[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
This bug was fixed in the package linux - 3.13.0-39.66 --- linux (3.13.0-39.66) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1386629 [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Prevent host from panicking on shared MSR writes. - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * KVM: x86: Fix wrong masking on relative jump/call - LP: #1384545 - CVE-2014-3647 * KVM: x86: Warn if guest virtual address space is not 48-bits - LP: #1384545 - CVE-2014-3647 * KVM: x86: Emulator fixes for eip canonical checks on near branches - LP: #1384545 - CVE-2014-3647 * KVM: x86: emulating descriptor load misses long-mode case - LP: #1384545 - CVE-2014-3647 * KVM: x86: Handle errors when RIP is set during far jumps - LP: #1384545 - CVE-2014-3647 * kvm: vmx: handle invvpid vm exit gracefully - LP: #1384544 - CVE-2014-3646 * Input: synaptics - gate forcepad support by DMI check - LP: #1381815 linux (3.13.0-38.65) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1379244 [ Andy Whitcroft ] * Revert SAUCE: scsi: hyper-v storsvc switch up to SPC-3 - LP: #1354397 * [Config] linux-image-extra is additive to linux-image - LP: #1375310 * [Config] linux-image-extra postrm is not needed on purge - LP: #1375310 [ Upstream Kernel Changes ] * Revert KVM: x86: Increase the number of fixed MTRR regs to 10 - LP: #1377564 * Revert USB: option,zte_ev: move most ZTE CDMA devices to zte_ev - LP: #1377564 * aufs: bugfix, stop calling security_mmap_file() again - LP: #1371316 * ipvs: fix ipv6 hook registration for local replies - LP: #1349768 * Drivers: add blist flags - LP: #1354397 * sd: fix a bug in deriving the FLUSH_TIMEOUT from the basic I/O timeout - LP: #1354397 * drm/i915/bdw: Add 42ms delay for IPS disable - LP: #1374389 * drm/i915: add null render states for gen6, gen7 and gen8 - LP: #1374389 * drm/i915/bdw: 3D_CHICKEN3 has write mask bits - LP: #1374389 * drm/i915/bdw: Disable idle DOP clock gating - LP: #1374389 * drm/i915: call lpt_init_clock_gating on BDW too - LP: #1374389 * drm/i915: shuffle panel code - LP: #1374389 * drm/i915: extract backlight minimum brightness from VBT - LP: #1374389 * drm/i915: respect the VBT minimum backlight brightness - LP: #1374389 * drm/i915/bdw: Apply workarounds in render ring init function - LP: #1374389 * drm/i915/bdw: Cleanup pre prod workarounds - LP: #1374389 * drm/i915: Replace hardcoded cacheline size with macro - LP: #1374389 * drm/i915: Refactor Broadwell PIPE_CONTROL emission into a helper. - LP: #1374389 * drm/i915: Add the WaCsStallBeforeStateCacheInvalidate:bdw workaround. - LP: #1374389 * drm/i915/bdw: Remove BDW preproduction W/As until C stepping. - LP: #1374389 * mptfusion: enable no_write_same for vmware scsi disks - LP: #1371591 * iommu/amd: Fix cleanup_domain for mass device removal - LP: #1375266 * cifs: mask off top byte in get_rfc1002_length() - LP: #1372482 * Input: synaptics - add support for ForcePads - LP: #1377564 * ASoC: pxa-ssp: drop SNDRV_PCM_FMTBIT_S24_LE - LP: #1377564 * drm/radeon: add bapm module parameter - LP: #1377564 * drm/radeon: Add missing lines to ci_set_thermal_temperature_range - LP: #1377564 * drm/radeon: Add ability to get and change dpm state when radeon PX card is turned off - LP: #1377564 * ALSA: hda/realtek - Avoid setting wrong COEF on ALC269 co - LP: #1377564 * of/irq: Fix lookup to use 'interrupts-extended' property first - LP: #1377564 * Possible null ptr deref in SMB2_tcon - LP: #1377564 * CIFS: Fix SMB2 readdir error handling - LP: #1377564 * CIFS: Fix wrong directory attributes after rename - LP: #1377564 * md/raid6: avoid data corruption during recovery of double-degraded RAID6 - LP: #1377564 * ARM: dts: i.MX53: fix apparent bug in VPU clks - LP: #1377564 * pata_scc: propagate return value of scc_wait_after_reset - LP: #1377564 * libata: widen Crucial M550 blacklist matching - LP: #1377564 * ALSA: hda - restore the gpio led after resume - LP: #1358116, #1377564 * md/raid10: fix memory leak when reshaping a RAID10. - LP: #1377564 * md/raid10: Fix memory leak when raid10 reshape completes. - LP: #1377564 * MIPS: OCTEON: make get_system_type() thread-safe - LP: #1377564 * can: c_can: checking IS_ERR() instead of NULL - LP: #1377564 * HID: logitech: perform bounds checking on device_id early enough - LP: #1377564 * firmware: Do not use WARN_ON(!spin_is_locked()) - LP: #1377564 * drm/radeon: add new KV pci id - LP: #1377564 * drm/radeon: add
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
No crashes so far with 3.13.0-38-generic, looks like it's fixed. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b] ip_forward_finish+0x8b/0x170 [ 6078.830211] [8165ac85] ip_forward+0x355/0x410 [
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
We installed 3.13.0-38-generic from proposed during a maintenance today on one of the initially affected server. We'll provide an update soon. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b] ip_forward_finish+0x8b/0x170 [ 6078.830211] [8165ac85] ip_forward+0x355/0x410 [
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
This patch fixes an issue with a currently applied patch to the ubuntu- trusty kernel. If the patch was applied to 3.13.11.y, I would suggest it go through the stable process and be applied there (and in fact it is applied to other stables). Overall it would be best if the original reporter could verify if this patch does fix the issue; but regardless I think this patch should be applied. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- trusty' to 'verification-done-trusty'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b] ip_forward_finish+0x8b/0x170 [ 6078.830211] [8165ac85] ip_forward+0x355/0x410 [ 6078.874484] [8165899d] ip_rcv_finish+0x7d/0x350 [ 6078.918046]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b] ip_forward_finish+0x8b/0x170 [ 6078.830211] [8165ac85] ip_forward+0x355/0x410 [ 6078.874484] [8165899d] ip_rcv_finish+0x7d/0x350 [ 6078.918046]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
