Public bug reported:
In my server ,i got a BUG,and i can initially locate where this bug is :
nf_conntrack_in-> resolve_normal_ct -> nf_conntrack_find_get ->
unlikely(!nf_ct_tuple_equal(tuple, &h->tuple)) -> nf_ct_put ->
destroy_conntrack -> nf_ct_is_confirmed -> BUG_ON
but I don't know why this happens,please help me ,THANK YOU!
4>------------[ cut here ]------------
15381 <2>kernel BUG at net/netfilter/nf_conntrack_core.c:206!
15382 <4>invalid opcode: 0000 [#1] SMP
15383 <4>last sysfs file:
/sys/devices/system/cpu/cpu47/topology/thread_siblings_list
15384 <4>CPU 0
15385 <4>Modules linked in: nbd(U) iptable_mangle iptable_nat nf_nat
nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 iptable_filter ip_tables ksl
b_ctk(U) fuse tcp_diag inet_diag xfs exportfs kvm_intel kvm vhost_net macvtap
macvlan cdc_ether usbnet mii tun openvswitch(U) libcrc32c b onding 8021q
garp stp llc toa hookers ipv6 power_meter iTCO_wdt iTCO_vendor_support dcdbas
ipmi_devintf lpc_ich mfd_core shpchp igb i2c_a lgo_bit i2c_core ixgbe dca
ptp pps_core mdio sg ext4 jbd2 mbcache sd_mod crc_t10dif ahci megaraid_sas wmi
dm_mirror dm_region_hash dm_log dm_mod [last unloaded: nbd]
15386 <4>
15387 <4>Pid: 25449, comm: mebs-nbd-core Tainted: G --------------- H
2.6.32-431.20.3.el6.mt20161028.x86_64 #1 Dell Inc. PowerEdge R 730/0WCJNT
15388 <4>RIP: 0010:[<ffffffffa029b8bc>] [<ffffffffa029b8bc>]
destroy_conntrack+0x11c/0x150 [nf_conntrack]
15389 <4>RSP: 0018:ffff881d10cd99f8 EFLAGS: 00010246
15390 troy_conntrack+0x11c/0x1RAX: 0000000000000000 RBX: ffff8813d96dbdc8 RCX:
0000000000000001
15391 <4>RDX: 000000000000b4be RSI: 0000000000000006 RDI: ffff8813d96dbdc8
15392 <4>RBP: ffff881d10cd9a08 R08: 0000000000000002 R09: 00000000000000c0
15393 <4>R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff81b18540
15394 <4>R13: 0000000000000003 R14: 0000000000000002 R15: 0000000000000002
15395 <4>FS: 00007f45d2ba1720(0000) GS:ffff88011f600000(0000)
knlGS:0000000000000000
15396 <4>CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
15397 <4>CR2: 0000000000000000 CR3: 0000001f0aa3f000 CR4: 00000000001427e0
15398 <4>DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
15399 <4>DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
15400 <4>Process mebs-nbd-core (pid: 25449, threadinfo ffff881d10cd8000, task
ffff881f0a9b6aa0)
15401 <4>Stack:
15402 <4> ffff881d10cd9ab8 ffffffff81b18540 ffff881d10cd9a18 ffffffff8148a4c7
15403 <4><d> ffff881d10cd9a38 ffffffffa029bac5 ffff881c47af1b68 ffffffff81b18540
15404 <4><d> ffff881d10cd9b18 ffffffffa029bdd0 ffffffffa026d620 ffffffffa02a7080
15405 <4>Call Trace:
15406 <4> [<ffffffff8148a4c7>] nf_conntrack_destroy+0x17/0x30
15407 <4> [<ffffffffa029bac5>] nf_conntrack_find_get+0x85/0x120 [nf_conntrack]
15408 <4> [<ffffffffa029bdd0>] nf_conntrack_in+0x270/0xa00 [nf_conntrack]
15409 <4> [<ffffffffa023e6e1>] ? ovs_dp_process_received_packet+0x51/0x80
[openvswitch]
15410 <4> [<ffffffffa026c6f1>] ipv4_conntrack_local+0x51/0x60
[nf_conntrack_ipv4]
15411 <4> [<ffffffff8148a439>] nf_iterate+0x69/0xb0
15412 <4> [<ffffffff81498030>] ? dst_output+0x0/0x20
15413 <4> [<ffffffff8148a5f6>] nf_hook_slow+0x76/0x120
15414 <4> [<ffffffff81498030>] ? dst_output+0x0/0x20
15415 <4> [<ffffffff8149a76f>] __ip_local_out+0x9f/0xb0
15416 <4> [<ffffffff8149a796>] ip_local_out+0x16/0x30
15417 <4> [<ffffffff8149ac80>] ip_queue_xmit+0x190/0x420
15418 <4> [<ffffffff8149b4a8>] ? ip_output+0xb8/0xc0
15419 <4> [<ffffffff814aff9e>] tcp_transmit_skb+0x40e/0x7b0
15420 <4> [<ffffffff814b24e0>] tcp_write_xmit+0x230/0xa90
15421 troy_conntrack+0x11c/0x150 [<ffffffff814b3060>]
__tcp_push_pending_frames+0x30/0xe0
15422 <4> [<ffffffff814b3182>] tcp_send_fin+0x72/0x1d0
15423 <4> [<ffffffff814a4586>] tcp_close+0x346/0x450
15424 <4> [<ffffffff814c7fd7>] inet_release+0x67/0x90
15425 <4> [<ffffffff814480e9>] sock_release+0x29/0x90
15426 <4> [<ffffffff81448167>] sock_close+0x17/0x30
15427 <4> [<ffffffff8118a8f5>] __fput+0xf5/0x210
15428 <4> [<ffffffff8118aa35>] fput+0x25/0x30
15429 <4> [<ffffffff81185d5d>] filp_close+0x5d/0x90
15430 <4> [<ffffffff81185e35>] sys_close+0xa5/0x100
15431 <4> [<ffffffff8100b072>] system_call_fastpath+0x16/0x1b
15432 <4>Code: 1b ec 1e e1 eb ce f6 05 9c fa d3 e1 20 74 ce 80 3d a0 ad 00 00
00 74 c5 48 89 de 48 c7 c7 00 32 2a a0 31 c0 e8 ca cc 28 e1 eb b2 <0f> 0b
eb fe f6 05 73 fa d3 e1 20 0f 84 f6 fe ff ff 80 3d 9b ad
15433 <1>RIP [<ffffffffa029b8bc>] destroy_conntrack+0x11c/0x150 [nf_conntrack]
15434 <4> RSP <ffff881d10cd99f8>
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1715279
Title:
2.6.32 netfliter . nf_conntrack . destroy_conntrack BUG
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1715279/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs