On Thu, Aug 07, 2008 at 04:43:37PM +0200, Julius Volz wrote: > This is the third iteration of the IPVS Netlink interface, this time > with only a small fix for a typo found by Thomas Graf. If there are no > further major issues, can this be applied? > > The two patches add a Generic Netlink interface to IPVS while keeping > the old get/setsockopt interface for userspace backwards compatibility. > The motivation for this is to have a more extensible interface for > future changes, such as the planned IPv6 support. > > An ipvsadm that already uses the new interface is available here: > > http://sixpak.org/vince/google/ipvsadm/ > (by Vince Busam) > > Old ipvsadms continue to work with this change. Hi Julius, these patches seem fine to me, however I am still seeing an oops when using the new ipvsadm. Are we sure that this bug is in generic code? # ipvsadm -A -t 10.4.0.132:80 # ipvsadm -C BUG: unable to handle kernel NULL pointer dereference at 00000028 IP: [<c021f034>] ip_vs_genl_set_cmd+0x254/0x494 *pde = 00000000 Oops: 0000 [#1] Pid: 33, comm: ipvsadm Not tainted (2.6.27-rc2-kexec-11901-ge6fce5b-dirty #13) EIP: 0060:[<c021f034>] EFLAGS: 00000206 CPU: 0 EIP is at ip_vs_genl_set_cmd+0x254/0x494 EAX: 00000014 EBX: 00000000 ECX: c7401300 EDX: c02e3018 ESI: 00000000 EDI: 00000011 EBP: c746dce4 ESP: c746dc20 DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 Process ipvsadm (pid: 33, ti=c746c000 task=c6f22700 task.ti=c746c000) Stack: 00000021 c0289340 c0289364 c0289374 c6faf088 00001102 c6faf0b4 c6faf058 00000003 c0289340 00000001 00000000 c02e0968 c01e948e 00000002 c6feb960 00000001 c6f84160 c6feb960 00000010 00000000 00000246 c01e4c57 00000246 Call Trace: [<c01e948e>] ctrl_dumpfamily+0x86/0xd4 [<c01e4c57>] sk_filter+0x67/0x7c [<c01e693d>] netlink_dump+0x15d/0x1a4 [<c01e9858>] genl_rcv_msg+0x1dc/0x204 [<c01e967c>] genl_rcv_msg+0x0/0x204 [<c01e89d2>] netlink_rcv_skb+0x72/0x80 [<c01e9671>] genl_rcv+0x19/0x24 [<c01e84d2>] netlink_unicast+0x232/0x284 [<c01e86dd>] netlink_sendmsg+0x1b9/0x288 [<c01d0d3b>] sock_sendmsg+0xb7/0xe0 [<c0120adc>] autoremove_wake_function+0x0/0x30 [<c0120adc>] autoremove_wake_function+0x0/0x30 [<c013a383>] __do_fault+0x15b/0x340 [<c01d7832>] verify_iovec+0x2a/0x88 [<c01d0e9f>] sys_sendmsg+0x13b/0x230 [<c01d184a>] sys_recvmsg+0x1b6/0x240 [<c01d1665>] move_addr_to_user+0x45/0x74 [<c01d1b50>] sys_getsockname+0x94/0xa0 [<c01d2a09>] release_sock+0x9/0x70 [<c01d3bca>] sock_setsockopt+0x106/0x638 [<c01d0a41>] sock_attach_fd+0x65/0xa0 [<c01d1e88>] sys_socketcall+0x80/0x1d8 [<c0103d42>] syscall_call+0x7/0xb ======================= Code: 8b 40 04 89 44 24 1c 8b 47 18 85 c0 74 07 8b 40 04 89 44 24 20 8d 44 24 18 e8 09 ca ff ff 89 c3 8b 84 24 88 00 00 00 85 c0 74 03 <ff> 48 14 b8 f0 90 28 c0 e8 e3 a5 00 00 89 d8 81 c4 8c 00 00 00 EIP: [<c021f034>] ip_vs_genl_set_cmd+0x254/0x494 SS:ESP 0068:c746dc20 ---[ end trace d371c2e324a230e1 ]--- Segmentation fault -- To unsubscribe from this list: send the line "unsubscribe lvs-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html