[Bug 1131864] New: OOPS in nf_getsockopt on aarch64
http://bugzilla.suse.com/show_bug.cgi?id=1131864 Bug ID: 1131864 Summary: OOPS in nf_getsockopt on aarch64 Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: aarch64 OS: Other Status: NEW Severity: Major Priority: P5 - None Component: Kernel Assignee: kernel-maintainers@forge.provo.novell.com Reporter: fvogt@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Found by openQA in the podman tests. Does not happen all the time (~50%). [ 367.311886] Unable to handle kernel paging request at virtual address ffff9b29bf7e8858 [ 367.314016] Mem abort info: [ 367.315384] ESR = 0x96000005 [ 367.316762] Exception class = DABT (current EL), IL = 32 bits [ 367.318490] SET = 0, FnV = 0 [ 367.319836] EA = 0, S1PTW = 0 [ 367.321257] Data abort info: [ 367.322548] ISV = 0, ISS = 0x00000005 [ 367.323954] CM = 0, WnR = 0 [ 367.325234] swapper pgtable: 4k pages, 48-bit VAs, pgdp = 00000000a126efc6 [ 367.327004] [ffff9b29bf7e8858] pgd=000000013fff8003, pud=0000000000000000 [ 367.328774] Internal error: Oops: 96000005 [#1] SMP [ 367.330330] Modules linked in: iptable_nat nf_nat_ipv4 nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_tables x_tables veth bridge stp llc dm_mod scsi_transport_iscsi af_packet nls_iso8859_1 nls_cp437 vfat fat snd_intel8x0 aes_ce_blk crypto_simd cryptd aes_ce_cipher crct10dif_ce snd_ac97_codec ac97_bus ghash_ce snd_pcm aes_arm64 snd_timer sha2_ce snd soundcore sha256_arm64 sha1_ce joydev virtio_net net_failover failover btrfs libcrc32c hid_generic usbhid xor xor_neon zlib_deflate sr_mod cdrom raid6_pq virtio_gpu virtio_blk drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm xhci_pci xhci_hcd drm virtio_scsi usbcore virtio_mmio overlay sg efivarfs virtio_rng [ 367.344165] CPU: 0 PID: 1910 Comm: iptables Not tainted 5.0.5-1-default #1 openSUSE Tumbleweed (unreleased) [ 367.346519] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 367.348509] pstate: 60000005 (nZCv daif -PAN -UAO) [ 367.350216] pc : alloc_counters.isra.4+0xe0/0x180 [ip_tables] [ 367.352058] lr : alloc_counters.isra.4+0x7c/0x180 [ip_tables] [ 367.353882] sp : ffff000013353be0 [ 367.355391] x29: ffff000013353be0 x28: 0000000000000000 [ 367.357151] x27: ffff9b2aa29eb440 x26: ffff0000108d7000 [ 367.358916] x25: 0000000000000000 x24: 0000000000000000 [ 367.360660] x23: ffff3b405a61d738 x22: ffff3b405a61e614 [ 367.362404] x21: ffff9b2aa29eb400 x20: ffff9b2aa29eb440 [ 367.364139] x19: ffff9b29bf7e8858 x18: 0000000000000000 [ 367.365880] x17: 0000000000000000 x16: ffff3b4059bd2fc8 [ 367.367648] x15: 0000000000000000 x14: 0000000000000000 [ 367.369362] x13: 0000000000000000 x12: 0140000000000000 [ 367.371085] x11: 0040000000000001 x10: ffff000010ad7000 [ 367.372767] x9 : 0000000000000000 x8 : 0000000000000000 [ 367.374434] x7 : ffff0080108d7000 x6 : ffff0000508d7000 [ 367.376078] x5 : 00001b2abf068000 x4 : 0000000000000001 [ 367.377745] x3 : 00005fea655a3000 x2 : 0000000000000000 [ 367.379375] x1 : ffff9b2aa29eb750 x0 : ffff9b2aa29eb4a0 [ 367.380981] Process iptables (pid: 1910, stack limit = 0x00000000cf5bfa4e) [ 367.382807] Call trace: [ 367.384067] alloc_counters.isra.4+0xe0/0x180 [ip_tables] [ 367.385711] do_ipt_get_ctl+0x24c/0x400 [ip_tables] [ 367.387317] nf_getsockopt+0x64/0xa8 [ 367.388730] ip_getsockopt+0xcc/0x140 [ 367.390139] raw_getsockopt+0x88/0xb0 [ 367.391531] sock_common_getsockopt+0x54/0x68 [ 367.392986] __arm64_sys_getsockopt+0x7c/0xe0 [ 367.394431] el0_svc_common+0x98/0x120 [ 367.395772] el0_svc_handler+0x38/0x78 [ 367.397104] el0_svc+0x8/0xc [ 367.398326] Code: d50339bf b9400263 6b01007f 54000120 (b9400261) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c1
Takashi Iwai
http://bugzilla.suse.com/show_bug.cgi?id=1131864
Matthias Brugger
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c2
Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c3
--- Comment #3 from Fabian Vogt
Looks like https://bugzilla.opensuse.org/show_bug.cgi?id=1128546 (ignore the unrelated USB trace and comments)
Yeah, that's the exact same crash - however, that bug report seems to be more about the USB issue now than the iptables one... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c4
--- Comment #4 from Guillaume GARDET
(In reply to Guillaume GARDET from comment #2)
Looks like https://bugzilla.opensuse.org/show_bug.cgi?id=1128546 (ignore the unrelated USB trace and comments)
Yeah, that's the exact same crash - however, that bug report seems to be more about the USB issue now than the iptables one...
Indeed, so keep this one to track this specific issue. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c5
--- Comment #5 from Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c6
--- Comment #6 from Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c7
Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
Stefan Brüns
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c8
--- Comment #8 from Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c9
--- Comment #9 from Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c10
--- Comment #10 from Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c11
Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c12
Andreas Schwab
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c13
Guillaume GARDET
See the follow-ups.
I did until: https://www.spinics.net/lists/netdev/msg520294.html Nothing was fixed? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c14
Andreas Schwab
http://bugzilla.suse.com/show_bug.cgi?id=1131864
Andreas Färber
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c15
--- Comment #15 from Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c16
Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c18
Denis Kirjanov
http://bugzilla.suse.com/show_bug.cgi?id=1131864
Guillaume GARDET
http://bugzilla.suse.com/show_bug.cgi?id=1131864
http://bugzilla.suse.com/show_bug.cgi?id=1131864#c19
Guillaume GARDET
Hi Guillaume,
please check if it still the issue and if it's not please closer the bug.
Thank you.
Backported patch in kernel 5.1.6 fixed this problem on qemu/openQA as well: arm64/kernel: kaslr: reduce module randomization range to 2 GB So, current released Tumbleweed is not affected anymore. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com