[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
This bug was fixed in the package linux - 3.13.0-33.58 --- linux (3.13.0-33.58) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1349897 [ Upstream Kernel Changes ] * mm: numa: do not automatically migrate KSM pages - LP: #1346917 * net: fix UDP tunnel GSO of frag_list GRO packets - LP: #1331219 * auditsc: audit_krule mask accesses need bounds checking - LP: #1347088 * n_tty: Fix buffer overruns with larger-than-4k pastes - LP: #1208740 -- Tim Gardner tim.gard...@canonical.com Fri, 18 Jul 2014 14:57:50 + ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331219 Title: Kernel Bug at skb_segment + 0x95a Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Released Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: A crash occurs with VXLAN packets when using GSO capable hardware such as the case with openstack neutron. Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed certain timings to hit this bug. Testcase: Create and run a Neutron gateway with VXLANs, and stress the network for an extended period of time. Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351]
[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331219 Title: Kernel Bug at skb_segment + 0x95a Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: A crash occurs with VXLAN packets when using GSO capable hardware such as the case with openstack neutron. Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed certain timings to hit this bug. Testcase: Create and run a Neutron gateway with VXLANs, and stress the network for an extended period of time. Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500 [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 [nf_conntrack_ipv4] [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0 [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20 [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100 [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0 [ 871.405922] [8165a418] ip_output+0x58/0x90 [ 871.411609] [81659b75] ip_local_out+0x25/0x30 [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110 [ 871.423772] [a0376581]
[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
** Description changed: + SRU Justification: + Impact: A crash occurs with VXLAN packets when using GSO capable hardware such as the case with openstack neutron. + + Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed + certain timings to hit this bug. + + Testcase: Create and run a Neutron gateway with VXLANs, and stress the + network for an extended period of time. + + Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500 [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 [nf_conntrack_ipv4] [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0 [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20 [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100 [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0 [ 871.405922] [8165a418] ip_output+0x58/0x90 [ 871.411609] [81659b75] ip_local_out+0x25/0x30 [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110 [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan] [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch] [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch] [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch] [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 [openvswitch] [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0 [ 871.467960] [a054fe1b]
[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Medium Assignee: Dave Chiluk (chiluk) Status: In Progress ** Changed in: linux (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux (Ubuntu Trusty) Assignee: (unassigned) = Dave Chiluk (chiluk) ** Changed in: linux (Ubuntu Utopic) Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331219 Title: Kernel Bug at skb_segment + 0x95a Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: A crash occurs with VXLAN packets when using GSO capable hardware such as the case with openstack neutron. Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed certain timings to hit this bug. Testcase: Create and run a Neutron gateway with VXLANs, and stress the network for an extended period of time. Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500 [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 [nf_conntrack_ipv4] [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0 [ 871.386135]
[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
** Changed in: linux (Ubuntu) Importance: Undecided = Medium ** Changed in: linux (Ubuntu) Status: Incomplete = Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331219 Title: Kernel Bug at skb_segment + 0x95a Status in “linux” package in Ubuntu: Triaged Bug description: Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500 [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 [nf_conntrack_ipv4] [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0 [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20 [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100 [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0 [ 871.405922] [8165a418] ip_output+0x58/0x90 [ 871.411609] [81659b75] ip_local_out+0x25/0x30 [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110 [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan] [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch] [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch] [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch] [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 [openvswitch] [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0 [ 871.467960] [a054fe1b]
[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
** Description changed: - Kernel Bug affects 3.11 - 3.13.0-30 on machines capable using gso - offload. + Kernel Bug affects 3.11-3.15 on machines capable using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel - dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m + dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500 [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 [nf_conntrack_ipv4] [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0 [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20 [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100 [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0 [ 871.405922] [8165a418] ip_output+0x58/0x90 [ 871.411609] [81659b75] ip_local_out+0x25/0x30 [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110 [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan] [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch] [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch] [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch] [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 [openvswitch] [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0 [ 871.467960] [a054fe1b] ovs_execute_actions+0x2b/0x30 [openvswitch] [ 871.475979] [a05526e2]
[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a
I have sent an e-mail to the linux-stable mailing list requesting that this patch be included in the stable trees. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1331219 Title: Kernel Bug at skb_segment + 0x95a Status in “linux” package in Ubuntu: Incomplete Bug description: Kernel Bug affects 3.11-3.15 on machines using gso offload. Stack trace [ 871.025524] [ cut here ] [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903! [ 871.038669] invalid opcode: [#1] SMP [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables x_tables veth openvswitch gre vxlan ip_tunnel dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal intel_powerclamp coretemp lpc_ich acpi_power_m eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si mac_hid lp parport btrfs xor raid6_pq libcrc32c hid_generic qla2xxx fnic libfcoe megaraid_sas [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt pps_core i2c_algo_bit wmi [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic #53-Ubuntu [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, BIOS C220M3.1.5.4f.0.111320130449 11/13/2013 [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 881fd2d18000 [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] skb_segment+0x95a/0x980 [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206 [ 871.177099] RAX: RBX: 881fb8929700 RCX: 881fcfba32f0 [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 881fcfba2200 [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 881fcfba22f0 [ 871.209171] R13: R14: 881fd09a8400 R15: 0050 [ 871.217191] FS: () GS:881fffce() knlGS: [ 871.226307] CS: 0010 DS: ES: CR0: 80050033 [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 001407e0 [ 871.240793] Stack: [ 871.243079] 0042 ffbe [ 871.251470] 000105ea 0040 881fb8929e00 0001 [ 871.259864] ffce 0074 003205a8 881fb8929700 [ 871.268257] Call Trace: [ 871.271032] IRQ [ 871.273193] [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0 [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan] [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360 [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding] [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390 [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130 [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360 [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables] [ 871.335669] [a05a3500] ? nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack] [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180 [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0 [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560 [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500 [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 [nf_conntrack_ipv4] [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0 [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20 [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100 [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0 [ 871.405922] [8165a418] ip_output+0x58/0x90 [ 871.411609] [81659b75] ip_local_out+0x25/0x30 [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110 [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan] [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch] [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch] [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch] [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 [openvswitch] [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0 [ 871.467960] [a054fe1b]