[Bug 1883498] Re: Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-08-05 Thread Heikki Hannikainen
4.4.0-186 is already released. Both 4.4.0-185 and 4.4.0-186 contain the
fix for this issue and work fine for me, no crashes observed.

** Changed in: linux (Ubuntu Xenial)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883498] Re: Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-06-25 Thread Heikki Hannikainen
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883498] Re: Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-06-25 Thread Heikki Hannikainen
4.4.0-185 from xenial-proposed seems stable still. Any chance of
releasing it to mainline xenial soon, we have some other needs to run
upgrades and deploying proposed packages is a bit of a hassle for a
fleet of hundreds?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883498] Re: Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-06-24 Thread Heikki Hannikainen
I have deployed 4.4.0-185 from xenial-proposed to 6 VMs on Monday. No
crashes yet, so it seems to me that 4.4.0-185 is good and fixes this
issue. On 4.4.0-184 these ones crashed very frequently.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883498] Re: Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-06-18 Thread Heikki Hannikainen
I can deploy 4.4.0-185 from xenial-proposed for testing on Monday. The
fix looks good, I was already staring at
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?id=5d41ce29e3b91ef305f88d23f72b3359de329cec
which came in 4.4.0-184.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883498] Re: Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-06-15 Thread Heikki Hannikainen
Paste error in original report; the related-but-not-quite-the-same bug
was here: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883498] Re: Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-06-15 Thread Heikki Hannikainen
** Attachment added: "6 dmesg of #1883498 crashes on different VMs"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+attachment/5383933/+files/1883498-dmesgs-6.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883498] [NEW] Frequent Panic in ip6_expire_frag_queue->icmpv6_send on 4.4.0-184-generic

2020-06-15 Thread Heikki Hannikainen
Public bug reported:

I happened to do an upgrade on a number of servers last week. Some of
them got 4.4.0-179-generic and the ones upgraded a bit later during the
week got 4.4.0-184-generic as it was just released. The ones with
4.4.0-184-generic started getting stuck. With linux-crashdump installed
I obtained the dmesgs and crash dumps. The backtrace appears somewhat
similar to #202669 but that one only happened on bare hardware for us -
this one is on KVM virtual instances. #202669 paniced in
icmpv6_route_lookup and this one dies already in icmpv6_send.

Between 2020-06-11 and 2020-06-15, on a set of 12 VMs running
4.4.0-184-generic, there were 85 crashes like this, on servers with
noticeable IPv6 traffic. All of the 12 VMs with 4.4.0-184-generic
crashed at least once. (There are more than 12 VMs experiencing this,
this is just the set I had linux-crashdump on.)

[57063.487084] BUG: unable to handle kernel NULL pointer dereference at 
0018
[57063.487184] IP: [] icmp6_send+0x1fb/0x970
[57063.487218] PGD 0 
[57063.487231] Oops:  [#1] SMP 
[57063.488665] Call Trace:
[57063.488679]   
[57063.488705]  [] ? __netif_receive_skb+0x18/0x60
[57063.488739]  [] ? task_tick_fair+0x4c8/0x8e0
[57063.488771]  [] ? _raw_spin_unlock_bh+0x20/0x50
[57063.488802]  [] icmpv6_send+0x21/0x30
[57063.488829]  [] ip6_expire_frag_queue+0x115/0x1b0
[57063.488862]  [] ? nf_ct_net_exit+0x50/0x50 [nf_defrag_ipv6]
[57063.488897]  [] nf_ct_frag6_expire+0x1f/0x30 
[nf_defrag_ipv6]
[57063.488937]  [] call_timer_fn+0x37/0x140
[57063.488965]  [] ? nf_ct_net_exit+0x50/0x50 [nf_defrag_ipv6]
[57063.489002]  [] run_timer_softirq+0x234/0x330
...

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883498

Title:
  Frequent Panic in ip6_expire_frag_queue->icmpv6_send on
  4.4.0-184-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1833400] Re: named crashes on REQUIRE((disp->attributes assert

2019-08-06 Thread Heikki Hannikainen
Hello, as I wrote in my original ticket description above, bind9
packages were not updated at this time; the crash did *not* happen on
shutdown.

However, the named process on each server crashed exactly once. There
were 0 crashes in July or August. So, I'm afraid, I can't reproduce
this.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1833400

Title:
  named crashes on REQUIRE((disp->attributes assert

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/1833400/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-06-20 Thread Heikki Hannikainen
I deployed the actual -proposed kernel 4.4.0-152.179 on 4 servers, and
it is stable for us. Previously there were multiple crashes per day.
Confirming, verification done. Thank you!

