Kernel panic skb_segment+0x5d7/0x980
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
High
|
Unassigned | ||
Utopic |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway we recently had a lot of trouble with kernel panics (linux-
The panics were kind of random happening sometimes already during the boot process and sometimes a couple of hours later.
The boxes were running perfectly find for a couple of months before. We believe some kind of "special" packet triggered the bug.
Potential related bugs:
https:/
https:/
Upgrading to linux-image-
[ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 000000000000006c
[ 6076.737716] IP: [<ffffffff81616
[ 6076.745780] PGD 0
[ 6076.748641] Oops: 0000 [#1] SMP
[ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich intel_rapl x86_pkg_
[ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic #63-Ubuntu
[ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 03/07/2013
[ 6076.872104] task: ffff880223841800 ti: ffff880223848000 task.ti: ffff880223848000
[ 6076.882722] RIP: 0010:[<
[ 6076.894243] RSP: 0018:ffff880227
[ 6076.901769] RAX: 0000000000000646 RBX: ffff88021f03f000 RCX: ffff8801ed4fff00
[ 6076.911893] RDX: 0000000000000646 RSI: 00000000000000c2 RDI: ffffea0007f6de00
[ 6076.971665] RBP: ffff880227263858 R08: 000000000000fff6 R09: 0000000000000001
[ 6077.031463] R10: ffff88021f03e800 R11: 0000000000010552 R12: ffff8801fdb1fc80
[ 6077.091313] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000646
[ 6077.151619] FS: 000000000000000
[ 6077.262424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 6077.320083] CR2: 000000000000006c CR3: 0000000001c0e000 CR4: 00000000000407e0
[ 6077.379854] Stack:
[ 6077.433555] ffffffff811a48f9 ffff8802272772c0 000000000000fff6 ffffffffffff000a
[ 6077.546280] ffffffff00010552 000000000000006a ffff88021f03e800 0000000100000020
[ 6077.658915] ffffffffffffffe4 0000000000010012 0000001c0000055c ffff88021f03f000
[ 6077.771400] Call Trace:
[ 6077.824494] <IRQ>
[ 6077.827251] [<ffffffff811a4
[ 6077.933211] [<ffffffff81681
[ 6077.988641] [<ffffffff81691
[ 6078.043154] [<ffffffff810a5
[ 6078.097358] [<ffffffff81623
[ 6078.150464] [<ffffffff816a0
[ 6078.202321] [<ffffffff81098
[ 6078.255348] [<ffffffff81691
[ 6078.306129] [<ffffffff8109a
[ 6078.355712] [<ffffffff81623
[ 6078.404660] [<ffffffff81624
[ 6078.452918] [<ffffffff81624
[ 6078.501057] [<ffffffff81643
[ 6078.548821] [<ffffffff81624
[ 6078.596793] [<ffffffff81624
[ 6078.644041] [<ffffffff8162b
[ 6078.691822] [<ffffffff8165d
[ 6078.739211] [<ffffffff8165e
[ 6078.784448] [<ffffffff8165a
[ 6078.830211] [<ffffffff8165a
[ 6078.874484] [<ffffffff81658
[ 6078.918046] [<ffffffff81659
[ 6078.959829] [<ffffffff81622
[ 6079.003064] [<ffffffff8101b
[ 6079.045844] [<ffffffff81622
[ 6079.086823] [<ffffffff81622
[ 6079.126412] [<ffffffff81622
[ 6079.164669] [<ffffffff81623
[ 6079.203193] [<ffffffff81623
[ 6079.242062] [<ffffffffa00d8
[ 6079.281003] [<ffffffffa00d8
[ 6079.319178] [<ffffffff81623
[ 6079.356843] [<ffffffff8106c
[ 6079.394099] [<ffffffff8106d
[ 6079.430844] [<ffffffff81731
[ 6079.466888] [<ffffffff81726
[ 6079.503660] <EOI>
[ 6079.506415] [<ffffffff815d1
[ 6079.573717] [<ffffffff815d1
[ 6079.611376] [<ffffffff8101c
[ 6079.648243] [<ffffffff810be
[ 6079.685771] [<ffffffff81041
[ 6079.723121] Code: 4c 24 60 eb 21 0f 1f 80 00 00 00 00 41 83 c5 01 49 83 c4 10 48 83 c1 10 41 39 c3 0f 86 83 01 00 00 41 89 c7 89 c2 45 39 e9 7f 37 <41> 8b 46 6c 41 39 46 68 0f 85 75 03 00 00 45 8b a6 cc 00 00 00
[ 6079.844842] RIP [<ffffffff81616
[ 6079.885283] RSP <ffff880227263790>
[ 6079.922830] CR2: 000000000000006c
[ 6080.024035] ---[ end trace 6e658236aae2d239 ]---
[ 6080.065884] Kernel panic - not syncing: Fatal exception in interrupt
ethtool -k port1
Features for port1:
rx-checksumming: on
tx-checksumming: on
scatter-gather: on
tcp-segmentatio
udp-fragmentati
generic-
generic-
large-receive-
rx-vlan-offload: on [fixed]
tx-vlan-offload: on [fixed]
ntuple-filters: off [fixed]
receive-hashing: off [fixed]
highdma: on
rx-vlan-filter: off [fixed]
vlan-challenged: off [fixed]
tx-lockless: off [fixed]
netns-local: off [fixed]
tx-gso-robust: off [fixed]
tx-fcoe-
tx-gre-
tx-ipip-
tx-sit-
tx-udp_
tx-mpls-
fcoe-mtu: off [fixed]
tx-nocache-copy: on
loopback: off [fixed]
rx-fcs: off [fixed]
rx-all: off [fixed]
tx-vlan-
rx-vlan-
rx-vlan-
l2-fwd-offload: off [fixed]
Changed in linux (Ubuntu Trusty): | |
status: | New → Confirmed |
importance: | Undecided → High |
Changed in linux (Ubuntu Utopic): | |
status: | Confirmed → Fix Released |
importance: | High → Undecided |
Changed in linux (Ubuntu Trusty): | |
status: | Confirmed → Fix Committed |
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1377851
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.