https://bugzilla.redhat.com/show_bug.cgi?id=1659706 i triggered something similar as https://www.spinics.net/lists/netdev/msg533254.html recently with 4.19.12-200.fc28.x86_64 by just call my "iptables.sh" which clears and sets up all sort of rules, chains and ipset - was a one-time event by call "iptables -t filter -P INPUT DROP" but i guess that should not happen and may point out a general problem explaining the random instability of the whole 4.19.x series IPTABLES="/usr/sbin/iptables" IPTABLES_FLT="$IPTABLES -t filter" /scripts/iptables.sh: line 617: 7874 Segmentation fault $IPTABLES_FLT -P INPUT DROP [root@firewall:~]$ dmesg -c [Mon Dec 24 13:49:01 2018] general protection fault: 0000 [#1] SMP PTI [Mon Dec 24 13:49:01 2018] CPU: 0 PID: 7874 Comm: iptables Not tainted 4.19.12-200.fc28.x86_64 #1 [Mon Dec 24 13:49:01 2018] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/03/2018 [Mon Dec 24 13:49:01 2018] RIP: 0010:rb_erase+0x216/0x370 [Mon Dec 24 13:49:01 2018] Code: e9 6b fe ff ff 4d 89 48 10 e9 91 fe ff ff c3 48 89 06 48 89 d0 48 8b 52 10 e9 b1 fe ff ff 48 8b 07 48 89 c1 48 83 e1 fc 74 53 <48> 3b 79 10 0f 84 94 00 00 00 4c 89 41 08 4d 85 c0 75 4c a8 01 0f [Mon Dec 24 13:49:01 2018] RSP: 0018:ffffb63fc2263d28 EFLAGS: 00010286 [Mon Dec 24 13:49:01 2018] RAX: ffd7d18a01ee7a26 RBX: ffff9651a1b1c960 RCX: ffd7d18a01ee7a24 [Mon Dec 24 13:49:01 2018] RDX: 0000000000000000 RSI: ffff96519890d3e8 RDI: ffff9651a1b1c960 [Mon Dec 24 13:49:01 2018] RBP: ffff9651a5942c08 R08: 0000000000000000 R09: ffffffffc02a23de [Mon Dec 24 13:49:01 2018] R10: ffff96519890b000 R11: 0000000000000000 R12: ffff96519890d3e8 [Mon Dec 24 13:49:01 2018] R13: ffff96519890d808 R14: ffff96519890d000 R15: ffff9651a1b1c980 [Mon Dec 24 13:49:01 2018] FS: 00007f76a1b53740(0000) GS:ffff9651a5e00000(0000) knlGS:0000000000000000 [Mon Dec 24 13:49:01 2018] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Mon Dec 24 13:49:01 2018] CR2: 0000564a46078000 CR3: 000000001951e005 CR4: 00000000001606f0 [Mon Dec 24 13:49:01 2018] Call Trace: [Mon Dec 24 13:49:01 2018] nf_conncount_destroy+0x58/0xc0 [nf_conncount] [Mon Dec 24 13:49:01 2018] cleanup_match+0x45/0x70 [Mon Dec 24 13:49:01 2018] cleanup_entry+0x3e/0xc0 [Mon Dec 24 13:49:01 2018] __do_replace+0x1ca/0x230 [Mon Dec 24 13:49:01 2018] do_ipt_set_ctl+0x146/0x1a2 [Mon Dec 24 13:49:01 2018] nf_setsockopt+0x44/0x70 [Mon Dec 24 13:49:01 2018] __sys_setsockopt+0x82/0xe0 [Mon Dec 24 13:49:01 2018] __x64_sys_setsockopt+0x20/0x30 [Mon Dec 24 13:49:01 2018] do_syscall_64+0x5b/0x160 [Mon Dec 24 13:49:01 2018] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [Mon Dec 24 13:49:01 2018] RIP: 0033:0x7f76a0a7e4ea [Mon Dec 24 13:49:01 2018] Code: ff ff ff c3 48 8b 15 b5 d9 2b 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 80 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 86 d9 2b 00 f7 d8 64 89 01 48 [Mon Dec 24 13:49:01 2018] RSP: 002b:00007ffc72e63a78 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [Mon Dec 24 13:49:01 2018] RAX: ffffffffffffffda RBX: 0000564a46032268 RCX: 00007f76a0a7e4ea [Mon Dec 24 13:49:01 2018] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000004 [Mon Dec 24 13:49:01 2018] RBP: 0000564a46060060 R08: 0000000000015f80 R09: 0000000000000000 [Mon Dec 24 13:49:01 2018] R10: 0000564a46060060 R11: 0000000000000202 R12: 0000564a460600c0 [Mon Dec 24 13:49:01 2018] R13: 0000564a46032268 R14: 0000000000015f20 R15: 0000564a46032260 [Mon Dec 24 13:49:01 2018] Modules linked in: bridge stp llc nf_nat_ftp nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_connlimit nf_conncount xt_recent nf_conntrack_ftp xt_CT xt_multiport xt_set iptable_raw xt_nat xt_NETMAP xt_iprange iptable_nat nf_nat_ipv4 nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle ip_set_bitmap_port ip_set_hash_net ip_set nfnetlink crct10dif_pclmul crc32_pclmul ghash_clmulni_intel vmw_balloon vmxnet3 vmw_vmci crc32c_intel vmw_pvscsi [Mon Dec 24 13:49:01 2018] ---[ end trace b66858b9c9a97ef2 ]--- [Mon Dec 24 13:49:01 2018] RIP: 0010:rb_erase+0x216/0x370 [Mon Dec 24 13:49:01 2018] Code: e9 6b fe ff ff 4d 89 48 10 e9 91 fe ff ff c3 48 89 06 48 89 d0 48 8b 52 10 e9 b1 fe ff ff 48 8b 07 48 89 c1 48 83 e1 fc 74 53 <48> 3b 79 10 0f 84 94 00 00 00 4c 89 41 08 4d 85 c0 75 4c a8 01 0f [Mon Dec 24 13:49:01 2018] RSP: 0018:ffffb63fc2263d28 EFLAGS: 00010286 [Mon Dec 24 13:49:01 2018] RAX: ffd7d18a01ee7a26 RBX: ffff9651a1b1c960 RCX: ffd7d18a01ee7a24 [Mon Dec 24 13:49:01 2018] RDX: 0000000000000000 RSI: ffff96519890d3e8 RDI: ffff9651a1b1c960 [Mon Dec 24 13:49:01 2018] RBP: ffff9651a5942c08 R08: 0000000000000000 R09: ffffffffc02a23de [Mon Dec 24 13:49:01 2018] R10: ffff96519890b000 R11: 0000000000000000 R12: ffff96519890d3e8 [Mon Dec 24 13:49:01 2018] R13: ffff96519890d808 R14: ffff96519890d000 R15: ffff9651a1b1c980 [Mon Dec 24 13:49:01 2018] FS: 00007f76a1b53740(0000) GS:ffff9651a5e00000(0000) knlGS:0000000000000000 [Mon Dec 24 13:49:01 2018] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Mon Dec 24 13:49:01 2018] CR2: 0000564a46078000 CR3: 000000001951e005 CR4: 00000000001606f0 Am 15.12.18 um 04:04 schrieb Reindl Harald: > am i really the only one where 4.19.x up to 4.19.9 randomly crashes? > > on my homeserver it takes some hours, a ton of virtual machines on ESXi > 6.5 are running stable all the time but on a NAT-Firewall guest it > survives just a few seconds until "kernel panic - Fatal exception in > interrupt" and a production webserver shortly after deploy 4.19.9 hat > the same yet while i though after running for days on 4.19.8/4.19.9 the > problem is now gone > > back to 4.18.20-100.fc27.x86_64 which had 3 weeks uptime on the same machine > > that's the first time any Fedor akernel is that unstable for years, in > 2014 or so there was a series which crashed at raid-check on a RAID10 > regulary but since then until a few weeks ago every single build rock stable > > god, hopefully 4.20.x becomes stable again and rebased ASAP :-( _______________________________________________ kernel mailing list -- kernel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to kernel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/kernel@xxxxxxxxxxxxxxxxxxxxxxx