[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-08-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-33.58

---
linux (3.13.0-33.58) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1349897

  [ Upstream Kernel Changes ]

  * mm: numa: do not automatically migrate KSM pages
- LP: #1346917
  * net: fix UDP tunnel GSO of frag_list GRO packets
- LP: #1331219
  * auditsc: audit_krule mask accesses need bounds checking
- LP: #1347088
  * n_tty: Fix buffer overruns with larger-than-4k pastes
- LP: #1208740
 -- Tim Gardner tim.gard...@canonical.com   Fri, 18 Jul 2014 14:57:50 +

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331219

Title:
  Kernel Bug at skb_segment + 0x95a

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Released
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  SRU Justification:
  Impact: A crash occurs with VXLAN packets when using GSO capable hardware 
such as the case with openstack neutron.

  Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed
  certain timings to hit this bug.

  Testcase: Create and run a Neutron gateway with VXLANs, and stress the
  network for an extended period of time.

  
  Kernel Bug affects 3.11-3.15 on machines using gso offload.

  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] 

[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-08-08 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331219

Title:
  Kernel Bug at skb_segment + 0x95a

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  SRU Justification:
  Impact: A crash occurs with VXLAN packets when using GSO capable hardware 
such as the case with openstack neutron.

  Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed
  certain timings to hit this bug.

  Testcase: Create and run a Neutron gateway with VXLANs, and stress the
  network for an extended period of time.

  
  Kernel Bug affects 3.11-3.15 on machines using gso offload.

  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500
  [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 
[nf_conntrack_ipv4]
  [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0
  [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20
  [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100
  [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0
  [ 871.405922] [8165a418] ip_output+0x58/0x90
  [ 871.411609] [81659b75] ip_local_out+0x25/0x30
  [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110
  [ 871.423772] [a0376581] 

[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-07-25 Thread Dave Chiluk
** Description changed:

+ SRU Justification:
+ Impact: A crash occurs with VXLAN packets when using GSO capable hardware 
such as the case with openstack neutron.
+ 
+ Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed
+ certain timings to hit this bug.
+ 
+ Testcase: Create and run a Neutron gateway with VXLANs, and stress the
+ network for an extended period of time.
+ 
+ 
  Kernel Bug affects 3.11-3.15 on machines using gso offload.
  
  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500
  [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 
[nf_conntrack_ipv4]
  [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0
  [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20
  [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100
  [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0
  [ 871.405922] [8165a418] ip_output+0x58/0x90
  [ 871.411609] [81659b75] ip_local_out+0x25/0x30
  [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110
  [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan]
  [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch]
  [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch]
  [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch]
  [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 
[openvswitch]
  [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0
  [ 871.467960] [a054fe1b] 

[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-07-25 Thread Tim Gardner
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Medium
 Assignee: Dave Chiluk (chiluk)
   Status: In Progress

** Changed in: linux (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Trusty)
 Assignee: (unassigned) = Dave Chiluk (chiluk)

** Changed in: linux (Ubuntu Utopic)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331219

Title:
  Kernel Bug at skb_segment + 0x95a

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  SRU Justification:
  Impact: A crash occurs with VXLAN packets when using GSO capable hardware 
such as the case with openstack neutron.

  Fix: Upstream fix 5882a07c7 fixes a locking error that previously allowed
  certain timings to hit this bug.

  Testcase: Create and run a Neutron gateway with VXLANs, and stress the
  network for an extended period of time.

  
  Kernel Bug affects 3.11-3.15 on machines using gso offload.

  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500
  [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 
[nf_conntrack_ipv4]
  [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0
  [ 871.386135] 

[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-06-18 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Importance: Undecided = Medium

** Changed in: linux (Ubuntu)
   Status: Incomplete = Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331219

Title:
  Kernel Bug at skb_segment + 0x95a

Status in “linux” package in Ubuntu:
  Triaged

Bug description:
  Kernel Bug affects 3.11-3.15 on machines using gso offload.

  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500
  [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 
[nf_conntrack_ipv4]
  [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0
  [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20
  [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100
  [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0
  [ 871.405922] [8165a418] ip_output+0x58/0x90
  [ 871.411609] [81659b75] ip_local_out+0x25/0x30
  [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110
  [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan]
  [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch]
  [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch]
  [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch]
  [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 
[openvswitch]
  [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0
  [ 871.467960] [a054fe1b] 

[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-06-17 Thread Dave Chiluk
** Description changed:

- Kernel Bug affects 3.11 - 3.13.0-30 on machines capable using gso
- offload.
+ Kernel Bug affects 3.11-3.15 on machines capable using gso offload.
  
  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
-  dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
+  dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500
  [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 
[nf_conntrack_ipv4]
  [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0
  [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20
  [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100
  [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0
  [ 871.405922] [8165a418] ip_output+0x58/0x90
  [ 871.411609] [81659b75] ip_local_out+0x25/0x30
  [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110
  [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan]
  [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch]
  [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch]
  [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch]
  [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 
[openvswitch]
  [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0
  [ 871.467960] [a054fe1b] ovs_execute_actions+0x2b/0x30 [openvswitch]
  [ 871.475979] [a05526e2] 

[Kernel-packages] [Bug 1331219] Re: Kernel Bug at skb_segment + 0x95a

2014-06-17 Thread Dave Chiluk
I have sent an e-mail to the linux-stable mailing list requesting that
this patch be included in the stable trees.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331219

Title:
  Kernel Bug at skb_segment + 0x95a

Status in “linux” package in Ubuntu:
  Incomplete

Bug description:
  Kernel Bug affects 3.11-3.15 on machines using gso offload.

