Re: kernel 4.19.x is unstable (random panics) -> reproducer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



see attachment of https://bugzilla.redhat.com/show_bug.cgi?id=1659706#c3

the problem seems to be in conntrack in general and seems to be easily
reproduceable combined with a ipset with a single port-range like
"create DEBUG_PORT bitmap:port range 10022-10022"

to trigger it that easy for me it needs the combination of "-t filter -A
INBOUND -p all -m set --match-set DEBUG_PORT dst" with the single-range
ipset *and* connlimit rule

[Mon Dec 24 16:08:04 2018] general protection fault: 0000 [#1] SMP PTI
[Mon Dec 24 16:08:04 2018] CPU: 0 PID: 890 Comm: iptables Not tainted
4.19.12-200.fc28.x86_64 #1
[Mon Dec 24 16:08:04 2018] Hardware name: VMware, Inc. VMware Virtual
Platform/440BX Desktop Reference Platform, BIOS 6.00 07/03/2018
[Mon Dec 24 16:08:04 2018] RIP: 0010:rb_erase+0x216/0x370
[Mon Dec 24 16:08:04 2018] Code: e9 6b fe ff ff 4d 89 48 10 e9 91 fe ff
ff c3 48 89 06 48 89 d0 48 8b 52 10 e9 b1 fe ff ff 48 8b 07 48 89 c1 48
83 e1 fc 74 53 <48> 3b 79 10 0f 84 94 00 00 00 4c 89 41 08 4d 85 c0 75
4c a8 01 0f
[Mon Dec 24 16:08:04 2018] RSP: 0018:ffffa8a840ac7d28 EFLAGS: 00010286
[Mon Dec 24 16:08:04 2018] RAX: 89a7851347204a0d RBX: ffff940e233086c0
RCX: 89a7851347204a0c
[Mon Dec 24 16:08:04 2018] RDX: 0000000000000000 RSI: ffff940e22502730
RDI: ffff940e233086c0
[Mon Dec 24 16:08:04 2018] RBP: ffff940e25942ec8 R08: 0000000000000000
R09: ffffffffc01533de
[Mon Dec 24 16:08:04 2018] R10: ffff940e24aac268 R11: 00000000000003c0
R12: ffff940e22502730
[Mon Dec 24 16:08:04 2018] R13: ffff940e22502808 R14: ffff940e22502000
R15: ffff940e233086e0
[Mon Dec 24 16:08:04 2018] FS:  00007f29173e7740(0000)
GS:ffff940e25e00000(0000) knlGS:0000000000000000
[Mon Dec 24 16:08:04 2018] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[Mon Dec 24 16:08:04 2018] CR2: 000055f6ca2fab48 CR3: 000000002242e003
CR4: 00000000001606f0
[Mon Dec 24 16:08:04 2018] Call Trace:
[Mon Dec 24 16:08:04 2018]  nf_conncount_destroy+0x58/0xc0 [nf_conncount]
[Mon Dec 24 16:08:04 2018]  cleanup_match+0x45/0x70
[Mon Dec 24 16:08:04 2018]  cleanup_entry+0x3e/0xc0
[Mon Dec 24 16:08:04 2018]  __do_replace+0x1ca/0x230
[Mon Dec 24 16:08:04 2018]  do_ipt_set_ctl+0x146/0x1a2
[Mon Dec 24 16:08:04 2018]  nf_setsockopt+0x44/0x70
[Mon Dec 24 16:08:04 2018]  __sys_setsockopt+0x82/0xe0
[Mon Dec 24 16:08:04 2018]  __x64_sys_setsockopt+0x20/0x30
[Mon Dec 24 16:08:04 2018]  do_syscall_64+0x5b/0x160
[Mon Dec 24 16:08:04 2018]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[Mon Dec 24 16:08:04 2018] RIP: 0033:0x7f29163124ea
[Mon Dec 24 16:08:04 2018] Code: ff ff ff c3 48 8b 15 b5 d9 2b 00 f7 d8
64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 80 00 00 00 00 49 89 ca b8 36
00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 86 d9 2b 00 f7 d8
64 89 01 48
[Mon Dec 24 16:08:04 2018] RSP: 002b:00007ffcc79633b8 EFLAGS: 00000202
ORIG_RAX: 0000000000000036
