OpenVZ Forum


Home » General » Support » *BUG REPORTED* 2.6.18-ovz028stab033.1 kernel panic
icon9.gif  *BUG REPORTED* 2.6.18-ovz028stab033.1 kernel panic [message #13705] Mon, 04 June 2007 07:46 Go to previous message
goeldi
Messages: 92
Registered: June 2006
Member
Yesterday at 4am I got this kernel panic.
This is kernel 2.6.18-ovz028stab033.1 on a CentOS 4.5 system with an AMD Athlon 64 Processor 3200+.

No /var/log/messages entry between 01:13 and 04:02 and then this:

Jun  3 04:40:19 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun  3 04:40:19 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun  3 04:40:19 hn kernel:  [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun  3 04:40:19 hn kernel:  [<c01b287e>] proc_lookup+0xbe/0x240
Jun  3 04:40:19 hn kernel:  [<c0182981>] real_lookup+0xb1/0xe0
Jun  3 04:40:19 hn kernel:  [<c0182d3d>] do_lookup+0xad/0xd0
Jun  3 04:40:19 hn kernel:  [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun  3 04:40:19 hn kernel:  [<c0183d62>] link_path_walk+0x62/0x140
Jun  3 04:40:19 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:19 hn kernel:  [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun  3 04:40:19 hn kernel:  [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun  3 04:40:19 hn kernel:  [<c01843d5>] path_lookup_open+0x35/0x40
Jun  3 04:40:19 hn kernel:  [<c0184da3>] open_namei+0x93/0x740
Jun  3 04:40:19 hn kernel:  [<c017289a>] do_filp_open+0x3a/0x60
Jun  3 04:40:19 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:19 hn kernel:  [<c0172c13>] do_sys_open+0x63/0x110
Jun  3 04:40:19 hn kernel:  [<c0172ce7>] sys_open+0x27/0x30
Jun  3 04:40:19 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  3 04:40:19 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun  3 04:40:20 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun  3 04:40:20 hn kernel:  [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun  3 04:40:20 hn kernel:  [<c01b287e>] proc_lookup+0xbe/0x240
Jun  3 04:40:20 hn kernel:  [<c0182981>] real_lookup+0xb1/0xe0
Jun  3 04:40:20 hn kernel:  [<c0182d3d>] do_lookup+0xad/0xd0
Jun  3 04:40:20 hn kernel:  [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun  3 04:40:20 hn kernel:  [<c0183d62>] link_path_walk+0x62/0x140
Jun  3 04:40:20 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:20 hn kernel:  [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun  3 04:40:20 hn kernel:  [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun  3 04:40:20 hn kernel:  [<c01843d5>] path_lookup_open+0x35/0x40
Jun  3 04:40:20 hn kernel:  [<c0184da3>] open_namei+0x93/0x740
Jun  3 04:40:20 hn kernel:  [<c017289a>] do_filp_open+0x3a/0x60
Jun  3 04:40:20 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:20 hn kernel:  [<c0172c13>] do_sys_open+0x63/0x110
Jun  3 04:40:20 hn kernel:  [<c0172ce7>] sys_open+0x27/0x30
Jun  3 04:40:20 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  3 04:40:20 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun  3 04:40:20 hn kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 0000002c
Jun  3 04:40:20 hn kernel:  printing eip:
Jun  3 04:40:20 hn kernel: c020cb22
Jun  3 04:40:20 hn kernel: *pde = 00000000
Jun  3 04:40:20 hn kernel: Oops: 0000 [#1]
Jun  3 04:40:20 hn kernel: Modules linked in: simfs vzethdev vzrst vzcpt vzdquota af_packet xt_length ipt_ttl xt_tcpmss ipt_TCPMSS xt_multiport xt_limit ipt_tos eeprom vznetdev vzmon vzdev iptable_nat ip_nat iptable_mangle ipt_REJECT xt_state ip_conntrack xt_tcpudp iptable_filter ip_tables x_tables thermal processor fan button battery asus_acpi ac ohci_hcd ehci_hcd usbcore shpchp i2c_nforce2 i2c_core forcedeth
Jun  3 04:40:20 hn kernel: CPU:    0, VCPU: 0.0
Jun  3 04:40:20 hn kernel: EIP:    0060:[<c020cb22>]    Not tainted VLI
Jun  3 04:40:20 hn kernel: EFLAGS: 00010286   (2.6.18-ovz028stab033.1 #1) 
Jun  3 04:40:20 hn kernel: EIP is at journal_clean_one_cp_list+0x32/0x70
Jun  3 04:40:20 hn kernel: eax: 00000000   ebx: 00000000   ecx: 00000000   edx: cf6c0ec0
Jun  3 04:40:20 hn kernel: esi: 00000000   edi: 00000000   ebp: 00000000   esp: c1b6ce34
Jun  3 04:40:20 hn kernel: ds: 007b   es: 007b   ss: 0068
Jun  3 04:40:20 hn kernel: Process kjournald (pid: 6465, veid: 0, ti=c1b6c000 task=c1942150 task.ti=c1b6c000)
Jun  3 04:40:20 hn kernel: Stack: cf6c0ec0 cf6c0ee0 00000000 00000019 00000000 c020cb9c cf6c0ec0 c1b6ce54 
Jun  3 04:40:20 hn kernel:        00000000 00000000 f7cc5180 00000001 cf6c0140 c020a24f f7cc5180 917ba1db 
Jun  3 04:40:20 hn kernel:        00007353 00007353 c0608840 917ba1db 00000000 00000000 c0117343 00000000 
Jun  3 04:40:20 hn kernel:  Call Trace:
Jun  3 04:40:20 hn kernel:  [<c020cb9c>] __journal_clean_checkpoint_list+0x3c/0x90