** Changed in: linux (Ubuntu Trusty) Status: Confirmed = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b] ip_forward_finish+0x8b/0x170 [ 6078.830211] [8165ac85] ip_forward+0x355/0x410 [ 6078.874484] [8165899d] ip_rcv_finish+0x7d/0x350 [ 6078.918046]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
Can't test with the 3.13 mainline as these are productive servers and we can't risk another outage at this time. As mentioned in the first post it in appears to be fixed in the 3.16 mainline kernel. ** Tags added: kernel-unable-to-test-upstream ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Confirmed Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b] ip_forward_finish+0x8b/0x170 [ 6078.830211]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: High Status: Confirmed ** Changed in: linux (Ubuntu Trusty) Status: New = Confirmed ** Changed in: linux (Ubuntu Trusty) Importance: Undecided = High ** Changed in: linux (Ubuntu Utopic) Status: Confirmed = Fix Released ** Changed in: linux (Ubuntu Utopic) Importance: High = Undecided -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Confirmed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
I strongly suspect this patch: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c3caf1192f904de2f1381211f564537235d50de3 And regardless this patch should be applied to 3.13.y, so I'll send an email to include it. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Confirmed Status in “linux” source package in Utopic: Fix Released Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
backtrace already posted ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Confirmed Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a] dev_hard_start_xmit+0x18a/0x560 [ 6078.501057] [8164360e] sch_direct_xmit+0xee/0x1c0 [ 6078.548821] [81624a50] __dev_queue_xmit+0x230/0x500 [ 6078.596793] [81624d30] dev_queue_xmit+0x10/0x20 [ 6078.644041] [8162be31] neigh_direct_output+0x11/0x20 [ 6078.691822] [8165d370] ip_finish_output+0x1b0/0x3b0 [ 6078.739211] [8165e8d8] ip_output+0x58/0x90 [ 6078.784448] [8165a84b] ip_forward_finish+0x8b/0x170 [ 6078.830211] [8165ac85] ip_forward+0x355/0x410 [ 6078.874484] [8165899d] ip_rcv_finish+0x7d/0x350 [ 6078.918046] [816592e8] ip_rcv+0x298/0x3d0 [ 6078.959829] [81622bb6]
[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980
Would it be possible for you to test the latest upstream stable kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.13 stable kernel[0]. If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'. Once testing of the upstream kernel is complete, please mark this bug as Confirmed. Thanks in advance. [0] kernel.ubuntu.com/~kernel-ppa/mainline/v3.13.11.8-trusty/ ** Changed in: linux (Ubuntu) Importance: Undecided = High ** Changed in: linux (Ubuntu) Status: Confirmed = Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1377851 Title: Kernel panic skb_segment+0x5d7/0x980 Status in “linux” package in Ubuntu: Incomplete Bug description: On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-image-3.13.0-36-generic 3.13.0-36.63) The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later. The boxes were running perfectly find for a couple of months before. We believe some kind of special packet triggered the bug. Potential related bugs: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591 Upgrading to linux-image-3.16.3-031603-generic (3.16.3-031603.201409171435) solved the problem for us. [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 006c [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980 [ 6076.745780] PGD 0 [ 6076.748641] Oops: [#1] SMP [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear [last unloaded: ipmi_si] [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013 [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 880223848000 [ 6076.882722] RIP: 0010:[81616787] [81616787] skb_segment+0x5d7/0x980 [ 6076.894243] RSP: 0018:880227263790 EFLAGS: 00010246 [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 8801ed4fff00 [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: ea0007f6de00 [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 0001 [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 8801fdb1fc80 [ 6077.091313] R13: 0001 R14: R15: 0646 [ 6077.151619] FS: () GS:88022726() knlGS: [ 6077.262424] CS: 0010 DS: ES: CR0: 80050033 [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 000407e0 [ 6077.379854] Stack: [ 6077.433555] 811a48f9 8802272772c0 fff6 000a [ 6077.546280] 00010552 006a 88021f03e800 00010020 [ 6077.658915] ffe4 00010012 001c055c 88021f03f000 [ 6077.771400] Call Trace: [ 6077.824494] IRQ [ 6077.827251] [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290 [ 6077.933211] [8168149d] tcp_gso_segment+0x10d/0x3f0 [ 6077.988641] [81691822] inet_gso_segment+0x132/0x360 [ 6078.043154] [810a5db2] ? enqueue_task_fair+0x422/0x6c0 [ 6078.097358] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.150464] [816a0fb4] gre_gso_segment+0x134/0x370 [ 6078.202321] [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70 [ 6078.255348] [81691822] inet_gso_segment+0x132/0x360 [ 6078.306129] [8109a800] ? try_to_wake_up+0x240/0x2c0 [ 6078.355712] [81623ffc] skb_mac_gso_segment+0x9c/0x180 [ 6078.404660] [8162413d] __skb_gso_segment+0x5d/0xb0 [ 6078.452918] [8162444a]