I've tested the proposed kernel under the previous test environment - after two hours the host was still up, where as it would have previously crashed within 30 minutes or so. As such, this appears to prevent the panic.
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1793753 Title: kernel panic - null pointer dereference on ipset operations Status in linux package in Ubuntu: Fix Released Status in linux source package in Xenial: Fix Released Bug description: == SRU Justification == A regression was introduced in Xenial, even prior to v4.4 Final. I did not test prior to this kernel once I found the bug was fixed in mainline. The bug reporter experienced crashes on machines running iptables using ipsets. He could get a trace from the console on one of them which is attached to the bug report. On these machines, some ipset commands are automatically run to update the sets, and/or to dump them (ipset restore, swap, delete ... / ipset save). I was able to reproduce this bug as was cking. This bug was found to be fixed by mainline commits 596cf3fe5854 and e5173418ac59. == Fixes == 596cf3fe5854 ("netfilter: ipset: fix race condition in ipset save, swap and delete") e5173418ac59 ("netfilter: ipset: Fix race between dump and swap") == Regression Potential == Low. This fixes a regression and is limited to netfilter. == Test Case == A test kernel was built with these patches and tested by myself and cking. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1793753/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp