[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-39.66

---
linux (3.13.0-39.66) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1386629

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Prevent host from panicking on shared MSR writes.
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * KVM: x86: Fix wrong masking on relative jump/call
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Warn if guest virtual address space is not 48-bits
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Emulator fixes for eip canonical checks on near branches
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: emulating descriptor load misses long-mode case
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Handle errors when RIP is set during far jumps
- LP: #1384545
- CVE-2014-3647
  * kvm: vmx: handle invvpid vm exit gracefully
- LP: #1384544
- CVE-2014-3646
  * Input: synaptics - gate forcepad support by DMI check
- LP: #1381815

linux (3.13.0-38.65) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1379244

  [ Andy Whitcroft ]

  * Revert SAUCE: scsi: hyper-v storsvc switch up to SPC-3
- LP: #1354397
  * [Config] linux-image-extra is additive to linux-image
- LP: #1375310
  * [Config] linux-image-extra postrm is not needed on purge
- LP: #1375310

  [ Upstream Kernel Changes ]

  * Revert KVM: x86: Increase the number of fixed MTRR regs to 10
- LP: #1377564
  * Revert USB: option,zte_ev: move most ZTE CDMA devices to zte_ev
- LP: #1377564
  * aufs: bugfix, stop calling security_mmap_file() again
- LP: #1371316
  * ipvs: fix ipv6 hook registration for local replies
- LP: #1349768
  * Drivers: add blist flags
- LP: #1354397
  * sd: fix a bug in deriving the FLUSH_TIMEOUT from the basic I/O timeout
- LP: #1354397
  * drm/i915/bdw: Add 42ms delay for IPS disable
- LP: #1374389
  * drm/i915: add null render states for gen6, gen7 and gen8
- LP: #1374389
  * drm/i915/bdw: 3D_CHICKEN3 has write mask bits
- LP: #1374389
  * drm/i915/bdw: Disable idle DOP clock gating
- LP: #1374389
  * drm/i915: call lpt_init_clock_gating on BDW too
- LP: #1374389
  * drm/i915: shuffle panel code
- LP: #1374389
  * drm/i915: extract backlight minimum brightness from VBT
- LP: #1374389
  * drm/i915: respect the VBT minimum backlight brightness
- LP: #1374389
  * drm/i915/bdw: Apply workarounds in render ring init function
- LP: #1374389
  * drm/i915/bdw: Cleanup pre prod workarounds
- LP: #1374389
  * drm/i915: Replace hardcoded cacheline size with macro
- LP: #1374389
  * drm/i915: Refactor Broadwell PIPE_CONTROL emission into a helper.
- LP: #1374389
  * drm/i915: Add the WaCsStallBeforeStateCacheInvalidate:bdw workaround.
- LP: #1374389
  * drm/i915/bdw: Remove BDW preproduction W/As until C stepping.
- LP: #1374389
  * mptfusion: enable no_write_same for vmware scsi disks
- LP: #1371591
  * iommu/amd: Fix cleanup_domain for mass device removal
- LP: #1375266
  * cifs: mask off top byte in get_rfc1002_length()
- LP: #1372482
  * Input: synaptics - add support for ForcePads
- LP: #1377564
  * ASoC: pxa-ssp: drop SNDRV_PCM_FMTBIT_S24_LE
- LP: #1377564
  * drm/radeon: add bapm module parameter
- LP: #1377564
  * drm/radeon: Add missing lines to ci_set_thermal_temperature_range
- LP: #1377564
  * drm/radeon: Add ability to get and change dpm state when radeon PX card
is turned off
- LP: #1377564
  * ALSA: hda/realtek - Avoid setting wrong COEF on ALC269  co
- LP: #1377564
  * of/irq: Fix lookup to use 'interrupts-extended' property first
- LP: #1377564
  * Possible null ptr deref in SMB2_tcon
- LP: #1377564
  * CIFS: Fix SMB2 readdir error handling
- LP: #1377564
  * CIFS: Fix wrong directory attributes after rename
- LP: #1377564
  * md/raid6: avoid data corruption during recovery of double-degraded
RAID6
- LP: #1377564
  * ARM: dts: i.MX53: fix apparent bug in VPU clks
- LP: #1377564
  * pata_scc: propagate return value of scc_wait_after_reset
- LP: #1377564
  * libata: widen Crucial M550 blacklist matching
- LP: #1377564
  * ALSA: hda - restore the gpio led after resume
- LP: #1358116, #1377564
  * md/raid10: fix memory leak when reshaping a RAID10.
- LP: #1377564
  * md/raid10: Fix memory leak when raid10 reshape completes.
- LP: #1377564
  * MIPS: OCTEON: make get_system_type() thread-safe
- LP: #1377564
  * can: c_can: checking IS_ERR() instead of NULL
- LP: #1377564
  * HID: logitech: perform bounds checking on device_id early enough
- LP: #1377564
  * firmware: Do not use WARN_ON(!spin_is_locked())
- LP: #1377564
  * drm/radeon: add new KV pci id
- LP: #1377564
  * drm/radeon: add 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-27 Thread Frederik Kriewitz
No crashes so far with 3.13.0-38-generic, looks like it's fixed.

** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-22 Thread Frederik Kriewitz
We installed 3.13.0-38-generic from proposed during a maintenance today on one 
of the initially affected server.
We'll provide an update soon.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-21 Thread Chris J Arges
This patch fixes an issue with a currently applied patch to the ubuntu-
trusty kernel. If the patch was applied to 3.13.11.y, I would suggest it
go through the stable process and be applied there (and in fact it is
applied to other stables). Overall it would be best if the original
reporter could verify if this patch does fix the issue; but regardless I
think this patch should be applied.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-16 Thread Brad Figg
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-14 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 6078.874484]  [8165899d] ip_rcv_finish+0x7d/0x350
  [ 6078.918046]  

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-10 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 6078.874484]  [8165899d] ip_rcv_finish+0x7d/0x350
  [ 6078.918046]  

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-09 Thread Luis Henriques
** Changed in: linux (Ubuntu Trusty)
   Status: Confirmed = Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 6078.874484]  [8165899d] ip_rcv_finish+0x7d/0x350
  [ 6078.918046] 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-07 Thread Frederik Kriewitz
Can't test with the 3.13 mainline as these are productive servers and we can't 
risk another outage at this time.
As mentioned in the first post it in appears to be fixed in the 3.16 mainline 
kernel.


** Tags added: kernel-unable-to-test-upstream

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-07 Thread Chris J Arges
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: High
   Status: Confirmed

** Changed in: linux (Ubuntu Trusty)
   Status: New = Confirmed

** Changed in: linux (Ubuntu Trusty)
   Importance: Undecided = High

** Changed in: linux (Ubuntu Utopic)
   Status: Confirmed = Fix Released

** Changed in: linux (Ubuntu Utopic)
   Importance: High = Undecided

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Confirmed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-07 Thread Chris J Arges
I strongly suspect this patch:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c3caf1192f904de2f1381211f564537235d50de3

And regardless this patch should be applied to 3.13.y, so I'll send an
email to include it.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Confirmed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-06 Thread Frederik Kriewitz
backtrace already posted

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 6078.874484]  [8165899d] ip_rcv_finish+0x7d/0x350
  [ 6078.918046]  [816592e8] ip_rcv+0x298/0x3d0
  [ 6078.959829]  [81622bb6] 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-06 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v3.13 stable kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
Confirmed.


Thanks in advance.

[0] kernel.ubuntu.com/~kernel-ppa/mainline/v3.13.11.8-trusty/


** Changed in: linux (Ubuntu)
   Importance: Undecided = High

** Changed in: linux (Ubuntu)
   Status: Confirmed = Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a]