[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
Fix verified on linux-image-4.13.0-39-generic/artful-proposed. Thank you for the great work! ** Tags removed: verification-needed-artful ** Tags added: verification-done-artful -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Fix Committed Status in linux source package in Artful: Fix Committed Bug description: == SRU Justification == The following commit introduced a regression identified in bug 1734327: ac8f82a0b6d9 ("UBUNTU: SAUCE: LSM stacking: LSM: Infrastructure management of the remaining blobs") The regression causes a kernel panic to occur after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. A revert of commit ac8f82a0b6d9 is needed to resolve this bug. However, commit 4ae2508f0bed also needs to be reverted because it depend on commit ac8f82a0b6d9. == Fix == Revert 4ae2508f0bed ("UBUNTU: SAUCE: LSM stacking: add stacking support to apparmor network hooks") Revert ac8f82a0b6d9 ("UBUNTU: SAUCE: LSM stacking: LSM: Infrastructure management of the remaining blobs") == Test Case == A test kernel was built with these two commits reverted and tested by the original bug reporter. The bug reporter states the test kernel resolved the bug. == Original Bug Description == Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-32-generic #35~lp1734327 is not affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Fix Committed Status in linux source package in Artful: In Progress Bug description: == SRU Justification == The following commit introduced a regression identified in bug 1734327: ac8f82a0b6d9 ("UBUNTU: SAUCE: LSM stacking: LSM: Infrastructure management of the remaining blobs") The regression causes a kernel panic to occur after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. A revert of commit ac8f82a0b6d9 is needed to resolve this bug. However, commit 4ae2508f0bed also needs to be reverted because it depend on commit ac8f82a0b6d9. == Fix == Revert 4ae2508f0bed ("UBUNTU: SAUCE: LSM stacking: add stacking support to apparmor network hooks") Revert ac8f82a0b6d9 ("UBUNTU: SAUCE: LSM stacking: LSM: Infrastructure management of the remaining blobs") == Test Case == A test kernel was built with these two commits reverted and tested by the original bug reporter. The bug reporter states the test kernel resolved the bug. == Original Bug Description == Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-17-generic #20~lp1734327JustCommit4ae2508Reverted is affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-17-generic #20~lp1734327 kernel with commits reverted is not affected. Thanks for all your effort. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-13-generic #14~lp1734327Commit8d9d2235a82 is affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-;
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-13-generic #14~lp1734327Commit1c8d41925cf is not affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
Tried 4.13.0-12 from https://launchpad.net/~canonical-kernel- team/+archive/ubuntu/ppa/+build/13498518, it's not affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-14 is affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ? lock_timer_base+0x81/0xa0
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-10 is not affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ? lock_timer_base+0x81/0xa0
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
Both 4.11.0-5 and 4.12.0-13 are not affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ?
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13.0-18 is affected. 4.10.0-41 is not affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ?
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
4.13-rc1 is not affected either. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ? lock_timer_base+0x81/0xa0
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
Unable to reproduce with both 4.13.0 and 4.14-rc1 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: In Progress Status in linux source package in Artful: In Progress Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ?
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
Unable to reproduce using upstream kernel 4.14.0-041400-generic. ** Tags added: kernel-fixed-upstream ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Confirmed Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250
[Kernel-packages] [Bug 1734327] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014087/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-;
[Kernel-packages] [Bug 1734327] CurrentDmesg.txt
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014080/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-;
[Kernel-packages] [Bug 1734327] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014086/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-;
[Kernel-packages] [Bug 1734327] ProcEnviron.txt
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014085/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-;
[Kernel-packages] [Bug 1734327] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014084/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-;
[Kernel-packages] [Bug 1734327] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014082/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0
[Kernel-packages] [Bug 1734327] JournalErrors.txt
apport information ** Attachment added: "JournalErrors.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014081/+files/JournalErrors.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-;
[Kernel-packages] [Bug 1734327] Lsusb.txt
apport information ** Attachment added: "Lsusb.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014083/+files/Lsusb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0
