[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-06-02 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Invalid
Status in linux package in Ubuntu:
  Expired

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-04-03 Thread Andres Rodriguez
** Changed in: maas
   Status: Won't Fix => Incomplete

** Changed in: maas
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Invalid
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   13.827246] RIP: 

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-03-09 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Status: Triaged => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Won't Fix
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   13.827246] RIP: 0033:0x7fc4a68e38a7
  [   13.827818] RSP: 

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-22 Thread Joseph Salisbury
** Tags removed: kernel-key
** Tags added: kernel-da-key

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Won't Fix
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   13.827246] RIP: 0033:0x7fc4a68e38a7
  [   13.827818] RSP: 002b:7ffea4ae47e8 

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-12 Thread Lee Trager
** Changed in: maas
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Won't Fix
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   13.827246] RIP: 0033:0x7fc4a68e38a7
  [   13.827818] RSP: 002b:7ffea4ae47e8 

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-12 Thread Joseph Salisbury
It might also be worthwhile to test the latest upstream 4.13 kernel:
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.13.16/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   13.827246] 

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-12 Thread Joseph Salisbury
Thanks for the update.  We can perform a "Reverse" bisect to identify
the commit that fixes this bug in mainline.  We would first need to
identify the last kernel version that had the bug and the first version
that did not have the bug.  We now know that v4.15-rc7 is fixed.  Can
you next test v4.15-rc1?  It can be downloaded from:

 http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.15-rc1

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-11 Thread Lee Trager
4.15-rc7 works with MAAS. I've commissioned, tested, and entered rescue
mode without hitting any kernel panics.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   13.827246] RIP: 

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-10 Thread Joseph Salisbury
Would it be possible for you to test the latest mainline kernel?

 http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.15-rc7

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   13.827246] RIP: 

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-10 Thread Blake Rouse
This kernel is PXE booting from MAAS. We might be able to modify the
kernel on disk that pxelinux.0 pulls to get you more information.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]  trace_do_page_fault+0x37/0xd0
  [   13.826051]  do_async_page_fault+0x51/0x80
  [   13.826652]  async_page_fault+0x28/0x30
  [   

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-09 Thread Joseph Salisbury
Are you able to install any test kernels on the system to perform some
debugging?

** Changed in: linux (Ubuntu)
   Status: Confirmed => Triaged

** Changed in: linux (Ubuntu)
   Importance: Undecided => Critical

** Tags added: kernel-da-key

** Tags removed: kernel-da-key
** Tags added: kernel-key

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  

[Kernel-packages] [Bug 1742324] Re: Bionic kernel panics in the MAAS ephemeral environment

2018-01-09 Thread Lee Trager
The kernel panic happens before I can access the system. The long log I
am able to pull is the console log which is attached.

** Tags removed: artful
** Tags added: bionic

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742324

Title:
  Bionic kernel panics in the MAAS ephemeral environment

Status in MAAS:
  Triaged
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Bionic kernel panics in the MAAS ephemeral environment. This does not
  always happen during commissioning or testing but does happen every
  time when trying to enter rescue mode. The test system is a KVM
  machine using all VirtIO drivers running on a Bionic host system. Both
  systems are using the 4.13.0-17-generic kernel.

  [   13.774332] BUG: unable to handle kernel paging request at f672c3075a20
  [   13.775203] IP: kfree+0x53/0x160
  [   13.775665] PGD 0 
  [   13.775666] P4D 0 
  [   13.775965] 
  [   13.776566] Oops:  [#1] SMP
  [   13.777004] Modules linked in: iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi overlay btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel pcbc ttm drm_kms_helper aesni_intel syscopyarea sysfillrect 
aes_x86_64 crypto_simd glue_helper cryptd sysimgblt fb_sys_fops drm psmouse 
virtio_blk virtio_net pata_acpi floppy
  [   13.782468] CPU: 0 PID: 696 Comm: lxd Not tainted 4.13.0-17-generic 
#20-Ubuntu
  [   13.783169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
  [   13.784028] task: 9afa30b62e80 task.stack: c07640a5
  [   13.784512] RIP: 0010:kfree+0x53/0x160
  [   13.784884] RSP: 0018:9afa3ca03a18 EFLAGS: 00010286
  [   13.785339] RAX:  RBX: f50a81d68280 RCX: 
0002
  [   13.785983] RDX: 457c0321e918 RSI: 00010080 RDI: 
6505c000
  [   13.786916] RBP: 9afa3ca03a30 R08: 0001f4c0 R09: 
94bbb839
  [   13.787877] R10: f672c3075a00 R11: e4e5cd01 R12: 
9afa3f794000
  [   13.788854] R13: 947a155e R14: 9afa3f794000 R15: 
9afa3f794000
  [   13.789882] FS:  7fc4a7938cc0() GS:9afa3ca0() 
knlGS:
  [   13.791134] CS:  0010 DS:  ES:  CR0: 80050033
  [   13.792003] CR2: f672c3075a20 CR3: 737f6000 CR4: 
001406f0
  [   13.793019] Call Trace:
  [   13.793462]  
  [   13.793886]  security_sk_free+0x3e/0x50
  [   13.794680]  __sk_destruct+0x108/0x190
  [   13.795465]  sk_destruct+0x20/0x30
  [   13.796193]  __sk_free+0x82/0xa0
  [   13.796899]  sk_free+0x19/0x20
  [   13.797537]  sock_put+0x14/0x20
  [   13.797926]  tcp_v4_rcv+0x94d/0x9d0
  [   13.798325]  ? ep_poll_callback+0x226/0x2b0
  [   13.798704]  ip_local_deliver_finish+0x5c/0x1f0
  [   13.799099]  ip_local_deliver+0x6f/0xe0
  [   13.799455]  ip_rcv_finish+0x120/0x410
  [   13.799868]  ip_rcv+0x28c/0x3a0
  [   13.800221]  ? csum_partial+0x11/0x20
  [   13.800649]  __netif_receive_skb_core+0x39a/0xaa0
  [   13.801295]  ? skb_checksum+0x35/0x50
  [   13.801742]  ? skb_append_datato_frags+0x200/0x200
  [   13.802164]  ? reqsk_fastopen_remove+0x140/0x140
  [   13.802576]  __netif_receive_skb+0x18/0x60
  [   13.803163]  ? __netif_receive_skb+0x18/0x60
  [   13.803798]  netif_receive_skb_internal+0x3f/0x3f0
  [   13.804538]  ? dev_gro_receive+0x2dc/0x480
  [   13.805210]  napi_gro_receive+0xc2/0xe0
  [   13.805851]  receive_buf+0x218/0xf70 [virtio_net]
  [   13.806591]  ? vring_unmap_one+0x1b/0x80
  [   13.807240]  virtnet_poll+0x173/0x268 [virtio_net]
  [   13.807998]  net_rx_action+0x13b/0x380
  [   13.808621]  ? skb_recv_done+0x30/0x40 [virtio_net]
  [   13.810159]  __do_softirq+0xde/0x2a5
  [   13.810673]  irq_exit+0xb6/0xc0
  [   13.811185]  do_IRQ+0x80/0xd0
  [   13.811881]  common_interrupt+0x89/0x89
  [   13.812668] RIP: 0010:filemap_fault+0xff/0x5e0
  [   13.819490] RSP: 0018:c07640a53cc8 EFLAGS: 0202 ORIG_RAX: 
ff8e
  [   13.820174] RAX: 0012e288 RBX: 9afa3f6e0800 RCX: 
0054
  [   13.820760] RDX:  RSI: 9afa30b64180 RDI: 
9afa3ca1c200
  [   13.821339] RBP: c07640a53d70 R08: 0310 R09: 
0001
  [   13.821917] R10: c076406ab738 R11: 00d2 R12: 
00ea
  [   13.822493] R13: 9afa3262e900 R14: f50a8174eec0 R15: 
c07640a53db8
  [   13.823075]  
  [   13.823327]  ? filemap_fault+0xb0/0x5e0
  [   13.823703]  ? filemap_map_pages+0x179/0x320
  [   13.824101]  __do_fault+0x1e/0xb0
  [   13.824434]  __handle_mm_fault+0xba7/0x1020
  [   13.824821]  handle_mm_fault+0xb1/0x200
  [   13.825189]  __do_page_fault+0x24d/0x4d0
  [   13.825560]