Jun  3 04:40:20 hn kernel:  [<c020a24f>] journal_commit_transaction+0x41f/0x1840
Jun  3 04:40:20 hn kernel:  [<c0117343>] schedule_vcpu+0x273/0x3e0
Jun  3 04:40:20 hn kernel:  [<c0117b9b>] deactivate_task+0x7b/0x100
Jun  3 04:40:20 hn kernel:  [<c0116ff7>] vcpu_put+0x67/0xd0
Jun  3 04:40:20 hn kernel:  [<c0493fbe>] schedule+0x5ae/0x8b0
Jun  3 04:40:20 hn kernel:  [<c020e67f>] kjournald+0x12f/0x380
Jun  3 04:40:20 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  3 04:40:20 hn kernel:  [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun  3 04:40:20 hn kernel:  [<c020e550>] kjournald+0x0/0x380
Jun  3 04:40:20 hn kernel:  [<c01368fd>] kthread+0xbd/0x100
Jun  3 04:40:20 hn kernel:  [<c0136840>] kthread+0x0/0x100
Jun  3 04:40:20 hn kernel:  [<c0101411>] kernel_thread_helper+0x5/0x14
Jun  3 04:40:20 hn kernel: Code: ec 04 8b 5c 24 18 8b 44 24 1c 89 de c7 00 00 00 00 00 31 c0 85 db 74 3c 8b 7b 30 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 89 f3 <8b> 76 2c 89 1c 24 e8 33 f8 ff ff 85 c0 74 06 45 83 f8 02 74 1a 
Jun  3 04:40:20 hn kernel: EIP: [<c020cb22>] journal_clean_one_cp_list+0x32/0x70 SS:ESP 0068:c1b6ce34
Jun  3 04:40:21 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun  3 04:40:21 hn kernel:  [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun  3 04:40:21 hn kernel:  [<c01b287e>] proc_lookup+0xbe/0x240
Jun  3 04:40:21 hn kernel:  [<c0182981>] real_lookup+0xb1/0xe0
Jun  3 04:40:21 hn kernel:  [<c0182d3d>] do_lookup+0xad/0xd0
Jun  3 04:40:21 hn kernel:  [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun  3 04:40:21 hn kernel:  [<c0183d62>] link_path_walk+0x62/0x140
Jun  3 04:40:21 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:21 hn kernel:  [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun  3 04:40:21 hn kernel:  [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun  3 04:40:21 hn kernel:  [<c01843d5>] path_lookup_open+0x35/0x40
Jun  3 04:40:21 hn kernel:  [<c0184da3>] open_namei+0x93/0x740
Jun  3 04:40:21 hn kernel:  [<c017289a>] do_filp_open+0x3a/0x60
Jun  3 04:40:21 hn kernel:  [<c0172a84>] get_unused_fd+0x24/0xc0
Jun  3 04:40:21 hn kernel:  [<c0172c13>] do_sys_open+0x63/0x110
Jun  3 04:40:21 hn kernel:  [<c0172ce7>] sys_open+0x27/0x30
Jun  3 04:40:21 hn kernel:  [<c0103177>] syscall_call+0x7/0xb
Jun  3 04:40:22 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'