[Kernel-packages] [Bug 1734327] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014089/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-;
[Kernel-packages] [Bug 1734327] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1734327/+attachment/5014088/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734327 Title: Kernel panic on a nfsroot system Status in linux package in Ubuntu: Incomplete Bug description: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0
[Kernel-packages] [Bug 1734327] Re: Kernel panic on a nfsroot system
apport information ** Tags added: apport-collected ** Description changed: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ? lock_timer_base+0x81/0xa0 4,1198,52387043,-; ip_local_out+0x35/0x40 4,1199,52388078,-; ip_queue_xmit+0x160/0x3e0 4,1200,52389068,-; ? __alloc_skb+0x87/0x1e0 4,1201,52390019,-; tcp_transmit_skb+0x538/0x9e0 4,1202,52390944,-; tcp_send_ack.part.35+0xbd/0x130 4,1203,52391849,-;
[Kernel-packages] [Bug 1734327] [NEW] Kernel panic on a nfsroot system
Public bug reported: Summary: Kernel panic occurs after multiple TCP connection creations/closures to the localhost. The bug was found using STAF RPC calls, but is easily reproducible with SSH. The bug doesn't appear on an identical virtual machine booting from the disk. The bug is not reproducible on a similarly-prepared Ubuntu 16.04 machine. The bug is reproducible using an older 4.13.0-16-generic kernel Reproducible on multiple hardware types. Unable to create a kernel memory dump due to makedumpfile errors. apport-bug save attached. NFSRoot boot options: vmlinuz initrd=initrd.img boot=nfs root=/dev/nfs nfsroot=190.0.0.254:/diskless/host/u1616/Ubuntu/17.10 intel_iommu=on net.ifnames=0 biosdevname=0 apparmor=0 ip=:eth0:dhcp blacklist=i40e,ixgbe,fm10k crashkernel=384M-:768M rw Software: OS: Ubuntu 17.10 Kernel: 4.13.0-17-generic x86_64 Reproduction steps: 1. Boot a system from a nfsroot 2. Configure password-less localhost ssh access 3. Run a loop: `while true; do ssh localhost 'uname -a'; done` 4. Wait for system to crash Trace: 4,1151,52372730,-;general protection fault: [#1] SMP 4,1152,52372771,-;Modules linked in: arc4 md4 rpcsec_gss_krb5 nls_utf8 auth_rpcgss cifs nfsv4 ccm ipmi_ssif intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp intel_cstate mei_me input_leds joydev intel_rapl_perf mei kvm_intel lpc_ich ioatdma kvm irqbypass ipmi_si ipmi_devintf ipmi_msghandler shpchp acpi_pad acpi_power_meter mac_hid ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 nfsv3 nfs_acl nfs lockd grace sunrpc fscache raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor hid_generic usbhid hid raid6_pq libcrc32c raid1 raid0 multipath linear uas usb_storage crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc ast ttm aesni_intel igb drm_kms_helper aes_x86_64 crypto_simd syscopyarea glue_helper 4,1153,52373251,c; sysfillrect dca cryptd sysimgblt i2c_algo_bit fb_sys_fops ahci ptp drm libahci pps_core wmi 4,1154,52373322,-;CPU: 11 PID: 1848 Comm: STAFProc Not tainted 4.13.0-17-generic #20-Ubuntu 4,1155,52373371,-;Hardware name: Supermicro Super Server/X10SRD-F, BIOS 2.0 12/17/2015 4,1156,52373418,-;task: 9d09267f5d00 task.stack: afddc3a7 4,1157,52373461,-;RIP: 0010:kfree+0x53/0x160 4,1158,52373486,-;RSP: 0018:9d092ecc3bc8 EFLAGS: 00010207 4,1159,52373521,-;RAX: RBX: 241c89490001 RCX: 0004 4,1160,52373566,-;RDX: 32d49081cc08 RSI: 00010080 RDI: 62fac000 4,1161,52373611,-;RBP: 9d092ecc3be0 R08: 0001f4c0 R09: 943bb839 4,1162,52373656,-;R10: 00904c789100 R11: R12: 9d09267ef000 4,1163,52373701,-;R13: 93fa155e R14: 9d09267ef000 R15: 9d09267ef000 4,1164,52373746,-;FS: 7f3a53313700() GS:9d092ecc() knlGS: 4,1165,52373797,-;CS: 0010 DS: ES: CR0: 80050033 4,1166,52373834,-;CR2: 7fd5c9ffa780 CR3: 0004666d7000 CR4: 003406e0 4,1167,52373878,-;DR0: DR1: DR2: 4,1168,52373923,-;DR3: DR6: fffe0ff0 DR7: 0400 4,1169,52373968,-;Call Trace: 4,1170,52373987,-; 4,1171,52374009,-; security_sk_free+0x3e/0x50 4,1172,52374042,-; __sk_destruct+0x108/0x190 4,1173,52374070,-; sk_destruct+0x20/0x30 4,1174,52374095,-; __sk_free+0x82/0xa0 4,1175,52374120,-; sk_free+0x19/0x20 4,1176,52374144,-; sock_put+0x14/0x20 4,1177,52374168,-; tcp_v4_rcv+0x94d/0x9d0 4,1178,52374195,-; ip_local_deliver_finish+0x5c/0x1f0 4,1179,52374226,-; ip_local_deliver+0x6f/0xe0 4,1180,52374254,-; ip_rcv_finish+0x120/0x410 4,1181,52374281,-; ip_rcv+0x28c/0x3a0 4,1182,52374305,-; ? update_load_avg+0x46d/0x590 4,1183,52374335,-; __netif_receive_skb_core+0x39a/0xaa0 4,1184,52374369,-; __netif_receive_skb+0x18/0x60 4,1185,52374398,-; ? __netif_receive_skb+0x18/0x60 4,1186,52374428,-; process_backlog+0x89/0x140 4,1187,52374457,-; net_rx_action+0x13b/0x380 4,1188,52374485,-; __do_softirq+0xde/0x2a5 4,1189,52375837,-; do_softirq_own_stack+0x1c/0x30 4,1190,52377188,-; 4,1191,52378538,-; do_softirq.part.17+0x4e/0x50 4,1192,52379869,-; __local_bh_enable_ip+0x5a/0x60 4,1193,52381174,-; ip_finish_output2+0x172/0x3a0 4,1194,52382442,-; ip_finish_output+0x190/0x250 4,1195,52383658,-; ? ip_finish_output+0x190/0x250 4,1196,52384833,-; ip_output+0x70/0xe0 4,1197,52385959,-; ? lock_timer_base+0x81/0xa0 4,1198,52387043,-; ip_local_out+0x35/0x40 4,1199,52388078,-; ip_queue_xmit+0x160/0x3e0 4,1200,52389068,-; ? __alloc_skb+0x87/0x1e0 4,1201,52390019,-; tcp_transmit_skb+0x538/0x9e0 4,1202,52390944,-; tcp_send_ack.part.35+0xbd/0x130 4,1203,52391849,-; tcp_send_ack+0x16/0x20 4,1204,52392729,-; tcp_cleanup_rbuf+0x67/0x100 4,1205,52393600,-; tcp_recvmsg+0x572/0xb60 4,1206,52394464,-; inet_recvmsg+0x4b/0xc0 4,1207,52395307,-; sock_recvmsg+0x3d/0x50 4,1208,52396135,-;