CRASHES in 6.2.0 macvlan_process_broadcast nf_conntrack_confirm

Bug #2013395 reported by Juan Pedro Paredes
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
ubuntu-release-upgrader (Ubuntu)
New
Undecided
Unassigned

Bug Description

Freshly update my RPi4, I got this warning.
[ 44.314769] ------------[ cut here ]------------
[ 44.314790] WARNING: CPU: 1 PID: 9 at net/netfilter/nf_conntrack_core.c:1202 __nf_conntrack_confirm+0x554/0x7ec [nf_conntrack]
[ 44.314855] Modules linked in: snd_seq_dummy snd_hrtimer br_netfilter snd_seq snd_seq_device cmac tun algif_hash algif_skcipher af_alg bnep hci_uart btqca btrtl btbcm btintel bluetooth ecdh_generic ecc overlay macvlan bridge stp llc cfg80211 rfkill ip6t_REJECT nf_reject_ipv6 xt_hl ip6_tables ip6t_rt ipt_REJECT nf_re
ject_ipv4 xt_comment nft_chain_nat xt_nat xt_MASQUERADE nft_limit xt_limit xt_addrtype xt_tcpudp xt_conntrack nft_compat nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack nf_defrag_ipv6 binfmt_misc nf_defrag_ipv4 nf_tables nfnetlink isofs cdrom ch341 usbserial bcm2835_v4l2(C
) bcm2835_codec(C) bcm2835_isp(C) rpivid_hevc(CE) bcm2835_mmal_vchiq(C) v4l2_mem2mem raspberrypi_hwmon videobuf2_dma_contig videobuf2_vmalloc videobuf2_memops v
ideobuf2_v4l2 vc_sm_cma(C) videodev snd_bcm2835(C) videobuf2_common mc nvmem_rmem uio_pdrv_genirq uio dm_multipath dm_mod dax scsi_dh_rdac scsi_dh_emc scsi_dh_a
lua uinput parport_pc ppdev lp nfsd fuse
[ 44.315069] parport efi_pstore auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables ipv6 autofs4 r8153_ecm cdc_ether r8152 btrfs blake2b_generic raid10
 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear md_mod uas usb_storage vc4 spid
ev snd_soc_hdmi_codec drm_display_helper cec drm_dma_helper drm_kms_helper v3d syscopyarea gpu_sched sysfillrect dwc2 drm_shmem_helper sysimgblt drm crct10dif_c
e drm_panel_orientation_quirks xhci_pci roles xhci_pci_renesas snd_soc_core i2c_bcm2835 snd_compress udc_core ac97_bus spi_bcm2835 snd_pcm_dmaengine snd_pcm phy
_generic snd_timer snd backlight aes_arm64
[ 44.315220] CPU: 1 PID: 9 Comm: kworker/u8:0 Tainted: G C E 6.2.0-1003-raspi #3-Ubuntu
[ 44.315227] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)
[ 44.315231] Workqueue: events_unbound macvlan_process_broadcast [macvlan]
[ 44.315252] pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 44.315259] pc : __nf_conntrack_confirm+0x554/0x7ec [nf_conntrack]
[ 44.315298] lr : __nf_conntrack_confirm+0xc0/0x7ec [nf_conntrack]
[ 44.315332] sp : ffff80000800bb10
[ 44.315336] x29: ffff80000800bb10 x28: ffff25c4c2ccba00 x27: ffffda04b16c5000
[ 44.315346] x26: 0000000000000000 x25: ffffda04b16c4fc0 x24: 00000000000001f6
[ 44.315356] x23: ffff25c44e38c400 x22: ffff25c4c2ccba58 x21: ffffda04dc607600
[ 44.315365] x20: 0000000000010df6 x19: 0000000000017570 x18: 0000000000000000
[ 44.315374] x17: ffff4bc0631c4000 x16: ffffda04db905620 x15: 0000000000004000
[ 44.315384] x14: 0000000000000001 x13: 0000000000000000 x12: 0000000000000001
[ 44.315393] x11: 0000000000000001 x10: 6c7967656e657261 x9 : ffffda04b16a951c
[ 44.315402] x8 : 7465646279746573 x7 : 7a76339901196a83 x6 : dd69f340f74aeff5
[ 44.315410] x5 : a852803105d2f2a5 x4 : 0000000000000000 x3 : ffffda04b16c5798
[ 44.315419] x2 : 0000000000000001 x1 : 0000000000000170 x0 : 0000000000000188
[ 44.315428] Call trace:
[ 44.315431] __nf_conntrack_confirm+0x554/0x7ec [nf_conntrack]
[ 44.315465] nf_confirm+0x2f0/0x310 [nf_conntrack]
[ 44.315499] nf_hook_slow+0x54/0xf4
[ 44.315513] ip_local_deliver+0xf0/0x124
[ 44.315518] ip_rcv_finish+0x98/0xbc
[ 44.315524] ip_sabotage_in+0x88/0x90 [br_netfilter]
[ 44.315537] nf_hook_slow+0x54/0xf4
[ 44.315543] ip_rcv+0xcc/0x100
[ 44.315547] __netif_receive_skb_one_core+0x60/0x8c
[ 44.315556] __netif_receive_skb+0x20/0x70
[ 44.315562] process_backlog+0xd8/0x1c4
[ 44.315568] __napi_poll.constprop.0+0x40/0x280
[ 44.315575] net_rx_action+0x1c4/0x3e4
[ 44.315582] __do_softirq+0x184/0x4f0
[ 44.315590] ____do_softirq+0x18/0x24
[ 44.315596] call_on_irq_stack+0x2c/0x54
[ 44.315602] do_softirq_own_stack+0x24/0x3c
[ 44.315607] do_softirq+0xcc/0xe0
[ 44.315614] __local_bh_enable_ip+0x110/0x114
[ 44.315618] netif_rx+0xdc/0x184
[ 44.315624] macvlan_broadcast+0x120/0x2c0 [macvlan]
[ 44.315638] macvlan_process_broadcast+0x1b4/0x1e0 [macvlan]
[ 44.315649] process_one_work+0x21c/0x4a0
[ 44.315658] worker_thread+0x74/0x430
[ 44.315665] kthread+0xec/0x100
[ 44.315673] ret_from_fork+0x10/0x20
[ 44.315681] ---[ end trace 0000000000000000 ]---

