Home » General » Support » *BUG REPORTED* 2.6.18-ovz028stab033.1 kernel panic
*BUG REPORTED* 2.6.18-ovz028stab033.1 kernel panic [message #13705] |
Mon, 04 June 2007 07:46 |
goeldi
Messages: 92 Registered: June 2006
|
Member |
|
|
Yesterday at 4am I got this kernel panic.
This is kernel 2.6.18-ovz028stab033.1 on a CentOS 4.5 system with an AMD Athlon 64 Processor 3200+.
No /var/log/messages entry between 01:13 and 04:02 and then this:
Jun 3 04:40:19 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun 3 04:40:19 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun 3 04:40:19 hn kernel: [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun 3 04:40:19 hn kernel: [<c01b287e>] proc_lookup+0xbe/0x240
Jun 3 04:40:19 hn kernel: [<c0182981>] real_lookup+0xb1/0xe0
Jun 3 04:40:19 hn kernel: [<c0182d3d>] do_lookup+0xad/0xd0
Jun 3 04:40:19 hn kernel: [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun 3 04:40:19 hn kernel: [<c0183d62>] link_path_walk+0x62/0x140
Jun 3 04:40:19 hn kernel: [<c0172a84>] get_unused_fd+0x24/0xc0
Jun 3 04:40:19 hn kernel: [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun 3 04:40:19 hn kernel: [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun 3 04:40:19 hn kernel: [<c01843d5>] path_lookup_open+0x35/0x40
Jun 3 04:40:19 hn kernel: [<c0184da3>] open_namei+0x93/0x740
Jun 3 04:40:19 hn kernel: [<c017289a>] do_filp_open+0x3a/0x60
Jun 3 04:40:19 hn kernel: [<c0172a84>] get_unused_fd+0x24/0xc0
Jun 3 04:40:19 hn kernel: [<c0172c13>] do_sys_open+0x63/0x110
Jun 3 04:40:19 hn kernel: [<c0172ce7>] sys_open+0x27/0x30
Jun 3 04:40:19 hn kernel: [<c0103177>] syscall_call+0x7/0xb
Jun 3 04:40:19 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun 3 04:40:20 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun 3 04:40:20 hn kernel: [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun 3 04:40:20 hn kernel: [<c01b287e>] proc_lookup+0xbe/0x240
Jun 3 04:40:20 hn kernel: [<c0182981>] real_lookup+0xb1/0xe0
Jun 3 04:40:20 hn kernel: [<c0182d3d>] do_lookup+0xad/0xd0
Jun 3 04:40:20 hn kernel: [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun 3 04:40:20 hn kernel: [<c0183d62>] link_path_walk+0x62/0x140
Jun 3 04:40:20 hn kernel: [<c0172a84>] get_unused_fd+0x24/0xc0
Jun 3 04:40:20 hn kernel: [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun 3 04:40:20 hn kernel: [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun 3 04:40:20 hn kernel: [<c01843d5>] path_lookup_open+0x35/0x40
Jun 3 04:40:20 hn kernel: [<c0184da3>] open_namei+0x93/0x740
Jun 3 04:40:20 hn kernel: [<c017289a>] do_filp_open+0x3a/0x60
Jun 3 04:40:20 hn kernel: [<c0172a84>] get_unused_fd+0x24/0xc0
Jun 3 04:40:20 hn kernel: [<c0172c13>] do_sys_open+0x63/0x110
Jun 3 04:40:20 hn kernel: [<c0172ce7>] sys_open+0x27/0x30
Jun 3 04:40:20 hn kernel: [<c0103177>] syscall_call+0x7/0xb
Jun 3 04:40:20 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun 3 04:40:20 hn kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 0000002c
Jun 3 04:40:20 hn kernel: printing eip:
Jun 3 04:40:20 hn kernel: c020cb22
Jun 3 04:40:20 hn kernel: *pde = 00000000
Jun 3 04:40:20 hn kernel: Oops: 0000 [#1]
Jun 3 04:40:20 hn kernel: Modules linked in: simfs vzethdev vzrst vzcpt vzdquota af_packet xt_length ipt_ttl xt_tcpmss ipt_TCPMSS xt_multiport xt_limit ipt_tos eeprom vznetdev vzmon vzdev iptable_nat ip_nat iptable_mangle ipt_REJECT xt_state ip_conntrack xt_tcpudp iptable_filter ip_tables x_tables thermal processor fan button battery asus_acpi ac ohci_hcd ehci_hcd usbcore shpchp i2c_nforce2 i2c_core forcedeth
Jun 3 04:40:20 hn kernel: CPU: 0, VCPU: 0.0
Jun 3 04:40:20 hn kernel: EIP: 0060:[<c020cb22>] Not tainted VLI
Jun 3 04:40:20 hn kernel: EFLAGS: 00010286 (2.6.18-ovz028stab033.1 #1)
Jun 3 04:40:20 hn kernel: EIP is at journal_clean_one_cp_list+0x32/0x70
Jun 3 04:40:20 hn kernel: eax: 00000000 ebx: 00000000 ecx: 00000000 edx: cf6c0ec0
