Re: [Bugme-new] [Bug 7366] New: BUG: unable to handle kernel paging request at virtual address d0cb03e0
Please use reply to _all_. Quoting manually .. Patrick McHardy wrote: >> Does it also happen without external patches like ipp2p? Did you >> load/unload any netfilter modules before? > > This happens after loading all specific, ip_conntrackmodules, flushing > al iptables rules, reseting counters, flushing all tables, unloading all > ip_conntrack modules and the runing command -j ACCEPT> . Tested also with kernel 2.6.18.1 and it works ok. I do not > thik this has to do anything with ipp2p > module, since is not even used, and in the commands I used, is not > specified a command for this module. Any chance you're also unloading iptables modules? If so this patch (already in Dave's queue) should fix it .. [NETFILTER]: fix cut-and-paste error in exit functions Signed-off-by: Patrick McHardy <[EMAIL PROTECTED]> --- commit c7b1507f3c040c02efa1b955f7180a33a232c4d9 tree fd21258deca0e5d8859271bb2c745302ce5a1e2a parent 26da6cf44bc574d528d715a17e48f54da061c151 author Patrick McHardy <[EMAIL PROTECTED]> Wed, 11 Oct 2006 08:35:50 +0200 committer Patrick McHardy <[EMAIL PROTECTED]> Wed, 11 Oct 2006 08:35:50 +0200 net/netfilter/xt_NFQUEUE.c |2 +- net/netfilter/xt_connmark.c |2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/net/netfilter/xt_NFQUEUE.c b/net/netfilter/xt_NFQUEUE.c index db9b896..39e1175 100644 --- a/net/netfilter/xt_NFQUEUE.c +++ b/net/netfilter/xt_NFQUEUE.c @@ -68,7 +68,7 @@ static int __init xt_nfqueue_init(void) static void __exit xt_nfqueue_fini(void) { - xt_register_targets(xt_nfqueue_target, ARRAY_SIZE(xt_nfqueue_target)); + xt_unregister_targets(xt_nfqueue_target, ARRAY_SIZE(xt_nfqueue_target)); } module_init(xt_nfqueue_init); diff --git a/net/netfilter/xt_connmark.c b/net/netfilter/xt_connmark.c index 92a5726..a8f0305 100644 --- a/net/netfilter/xt_connmark.c +++ b/net/netfilter/xt_connmark.c @@ -147,7 +147,7 @@ static int __init xt_connmark_init(void) static void __exit xt_connmark_fini(void) { - xt_register_matches(xt_connmark_match, ARRAY_SIZE(xt_connmark_match)); + xt_unregister_matches(xt_connmark_match, ARRAY_SIZE(xt_connmark_match)); } module_init(xt_connmark_init);
Re: [Bugme-new] [Bug 7366] New: BUG: unable to handle kernel paging request at virtual address d0cb03e0
Andrew Morton wrote: > >>http://bugzilla.kernel.org/show_bug.cgi?id=7366 >>___ >>Oct 15 17:38:40 test kernel: BUG: unable to handle kernel paging request at >>virtual address d0cb03e0 >>Oct 15 17:38:40 test kernel: printing eip: >>Oct 15 17:38:40 test kernel: d08fc19b >>Oct 15 17:38:40 test kernel: *pde = 0ba03067 >>Oct 15 17:38:40 test kernel: *pte = >>Oct 15 17:38:40 test kernel: Oops: [#1] >>Oct 15 17:38:40 test kernel: SMP >>Oct 15 17:38:40 test kernel: Modules linked in: ipt_MASQUERADE iptable_nat >>ip_nat ip_conntrack xt_limit ip6table_filter ip6_tables xt_mac xt_tcpudp >>xt_pkttype iptable_raw xt_CLASSIFY xt_MARK xt_length xt_physdev bridge >>xt_policy >>xt_multiport ipt_ULOG ipt_TTL ipt_ttl ipt_TOS ipt_tos ipt_TCPMSS ipt_REJECT >>ipt_recent ipt_owner ipt_LOG ipt_iprange ipt_ipp2p ipt_hashlimit ipt_ECN >>ipt_ecn >>ipt_CLUSTERIP ipt_ah ipt_addrtype nfnetlink iptable_mangle nfsd exportfs lockd >>nfs_acl ipv6 sunrpc iptable_filter ip_tables x_tables i810_audio ac97_codec >>soundcore 8139too mii af_packet ide_cd binfmt_misc loop dm_mod video thermal >>sbs >>processor i2c_ec i2c_core fan container button battery asus_acpi ac intel_agp >>agpgart uhci_hcd usbcore ext3 jbd Does it also happen without external patches like ipp2p? Did you load/unload any netfilter modules before? - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [Bugme-new] [Bug 7366] New: BUG: unable to handle kernel paging request at virtual address d0cb03e0
(plesae provide updates via reply-to-all email, not via the bugzilla interface) Looks like a netfilter regression. On Sun, 15 Oct 2006 14:00:33 -0700 [EMAIL PROTECTED] wrote: > http://bugzilla.kernel.org/show_bug.cgi?id=7366 > >Summary: BUG: unable to handle kernel paging request at virtual > address d0cb03e0 > Kernel Version: 2.6.19-rc2 > Status: NEW > Severity: blocking > Owner: [EMAIL PROTECTED] > Submitter: [EMAIL PROTECTED] > > > Most recent kernel where this bug did not occur:2.6.17.5 > Distribution: Mandriva 2007 > Hardware Environment: Mb chipset i810, CPU Celeron (Mendocino), Lan Cards > 2xRTL8129 > Software Environment: Mandriva 2007, Test Kernel 2.6.19-rc2 > Problem Description: Kernel Locks when Entering comand "iptables -A INPUT -i > eth1 -j ACCEPT" and this is the message in logs: > __ > Oct 15 17:38:40 test kernel: BUG: unable to handle kernel paging request at > virtual address d0cb03e0 > Oct 15 17:38:40 test kernel: printing eip: > Oct 15 17:38:40 test kernel: d08fc19b > Oct 15 17:38:40 test kernel: *pde = 0ba03067 > Oct 15 17:38:40 test kernel: *pte = > Oct 15 17:38:40 test kernel: Oops: [#1] > Oct 15 17:38:40 test kernel: SMP > Oct 15 17:38:40 test kernel: Modules linked in: ipt_MASQUERADE iptable_nat > ip_nat ip_conntrack xt_limit ip6table_filter ip6_tables xt_mac xt_tcpudp > xt_pkttype iptable_raw xt_CLASSIFY xt_MARK xt_length xt_physdev bridge > xt_policy > xt_multiport ipt_ULOG ipt_TTL ipt_ttl ipt_TOS ipt_tos ipt_TCPMSS ipt_REJECT > ipt_recent ipt_owner ipt_LOG ipt_iprange ipt_ipp2p ipt_hashlimit ipt_ECN > ipt_ecn > ipt_CLUSTERIP ipt_ah ipt_addrtype nfnetlink iptable_mangle nfsd exportfs lockd > nfs_acl ipv6 sunrpc iptable_filter ip_tables x_tables i810_audio ac97_codec > soundcore 8139too mii af_packet ide_cd binfmt_misc loop dm_mod video thermal > sbs > processor i2c_ec i2c_core fan