Looks like br_netfilter went splat.
Begin forwarded message: Date: Sat, 31 Dec 2005 09:23:40 -0800 From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [Bugme-new] [Bug 5803] New: Bridge code Oops with 2.6.14.2 http://bugzilla.kernel.org/show_bug.cgi?id=5803 Summary: Bridge code Oops with 2.6.14.2 Kernel Version: 2.6.14.2 Status: NEW Severity: high Owner: [EMAIL PROTECTED] Submitter: [EMAIL PROTECTED] Most recent kernel where this bug did not occur: 2.6.13.2 Distribution: Debian Etch Hardware Environment: Tyan Transport GX28 (B2882), Dual AMD Opteron 242, 4GB RAM Software Environment: Kernel compiled with skas3-v8.2, running multiple UML instances, using bridging interfaces on all active ethernet ports Problem Description: We launch 10 UML instances using a bridging interface (no iptables). The systems will run fine (6-8 days) until we attempt to shutdown the system for maintenance. The host server will "freeze" hard when shutting down the guest instances (no network, console, etc), usually after the 7th instance has been shutdown and it's network interface removed from the bridge. I had to power- cycle the system to recover. The issue disappears when I reverted the host back to 2.6.13.2. Initially, I thought the issue had disappeared once I upgraded the oldest guest UML kernel (2.6.7) it to a more recent version. However, it reappeared this week with all newer guest instances. Unfortunately, only one of the "freezes" dumped any information: device bind1-0 left promiscuous mode Unable to handle kernel NULL pointer dereference at virtual address 00000000 printing eip: f8be14f4 *pde = 00000000 Oops: 0000 [#1] SMP Modules linked in: autofs4 tun ipv6 bridge floppy pcspkr hw_random i2c_amd8111 generic amd74xx shpchp pci_hotplug ohci_hcd usbcore raid1 md_mod dm_mod rtc w83627hf eeprom lm85 hwmon_vid i2c_isa i2c_amd756 i2c_core tg3 e100 mii psmouse ide_generic ide_disk ide_cd cdrom ide_core unix CPU: 1 EIP: 0060:[<f8be14f4>] Not tainted VLI EFLAGS: 00010287 (2.6.14.2-skas3-v8.2) EIP is at br_nf_forward_ip+0xa2/0x16a [bridge] eax: 00000000 ebx: d7b59dc0 ecx: ea4a5380 edx: 00000080 esi: 00000002 edi: 00000002 ebp: f8bdbdb7 esp: e172bcc8 ds: 007b es: 007b ss: 0068 Process linux-2.6.7-02- (pid: 4049, threadinfo=e172a000 task=e99ed550) Stack: 80000000 c03e7350 c02d44e7 00000002 e172bd58 f8be1334 80000000 ea4a5380 e172bd40 80000000 c03e7350 c02d44e7 00000002 e172bd7c f2641000 efd7e800 f8bdbdb7 00000002 e172bd7c c03e7350 f8bdbdb7 c02d4564 c03e7350 e172bd7c Call Trace: [<c02d44e7>] nf_iterate+0x66/0x8a [<f8be1334>] br_nf_forward_finish+0x0/0x11e [bridge] [<c02d44e7>] nf_iterate+0x66/0x8a [<f8bdbdb7>] br_forward_finish+0x0/0x6b [bridge] [<f8bdbdb7>] br_forward_finish+0x0/0x6b [bridge] [<c02d4564>] nf_hook_slow+0x59/0x10e [<f8bdbdb7>] br_forward_finish+0x0/0x6b [bridge] [<f8bdbefa>] __br_forward+0x63/0x7c [bridge] [<f8bdbdb7>] br_forward_finish+0x0/0x6b [bridge] [<f8bdc11b>] br_flood_forward+0x27/0x2c [bridge] [<f8bdbe97>] __br_forward+0x0/0x7c [bridge] [<f8bdcb1b>] br_handle_frame_finish+0x11b/0x137 [bridge] [<f8be094c>] br_nf_pre_routing_finish+0x1a6/0x36b [bridge] [<f8bdca00>] br_handle_frame_finish+0x0/0x137 [bridge] [<f8be07a6>] br_nf_pre_routing_finish+0x0/0x36b [bridge] [<f8be07a6>] br_nf_pre_routing_finish+0x0/0x36b [bridge] [<c02d4564>] nf_hook_slow+0x59/0x10e [<f8be07a6>] br_nf_pre_routing_finish+0x0/0x36b [bridge] [<f8bdca00>] br_handle_frame_finish+0x0/0x137 [bridge] [<f8be11a6>] br_nf_pre_routing+0x332/0x457 [bridge] [<f8be07a6>] br_nf_pre_routing_finish+0x0/0x36b [bridge] [<c02d44e7>] nf_iterate+0x66/0x8a [<f8bdca00>] br_handle_frame_finish+0x0/0x137 [bridge] [<f8bdca00>] br_handle_frame_finish+0x0/0x137 [bridge] [<c02d4564>] nf_hook_slow+0x59/0x10e [<f8bdca00>] br_handle_frame_finish+0x0/0x137 [bridge] [<f8bdccec>] br_handle_frame+0x1b5/0x229 [bridge] [<f8bdca00>] br_handle_frame_finish+0x0/0x137 [bridge] [<c027e6e9>] netif_receive_skb+0x1af/0x334 [<f8a74bf5>] e100_poll+0x1cf/0x70c [e100] [<c027ea36>] net_rx_action+0xc1/0x197 [<c01206a2>] __do_softirq+0x72/0xdd [<c0120740>] do_softirq+0x33/0x35 [<c0104e7e>] do_IRQ+0x1e/0x24 [<c0103772>] common_interrupt+0x1a/0x20 Code: c1 e2 06 8d 82 90 71 3e c0 3b 82 90 71 3e c0 74 58 c7 44 24 18 00 00 00 80 c7 44 24 14 34 13 be f8 8b 44 24 3c 8b 80 ec 02 00 00 <8b> 00 8b 40 0c 89 44 24 10 8b 44 24 38 8b 80 ec 02 00 00 8b 00 Steps to reproduce: ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html