Bug#500472: [Fwd: Bug#500472: linux-image-2.6.26-1-openvz-amd64: NULL pointer dereference in tcp_v4_send_ack]
On 29 September 2008 12:59:11 you wrote: > > Original Message > Subject: Bug#500472: linux-image-2.6.26-1-openvz-amd64: NULL pointer > dereference in tcp_v4_send_ack Thanks! It is a mainstream bug. Fixed patch was sent to [EMAIL PROTECTED] > Date: Sun, 28 Sep 2008 19:37:07 +0400 > From: Alexandre Rossi <[EMAIL PROTECTED]> > Reply-To: Alexandre Rossi <[EMAIL PROTECTED]>, > "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> > To: Debian Bug Tracking System <[EMAIL PROTECTED]> > > Package: linux-image-2.6.26-1-openvz-amd64 > Version: 2.6.26-5 > Severity: important > > Hi, > > The machine freezes sometimes, repeatedly and it seems this happens under > some network load in a VE. > > vcfgvalidate is all ok. The fail counts of user beancounters are all 0. > > > Here is the stacktrace. Feel free to ask for more info. > > Alex > -- > [ 960.532790] BUG: unable to handle kernel NULL pointer dereference at > 0450 > [ 960.532790] IP: [] tcp_v4_send_ack+0x1f6/0x23e > [ 960.532790] PGD 1a5ec067 PUD 1a801067 PMD 0 > [ 960.532790] Oops: [1] SMP > [ 960.532790] CPU: 0 > [ 960.532790] Modules linked in: netconsole configfs i915 drm vzethdev > vznetdev simfs vzdquota vzmon vzdev xt_TCPMSS video output ac battery > ip6table_filter ip6_tables iptable_raw xt_comment xt_policy ipt_ULOG > ipt_TTL ipt_ttl ipt_REJECT ipt_REDIRECT ipt_recent ipt_NETMAP > ipt_MASQUERADE ipt_LOG ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype > nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre > nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp > nf_conntrack_amanda nf_conntrack_tftp nf_conntrack_sip > nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre > nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc > nf_conntrack_h323 nf_conntrack_ftp xt_tcpmss xt_pkttype xt_physdev > xt_owner xt_NFQUEUE xt_NFLOG xt_multiport xt_MARK xt_mark xt_mac > xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp > xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY xt_tcpudp > xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack iptable_m! > angle nfnetlink iptable_filter ip_tables x_tables ipv6 eeprom > cpufreq_ondemand acpi_cpufreq freq_table loop parport_pc i2c_i801 > rng_core snd_hda_intel i2c_core parport snd_pcm pcspkr iTCO_wdt > snd_timer snd soundcore button snd_page_alloc intel_agp evdev ext3 jbd > mbcache dm_mirror dm_log dm_snapshot dm_mod sd_mod ide_cd_mod cdrom > ide_disk ata_generic ata_piix 8139too libata scsi_mod dock 8139cp mii > r8169 ide_pci_generic piix ide_core thermal processor fan thermal_sys > [ 960.532790] Pid: 0, comm: swapper Not tainted 2.6.26-1-openvz-amd64 > #1 036test001 > [ 960.532790] RIP: 0010:[] [] > tcp_v4_send_ack+0x1f6/0x23e > [ 960.532790] RSP: 0018:805d9bf0 EFLAGS: 00010246 > [ 960.532790] RAX: RBX: 81001a88a980 RCX: > 0020 > [ 960.532790] RDX: 805d9c40 RSI: 81001a88a980 RDI: > > [ 960.532790] RBP: 00027410 R08: 