container button battery asus_acpi ac intel_agp > agpgart uhci_hcd usbcore ext3 jbd > Oct 15 17:38:40 test kernel: CPU:0 > Oct 15 17:38:40 test kernel: EIP:0060:[pg0+273219995/1069097984]Not > tainted VLI > Oct 15 17:38:40 test kernel: EIP:0060:[]Not tainted VLI > Oct 15 17:38:40 test kernel: EFLAGS: 00010282 (2.6.19-rc2-1 #2) > Oct 15 17:38:40 test kernel: EIP is at xt_find_match+0x3b/0xf0 [x_tables] > Oct 15 17:38:40 test kernel: eax: ebx: d0cb03e0 ecx: > edx: cdcf7070 > Oct 15 17:38:40 test kernel: esi: d0cf5070 edi: 0002 ebp: ca71fba0 > esp: ca71fb8c > Oct 15 17:38:40 test kernel: ds: 007b es: 007b ss: 0068 > Oct 15 17:38:40 test kernel: Process iptables (pid: 12607, ti=ca71e000 > task=cea9e560 task.ti=ca71e000) > Oct 15 17:38:40 test kernel: Stack: 0070 00cff000 d0cf5072 d0cf5070 > 0002 > ca71fc18 d0b8db0e 0002 > Oct 15 17:38:40 test kernel:d0cf5072 ca71fbb8 ce88f248 > 0163 > 00d2 00c0 > Oct 15 17:38:40 test kernel:ccc95600 000e ca71fc80 > ccc95600 > d0cf5000 ca71fbf8 d0cfe134 > Oct 15 17:38:40 test kernel: Call Trace: > Oct 15 17:38:40 test kernel: [show_trace_log_lvl+38/64] > show_trace_log_lvl+0x26/0x40 > Oct 15 17:38:40 test kernel: [] show_trace_log_lvl+0x26/0x40 > Oct 15 17:38:40 test kernel: [show_stack_log_lvl+177/224] > show_stack_log_lvl+0xb1/0xe0 > Oct 15 17:38:40 test kernel: [] show_stack_log_lvl+0xb1/0xe0 > Oct 15 17:38:40 test kernel: [show_registers+447/624] > show_registers+0x1bf/0x270 > Oct 15 17:38:40 test kernel: [] show_registers+0x1bf/0x270 > Oct 15 17:38:40 test kernel: [die+313/752] die+0x139/0x2f0 > Oct 15 17:38:40 test kernel: [] die+0x139/0x2f0 > Oct 15 17:38:40 test kernel: [do_page_fault+545/1584] > do_page_fault+0x221/0x630 > Oct 15 17:38:40 test kernel: [] do_page_fault+0x221/0x630 > Oct 15 17:38:40 test kernel: [error_code+57/64] error_code+0x39/0x40 > Oct 15 17:38:40 test kernel: [] error_code+0x39/0x40 > Oct 15 17:38:40 test kernel: [pg0+275913486/1069097984] > translate_table+0x34e/0x880 [ip_tables] > Oct 15 17:38:40 test kernel: [] translate_table+0x34e/0x880 > [ip_tables] > Oct 15 17:38:40 test kernel: [pg0+275915230/1069097984] > do_ipt_set_ctl+0x19e/0x770 [ip_tables] > Oct 15 17:38:40 test kernel: [] do_ipt_set_ctl+0x19e/0x770 > [ip_tables] > Oct 15 17:38:40 test kernel: [nf_sockopt+189/272] nf_sockopt+0xbd/0x110 > Oct 15 17:38:40 test kernel: [] nf_sockopt+0xbd/0x110 > Oct 15 17:38:40 test kernel: [nf_setsockopt+41/48] nf_setsockopt+0x29/0x30 > Oct 15 17:38:40 test kernel: [] nf_setsockopt+0x29/0x30 > Oct 15 17:38:40 test kernel: [ip_setsockopt+314/3312] > ip_setsockopt+0x13a/0xcf0 > Oct 15 17:38:40 test kernel: [] ip_setsockopt+0x13a/0xcf0 > Oct 15 17:38:40 test kernel: [raw_setsockopt+58/144] raw_setsockopt+0x3a/0x90 > Oct 15 17:38:40 test kernel: [] raw_setsockopt+0x3a/0x90 > Oct 15 17:38:40 test kernel: [sock_commo