ProblemType: Bug
DistroRelease: Ubuntu 23.04
Package: ubuntu-release-upgrader-core 1:23.04.2
ProcVersionSignature: Ubuntu 6.2.0-1003.3-raspi 6.2.2
Uname: Linux 6.2.0-1003-raspi aarch64
ApportVersion: 2.26.0-0ubuntu2
Architecture: arm64
CasperMD5CheckResult: unknown
CloudArchitecture: aarch64
CloudBuildName: server
CloudID: none
CloudName: none
CloudPlatform: none
CloudSerial:

CloudSubPlatform: config
CrashDB: ubuntu
Date: Thu Mar 30 22:28:57 2023
ImageMediaBuild: 20201022
PackageArchitecture: all
ProcEnviron:
 LANG=C.UTF-8
 PATH=(custom, no user)
 SHELL=/bin/bash
 TERM=screen-256color
 XDG_RUNTIME_DIR=<set>
SourcePackage: ubuntu-release-upgrader
Symptom: dist-upgrade
UpgradeStatus: Upgraded to lunar on 2023-02-18 (40 days ago)
VarLogDistupgradeLspcitxt:
 00:00.0 PCI bridge [0604]: Broadcom Inc. and subsidiaries BCM2711 PCIe Bridge [14e4:2711] (rev 10)
 01:00.0 USB controller [0c03]: VIA Technologies, Inc. VL805/806 xHCI USB 3.0 Controller [1106:3483] (rev 01)

Revision history for this message
Juan Pedro Paredes (juampe) wrote :
description: updated
Revision history for this message
Juan Pedro Paredes (juampe) wrote :

Sorry but I have to back to 5.19.0-1013-raspi.
linux-image-6.2.0-1003-raspi is REALLY a inestable kernel I got 3 panics today.
Sorry, no traces in /vat/crash
docker macvlan and conntrack is not a good option fo 6.2.0 kernels

summary: - WARNING macvlan_process_broadcast nf_conntrack_confirm
+ CRASHES in 6.2.0 macvlan_process_broadcast nf_conntrack_confirm
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.