|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 598] New: Starting/Stopping of APF leads to a kernel pan
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=598
Summary: Starting/Stopping of APF leads to a kernel panic.
Product: Xen
Version: unstable
Platform: x86-64
OS/Version: Linux-2.6
Status: NEW
Severity: critical
Priority: P1
Component: Guest-OS
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: theprisonerofzenda@xxxxxxxxx
Im running xen-unstable downloaded on 4/4/2006, i'm running CentOS 4.3 as a
domU distro, i have APF installed on this domU, APF is a combination of some
bash scripts which hanldes iptables rules and in it's startup it loads some
rules in the iptables, when i start my domU it starts very well and APF is
loaded successfully and all iptables rules are loaded, after loging into the
domU through ssh or through the virtual xen console and stopping APF then
starting it again i get this errors and the domU sometimes crash and sometime
just be out of service and i have to go do an xm destroy, not xm shutdown..
here's the error i got on my xen virtual domU console.
######## START ERROR #########
server login: ip_tables: (C) 2000-2006 Netfilter Core Team
Unable to handle kernel paging request at ffffc2000033f053 RIP:
<ffffffff88010850>{:ip_tables:ipt_do_table+192}
PGD 3fc067 PUD 3fb067 PMD bc145067 PTE 0
Oops: 0000 [1] SMP
CPU 0
Modules linked in: iptable_mangle iptable_filter ip_tables ipt_owner
ipt_multiport xt_limit ipt_TOS xt_tcpudp ipt_REJECT ipt_LOG x_tables dm_mod
Pid: 0, comm: swapper Not tainted 2.6.16-xenU #2
RIP: e030:[<ffffffff88010850>] <ffffffff88010850>{:ip_tables:ipt_do_table+192}
RSP: e02b:ffffffff80377e58 EFLAGS: 00010246
RAX: 0000000000004000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff88015b14
RBP: ffffffff80377ef8 R08: ffffffff88015b14 R09: 0000000000000000
R10: 000000010000e73a R11: 0000000000000000 R12: ffff8800ba9b44c0
R13: ffffc2000033f000 R14: ffff8800b455c030 R15: ffff8800045f8000
FS: 00002b88797946e0(0000) GS:ffffffff803ba000(0000) knlGS:0000000000000000
CS: e033 DS: 0000 ES: 0000
Process swapper (pid: 0, threadinfo ffffffff803c6000, task ffffffff8031f5c0)
Stack: ffff8800b460f180 ffffffff80377e78 0000000000000000 0000000000000000
0000000180377e88 ffffffff80377fe8 ffffffff88015b14 0000000088010a7c
ffff8800045f8000 ffffffff88013a00
Call Trace: <IRQ> <ffffffff8801501b>{:iptable_filter:ipt_hook+27}
<ffffffff8026e22b>{nf_iterate+91}
<ffffffff80274660>{ip_local_deliver_finish+0}
<ffffffff8026e383>{nf_hook_slow+99}
<ffffffff80274660>{ip_local_deliver_finish+0}
<ffffffff802748cc>{ip_local_deliver+108} <ffffffff80274fb5>{ip_rcv+1269}
<ffffffff8025ab1f>{netif_receive_skb+479}
<ffffffff8023d111>{netif_poll+1729}
<ffffffff80257ec6>{net_rx_action+198}
<ffffffff801305e0>{__do_softirq+144}
<ffffffff8010bf82>{call_softirq+30} <ffffffff8010d8c3>{do_softirq+83}
<ffffffff801301e8>{irq_exit+72} <ffffffff8010db8f>{do_IRQ+79}
<ffffffff80231362>{evtchn_do_upcall+162}
<ffffffff8010bab2>{do_hypervisor_callback+30} <EOI>
<ffffffff801073aa>{hypercall_page+938}
<ffffffff801073aa>{hypercall_page+938}
<ffffffff80109bbb>{xen_idle+139} <ffffffff80109c4c>{cpu_idle+92}
<ffffffff80108026>{rest_init+38} <ffffffff803c97d0>{start_kernel+512}
<ffffffff803c91a1>{_sinittext+417}
Code: 41 0f b6 4d 53 41 8b 45 08 41 23 46 0c 41 3b 45 00 0f b6 f9
RIP <ffffffff88010850>{:ip_tables:ipt_do_table+192} RSP <ffffffff80377e58>
CR2: ffffc2000033f053
<0>Kernel panic - not syncing: Aiee, killing interrupt handler!
debian:/#
######## END ERROR #########
Some usefull links:
Advanced Policy Firewall [APF] project website -
http://www.rfxnetworks.com/apf.php
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-bugs] [Bug 598] New: Starting/Stopping of APF leads to a kernel panic.,
bugzilla-daemon <=
|
|
|
|
|