http://bugzilla.suse.com/show_bug.cgi?id=1131864 Bug ID: 1131864 Summary: OOPS in nf_getsockopt on aarch64 Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: aarch64 OS: Other Status: NEW Severity: Major Priority: P5 - None Component: Kernel Assignee: kernel-maintainers@forge.provo.novell.com Reporter: fvogt@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Found by openQA in the podman tests. Does not happen all the time (~50%). [ 367.311886] Unable to handle kernel paging request at virtual address ffff9b29bf7e8858 [ 367.314016] Mem abort info: [ 367.315384] ESR = 0x96000005 [ 367.316762] Exception class = DABT (current EL), IL = 32 bits [ 367.318490] SET = 0, FnV = 0 [ 367.319836] EA = 0, S1PTW = 0 [ 367.321257] Data abort info: [ 367.322548] ISV = 0, ISS = 0x00000005 [ 367.323954] CM = 0, WnR = 0 [ 367.325234] swapper pgtable: 4k pages, 48-bit VAs, pgdp = 00000000a126efc6 [ 367.327004] [ffff9b29bf7e8858] pgd=000000013fff8003, pud=0000000000000000 [ 367.328774] Internal error: Oops: 96000005 [#1] SMP [ 367.330330] Modules linked in: iptable_nat nf_nat_ipv4 nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_tables x_tables veth bridge stp llc dm_mod scsi_transport_iscsi af_packet nls_iso8859_1 nls_cp437 vfat fat snd_intel8x0 aes_ce_blk crypto_simd cryptd aes_ce_cipher crct10dif_ce snd_ac97_codec ac97_bus ghash_ce snd_pcm aes_arm64 snd_timer sha2_ce snd soundcore sha256_arm64 sha1_ce joydev virtio_net net_failover failover btrfs libcrc32c hid_generic usbhid xor xor_neon zlib_deflate sr_mod cdrom raid6_pq virtio_gpu virtio_blk drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm xhci_pci xhci_hcd drm virtio_scsi usbcore virtio_mmio overlay sg efivarfs virtio_rng [ 367.344165] CPU: 0 PID: 1910 Comm: iptables Not tainted 5.0.5-1-default #1 openSUSE Tumbleweed (unreleased) [ 367.346519] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 367.348509] pstate: 60000005 (nZCv daif -PAN -UAO) [ 367.350216] pc : alloc_counters.isra.4+0xe0/0x180 [ip_tables] [ 367.352058] lr : alloc_counters.isra.4+0x7c/0x180 [ip_tables] [ 367.353882] sp : ffff000013353be0 [ 367.355391] x29: ffff000013353be0 x28: 0000000000000000 [ 367.357151] x27: ffff9b2aa29eb440 x26: ffff0000108d7000 [ 367.358916] x25: 0000000000000000 x24: 0000000000000000 [ 367.360660] x23: ffff3b405a61d738 x22: ffff3b405a61e614 [ 367.362404] x21: ffff9b2aa29eb400 x20: ffff9b2aa29eb440 [ 367.364139] x19: ffff9b29bf7e8858 x18: 0000000000000000 [ 367.365880] x17: 0000000000000000 x16: ffff3b4059bd2fc8 [ 367.367648] x15: 0000000000000000 x14: 0000000000000000 [ 367.369362] x13: 0000000000000000 x12: 0140000000000000 [ 367.371085] x11: 0040000000000001 x10: ffff000010ad7000 [ 367.372767] x9 : 0000000000000000 x8 : 0000000000000000 [ 367.374434] x7 : ffff0080108d7000 x6 : ffff0000508d7000 [ 367.376078] x5 : 00001b2abf068000 x4 : 0000000000000001 [ 367.377745] x3 : 00005fea655a3000 x2 : 0000000000000000 [ 367.379375] x1 : ffff9b2aa29eb750 x0 : ffff9b2aa29eb4a0 [ 367.380981] Process iptables (pid: 1910, stack limit = 0x00000000cf5bfa4e) [ 367.382807] Call trace: [ 367.384067] alloc_counters.isra.4+0xe0/0x180 [ip_tables] [ 367.385711] do_ipt_get_ctl+0x24c/0x400 [ip_tables] [ 367.387317] nf_getsockopt+0x64/0xa8 [ 367.388730] ip_getsockopt+0xcc/0x140 [ 367.390139] raw_getsockopt+0x88/0xb0 [ 367.391531] sock_common_getsockopt+0x54/0x68 [ 367.392986] __arm64_sys_getsockopt+0x7c/0xe0 [ 367.394431] el0_svc_common+0x98/0x120 [ 367.395772] el0_svc_handler+0x38/0x78 [ 367.397104] el0_svc+0x8/0xc [ 367.398326] Code: d50339bf b9400263 6b01007f 54000120 (b9400261) -- You are receiving this mail because: You are on the CC list for the bug.