hn kernel: ds: 007b   es: 007b   ss: 0068
Jun  4 22:56:12 hn kernel: Process sshd (pid: 13217, veid: 194, ti=c6dcd000 task=cb018d70 task.ti=c6dcd000)
Jun  4 22:56:12 hn kernel: Stack: c1affcc0 00000004 009428fb 00000009 c6dcdf04 c6dcdf50 cb043394 00000002 
Jun  4 22:56:12 hn kernel:        fffffff8 00000000 00000000 00000000 00000008 00000008 cb0abcc0 cb043264 
Jun  4 22:56:12 hn kernel:        c6dbd9d8 c01749b8 cb043264 00000008 00000000 00000000 00000000 f7ff06c0 
Jun  4 22:56:12 hn kernel:  Call Trace:
Jun  4 22:56:12 hn kernel:  [<c01749b8>] __fput+0x78/0x190
Jun  4 22:56:12 hn kernel:  [<c0172d96>] filp_close+0x46/0x90
Jun  4 22:56:12 hn kernel:  [<c0172e31>] sys_close+0x51/0x70
Jun  4 22:56:12 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  4 22:56:12 hn kernel: Code: 00 00 00 8d 83 30 01 00 00 89 44 24 18 e8 51 2f 2f 00 8b 83 28 01 00 00 8d 58 f8 8b 53 08 83 ea 08 89 54 24 20
 eb 11 8b 5c 24 20 <8b> 53 08 8d 43 08 83 ea 08 89 54 24 20 39 e8 74 57 8b 73 20 85 
Jun  4 22:56:12 hn kernel: EIP: [<c01a1d18>] inotify_inode_queue_event+0x88/0x120 SS:ESP 0068:c6dcdf1c
Jun  4 22:56:12 hn kernel: swap_free: Bad swap file entry 80000000
Jun  4 22:56:12 hn last message repeated 6 times
Jun  4 22:56:12 hn kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 00000050
Jun  4 22:56:12 hn kernel:  printing eip:
Jun  4 22:56:12 hn kernel: c015c351
Jun  4 22:56:12 hn kernel: *pde = 00000000
Jun  4 22:56:12 hn kernel: Oops: 0000 [#2]
Jun  4 22:56:12 hn kernel: Modules linked in: vznetdev af_packet loop simfs vzethdev vzrst vzcpt vzdquota xt_length ipt_ttl xt_tcpmss ipt_TCPMS
S xt_multiport xt_limit ipt_tos eeprom vzmon vzdev iptable_nat ip_nat iptable_mangle ipt_REJECT xt_state ip_conntrack xt_tcpudp iptable_filter 
ip_tables x_tables thermal processor fan button battery asus_acpi ac ohci_hcd ehci_hcd usbcore shpchp i2c_nforce2 i2c_core forcedeth
Jun  4 22:56:12 hn kernel: CPU:    0, VCPU: 194.0
Jun  4 22:56:12 hn kernel: EIP:    0060:[<c015c351>]    Not tainted VLI
Jun  4 22:56:12 hn kernel: EFLAGS: 00010202   (2.6.18-ovz028stab033.1 #1) 
Jun  4 22:56:12 hn kernel: EIP is at vma_prio_tree_remove+0x51/0x150
Jun  4 22:56:12 hn kernel: eax: dd58f94c   ebx: d792995c   ecx: f7fb4c00   edx: dd58f938
Jun  4 22:56:12 hn kernel: esi: 00000020   edi: b7c2f000   ebp: dd58f94c   esp: c6dcddb0
Jun  4 22:56:12 hn kernel: ds: 007b   es: 007b   ss: 0068
Jun  4 22:56:12 hn kernel: Process sshd (pid: 13217, veid: 194, ti=c6dcd000 task=cb018d70 task.ti=c6dcd000)
Jun  4 22:56:12 hn kernel: Stack: c015e5d6 c0607f1c d556f800 e0011224 d792995c b7c2f000 00000000 c0162204 
Jun  4 22:56:12 hn kernel:        d792995c dd58f94c dd58f938 c015e6ad d792995c 80000000 80072000 00000000 
Jun  4 22:56:12 hn kernel:        b7c2f000 c6dcde20 d7929320 f7fd9240 00000001 c01645dd c6dcde20 d7929320 
Jun  4 22:56:12 hn kernel:  Call Trace:
Jun  4 22:56:12 hn kernel:  [<c015e5d6>] free_pgd_range+0x106/0x1a0
Jun  4 22:56:12 hn kernel:  [<c0162204>] unlink_file_vma+0x24/0x30
Jun  4 22:56:12 hn kernel:  [<c015e6ad>] free_pgtables+0x3d/0x90
Jun  4 22:56:12 hn kernel:  [<c01645dd>] exit_mmap+0x8d/0xf0
Jun  4 22:56:12 hn kernel:  [<c011d2c6>] mmput+0x26/0xb0
Jun  4 22:56:12 hn kernel:  [<c012352b>] do_exit+0x10b/0x420
Jun  4 22:56:12 hn kernel:  [<c0104553>] die+0x213/0x220
Jun  4 22:56:12 hn kernel:  [<c0120cf0>] vprintk+0x30/0x50
Jun  4 22:56:12 hn kernel:  [<c0115dac>] do_page_fault+0x30c/0x580
Jun  4 22:56:12 hn kernel:  [<c0115aa0>] do_page_fault+0x0/0x580
Jun  4 22:56:12 hn kernel:  [<c0103bd5>] error_code+0x39/0x40
Jun  4 22:56:12 hn kernel:  [<c01a1d18>] inotify_inode_queue_event+0x88/0x120
Jun  4 22:56:12 hn kernel:  [<c01749b8>] __fput+0x78/0x190
Jun  4 22:56:12 hn kernel:  [<c0172d96>] filp_close+0x46/0x90
Jun  4 22:56:12 hn kernel:  [<c0172e31>] sys_close+0x51/0x70
Jun  4 22:56:12 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  4 22:56:12 hn kernel: Code: d2 75 79 8d 43 24 8b 53 24 8b 48 04 89 4a 04 89 11 89 40 04 89 43 24 8b 5c 24 0c 8b 74 24 10 8b 7c 24 14 8b 6c
 24 18 83 c4 1c c3 <39> 5e 30 0f 85 d7 00 00 00 8b 43 2c 85 c0 74 64 8b 56 24 8d 4e 
Jun  4 22:56:12 hn kernel: EIP: [<c015c351>] vma_prio_tree_remove+0x51/0x150 SS:ESP 0068:c6dcddb0
Jun  4 22:56:12 hn kernel: Fixing recursive fault but reboot is needed!
Jun  4 22:56:12 hn kernel: Assertion failure in __journal_file_buffer() at fs/jbd/transaction.c:1942: "jh->b_transaction == transaction || jh->
b_transaction == 0"
Jun  4 22:56:12 hn kernel: Stack=c1bb6e00 current=c1bfc290 pid=6472 ve=0 comm='kjournald'
Jun  4 22:56:12 hn kernel:  [<c020971d>] __journal_file_buffer+0x18d/0x3a0
Jun  4 22:56:12 hn kernel:  [<c020994f>] journal_file_buffer+0x1f/0x30
Jun  4 22:56:12 hn kernel:  [<c020ecfa>] journal_write_metadata_buffer+0x25a/0x340
Jun  4 22:56:13 hn kernel:  [<c020a572>] journal_commit_transaction+0x742/0x1840
Jun  4 22:56:13 hn kernel:  [<c0117b9b>] deactivate_task+0x7b/0x100
Jun  4 22:56:13 hn kernel:  [<c0493f8b>] schedule+0x57b/0x8b0
Jun  4 22:56:13 hn kernel:  [<c020e67f>] kjournald+0x12f/0x380
Jun  4 22:56:13 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  4 22:56:13 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  4 22:56:13 hn kernel:  [<c020e550>] kjournald+0x0/0x380
Jun  4 22:56:13 hn kernel:  [<c01368fd>] kthread+0xbd/0x100
Jun  4 22:56:13 hn kernel:  [<c0136840>] kthread+0x0/0x100
Jun  4 22:56:13 hn kernel:  [<c0101411>] kernel_thread_helper+0x5/0x14
Jun  4 22:56:13 hn kernel: Assertion failure in __journal_temp_unlink_buffer() at fs/jbd/transaction.c:1512: "transaction->t_nr_buffers >= 0"
Jun  4 22:56:13 hn kernel: Stack=c1bb6db8 current=c1bfc290 pid=6472 ve=0 comm='kjournald'
Jun  4 22:56:13 hn kernel:  [<c0208f00>] __journal_temp_unlink_buffer+0x280/0x290
Jun  4 22:56:13 hn kernel:  [<c0104032>] dump_stack+0x22/0x40
Jun  4 22:56:13 hn kernel:  [<c020964c>] __journal_file_buffer+0xbc/0x3a0
Jun  4 22:56:13 hn kernel:  [<c020994f>] journal_file_buffer+0x1f/0x30
Jun  4 22:56:13 hn kernel:  [<c020ecfa>] journal_write_metadata_buffer+0x25a/0x340
Jun  4 22:56:13 hn kernel:  [<c020a572>] journal_commit_transaction+0x742/0x1840
Jun  4 22:56:13 hn kernel:  [<c0117b9b>] deactivate_task+0x7b/0x100
Jun  4 22:56:13 hn kernel:  [<c0493f8b>] schedule+0x57b/0x8b0
Jun  4 22:56:13 hn kernel:  [<c020e67f>] kjournald+0x12f/0x380
Jun  4 22:56:13 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  4 22:56:13 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  4 22:56:13 hn kernel:  [<c020e550>] kjournald+0x0/0x380
Jun  4 22:56:13 hn kernel:  [<c01368fd>] kthread+0xbd/0x100
Jun  4 22:56:13 hn kernel:  [<c0136840>] kthread+0x0/0x100
Jun  4 22:56:13 hn kernel:  [<c0101411>] kernel_thread_helper+0x5/0x14
Jun  4 22:56:13 hn kernel: BUG: unable to handle kernel paging request at virtual address 4e6518fe
Jun  4 22:56:13 hn kernel:  printing eip:
Jun  4 22:56:13 hn kernel: c020969e
Jun  4 22:56:13 hn kernel: *pde = 00000000
Jun  4 22:56:13 hn kernel: Oops: 0002 [#3]
Jun  4 22:56:13 hn kernel: Modules linked in: vznetdev af_packet loop simfs vzethdev vzrst vzcpt vzdquota xt_length ipt_ttl xt_tcpmss ipt_TCPMS
S xt_multiport xt_limit ipt_tos eeprom vzmon vzdev iptable_nat ip_nat iptable_mangle ipt_REJECT xt_state ip_conntrack xt_tcpudp iptable_filter 
ip_tables x_tables thermal processor fan button battery asus_acpi ac ohci_hcd ehci_hcd usbcore shpchp i2c_nforce2 i2c_core forcedeth
Jun  4 22:56:13 hn kernel: CPU:    0, VCPU: 0.0
Jun  4 22:56:13 hn kernel: EIP:    0060:[<c020969e>]    Not tainted VLI
Jun  4 22:56:13 hn kernel: EFLAGS: 00010282   (2.6.18-ovz028stab033.1 #1) 
Jun  4 22:56:13 hn kernel: EIP is at __journal_file_buffer+0x10e/0x3a0
Jun  4 22:56:13 hn kernel: eax: 4e6518de   ebx: edf8b3ac   ecx: 00000000   edx: e34c62a7
Jun  4 22:56:13 hn kernel: esi: e14e6dd4   edi: 00000004   ebp: d0b1bc70   esp: c1bb6dd8
Jun  4 22:56:13 hn kernel: ds: 007b   es: 007b   ss: 0068
Jun  4 22:56:13 hn kernel: Process kjournald (pid: 6472, veid: 0, ti=c1bb6000 task=c1bfc290 task.ti=c1bb6000)
Jun  4 22:56:13 hn kernel: Stack: e34c6754 c1bb6e00 c1bfc290 00001948 00000000 c1bfc434 00000000 d0b1bc70 
Jun  4 22:56:13 hn kernel:        00000296 f7ff32c0 edf8b3ac 00000850 e14e6dd4 00000005 c142e49c 00000000 
Jun  4 22:56:13 hn kernel:        c020994f e14e6dd4 d0b1bc40 00000004 c020ed13 e14e6dd4 d0b1bc40 00000004 
Jun  4 22:56:13 hn kernel:  Call Trace:
Jun  4 22:56:13 hn kernel:  [<c020994f>] journal_file_buffer+0x1f/0x30
Jun  4 22:56:13 hn kernel:  [<c020ed13>] journal_write_metadata_buffer+0x273/0x340
Jun  4 22:56:13 hn kernel:  [<c020a572>] journal_commit_transaction+0x742/0x1840
Jun  4 22:56:13 hn kernel:  [<c0117b9b>] deactivate_task+0x7b/0x100
Jun  4 22:56:13 hn kernel:  [<c0493f8b>] schedule+0x57b/0x8b0
Jun  4 22:56:13 hn kernel:  [<c020e67f>] kjournald+0x12f/0x380
Jun  4 22:56:13 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  4 22:56:13 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  4 22:56:13 hn kernel:  [<c020e550>] kjournald+0x0/0x380
Jun  4 22:56:13 hn kernel:  [<c01368fd>] kthread+0xbd/0x100
Jun  4 22:56:13 hn kernel:  [<c0136840>] kthread+0x0/0x100
Jun  4 22:56:13 hn kernel:  [<c0101411>] kernel_thread_helper+0x5/0x14
Jun  4 22:56:13 hn kernel: Code: 7e 08 8b 54 24 18 85 d2 74 04 0f ba 2b 13 8b 5c 24 30 8b 74 24 34 8b 7c 24 38 8b 6c 24 3c 83 c4 40 c3 89 56 20
 8b 42 24 89 46 24 <89> 70 20 89 72 24 eb cc c7 04 24 40 10 4d c0 b8 30 37 4d c0 b9 
Jun  4 22:56:13 hn kernel: EIP: [<c020969e>] __journal_file_buffer+0x10e/0x3a0 SS:ESP 0068:c1bb6dd8
Jun  4 22:56:13 hn kernel: Bad page state in process 'syslogd'
Jun  4 22:56:13 hn kernel: page:c11454ac flags:0x80000020 mapping:00000000 mapcount:0 count:0
Jun  4 22:56:13 hn kernel: Trying to fix it up, but a reboot is needed
Jun  4 22:56:13 hn kernel: Backtrace:
Jun  4 22:56:13 hn kernel:  [<c015599f>] bad_page+0x5f/0xa0
Jun  4 22:56:13 hn kernel:  [<c0155e8c>] prep_new_page+0x4c/0x1c0
Jun  4 22:56:13 hn kernel:  [<c015655b>] buffered_rmqueue+0x7b/0x110
Jun  4 22:56:13 hn kernel:  [<c015655b>] buffered_rmqueue+0x7b/0x110
Jun  4 22:56:13 hn kernel:  [<c0156792>] get_page_from_freelist+0xc2/0xf0
Jun  4 22:56:13 hn kernel:  [<c0156956>] __alloc_pages+0x66/0x3c0
Jun  4 22:56:13 hn kernel:  [<c0160c81>] do_anonymous_page+0x61/0x1e0
Jun  4 22:56:13 hn kernel:  [<c01613ae>] __handle_mm_fault+0x1be/0x2c0
Jun  4 22:56:13 hn kernel:  [<c0115bce>] do_page_fault+0x12e/0x580
Jun  4 22:56:13 hn kernel:  [<c0115aa0>] do_page_fault+0x0/0x580
Jun  4 22:56:13 hn kernel:  [<c0103bd5>] error_code+0x39/0x40
Jun  4 22:57:13 hn kernel: Bad pte = 4d49f6a4, process = ???, vm_flags = 100075, vaddr = b8002020
Jun  4 22:57:13 hn kernel:  [<c015e8b6>] vm_normal_page+0x86/0x90
Jun  4 22:57:13 hn kernel:  [<c015ee5c>] zap_pte_range+0x13c/0x290
Jun  4 22:57:13 hn kernel:  [<c015f074>] unmap_page_range+0xc4/0x160
Jun  4 22:57:13 hn kernel:  [<c015f1e0>] unmap_vmas+0xd0/0x1b0
Jun  4 22:57:13 hn kernel:  [<c01645b9>] exit_mmap+0x69/0xf0
Jun  4 22:57:13 hn kernel:  [<c011d2c6>] mmput+0x26/0xb0
Jun  4 22:57:13 hn kernel:  [<c012352b>] do_exit+0x10b/0x420
Jun  4 22:57:13 hn kernel:  [<c012389b>] do_group_exit+0x2b/0x80
Jun  4 22:57:13 hn kernel:  [<c0115aa0>] do_page_fault+0x0/0x580
Jun  4 22:57:13 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  4 22:57:13 hn kernel: ------------[ cut here ]------------
Jun  4 22:57:13 hn kernel: kernel BUG at mm/rmap.c:529!
Jun  4 22:57:13 hn kernel: invalid opcode: 0000 [#4]
Jun  4 22:58:14 hn syslogd 1.4.1: restart.
Jun  4 22:58:14 hn syslog: syslogd startup succeeded
Jun  4 22:58:14 hn kernel: klogd 1.4.1, log source = /proc/kmsg started.
Jun  4 22:58:14 hn kernel: Linux version 2.6.18-ovz028stab033.1 (root@centos-32-build) (gcc version 3.4.4 20050721 (Red Hat 3.4.4-2)) #1 Thu Ma
y 24 15:09:26 MSD 2007
Jun  4 22:58:14 hn kernel: BIOS-provided physical RAM map:
Jun  4 22:58:14 hn kernel:  BIOS-e820: 0000000000000000 - 000000000009d000 (usable)
Jun  4 22:58:14 hn kernel:  BIOS-e820: 000000000009f800 - 00000000000a0000 (reserved)
Jun  4 22:58:14 hn kernel:  BIOS-e820: 00000000000f0000 - 0000000000100000 (reserved)
Jun  4 22:58:14 hn kernel:  BIOS-e820: 0000000000100000 - 000000003bff0000 (usable)
Jun  4 22:58:14 hn kernel:  BIOS-e820: 000000003bff0000 - 000000003bff3000 (ACPI NVS)
Jun  4 22:58:14 hn kernel:  BIOS-e820: 000000003bff3000 - 000000003c000000 (ACPI data)
Jun  4 22:58:14 hn kernel:  BIOS-e820: 000000003c000000 - 0000000040000000 (reserved)
Jun  4 22:58:14 hn kernel:  BIOS-e820: 00000000f0000000 - 00000000f2000000 (reserved)
Re: 2.6.18-ovz028stab033.1 kernel panic [message #13781 is a reply to message #13780] Tue, 05 June 2007 09:22 Go to previous message
Vasily Tarasov is currently offline  Vasily Tarasov
Messages: 1345
Registered: January 2006
Senior Member
Hmmm... Can you perform Hardware Testing on this machine (http://wiki.openvz.org/Hardware_testing), please?

Thanks,
Vasily
Previous Topic: *SUGGESTION* make an equivalent of Vmware VMTN
Next Topic: Good Tutoral to set CONF files
Goto Forum:
  


Current Time: Wed Nov 06 09:11:55 GMT 2024

Total time taken to generate the page: 0.03338 seconds