16a0 R09: > 00027410 > [ 960.532790] R10: 31ff5ed3 R11: 221928fa R12: > > [ 960.532790] R13: R14: 81001a88c034 R15: > 81001a88a980 > [ 960.532790] FS: () GS:80533000() > knlGS: > [ 960.532790] CS: 0010 DS: 0018 ES: 0018 CR0: 8005003b > [ 960.532790] CR2: 0450 CR3: 1a5e8000 CR4: > 06e0 > [ 960.532790] DR0: DR1: DR2: > > [ 960.532790] DR3: DR6: 0ff0 DR7: > 0400 > [ 960.532790] Process swapper (pid: 0, veid=0, threadinfo > 8056a000, task 804ee480) > [ 960.532790] Stack: 5000afff 80423437 > 31ff5ed30ce25000 a0161080221928fa > [ 960.532790] 0a080101 107402008d740200 > 80423437 > [ 960.532790] 805d9db0 a02987ec 805d9c00 > 0020 > [ 960.532790] Call Trace: > [ 960.532790][] ? _read_lock_bh+0x9/0x19 > [ 960.532790] [] ? _read_lock_bh+0x9/0x19 > [ 960.532790] [] ? :ip_tables:ipt_do_table+0x515/0x581 > [ 960.532790] [] ? tcp_check_req+0x14a/0x3d8 > [ 960.532790] [] ? tcp_v4_do_rcv+0x387/0x4df > [ 960.532790] [] ? nf_iterate+0x41/0x7d > [ 960.532790] [] ? tcp_v4_rcv+0x6f6/0x748 > [ 960.532790] [] ? ip_local_deliver_finish+0x171/0x25f > [ 960.532790] [] ? ip_rcv_finish+0x3a1/0x3c4 > [ 960.532790] [] ? ip_rcv+0x26e/0x2c3 > [ 960.532790] [] ? netif_receive_skb+0x37b/0x44f >
Bug#500472: linux-image-2.6.26-1-openvz-amd64: NULL pointer dereference in tcp_v4_send_ack
On Sun, Sep 28, 2008 at 05:37:07PM +0200, Alexandre Rossi wrote: > The machine freezes sometimes, repeatedly and it seems this happens under > some network load in a VE. > > vcfgvalidate is all ok. The fail counts of user beancounters are all 0. I presume the same problem on my server, but I cannot debug it because it seems to lock-up hardly, with the console not visible anymore. After some quick googling I found an ugly patch on the openvz list: http://openvz.org/pipermail/devel/2008-July/013096.html It would probably safe the machine from panicing... but not much more... Judging for the package the problem may as well be grave.. Kind regards, Philipp Kern -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#500472: linux-image-2.6.26-1-openvz-amd64: NULL pointer dereference in tcp_v4_send_ack
Package: linux-image-2.6.26-1-openvz-amd64 Version: 2.6.26-5 Severity: important Hi, The machine freezes sometimes, repeatedly and it seems this happens under some network load in a VE. vcfgvalidate is all ok. The fail counts of user beancounters are all 0. Here is the stacktrace. Feel free to ask for more info. Alex -- [ 960.532790] BUG: unable to handle kernel NULL pointer dereference at 0450 [ 960.532790] IP: [] tcp_v4_send_ack+0x1f6/0x23e [ 960.532790] PGD 1a5ec067 PUD 1a801067 PMD 0 [ 960.532790] Oops: [1] SMP [ 960.532790] CPU: 0 [ 960.532790] Modules linked in: netconsole configfs i915 drm vzethdev vznetdev simfs vzdquota vzmon vzdev xt_TCPMSS video output ac battery ip6table_filter ip6_tables iptable_raw xt_comment xt_policy ipt_ULOG ipt_TTL ipt_ttl ipt_REJECT ipt_REDIRECT ipt_recent ipt_NETMAP ipt_MASQUERADE ipt_LOG ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG xt_multiport xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY xt_tcpudp xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack iptable_mangle nfnetlink iptable_filter ip_tables x_tables ipv6 eeprom cpufreq_ondemand acpi_cpufreq freq_table loop parport_pc i2c_i801 rng_core snd_hda_intel i2c_core parport snd_pcm pcspkr iTCO_wdt snd_timer snd soundcore button snd_page_alloc intel_agp evdev ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod sd_mod ide_cd_mod cdrom ide_disk ata_generic ata_piix 8139too libata scsi_mod dock 8139cp mii r8169 ide_pci_generic piix ide_core thermal processor fan thermal_sys [ 960.532790] Pid: 0, comm: swapper Not tainted 2.6.26-1-openvz-amd64 #1 036test001 [ 960.532790] RIP: 0010:[] [] tcp_v4_send_ack+0x1f6/0x23e [ 960.532790] RSP: 0018:805d9bf0 EFLAGS: 00010246 [ 960.532790] RAX: RBX: 81001a88a980 RCX: 0020 [ 960.532790] RDX: 805d9c40 RSI: 81001a88a980 RDI: [ 960.532790] RBP: 00027410 R08: 16a0 R09: 00027410 [ 960.532790] R10: 31ff5ed3 R11: 221928fa R12: [ 960.532790] R13: R14: 81001a88c034 R15: 81001a88a980 [ 960.532790] FS: () GS:80533000() knlGS: [ 960.532790] CS: 0010 DS: 0018 ES: 0018 CR0: 8005003b [ 960.532790] CR2: 0450 CR3: 1a5e8000 CR4: 06e0 [ 960.532790] DR0: DR1: DR2: [ 960.532790] DR3: DR6: 0ff0 DR7: 0400 [ 960.532790] Process swapper (pid: 0, veid=0, threadinfo 8056a000, task 804ee480) [ 960.532790] Stack: 5000afff 80423437 31ff5ed30ce25000 a0161080221928fa [ 960.532790] 0a080101 107402008d740200 80423437 [ 960.532790] 805d9db0 a02987ec 805d9c00 0020 [ 960.532790] Call Trace: [ 960.532790][] ? _read_lock_bh+0x9/0x19 [ 960.532790] [] ? _read_lock_bh+0x9/0x19 [ 960.532790] [] ? :ip_tables:ipt_do_table+0x515/0x581 [ 960.532790] [] ? tcp_check_req+0x14a/0x3d8 [ 960.532790] [] ? tcp_v4_do_rcv+0x387/0x4df [ 960.532790] [] ? nf_iterate+0x41/0x7d [ 960.532790] [] ? tcp_v4_rcv+0x6f6/0x748 [ 960.532790] [] ? ip_local_deliver_finish+0x171/0x25f [ 960.532790] [] ? ip_rcv_finish+0x3a1/0x3c4 [ 960.532790] [] ? ip_rcv+0x26e/0x2c3 [ 960.532790] [] ? netif_receive_skb+0x37b/0x44f [ 960.532790] [] ? process_backlog+0x86/0xef [ 960.532790] [] ? net_rx_action+0xab/0x1da [ 960.532790] [] ? __do_softirq+0x96/0x15c [ 960.532790] [] ? call_softirq+0x1c/0x28 [ 960.532790] [] ? do_softirq+0x3c/0x81 [ 960.532790] [] ? irq_exit+0x81/0xc5 [ 960.532790] [] ? do_IRQ+0xb9/0xd9 [ 960.532790] [] ? mwait_idle+0x0/0x4d [ 960.532790] [] ? mwait_idle+0x0/0x4d [ 960.532790] [] ? ret_from_intr+0x0/0x19 [ 960.532790][] ? lapic_next_event+0x0/0x13 [ 960.532790] [] ? mwait_idle+0x41/0x4d [ 960.532790] [] ? cpu_idle+0x89/0xb3 [ 960.532790] [ 960.532790] [ 960.532790] Code: 00 4d 85 e4 89 44 24 60 c7 44 24 64 08 00 00 00 74 09 41 8b 44 24 04 89 44 24 68 48 8b 43 20 8b 4c 24 58 48 8d 54 24 50 48 89 de <48> 8b 80 50 04 00 00 48 8b b8 40 01 00 00 e8 d1 b7 fe ff 65 48 [ 960.532790] RIP [] tcp_v4_send_ack+0x1f6/0x23e [ 960.532790] RSP [ 960.532790] CR2: 0450 [ 960.532790] ---[ end trace b9ce8b85803028c3 ]--- [ 960.532790] Kernel panic - not syncing: Aiee, killing