  Stack trace
  [ 871.025524] [ cut here ]
  [ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
  [ 871.038669] invalid opcode:  [#1] SMP
  [ 871.043318] Modules linked in: xt_nat xt_REDIRECT dccp_diag dccp tcp_diag 
udp_diag inet_diag unix_diag ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conn
  track nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp bridge 
ip6table_filter ip6_tables iptable_filter ip_tables ebtable_nat ebtables 
x_tables veth openvswitch gre vxlan ip_tunnel
   dm_crypt 8021q garp stp mrp llc bonding nfsd auth_rpcgss nfs_acl nfs lockd 
sunrpc fscache sb_edac gpio_ich joydev edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp lpc_ich acpi_power_m
  eter kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel 
aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ipmi_si 
mac_hid lp parport btrfs xor raid6_pq libcrc32c
  hid_generic qla2xxx fnic libfcoe megaraid_sas
  [ 871.124025] igb usbhid libfc hid dca scsi_transport_fc ptp enic scsi_tgt 
pps_core i2c_algo_bit wmi
  [ 871.132967] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.13.0-29-generic 
#53-Ubuntu
  [ 871.141500] Hardware name: Cisco Systems Inc UCSC-C220-M3S/UCSC-C220-M3S, 
BIOS C220M3.1.5.4f.0.111320130449 11/13/2013
  [ 871.153541] task: 881fd2d117f0 ti: 881fd2d18000 task.ti: 
881fd2d18000
  [ 871.161975] RIP: 0010:[81612a6a] [81612a6a] 
skb_segment+0x95a/0x980
  [ 871.171124] RSP: 0018:881fffce3498 EFLAGS: 00010206
  [ 871.177099] RAX:  RBX: 881fb8929700 RCX: 
881fcfba32f0
  [ 871.185120] RDX: 0050 RSI: 881fcfba3200 RDI: 
881fcfba2200
  [ 871.193140] RBP: 881fffce3560 R08: 0042 R09: 

  [ 871.201160] R10: 881fb8929e00 R11: 05ea R12: 
881fcfba22f0
  [ 871.209171] R13:  R14: 881fd09a8400 R15: 
0050
  [ 871.217191] FS: () GS:881fffce() 
knlGS:
  [ 871.226307] CS: 0010 DS:  ES:  CR0: 80050033
  [ 871.232772] CR2: 7fbd1ccb4000 CR3: 01c0e000 CR4: 
001407e0
  [ 871.240793] Stack:
  [ 871.243079]   0042 
ffbe
  [ 871.251470] 000105ea 0040 881fb8929e00 
0001
  [ 871.259864] ffce 0074 003205a8 
881fb8929700
  [ 871.268257] Call Trace:
  [ 871.271032] IRQ
  [ 871.273193]
  [ 871.274913] [8167cfbd] tcp_gso_segment+0x10d/0x3f0
  [ 871.279926] [a03740f0] ? vxlan_set_owner+0x60/0x60 [vxlan]
  [ 871.287178] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.293749] [a045c701] ? bond_mode_name+0x21/0x30 [bonding]
  [ 871.301097] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.307858] [816840d7] skb_udp_tunnel_segment+0xd7/0x390
  [ 871.314906] [816847f0] udp4_ufo_fragment+0x120/0x130
  [ 871.321566] [8168d422] inet_gso_segment+0x132/0x360
  [ 871.328132] [a0563f67] ? ipt_do_table+0x317/0x6aa [ip_tables]
  [ 871.335669] [a05a3500] ? 
nf_conntrack_hash_check_insert+0x280/0x2e0 [nf_conntrack]
  [ 871.345268] [8161fdac] skb_mac_gso_segment+0x9c/0x180
  [ 871.352026] [8161feed] __skb_gso_segment+0x5d/0xb0
  [ 871.358494] [816201fa] dev_hard_start_xmit+0x18a/0x560
  [ 871.365351] [816208e8] __dev_queue_xmit+0x318/0x500
  [ 871.371910] [a05c0238] ? ipv4_confirm+0x78/0x100 
[nf_conntrack_ipv4]
  [ 871.380156] [8163e03b] ? eth_header+0x2b/0xd0
  [ 871.386135] [81620ae0] dev_queue_xmit+0x10/0x20
  [ 871.392315] [81629367] neigh_connected_output+0xb7/0x100
  [ 871.399366] [81658eb0] ip_finish_output+0x1b0/0x3b0
  [ 871.405922] [8165a418] ip_output+0x58/0x90
  [ 871.411609] [81659b75] ip_local_out+0x25/0x30
  [ 871.417596] [8169c43e] iptunnel_xmit+0xee/0x110
  [ 871.423772] [a0376581] vxlan_xmit_skb+0x1d1/0x350 [vxlan]
  [ 871.430928] [a055956b] vxlan_tnl_send+0x11b/0x190 [openvswitch]
  [ 871.438666] [a055895d] ovs_vport_send+0x1d/0x80 [openvswitch]
  [ 871.446203] [a054f19a] do_output+0x2a/0x50 [openvswitch]
  [ 871.453255] [a054f643] do_execute_actions+0x2e3/0xa90 
[openvswitch]
  [ 871.461394] [8163f1ff] ? sch_direct_xmit+0x5f/0x1c0
  [ 871.467960] [a054fe1b]