Jun 3 04:40:20 hn kernel: esi: 00000000 edi: 00000000 ebp: 00000000 esp: c1b6ce34
Jun 3 04:40:20 hn kernel: ds: 007b es: 007b ss: 0068
Jun 3 04:40:20 hn kernel: Process kjournald (pid: 6465, veid: 0, ti=c1b6c000 task=c1942150 task.ti=c1b6c000)
Jun 3 04:40:20 hn kernel: Stack: cf6c0ec0 cf6c0ee0 00000000 00000019 00000000 c020cb9c cf6c0ec0 c1b6ce54
Jun 3 04:40:20 hn kernel: 00000000 00000000 f7cc5180 00000001 cf6c0140 c020a24f f7cc5180 917ba1db
Jun 3 04:40:20 hn kernel: 00007353 00007353 c0608840 917ba1db 00000000 00000000 c0117343 00000000
Jun 3 04:40:20 hn kernel: Call Trace:
Jun 3 04:40:20 hn kernel: [<c020cb9c>] __journal_clean_checkpoint_list+0x3c/0x90
Jun 3 04:40:20 hn kernel: [<c020a24f>] journal_commit_transaction+0x41f/0x1840
Jun 3 04:40:20 hn kernel: [<c0117343>] schedule_vcpu+0x273/0x3e0
Jun 3 04:40:20 hn kernel: [<c0117b9b>] deactivate_task+0x7b/0x100
Jun 3 04:40:20 hn kernel: [<c0116ff7>] vcpu_put+0x67/0xd0
Jun 3 04:40:20 hn kernel: [<c0493fbe>] schedule+0x5ae/0x8b0
Jun 3 04:40:20 hn kernel: [<c020e67f>] kjournald+0x12f/0x380
Jun 3 04:40:20 hn kernel: [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun 3 04:40:20 hn kernel: [<c0136d60>] autoremove_wake_function+0x0/0x60
Jun 3 04:40:20 hn kernel: [<c020e550>] kjournald+0x0/0x380
Jun 3 04:40:20 hn kernel: [<c01368fd>] kthread+0xbd/0x100
Jun 3 04:40:20 hn kernel: [<c0136840>] kthread+0x0/0x100
Jun 3 04:40:20 hn kernel: [<c0101411>] kernel_thread_helper+0x5/0x14
Jun 3 04:40:20 hn kernel: Code: ec 04 8b 5c 24 18 8b 44 24 1c 89 de c7 00 00 00 00 00 31 c0 85 db 74 3c 8b 7b 30 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 89 f3 <8b> 76 2c 89 1c 24 e8 33 f8 ff ff 85 c0 74 06 45 83 f8 02 74 1a
Jun 3 04:40:20 hn kernel: EIP: [<c020cb22>] journal_clean_one_cp_list+0x32/0x70 SS:ESP 0068:c1b6ce34
Jun 3 04:40:21 hn kernel: BUG: warning at fs/proc/inode.c:157/proc_get_inode()
Jun 3 04:40:21 hn kernel: [<c01af1ae>] proc_get_inode+0x11e/0x130
Jun 3 04:40:21 hn kernel: [<c01b287e>] proc_lookup+0xbe/0x240
Jun 3 04:40:21 hn kernel: [<c0182981>] real_lookup+0xb1/0xe0
Jun 3 04:40:21 hn kernel: [<c0182d3d>] do_lookup+0xad/0xd0
Jun 3 04:40:21 hn kernel: [<c01835ff>] __link_path_walk+0x89f/0xfa0
Jun 3 04:40:21 hn kernel: [<c0183d62>] link_path_walk+0x62/0x140
Jun 3 04:40:21 hn kernel: [<c0172a84>] get_unused_fd+0x24/0xc0
Jun 3 04:40:21 hn kernel: [<c018415a>] do_path_lookup+0x10a/0x2b0
Jun 3 04:40:21 hn kernel: [<c0184364>] __path_lookup_intent_open+0x44/0x80
Jun 3 04:40:21 hn kernel: [<c01843d5>] path_lookup_open+0x35/0x40
Jun 3 04:40:21 hn kernel: [<c0184da3>] open_namei+0x93/0x740
Jun 3 04:40:21 hn kernel: [<c017289a>] do_filp_open+0x3a/0x60
Jun 3 04:40:21 hn kernel: [<c0172a84>] get_unused_fd+0x24/0xc0
Jun 3 04:40:21 hn kernel: [<c0172c13>] do_sys_open+0x63/0x110
Jun 3 04:40:21 hn kernel: [<c0172ce7>] sys_open+0x27/0x30
Jun 3 04:40:21 hn kernel: [<c0103177>] syscall_call+0x7/0xb
Jun 3 04:40:22 hn kernel: ip_tables: error: `RH-Firewall-1-INPUT'
Jun 3 10:49:17 hn kernel: ACPI: Interpreter enabled
Jun 3 10:49:17 hn kernel: ACPI: Using IOAPIC for interrupt routing
Jun 3 10:49:17 hn kernel: ACPI: PCI Root Bridge [PCI0] (0000:00)
Jun 3 10:49:17 hn kernel: PCI: Transparent bridge - 0000:00:10.0
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK1] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK2] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK3] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK4] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK5] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK6] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK7] (IRQs 5 7 9 10 *11 14 15)
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LNK8] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUBA] (IRQs 5 7 9 *10 11 14 15)
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUBB] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LMAC] (IRQs *5 7 9 10 11 14 15)
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LACI] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LAZA] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LPMU] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LMCI] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LSMB] (IRQs 5 7 9 10 *11 14 15)
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LUB2] (IRQs *5 7 9 10 11 14 15)
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LIDE] (IRQs 5 7 9 10 11 14 15) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LSID] (IRQs 5 7 9 10 *11 14 15)
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [LFID] (IRQs 5 7 9 *10 11 14 15)
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC1] (IRQs 16) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC2] (IRQs 17) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC3] (IRQs 18) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC4] (IRQs 19) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC5] (IRQs 16) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC6] (IRQs 16) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC7] (IRQs 16) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APC8] (IRQs 16) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCF] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCG] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCH] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCJ] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APMU] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [AAZA] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCK] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCS] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCL] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCM] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APCZ] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APSI] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:17 hn kernel: ACPI: PCI Interrupt Link [APSJ] (IRQs 20 21 22 23) *0, disabled.
Jun 3 10:49:18 hn kernel: SCSI subsystem initialized
Jun 3 10:49:18 hn kernel: PCI: Using ACPI for IRQ routing
Jun 3 10:49:18 hn kernel: PCI: If a device doesn't work, try "pci=routeirq". If it helps, post a report
Jun 3 10:49:18 hn kernel: PCI: Bridge: 0000:00:03.0
Jun 3 10:49:18 hn kernel: IO window: 8000-8fff
Jun 3 10:49:18 hn kernel: MEM window: disabled.
Jun 3 10:49:18 hn mdmonitor: mdadm succeeded
Jun 3 10:49:18 hn kernel: PREFETCH window: disabled.
Jun 3 10:49:18 hn kernel: PCI: Bridge: 0000:00:04.0
Jun 3 10:49:18 hn kernel: IO window: 9000-9fff
Jun 3 10:49:18 hn kernel: MEM window: disabled.
Jun 3 10:49:18 hn kernel: PREFETCH window: disabled.
Jun 3 10:49:18 hn kernel: PCI: Bridge: 0000:00:10.0
Jun 3 10:49:18 hn kernel: IO window: a000-afff
Jun 3 10:49:18 hn kernel: MEM window: disabled.
Jun 3 10:49:18 hn kernel: PREFETCH window: disabled.
There was no accident in the user_beancounters
This is my /etc/sysconfig/iptables file:
*filter
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
:OUTPUT ACCEPT [0:0]
-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT
-A INPUT -j RH-Firewall-1-INPUT
#-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 10000 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -s 212.98.47.70 -m tcp -p tcp --dport 19150 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -s 192.168.2.3 -m tcp -p tcp --dport 19150 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
*mangle
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
*nat
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed
[Updated on: Mon, 04 June 2007 07:56] by Moderator Report message to a moderator
|
|
|
Goto Forum:
Current Time: Wed Aug 28 06:22:48 GMT 2024
Total time taken to generate the page: 0.03345 seconds
|