[Mon Dec 24 16:08:04 2018] RAX: ffffffffffffffda RBX: 000055f6ca2f8268
RCX: 00007f29163124ea
[Mon Dec 24 16:08:04 2018] RDX: 0000000000000040 RSI: 0000000000000000
RDI: 0000000000000004
[Mon Dec 24 16:08:04 2018] RBP: 000055f6ca2f9e50 R08: 0000000000000cf8
R09: 0000000000000000
[Mon Dec 24 16:08:04 2018] R10: 000055f6ca2f9e50 R11: 0000000000000202
R12: 000055f6ca2f9eb0
[Mon Dec 24 16:08:04 2018] R13: 000055f6ca2f8268 R14: 0000000000000c98
R15: 000055f6ca2f8260
[Mon Dec 24 16:08:04 2018] Modules linked in: bridge stp llc xt_recent
xt_set xt_connlimit nf_conncount xt_conntrack iptable_raw iptable_nat
nf_nat_ipv4 nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c
iptable_mangle ip_set_bitmap_port ip_set nfnetlink crct10dif_pclmul
crc32_pclmul ghash_clmulni_intel vmw_balloon vmxnet3 vmw_vmci
crc32c_intel vmw_pvscsi
[Mon Dec 24 16:08:04 2018] ---[ end trace a31b84c2a1d265ac ]---
[Mon Dec 24 16:08:04 2018] RIP: 0010:rb_erase+0x216/0x370
[Mon Dec 24 16:08:04 2018] Code: e9 6b fe ff ff 4d 89 48 10 e9 91 fe ff
ff c3 48 89 06 48 89 d0 48 8b 52 10 e9 b1 fe ff ff 48 8b 07 48 89 c1 48
83 e1 fc 74 53 <48> 3b 79 10 0f 84 94 00 00 00 4c 89 41 08 4d 85 c0 75
4c a8 01 0f
[Mon Dec 24 16:08:04 2018] RSP: 0018:ffffa8a840ac7d28 EFLAGS: 00010286
[Mon Dec 24 16:08:04 2018] RAX: 89a7851347204a0d RBX: ffff940e233086c0
RCX: 89a7851347204a0c
[Mon Dec 24 16:08:04 2018] RDX: 0000000000000000 RSI: ffff940e22502730
RDI: ffff940e233086c0
[Mon Dec 24 16:08:04 2018] RBP: ffff940e25942ec8 R08: 0000000000000000
R09: ffffffffc01533de
[Mon Dec 24 16:08:04 2018] R10: ffff940e24aac268 R11: 00000000000003c0
R12: ffff940e22502730
[Mon Dec 24 16:08:04 2018] R13: ffff940e22502808 R14: ffff940e22502000
R15: ffff940e233086e0
[Mon Dec 24 16:08:04 2018] FS:  00007f29173e7740(0000)
GS:ffff940e25e00000(0000) knlGS:0000000000000000
[Mon Dec 24 16:08:04 2018] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[Mon Dec 24 16:08:04 2018] CR2: 000055f6ca2fab48 CR3: 000000002242e003
CR4: 00000000001606f0

Am 24.12.18 um 14:07 schrieb Reindl Harald:
> https://bugzilla.redhat.com/show_bug.cgi?id=1659706
> 
> i triggered something similar as
> https://www.spinics.net/lists/netdev/msg533254.html recently with
> 4.19.12-200.fc28.x86_64 by just call my "iptables.sh" which clears and
> sets up all sort of rules, chains and ipset - was a one-time event by
> call "iptables -t filter -P INPUT DROP" but i guess that should not
> happen and may point out a general problem explaining the random
> instability of the whole 4.19.x series
> 
> IPTABLES="/usr/sbin/iptables"
> IPTABLES_FLT="$IPTABLES -t filter"
> 
> /scripts/iptables.sh: line 617:  7874 Segmentation fault
> $IPTABLES_FLT -P INPUT DROP
> 
> [root@firewall:~]$ dmesg -c
> [Mon Dec 24 13:49:01 2018] general protection fault: 0000 [#1] SMP PTI
> [Mon Dec 24 13:49:01 2018] CPU: 0 PID: 7874 Comm: iptables Not tainted
> 4.19.12-200.fc28.x86_64 #1
> [Mon Dec 24 13:49:01 2018] Hardware name: VMware, Inc. VMware Virtual
> Platform/440BX Desktop Reference Platform, BIOS 6.00 07/03/2018
