Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 887987 Details for
Bug 1089569
IPTables rule change causes kernel Oops on get_counters after a while
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Kernel Oops Trace
iptables-trace.txt (text/plain), 3.96 KB, created by
Chris
on 2014-04-21 01:01:12 UTC
(
hide
)
Description:
Kernel Oops Trace
Filename:
MIME Type:
Creator:
Chris
Created:
2014-04-21 01:01:12 UTC
Size:
3.96 KB
patch
obsolete
>Apr 20 22:15:02 bne00 kernel: BUG: unable to handle kernel paging request at ffffc90017ae0008 >Apr 20 22:15:03 bne00 kernel: IP: [<ffffffff8160d041>] get_counters+0x91/0xd0 >Apr 20 22:15:03 bne00 Keepalived_vrrp[1461]: Netlink reflector reports IP 2001:dea:0:10:20a:f7ff:fe45:76c8 added >Apr 20 22:15:03 bne00 Keepalived_healthcheckers[1460]: Netlink reflector reports IP 2001:dea:0:10:20a:f7ff:fe45:76c8 added >Apr 20 22:15:03 bne00 kernel: PGD 226c1d067 PUD 226c1e067 PMD a7eb5067 PTE 0 >Apr 20 22:15:03 bne00 kernel: Oops: 0002 [#1] SMP >Apr 20 22:15:03 bne00 kernel: Modules linked in: iptable_nat nf_nat_ipv4 nf_nat iptable_mangle xt_dscp ip_vs libcrc32c 8021q garp stp mrp llc xt_LOG ipt_ULOG xt_recent xt_multiport xt_conntrack nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack x86_pkg_temp_thermal coretemp kvm_intel kvm crct10dif_pclmul tg3 crc32_pclmul crc32c_intel gpio_ich ipmi_devintf dcdbas iTCO_wdt iTCO_vendor_support sb_edac ptp ipmi_si ghash_clmulni_intel microcode mei_me pps_core wmi edac_core mei acpi_power_meter lpc_ich ipmi_msghandler mfd_core shpchp mgag200 i2c_algo_bit drm_kms_helper ttm drm i2c_core [last unloaded: iptable_mangle] >Apr 20 22:15:03 bne00 kernel: CPU: 3 PID: 44427 Comm: iptables Not tainted 3.13.9-200.fc20.x86_64 #1 >Apr 20 22:15:03 bne00 kernel: Hardware name: Dell Inc. PowerEdge R320/08VT7V, BIOS 2.2.0 02/06/2014 >Apr 20 22:15:03 bne00 kernel: task: ffff8802213fe780 ti: ffff8800b402e000 task.ti: ffff8800b402e000 >Apr 20 22:15:03 bne00 kernel: RIP: 0010:[<ffffffff8160d041>] [<ffffffff8160d041>] get_counters+0x91/0xd0 >Apr 20 22:15:03 bne00 kernel: RSP: 0018:ffff8800b402fdb8 EFLAGS: 00010286 >Apr 20 22:15:03 bne00 kernel: RAX: ffffc900178efc98 RBX: 00000000000114e0 RCX: ffffc90017ae0000 >Apr 20 22:15:03 bne00 kernel: RDX: 000000000000001c RSI: 0000000000000000 RDI: ffff8802273914e0 >Apr 20 22:15:03 bne00 kernel: RBP: ffff8800b402fdd8 R08: 0000000000000201 R09: ffff8800bc6dace0 >Apr 20 22:15:03 bne00 kernel: R10: 0000000000000000 R11: ffffffff811843ac R12: ffffffff81cffa40 >Apr 20 22:15:03 bne00 kernel: R13: ffff8800bc6dac00 R14: ffffc90017ade000 R15: ffff880223b99960 >Apr 20 22:15:03 bne00 kernel: FS: 00007f3a72dfd740(0000) GS:ffff880227060000(0000) knlGS:0000000000000000 >Apr 20 22:15:03 bne00 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >Apr 20 22:15:03 bne00 kernel: CR2: ffffc90017ae0008 CR3: 0000000037223000 CR4: 00000000000407e0 >Apr 20 22:15:03 bne00 kernel: Stack: >Apr 20 22:15:03 bne00 kernel: ffffc90017ade000 ffff8800bc6dac00 ffff8800bc6dac00 ffff8800b402fef4 >Apr 20 22:15:03 bne00 kernel: ffff8800b402fdf8 ffffffff8160e0e6 0000000000014740 00000000020b90c0 >Apr 20 22:15:03 bne00 kernel: ffff8800b402fea0 ffffffff8160e5a3 ffffffff8156fcf9 00000000000000a9 >Apr 20 22:15:03 bne00 kernel: Call Trace: >Apr 20 22:15:03 bne00 kernel: [<ffffffff8160e0e6>] alloc_counters.isra.10+0x36/0x40 >Apr 20 22:15:03 bne00 kernel: [<ffffffff8160e5a3>] do_ipt_get_ctl+0x1c3/0x3b0 >Apr 20 22:15:03 bne00 kernel: [<ffffffff8156fcf9>] ? sk_prot_alloc+0x39/0x190 >Apr 20 22:15:03 bne00 kernel: [<ffffffff816924b4>] ? __do_page_fault+0x1f4/0x530 >Apr 20 22:15:03 bne00 kernel: [<ffffffff815b5d78>] nf_getsockopt+0x68/0x90 >Apr 20 22:15:03 bne00 kernel: [<ffffffff815c5160>] ip_getsockopt+0x80/0xa0 >Apr 20 22:15:03 bne00 kernel: [<ffffffff815e75f5>] raw_getsockopt+0x25/0x50 >Apr 20 22:15:03 bne00 kernel: [<ffffffff8156e334>] sock_common_getsockopt+0x14/0x20 >Apr 20 22:15:03 bne00 kernel: [<ffffffff8156d258>] SyS_getsockopt+0x68/0xd0 >Apr 20 22:15:03 bne00 kernel: [<ffffffff81696d69>] system_call_fastpath+0x16/0x1b >Apr 20 22:15:03 bne00 kernel: Code: 01 c1 48 39 c8 73 c3 45 31 c0 8b 0f f6 c1 01 75 4a 4c 8b 50 68 48 8b 70 60 3b 0f 75 ed 44 89 c1 41 83 c0 01 48 c1 e1 04 4c 01 f1 <4c> 01 51 08 48 01 31 0f b7 48 5a 48 01 c8 41 8b 4d 00 49 03 49 >Apr 20 22:15:03 bne00 kernel: RIP [<ffffffff8160d041>] get_counters+0x91/0xd0 >Apr 20 22:15:03 bne00 kernel: RSP <ffff8800b402fdb8> >Apr 20 22:15:03 bne00 kernel: CR2: ffffc90017ae0008 >Apr 20 22:15:03 bne00 kernel: ---[ end trace 81d09ecb28e8c5b1 ]---
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1089569
: 887987