I was able to reproduce the issue with linux-
image-4.4.0-113-generic=4.4.0-113.136~14.04.1 in a local VM running
Trusty. When I run 'ping' I get the following stack trace on the
console:

===============================================================
[   18.434331] BUG: unable to handle kernel NULL pointer dereference at 
0000000000000020
[   18.436852] IP: [<ffffffff813f6d54>] csum_and_copy_from_iter+0x14/0x4a0
[   18.438236] PGD 800000003db9b067 PUD 3b81e067 PMD 0 
[   18.439299] Oops: 0000 [#1] SMP 
[   18.439993] Modules linked in: ppdev kvm_intel kvm irqbypass joydev 
input_leds serio_raw parport_pc 8250_fintek parport i2c_piix4 mac_hid psmouse 
pata_acpi floppy
[   18.442997] CPU: 0 PID: 914 Comm: ping Not tainted 4.4.0-113-generic 
#136~14.04.1
[   18.444535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
[   18.445918] task: ffff880036766600 ti: ffff88003d31c000 task.ti: 
ffff88003d31c000
[   18.447084] RIP: 0010:[<ffffffff813f6d54>]  [<ffffffff813f6d54>] 
csum_and_copy_from_iter+0x14/0x4a0
[   18.448376] RSP: 0018:ffff88003d31f980  EFLAGS: 00010282
[   18.449036] RAX: 0000000000000000 RBX: 0000000000000010 RCX: 0000000000000010
[   18.449866] RDX: ffff88003d31f9f4 RSI: 0000000000000040 RDI: ffff88003b1f2234
[   18.450695] RBP: ffff88003d31f9e0 R08: 0000000000000000 R09: ffff8800368f0200
[   18.451658] R10: ffff88003b1f2234 R11: 0000000000000040 R12: 0000000000000040
[   18.452702] R13: 0000000000000000 R14: ffff880036766f20 R15: ffff88003b1f2234
[   18.453688] FS:  00007f2ea8586740(0000) GS:ffff88003fc00000(0000) 
knlGS:0000000000000000
[   18.454829] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   18.455598] CR2: 0000000000000020 CR3: 000000003d31a000 CR4: 0000000000000670
[   18.456543] Stack:
[   18.456812]  ffffffff816ff48e ffff8800368f0200 ffff88003d31fa0f 
00000000024000c0
[   18.458128]  0000000000000200 00000000ffffffff ffff88003d31f9f0 
ffff8800368f0200
[   18.460484]  0000000000000040 0000000000000000 ffff880036766f20 
ffff88003b1f2234
[   18.461653] Call Trace:
[   18.462045]  [<ffffffff816ff48e>] ? __alloc_skb+0x7e/0x280
[   18.463098]  [<ffffffff81752f17>] ip_generic_getfrag+0x47/0xd0
[   18.464110]  [<ffffffff8177aecd>] raw_getfrag+0xad/0x100
[   18.465068]  [<ffffffff817547a2>] __ip_append_data.isra.46+0x832/0xa30
[   18.466215]  [<ffffffff8177ae20>] ? raw_recvmsg+0x1b0/0x1b0
[   18.467195]  [<ffffffff81752e17>] ? ip_setup_cork+0xc7/0x120
[   18.468158]  [<ffffffff8177ae20>] ? raw_recvmsg+0x1b0/0x1b0
[   18.469097]  [<ffffffff817553f3>] ip_append_data+0x83/0xf0
[   18.470003]  [<ffffffff8177bb4e>] raw_sendmsg+0x71e/0xb60
[   18.470934]  [<ffffffff8138a528>] ? aa_sk_perm+0x78/0x230
[   18.471848]  [<ffffffff8138aded>] ? aa_sock_msg_perm+0x5d/0x140
[   18.472888]  [<ffffffff8178b01d>] inet_sendmsg+0x6d/0xa0
[   18.473811]  [<ffffffff816f6b8e>] sock_sendmsg+0x3e/0x50
[   18.474702]  [<ffffffff816f74c6>] ___sys_sendmsg+0x276/0x290
[   18.475644]  [<ffffffff814e3fc7>] ? n_tty_ioctl_helper+0x27/0x110
[   18.476655]  [<ffffffff814df760>] ? n_tty_ioctl+0x70/0xe0
[   18.477552]  [<ffffffff81817e52>] ? mutex_lock+0x12/0x2f
[   18.478471]  [<ffffffff814dd670>] ? tty_ioctl+0x220/0xc30
[   18.479221]  [<ffffffff818195ae>] ? _raw_spin_unlock_bh+0x1e/0x20
[   18.480061]  [<ffffffff816f7e22>] __sys_sendmsg+0x42/0x80
[   18.480867]  [<ffffffff816f7e72>] SyS_sendmsg+0x12/0x20
[   18.481657]  [<ffffffff81819b5f>] entry_SYSCALL_64_fastpath+0x1c/0x97
[   18.482576] Code: e7 e8 04 ec 01 00 48 89 d8 e9 5d fe ff ff 66 0f 1f 84 00 
00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 89 cb 48 83 ec 38 <4c> 8b 
61 10 48 89 55 c0 4c 39 e6 4c 0f 46 e6 4d 85 e4 0f 84 f2 
[   18.485891] RIP  [<ffffffff813f6d54>] csum_and_copy_from_iter+0x14/0x4a0
[   18.486789]  RSP <ffff88003d31f980>
[   18.487252] CR2: 0000000000000020
[   18.487725] ---[ end trace ff8d78050aa340a1 ]---
===============================================================

Which is the same stack trace as reported on bug 1748671.

A fix for this issue has been released with the latest linux-lts-xenial
kernel on -proposed (currently linux-
image-4.4.0-116-generic=4.4.0-116.140~14.04.1), and I am not able to
reproduce the issue with this kernel.

So I suggest we mark this bug as duplicate of bug 1748671.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749419

Title:
  ping does not work on Trusty with proposed kernel
  4.4.0-113.136~14.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1749419/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to