> [Mon Dec 24 13:49:01 2018] RIP: 0010:rb_erase+0x216/0x370
> [Mon Dec 24 13:49:01 2018] Code: e9 6b fe ff ff 4d 89 48 10 e9 91 fe ff
> ff c3 48 89 06 48 89 d0 48 8b 52 10 e9 b1 fe ff ff 48 8b 07 48 89 c1 48
> 83 e1 fc 74 53 <48> 3b 79 10 0f 84 94 00 00 00 4c 89 41 08 4d 85 c0 75
> 4c a8 01 0f
> [Mon Dec 24 13:49:01 2018] RSP: 0018:ffffb63fc2263d28 EFLAGS: 00010286
> [Mon Dec 24 13:49:01 2018] RAX: ffd7d18a01ee7a26 RBX: ffff9651a1b1c960
> RCX: ffd7d18a01ee7a24
> [Mon Dec 24 13:49:01 2018] RDX: 0000000000000000 RSI: ffff96519890d3e8
> RDI: ffff9651a1b1c960
> [Mon Dec 24 13:49:01 2018] RBP: ffff9651a5942c08 R08: 0000000000000000
> R09: ffffffffc02a23de
> [Mon Dec 24 13:49:01 2018] R10: ffff96519890b000 R11: 0000000000000000
> R12: ffff96519890d3e8
> [Mon Dec 24 13:49:01 2018] R13: ffff96519890d808 R14: ffff96519890d000
> R15: ffff9651a1b1c980
> [Mon Dec 24 13:49:01 2018] FS:  00007f76a1b53740(0000)
> GS:ffff9651a5e00000(0000) knlGS:0000000000000000
> [Mon Dec 24 13:49:01 2018] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [Mon Dec 24 13:49:01 2018] CR2: 0000564a46078000 CR3: 000000001951e005
> CR4: 00000000001606f0
> [Mon Dec 24 13:49:01 2018] Call Trace:
> [Mon Dec 24 13:49:01 2018]  nf_conncount_destroy+0x58/0xc0 [nf_conncount]
> [Mon Dec 24 13:49:01 2018]  cleanup_match+0x45/0x70
> [Mon Dec 24 13:49:01 2018]  cleanup_entry+0x3e/0xc0
> [Mon Dec 24 13:49:01 2018]  __do_replace+0x1ca/0x230
> [Mon Dec 24 13:49:01 2018]  do_ipt_set_ctl+0x146/0x1a2
> [Mon Dec 24 13:49:01 2018]  nf_setsockopt+0x44/0x70
> [Mon Dec 24 13:49:01 2018]  __sys_setsockopt+0x82/0xe0
> [Mon Dec 24 13:49:01 2018]  __x64_sys_setsockopt+0x20/0x30
> [Mon Dec 24 13:49:01 2018]  do_syscall_64+0x5b/0x160
> [Mon Dec 24 13:49:01 2018]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> [Mon Dec 24 13:49:01 2018] RIP: 0033:0x7f76a0a7e4ea
> [Mon Dec 24 13:49:01 2018] Code: ff ff ff c3 48 8b 15 b5 d9 2b 00 f7 d8
> 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 80 00 00 00 00 49 89 ca b8 36
> 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 86 d9 2b 00 f7 d8
> 64 89 01 48
> [Mon Dec 24 13:49:01 2018] RSP: 002b:00007ffc72e63a78 EFLAGS: 00000202
> ORIG_RAX: 0000000000000036
> [Mon Dec 24 13:49:01 2018] RAX: ffffffffffffffda RBX: 0000564a46032268
> RCX: 00007f76a0a7e4ea
> [Mon Dec 24 13:49:01 2018] RDX: 0000000000000040 RSI: 0000000000000000
> RDI: 0000000000000004
> [Mon Dec 24 13:49:01 2018] RBP: 0000564a46060060 R08: 0000000000015f80
> R09: 0000000000000000
> [Mon Dec 24 13:49:01 2018] R10: 0000564a46060060 R11: 0000000000000202
> R12: 0000564a460600c0
> [Mon Dec 24 13:49:01 2018] R13: 0000564a46032268 R14: 0000000000015f20
> R15: 0000564a46032260
> [Mon Dec 24 13:49:01 2018] Modules linked in: bridge stp llc nf_nat_ftp
> nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_connlimit nf_conncount
> xt_recent nf_conntrack_ftp xt_CT xt_multiport xt_set iptable_raw xt_nat
> xt_NETMAP xt_iprange iptable_nat nf_nat_ipv4 nf_nat xt_conntrack
> nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle
> ip_set_bitmap_port ip_set_hash_net ip_set nfnetlink crct10dif_pclmul
> crc32_pclmul ghash_clmulni_intel vmw_balloon vmxnet3 vmw_vmci
> crc32c_intel vmw_pvscsi
> [Mon Dec 24 13:49:01 2018] ---[ end trace b66858b9c9a97ef2 ]---
> [Mon Dec 24 13:49:01 2018] RIP: 0010:rb_erase+0x216/0x370
> [Mon Dec 24 13:49:01 2018] Code: e9 6b fe ff ff 4d 89 48 10 e9 91 fe ff
> ff c3 48 89 06 48 89 d0 48 8b 52 10 e9 b1 fe ff ff 48 8b 07 48 89 c1 48
> 83 e1 fc 74 53 <48> 3b 79 10 0f 84 94 00 00 00 4c 89 41 08 4d 85 c0 75
> 4c a8 01 0f
> [Mon Dec 24 13:49:01 2018] RSP: 0018:ffffb63fc2263d28 EFLAGS: 00010286
> [Mon Dec 24 13:49:01 2018] RAX: ffd7d18a01ee7a26 RBX: ffff9651a1b1c960
> RCX: ffd7d18a01ee7a24
> [Mon Dec 24 13:49:01 2018] RDX: 0000000000000000 RSI: ffff96519890d3e8
> RDI: ffff9651a1b1c960
> [Mon Dec 24 13:49:01 2018] RBP: ffff9651a5942c08 R08: 0000000000000000
> R09: ffffffffc02a23de
> [Mon Dec 24 13:49:01 2018] R10: ffff96519890b000 R11: 0000000000000000
> R12: ffff96519890d3e8
> [Mon Dec 24 13:49:01 2018] R13: ffff96519890d808 R14: ffff96519890d000
> R15: ffff9651a1b1c980
> [Mon Dec 24 13:49:01 2018] FS:  00007f76a1b53740(0000)
> GS:ffff9651a5e00000(0000) knlGS:0000000000000000
> [Mon Dec 24 13:49:01 2018] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [Mon Dec 24 13:49:01 2018] CR2: 0000564a46078000 CR3: 000000001951e005
> CR4: 00000000001606f0
> 
> Am 15.12.18 um 04:04 schrieb Reindl Harald:
>> am i really the only one where 4.19.x up to 4.19.9 randomly crashes?
>>
>> on my homeserver it takes some hours, a ton of virtual machines on ESXi
>> 6.5 are running stable all the time but on a NAT-Firewall guest it
>> survives just a few seconds until "kernel panic - Fatal exception in
>> interrupt" and a production webserver shortly after deploy 4.19.9 hat
>> the same yet while i though after running for days on 4.19.8/4.19.9 the
>> problem is now gone
>>
>> back to 4.18.20-100.fc27.x86_64 which had 3 weeks uptime on the same machine
>>
>> that's the first time any Fedor akernel is that unstable for years, in
>> 2014 or so there was a series which crashed at raid-check on a RAID10
>> regulary but since then until a few weeks ago every single build rock stable
>>
>> god, hopefully 4.20.x becomes stable again and rebased ASAP :-(
_______________________________________________
kernel mailing list -- kernel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to kernel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/kernel@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora General Discussion]     [Older Fedora Users Archive]     [Fedora Advisory Board]     [Fedora Security]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Mentors]     [Fedora Package Announce]     [Fedora Package Review]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Coolkey]     [Yum Users]     [Tux]     [Yosemite News]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [USB]     [Asterisk PBX]

  Powered by Linux