As a status update: thanks for testing. I pity it did not help. So far I
was looking through all related changes in that set but could not find
anything that immediately stuck out. Thinking more over the crash
stacktrace it is a netfilter contrack timer expiring which causes a call
into ip6_expire_frag_queue() and that got rewritten in "ipv6: frags:
rewrite ip6_expire_frag_queue()" to use the first entry in the frag list
for sending an ICMP message. And before doing that, it calls skb_get()
which does increment the user refcount. That might actually be the issue
but it is still done that way in any kernel since v4.18 upstream. Could
be that nobody is using those under heavy ipv6 traffic, yet. Since I am
not that familiar with the network stack, I would like to reach out to
upstream with that question.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to