Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932716Ab1FAXEG (ORCPT ); Wed, 1 Jun 2011 19:04:06 -0400 Received: from nessie.weebeastie.net ([220.233.7.36]:55987 "EHLO bunyip.billabong.weebeastie.net" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932620Ab1FAXED (ORCPT ); Wed, 1 Jun 2011 19:04:03 -0400 Date: Thu, 2 Jun 2011 09:03:42 +1000 From: CaT To: Brad Campbell Cc: Avi Kivity , Hugh Dickins , Andrea Arcangeli , Borislav Petkov , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-mm , netdev Subject: Re: KVM induced panic on 2.6.38[2367] & 2.6.39 Message-ID: <20110601230342.GC3956@zip.com.au> References: <20110601011527.GN19505@random.random> <4DE5DCA8.7070704@fnarfbargle.com> <4DE5E29E.7080009@redhat.com> <4DE60669.9050606@fnarfbargle.com> <4DE60918.3010008@redhat.com> <4DE60940.1070107@redhat.com> <4DE61A2B.7000008@fnarfbargle.com> <20110601111841.GB3956@zip.com.au> <4DE62801.9080804@fnarfbargle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4DE62801.9080804@fnarfbargle.com> Organisation: Furball Inc. User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5994 Lines: 128 On Wed, Jun 01, 2011 at 07:52:33PM +0800, Brad Campbell wrote: > Unfortunately the only interface that is mentioned by name anywhere > in my firewall is $DMZ (which is ppp0 and not part of any bridge). > > All of the nat/dnat and other horrible hacks are based on IP addresses. Damn. Not referencing the bridge interfaces at all stopped our host from going down in flames when we passed it a few packets. These are two of the oopses we got from it. Whilst the kernel here is .35 we got the same issue from a range of kernels. Seems related. The oopses may be a bit weird. Copy and paste from an ipmi terminal. slab error in cache_alloc_debugcheck_after(): cache `size-64': double free, or n Pid: 2431, comm: kvm Tainted: G D 2.6.35.9-local.20110314-141930 #1 Call Trace: [] ? __slab_error+0x1f/0x30 [] ? cache_alloc_debugcheck_after+0x6b/0x1f0 [] ? br_nf_pre_routing_finish+0x0/0x370 [] ? br_nf_pre_routing+0x2fb/0x980 [] ? kmem_cache_alloc_notrace+0x7d/0xf0 [] ? br_nf_pre_routing+0x2fb/0x980 [] ? nf_iterate+0x66/0xb0 [] ? br_handle_frame_finish+0x0/0x1c0 [] ? nf_hook_slow+0x64/0xf0 [] ? br_handle_frame_finish+0x0/0x1c0 [] ? br_handle_frame+0x18c/0x250 [] ? __netif_receive_skb+0x169/0x2a0 [] ? process_backlog+0xe3/0x1d0 [] ? net_rx_action+0x87/0x1c0 [] ? __do_softirq+0xa7/0x1d0 [] ? call_softirq+0x1c/0x30 [] ? do_softirq+0x4d/0x80 [] ? netif_rx_ni+0x1e/0x30 [] ? tun_chr_aio_write+0x36a/0x510 [] ? tun_chr_aio_write+0x0/0x510 [] ? do_sync_readv_writev+0xa9/0xf0 [] ? ktime_get+0x5b/0xe0 [] ? lapic_next_event+0x18/0x20 [] ? tick_dev_program_event+0x38/0x100 [] ? rw_copy_check_uvector+0x77/0x130 [] ? do_readv_writev+0xdc/0x200 [] ? sys_timer_settime+0x13c/0x2e0 [] ? sys_writev+0x4e/0x90 [] ? system_call_fastpath+0x16/0x1b ffff8801e7621500: redzone 1:0xbf05bd0100000006, redzone 2:0x9f911029d74e35b ---------- Code: 40 01 00 00 4c 8b a4 24 48 01 00 00 4c 8b ac 24 50 01 00 00 4c 8b b4 24 5 RIP [] icmp_send+0x297/0x650 RSP ---[ end trace 9d3f7be7684ac91e ]--- Kernel panic - not syncing: Fatal exception in interrupt Pid: 0, comm: swapper Tainted: G D 2.6.35.9-local.20110314-144920 #2 Call Trace: [] ? panic+0x94/0x116 [] ? _raw_spin_lock_irqsave+0x26/0x40 [] ? oops_end+0xef/0xf0 [] ? general_protection+0x25/0x30 [] ? icmp_send+0x25f/0x650 [] ? icmp_send+0x297/0x650 [] ? nf_iterate+0x66/0xb0 [] ? br_nf_forward_finish+0x0/0x170 [] ? nf_hook_slow+0x64/0xf0 [] ? br_nf_forward_finish+0x0/0x170 [] ? br_nf_forward_ip+0x201/0x3e0 [] ? nf_iterate+0x66/0xb0 [] ? br_forward_finish+0x0/0x60 [] ? nf_hook_slow+0x64/0xf0 [] ? br_forward_finish+0x0/0x60 [] ? __br_forward+0x69/0xb0 [] ? br_handle_frame_finish+0x12a/0x280 [] ? br_nf_pre_routing_finish+0x208/0x370 [] ? nf_hook_slow+0x64/0xf0 [] ? br_nf_pre_routing_finish+0x0/0x370 [] ? br_nf_forward_ip+0x2d8/0x3e0 [] ? br_nf_pre_routing+0x785/0x980 [] ? nf_iterate+0x66/0xb0 [] ? nf_hook_slow+0x64/0xf0 [] ? br_handle_frame_finish+0x0/0x280 [] ? nf_hook_slow+0x64/0xf0 [] ? br_handle_frame_finish+0x0/0x280 [] ? br_handle_frame+0x18c/0x250 [] ? __netif_receive_skb+0x1cb/0x350 [] ? read_tsc+0x5/0x20 [] ? netif_receive_skb+0x78/0x80 [] ? napi_gro_receive+0x27/0x40 [] ? napi_skb_finish+0x38/0x50 [] ? bnx2_poll_work+0xd0d/0x13d0 [] ? ctnetlink_conntrack_event+0x210/0x7d0 [] ? autoremove_wake_function+0x9/0x30 [] ? ktime_get+0x5b/0xe0 [] ? bnx2_poll+0x61/0x230 [] ? lapic_next_event+0x18/0x20 [] ? net_rx_action+0x9f/0x200 [] ? __hrtimer_start_range_ns+0x22f/0x410 [] ? __do_softirq+0xaf/0x1e0 [] ? handle_IRQ_event+0x47/0x160 [] ? call_softirq+0x1c/0x30 [] ? do_softirq+0x65/0xa0 [] ? irq_exit+0x85/0x90 [] ? do_IRQ+0x6b/0xe0 [] ? ret_from_intr+0x0/0x11 [] ? intel_idle+0xf0/0x180 [] ? intel_idle+0xd0/0x180 [] ? cpuidle_idle_call+0x9f/0x140 [] ? cpu_idle+0x62/0xb0 [] ? start_kernel+0x2ef/0x2fa [] ? x86_64_start_kernel+0xfb/0x10a -- "A search of his car uncovered pornography, a homemade sex aid, women's stockings and a Jack Russell terrier." - http://www.dailytelegraph.com.au/news/wacky/indeed/story-e6frev20-1111118083480 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/