Jun  3 10:49:17 hn kernel: ACPI: Interpreter enabled
Jun  3 10:49:17 hn kernel: ACPI: Using IOAPIC for interrupt routing
Jun  3 10:49:17 hn kernel: ACPI: PCI Root Bridge [PCI0] (0000:00)
Jun  3 10:49:17 hn kernel: PCI: Transparent bridge - 0000:00:10.0
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK1] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK2] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK3] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK4] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK5] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK6] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK7] (IRQs 5 7 9 10 *11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK8] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUBA] (IRQs 5 7 9 *10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUBB] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LMAC] (IRQs *5 7 9 10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LACI] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LAZA] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LPMU] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LMCI] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LSMB] (IRQs 5 7 9 10 *11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUB2] (IRQs *5 7 9 10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LIDE] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LSID] (IRQs 5 7 9 10 *11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LFID] (IRQs 5 7 9 *10 11 14 15)
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC1] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC2] (IRQs 17) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC3] (IRQs 18) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC4] (IRQs 19) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC5] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC6] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC7] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC8] (IRQs 16) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCF] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCG] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCH] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCJ] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APMU] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [AAZA] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCK] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCS] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCL] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCM] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCZ] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APSI] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APSJ] (IRQs 20 21 22 23) *0, disabled.
Jun  3 10:49:18 hn kernel: SCSI subsystem initialized
Jun  3 10:49:18 hn kernel: PCI: Using ACPI for IRQ routing
Jun  3 10:49:18 hn kernel: PCI: If a device doesn't work, try "pci=routeirq".  If it helps, post a report
Jun  3 10:49:18 hn kernel: PCI: Bridge: 0000:00:03.0
Jun  3 10:49:18 hn kernel:   IO window: 8000-8fff
Jun  3 10:49:18 hn kernel:   MEM window: disabled.
Jun  3 10:49:18 hn mdmonitor: mdadm succeeded
Jun  3 10:49:18 hn kernel:   PREFETCH window: disabled.
Jun  3 10:49:18 hn kernel: PCI: Bridge: 0000:00:04.0
Jun  3 10:49:18 hn kernel:   IO window: 9000-9fff
Jun  3 10:49:18 hn kernel:   MEM window: disabled.
Jun  3 10:49:18 hn kernel:   PREFETCH window: disabled.
Jun  3 10:49:18 hn kernel: PCI: Bridge: 0000:00:10.0
Jun  3 10:49:18 hn kernel:   IO window: a000-afff
Jun  3 10:49:18 hn kernel:   MEM window: disabled.
Jun  3 10:49:18 hn kernel:   PREFETCH window: disabled.


There was no accident in the user_beancounters

This is my /etc/sysconfig/iptables file:

*filter
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
:OUTPUT ACCEPT [0:0]
-P INPUT ACCEPT 
-P FORWARD ACCEPT 
-P OUTPUT ACCEPT
-A INPUT -j RH-Firewall-1-INPUT
#-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 10000 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -s 212.98.47.70 -m tcp -p tcp --dport 19150 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -s 192.168.2.3 -m tcp -p tcp --dport 19150 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
*mangle
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
*nat
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed

[Updated on: Mon, 04 June 2007 07:56] by Moderator

Report message to a moderator

 
Read Message icon9.gif
Read Message
Read Message
Read Message
Previous Topic: *SUGGESTION* make an equivalent of Vmware VMTN
Next Topic: Good Tutoral to set CONF files
Goto Forum:
  


Current Time: Wed Aug 28 00:59:49 GMT 2024

Total time taken to generate the page: 0.06268 seconds