[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 598] New: Starting/Stopping of APF leads to a kernel panic.
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=598 Summary: Starting/Stopping of APF leads to a kernel panic. Product: Xen Version: unstable Platform: x86-64 OS/Version: Linux-2.6 Status: NEW Severity: critical Priority: P1 Component: Guest-OS AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: theprisonerofzenda@xxxxxxxxx Im running xen-unstable downloaded on 4/4/2006, i'm running CentOS 4.3 as a domU distro, i have APF installed on this domU, APF is a combination of some bash scripts which hanldes iptables rules and in it's startup it loads some rules in the iptables, when i start my domU it starts very well and APF is loaded successfully and all iptables rules are loaded, after loging into the domU through ssh or through the virtual xen console and stopping APF then starting it again i get this errors and the domU sometimes crash and sometime just be out of service and i have to go do an xm destroy, not xm shutdown.. here's the error i got on my xen virtual domU console. ######## START ERROR ######### server login: ip_tables: (C) 2000-2006 Netfilter Core Team Unable to handle kernel paging request at ffffc2000033f053 RIP: <ffffffff88010850>{:ip_tables:ipt_do_table+192} PGD 3fc067 PUD 3fb067 PMD bc145067 PTE 0 Oops: 0000 [1] SMP CPU 0 Modules linked in: iptable_mangle iptable_filter ip_tables ipt_owner ipt_multiport xt_limit ipt_TOS xt_tcpudp ipt_REJECT ipt_LOG x_tables dm_mod Pid: 0, comm: swapper Not tainted 2.6.16-xenU #2 RIP: e030:[<ffffffff88010850>] <ffffffff88010850>{:ip_tables:ipt_do_table+192} RSP: e02b:ffffffff80377e58 EFLAGS: 00010246 RAX: 0000000000004000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff88015b14 RBP: ffffffff80377ef8 R08: ffffffff88015b14 R09: 0000000000000000 R10: 000000010000e73a R11: 0000000000000000 R12: ffff8800ba9b44c0 R13: ffffc2000033f000 R14: ffff8800b455c030 R15: ffff8800045f8000 FS: 00002b88797946e0(0000) GS:ffffffff803ba000(0000) knlGS:0000000000000000 CS: e033 DS: 0000 ES: 0000 Process swapper (pid: 0, threadinfo ffffffff803c6000, task ffffffff8031f5c0) Stack: ffff8800b460f180 ffffffff80377e78 0000000000000000 0000000000000000 0000000180377e88 ffffffff80377fe8 ffffffff88015b14 0000000088010a7c ffff8800045f8000 ffffffff88013a00 Call Trace: <IRQ> <ffffffff8801501b>{:iptable_filter:ipt_hook+27} <ffffffff8026e22b>{nf_iterate+91} <ffffffff80274660>{ip_local_deliver_finish+0} <ffffffff8026e383>{nf_hook_slow+99} <ffffffff80274660>{ip_local_deliver_finish+0} <ffffffff802748cc>{ip_local_deliver+108} <ffffffff80274fb5>{ip_rcv+1269} <ffffffff8025ab1f>{netif_receive_skb+479} <ffffffff8023d111>{netif_poll+1729} <ffffffff80257ec6>{net_rx_action+198} <ffffffff801305e0>{__do_softirq+144} <ffffffff8010bf82>{call_softirq+30} <ffffffff8010d8c3>{do_softirq+83} <ffffffff801301e8>{irq_exit+72} <ffffffff8010db8f>{do_IRQ+79} <ffffffff80231362>{evtchn_do_upcall+162} <ffffffff8010bab2>{do_hypervisor_callback+30} <EOI> <ffffffff801073aa>{hypercall_page+938} <ffffffff801073aa>{hypercall_page+938} <ffffffff80109bbb>{xen_idle+139} <ffffffff80109c4c>{cpu_idle+92} <ffffffff80108026>{rest_init+38} <ffffffff803c97d0>{start_kernel+512} <ffffffff803c91a1>{_sinittext+417} Code: 41 0f b6 4d 53 41 8b 45 08 41 23 46 0c 41 3b 45 00 0f b6 f9 RIP <ffffffff88010850>{:ip_tables:ipt_do_table+192} RSP <ffffffff80377e58> CR2: ffffc2000033f053 <0>Kernel panic - not syncing: Aiee, killing interrupt handler! debian:/# ######## END ERROR ######### Some usefull links: Advanced Policy Firewall [APF] project website - http://www.rfxnetworks.com/apf.php -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |