On Tue, Nov 08, 2011 at 01:29:34PM +0100, Bastian Blank wrote: >severity 648004 normal >thanks > >On Tue, Nov 08, 2011 at 10:15:33AM +0100, Bernhard Reutner-Fischer wrote: >> On debian 6.0.2 i am running a XEN guest with 2.6.32-5-xen-amd64 >> from linux-image-2.6.32-5-xen-amd64 (version 2.6.32-35). > >This is neither the latest version (2.6.32-38 is it) nor is it >supported (use the non -xen variant).
Works fine with 3.0.0-1-amd64 (linux-image-3.0.0-1-amd64 v3.0.0-3) from testing. Same thing happens with current, stable version (2.6.32-38) of linux-image-2.6.32-5-xen-amd64 [ 382.049709] HTB: quantum of class 10666 is big. Consider r2q change. [ 382.086646] u32 classifier [ 382.086652] Performance counters on [ 382.086655] input device check on [ 382.086658] Actions configured [ 382.097749] BUG: unable to handle kernel NULL pointer dereference at (null) [ 382.097760] IP: [<(null)>] (null) [ 382.097765] PGD fdcc3067 PUD fdcf6067 PMD 0 [ 382.097772] Oops: 0010 [#1] SMP [ 382.097777] last sysfs file: /sys/devices/virtual/net/lo/operstate [ 382.097782] CPU 0 [ 382.097786] Modules linked in: act_police cls_u32 sch_sfq sch_htb snd_pcm snd_timer snd soundcore snd_page_alloc evdev pcspkr ext4 mbcache jbd2 crc16 xen_netfront xen_blkfront [ 382.097812] Pid: 1036, comm: tc Not tainted 2.6.32-5-xen-amd64 #1 [ 382.097817] RIP: e030:[<0000000000000000>] [<(null)>] (null) [ 382.097822] RSP: e02b:ffff8800fdce1940 EFLAGS: 00010282 [ 382.097827] RAX: ffffffffa0106c80 RBX: ffff8800fea0fe40 RCX: 00000000416e3e1a [ 382.097832] RDX: 0000000000020000 RSI: 0000000000000000 RDI: ffff8800fd8c8000 [ 382.097837] RBP: ffff8800ffa4ef00 R08: ffff8800ffc03100 R09: ffff880000009680 [ 382.097841] R10: 0000000000000001 R11: 0000000000000001 R12: ffff8800ffa4ea40 [ 382.097847] R13: ffff8800fea0fe40 R14: ffff8800fdce19b8 R15: 0000000000000000 [ 382.097855] FS: 00007fef5deed700(0000) GS:ffff8800038ad000(0000) knlGS:0000000000000000 [ 382.097861] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 382.097865] CR2: 0000000000000000 CR3: 00000000fe4d9000 CR4: 0000000000002660 [ 382.097870] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 382.097875] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 382.097881] Process tc (pid: 1036, threadinfo ffff8800fdce0000, task ffff880002c10000) [ 382.097886] Stack: [ 382.097889] ffffffffa010d7b8 ffff8800ffb15ea0 ffffffffa010dabe 000000200040003d [ 382.097896] <0> ffff8800fea0fe40 ffff8800fd348488 0000000080000800 ffff8800ffa4ef00 [ 382.097906] <0> ffff8800fdce1aa8 ffff8800ffa4ea40 ffffffffa010db3c 0000000000000002 [ 382.097916] Call Trace: [ 382.097922] [<ffffffffa010d7b8>] ? u32_set_parms+0xbd/0x143 [cls_u32] [ 382.097929] [<ffffffffa010dabe>] ? u32_change+0x280/0x39c [cls_u32] [ 382.097935] [<ffffffffa010db3c>] ? u32_change+0x2fe/0x39c [cls_u32] [ 382.097943] [<ffffffff81276add>] ? tc_ctl_tfilter+0x4ea/0x5af [ 382.097951] [<ffffffff8100e635>] ? xen_force_evtchn_callback+0x9/0xa [ 382.097957] [<ffffffff8127b480>] ? netlink_sendmsg+0x162/0x255 [ 382.097964] [<ffffffff81269dc3>] ? rtnetlink_rcv_msg+0x0/0x1f5 [ 382.097970] [<ffffffff8127b040>] ? netlink_rcv_skb+0x34/0x7c [ 382.097976] [<ffffffff81269dbd>] ? rtnetlink_rcv+0x1f/0x25 [ 382.097981] [<ffffffff8127ae34>] ? netlink_unicast+0xe2/0x148 [ 382.097988] [<ffffffff812588f9>] ? __alloc_skb+0x69/0x15a [ 382.097993] [<ffffffff8127b560>] ? netlink_sendmsg+0x242/0x255 [ 382.098000] [<ffffffff81251265>] ? sock_sendmsg+0xa3/0xbb [ 382.098006] [<ffffffff81251169>] ? sock_recvmsg+0xa6/0xbe [ 382.098012] [<ffffffff81065f86>] ? autoremove_wake_function+0x0/0x2e [ 382.098018] [<ffffffff81065f86>] ? autoremove_wake_function+0x0/0x2e [ 382.098024] [<ffffffff81259c64>] ? verify_iovec+0x46/0x96 [ 382.098029] [<ffffffff812514a7>] ? sys_sendmsg+0x22a/0x2b5 [ 382.098036] [<ffffffff8100ecf2>] ? check_events+0x12/0x20 [ 382.098043] [<ffffffff8115453f>] ? cap_file_free_security+0x0/0x1 [ 382.098050] [<ffffffff8130fb26>] ? do_page_fault+0x2e0/0x2fc [ 382.098056] [<ffffffff81011b42>] ? system_call_fastpath+0x16/0x1b [ 382.098060] Code: Bad RIP value. [ 382.098068] RIP [<(null)>] (null) [ 382.098072] RSP <ffff8800fdce1940> [ 382.098076] CR2: 0000000000000000 [ 382.098080] ---[ end trace 68f04f1376e5fcff ]--- > >> The bug sounds like it comes from the openvirtuozzo patch. > >Which is not available in this package. Are you sure? The patch contains this hunk in the ChangeLog: + [ maximilian attems] + * Update openvz patch to feoktistov (ipv6, checkpointing, stability, + ipsec, nfs, ppp, tc, ve). (closes: #607041, #613501, #613170) --- they touch tc! ---^ Maximilian, can you reproduce this? thanks, -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20111109104138.ga14...@mx.loc