** Tags added: amd64 apport-bug apport-collected xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1833400] [NEW] named crashes on REQUIRE((disp->attributes assert

2019-06-19 Thread Heikki Hannikainen
Public bug reported:

Ubuntu xenial 16.04, bind9 1:9.10.3.dfsg.P4-8ubuntu1.14

Yesterday the named process started crashing frequently, 49 crashes so
far on 49 different servers around the world (one crash each!). We did
run OS upgrades yesterday, but bind9 packages were not updated at this
time. This particular bind9 package version was mostly deployed out last
month. Due to the sudden surge of crashes and the distribution I'm
suspecting this might be triggered remotely by an incoming packet.

Backtrace from the assert:

2019-06-18T21:42:16.801421+00:00 hostname named[888]: general: critical: 
../../../lib/dns/dispatch.c:3691: REQUIRE((disp->attributes & 0x0020U) != 
0) failed, back trace
2019-06-18T21:42:16.801890+00:00 hostname named[888]: general: critical: #0 
0x555c41aeeaf0 in ??
2019-06-18T21:42:16.802118+00:00 hostname named[888]: general: critical: #1 
0x7f475bd66eaa in ??
2019-06-18T21:42:16.802315+00:00 hostname named[888]: general: critical: #2 
0x7f475ca9f7da in ??
2019-06-18T21:42:16.802496+00:00 hostname named[888]: general: critical: #3 
0x555c41ae3195 in ??
2019-06-18T21:42:16.802684+00:00 hostname named[888]: general: critical: #4 
0x7f475bd8b420 in ??
2019-06-18T21:42:16.802875+00:00 hostname named[888]: general: critical: #5 
0x7f475b7346ba in ??
2019-06-18T21:42:16.803056+00:00 hostname named[888]: general: critical: #6 
0x7f475ae7e41d in ??
2019-06-18T21:42:16.803245+00:00 hostname named[888]: general: critical: 
exiting (due to assertion failure)

** Affects: bind9 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1833400

Title:
  named crashes on REQUIRE((disp->attributes assert

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/1833400/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-06-05 Thread Heikki Hannikainen
I've now got the v4 debs on 5 servers, and not a single crash since they
were installed on each. Looks good to me. Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-05-31 Thread Heikki Hannikainen
Thanks, I deployed the v4 debs on one server which was particularly
unstable, and it's still up after 1 day and 8 hours now. I'll deploy
more widely on Monday and Tuesday.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1785171] Re: Intel I219-V Ethernet Interface on Ubuntu Linux Using e1000e Driver keeps Dropping Internet Connection

2019-05-27 Thread Heikki Hannikainen
I was experiencing this on multiple Ubuntu 18.04 servers with high UDP
workload, I219-LM Ethernet, 4.15.0-50-generic Ubuntu kernel. Many events
with "Detected Hardware Unit Hang" ... "Reset adapter unexpectedly" per
day per server. The workaround suggested by the hosting provider does
seem to help, 0 resets seen after disabling TSO & GSO:

ethtool -K  tso off gso off

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1785171

Title:
  Intel I219-V Ethernet Interface on Ubuntu Linux Using e1000e Driver
  keeps Dropping Internet Connection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1785171/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-05-21 Thread Heikki Hannikainen
I've now got 6 crashes within past 24 hours on the #170+lp1824687v2
testing kernel on a *single* server. It's a production environment, so
I'll roll back for now. Two latest backtraces:

[ 6251.834160] Call Trace:
[ 6251.834166]  
[ 6251.834174]  [] skb_release_head_state+0x90/0xb0
[ 6251.834189]  [] skb_release_all+0x12/0x30
[ 6251.834203]  [] kfree_skb+0x32/0xa0
[ 6251.834798]  [] inet_frag_destroy+0x7e/0x100
[ 6251.835388]  [] ? nf_ct_net_exit+0x50/0x50 [nf_defrag_ipv6]
[ 6251.835979]  [] ip6_expire_frag_queue+0x102/0x110
[ 6251.836562]  [] nf_ct_frag6_expire+0x1f/0x30 
[nf_defrag_ipv6]
[ 6251.837154]  [] call_timer_fn+0x37/0x140
[ 6251.837746]  [] ? nf_ct_net_exit+0x50/0x50 [nf_defrag_ipv6]
[ 6251.838350]  [] run_timer_softirq+0x234/0x330
[ 6251.838961]  [] __do_softirq+0x109/0x2b0
[ 6251.839574]  [] irq_exit+0xa5/0xb0
[ 6251.840192]  [] smp_apic_timer_interrupt+0x50/0x70
[ 6251.843313]  [] apic_timer_interrupt+0xcc/0xe0
[ 6251.843944]  
[ 6251.843952]  [] ? kfree_skbmem+0x59/0x60
[ 6251.845153]  [] ? __fsnotify_parent+0x5d/0x130
[ 6251.845744]  [] vfs_read+0xfb/0x130
[ 6251.846316]  [] SyS_read+0x55/0xc0
[ 6251.846868]  [] entry_SYSCALL_64_fastpath+0x22/0xcb

[ 1037.665436] Call Trace:
[ 1037.665442]   
[ 1037.665452]  [] nf_skb_free+0x17/0x20 [nf_defrag_ipv6]
[ 1037.665469]  [] inet_frag_destroy+0x73/0x100
[ 1037.665484]  [] ? nf_ct_net_exit+0x50/0x50 [nf_defrag_ipv6]
[ 1037.665501]  [] ip6_expire_frag_queue+0x102/0x110
[ 1037.665516]  [] nf_ct_frag6_expire+0x1f/0x30 
[nf_defrag_ipv6]
[ 1037.665534]  [] call_timer_fn+0x37/0x140
[ 1037.665548]  [] ? nf_ct_net_exit+0x50/0x50 [nf_defrag_ipv6]
[ 1037.665569]  [] run_timer_softirq+0x234/0x330
[ 1037.665585]  [] __do_softirq+0x109/0x2b0
[ 1037.665598]  [] irq_exit+0xa5/0xb0
[ 1037.666290]  [] smp_apic_timer_interrupt+0x50/0x70
[ 1037.666929]  [] apic_timer_interrupt+0xcc/0xe0
[ 1037.667566]   
[ 1037.667578]  [] ? audit_unix_sk_addr+0x40/0x40
[ 1037.669394]  [] ? inet_recvmsg+0xb0/0xb0
[ 1037.670423]  [] ? inet_sendmsg+0x22/0xa0
[ 1037.671441]  [] sock_sendmsg+0x3e/0x50
[ 1037.672440]  [] sock_write_iter+0x85/0xf0
[ 1037.673409]  [] do_iter_readv_writev+0x6f/0xa0
[ 1037.674353]  [] do_readv_writev+0x18f/0x230
[ 1037.675273]  [] ? __vfs_read+0x29/0x40
[ 1037.676167]  [] vfs_writev+0x39/0x50
[ 1037.677035]  [] SyS_writev+0x59/0xf0
[ 1037.677873]  [] entry_SYSCALL_64_fastpath+0x22/0xcb

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-05-17 Thread Heikki Hannikainen
Unfortunately 4.4.0-144-generic #170+lp1824687v2 testing kernel still
crashes. I have 4 hardware instances running it now, there were 2 panics
(Australia, Sweden) within 24 hours. I installed linux-crashdump on them
after the first crash to get the panic logs reliably. Attached a log
from the second panic.

** Attachment added: "Stack trace of 2019-05-16 crash with lp1824687v2 test 
kernel"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+attachment/5264424/+files/dmesg.201905161604.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-05-15 Thread Heikki Hannikainen
Sorry for the delay. I'm back in the office now and deploying the test
kernel today to a few servers, and to additional ones tomorrow if it's
OK on the first ones.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-05-03 Thread Heikki Hannikainen
Thank you! I can test this on Monday, weekend is starting here in 2
minutes and this is not the greatest moment to start testing. :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-05-03 Thread Heikki Hannikainen
There is the kernel.org bug ticket which describes similar oopsing
through ip6_expire_frag_queue() in 4.9 and 4.19 kernels:
https://bugzilla.kernel.org/show_bug.cgi?id=202669

I also saw crashes on 4.15.0-48-generic on a server running the same
task; I don't have stack traces to show yet since they didn't get out to
the remote syslog server.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-04-29 Thread Heikki Hannikainen
kernel.org bug ticket, showing similar crashes on 4.9 and 4.19 kernels:
https://bugzilla.kernel.org/show_bug.cgi?id=202669

** Bug watch added: Linux Kernel Bug Tracker #202669
   https://bugzilla.kernel.org/show_bug.cgi?id=202669

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-04-29 Thread Heikki Hannikainen
** Attachment added: "5 kernel stack traces of crashes on 4.4.0-145 and -146, 
on 4 different hardware nodes"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+attachment/5260024/+files/hessu-ipv6_expire_frag_queue-crashes.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1824687] Re: 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue

2019-04-29 Thread Heikki Hannikainen
I have had this crash, with the ip6_expire_frag_queue stack trace, more
than 18 times since 2019-04-16 on more than 10 different servers in 8
different countries.  There have been some more crashes, but from these
ones the panic dump managed to go out to a remote syslog server where
it's easy to grep. Crash count by kernel version; these are on both
trusty and xenial:

2 crashes: 4.4.0-144-generic #170~14.04.1-Ubuntu
8 crashes: 4.4.0-145-generic #171-Ubuntu
8 crashes: 4.4.0-146-generic #172-Ubuntu

Downgrading to 4.4.0-143 now, as that build does not seem to have the
"ipv6: frags: rewrite ip6_expire_frag_queue()" change; it first appears
in 4.4.0-144-generic image.  I think by tomorrow it's clear whether that
kernel is stable as we're now having multiple crashes per day (last
crash 50 minutes ago).

These are routers running NAT & firewall & some applications, with
substantial IPv6 traffic.

Interestingly the crashes only happen on bare hardware. We have a much
larger number of VMs doing the same thing, most of them now running 
4.4.0-146, and none of them have crashed like this.  The hardware instances
do have a larger number of CPU cores, the VMs only have 2 or 4.

I am also seeing crashes on 4.15.0-48-generic hwe kernel running on xenial,
but no stack trace to show yet.

Attaching kernel stack trace file containing several crashes on various
servers (hessu-ipv6_expire_frag_queue-crashes.txt).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824687

Title:
  4.4.0-145-generic Kernel Panic  ip6_expire_frag_queue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824687/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1614953] Re: hw csum failure when IPv6 interfaces configured in netdev_rx_csum_fault+0x38/0x40

2017-03-27 Thread Heikki Hannikainen
I am currently getting these on 4.4.0-66, on 14.04LTS / trusty. Xen VM.
Unfortunately unable to migrate immediately to 16.04LTS (largish
platform with many custom packages built for the distribution). On the
3.13.0 kernels I don't get these, but would like to go to 4.4 due to
other fixes being present there.

Linux hostname 4.4.0-66-generic #87~14.04.1-Ubuntu SMP Fri Mar 3
17:32:36 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux

[0.171412] xen_netfront: Initialising Xen virtual ethernet driver

[134355.195249] : hw csum failure
[134355.195264] CPU: 0 PID: 1226 Comm: named Not tainted 4.4.0-66-generic 
#87~14.04.1-Ubuntu
[134355.195266]   88007b47bc20 813dc80c 

[134355.195270]  880005840b00 88007b47bc38 816ff14a 
0008
[134355.195272]  88007b47bc78 816f5b70 0004 
a9ab56547af5
[134355.195274] Call Trace:
[134355.195284]  [] dump_stack+0x63/0x87
[134355.195290]  [] netdev_rx_csum_fault+0x3a/0x40
[134355.195294]  [] skb_copy_and_csum_datagram_msg+0xd0/0xe0
[134355.195299]  [] udpv6_recvmsg+0x22f/0x6f0
[134355.195302]  [] inet_recvmsg+0x6f/0x80
[134355.195305]  [] sock_recvmsg+0x3b/0x50
[134355.195306]  [] ___sys_recvmsg+0xdb/0x1f0
[134355.195312]  [] ? get_futex_key+0x19d/0x280
[134355.195317]  [] ? 
__raw_callee_save___pv_queued_spin_unlock+0x11/0x20
[134355.195320]  [] ? futex_wake+0x81/0x150
[134355.195323]  [] ? do_futex+0xf4/0x520
[134355.195327]  [] ? finish_task_switch+0x7a/0x290
[134355.195330]  [] __sys_recvmsg+0x42/0x80
[134355.195332]  [] SyS_recvmsg+0x12/0x20
[134355.195335]  [] entry_SYSCALL_64_fastpath+0x16/0x75

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1614953

Title:
  hw csum failure when IPv6 interfaces configured in
  netdev_rx_csum_fault+0x38/0x40

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1614953/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1317811] Re: Dropped packets on EC2, xen_netfront: xennet: skb rides the rocket: x slots

2015-02-18 Thread Heikki Hannikainen
On the other hand, turning off scatter gather caused a rather constant
0.1% packet loss (transmit drops) in my setup (trusty on Xen). VPN
gateways, with NAT and firewalling, relatively high throughput at times.
Enabling scatter gather removes the constant small packet loss but then
I do get the rides the rocket events.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1317811

Title:
  Dropped packets on EC2, xen_netfront: xennet: skb rides the rocket: x
  slots

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317811/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1317811] Re: Dropped packets on EC2, xen_netfront: xennet: skb rides the rocket: x slots

2015-02-17 Thread Heikki Hannikainen
Since yesterday morning I've had 3.13.0-46.75 running on 6 VMs. Those
VMs haven't had any xen_netfront: xennet: skb rides the rocket
messages. Meanwhile, 8 other VMs with 3.13.0-44 did have these errors.

So, looks good to me. Not absolute proof, but looks good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1317811

Title:
  Dropped packets on EC2, xen_netfront: xennet: skb rides the rocket: x
  slots

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317811/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1317811] Re: Dropped packets on EC2, xen_netfront: xennet: skb rides the rocket: x slots

2015-02-16 Thread Heikki Hannikainen
Installed 3.13.0-46.75 on 6 VMs which exhibited this problem daily. I'll
confirm tomorrow evening, if it's gone away.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1317811

Title:
  Dropped packets on EC2, xen_netfront: xennet: skb rides the rocket: x
  slots

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317811/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 871665] [NEW] Mouse pointer does not move correctly from a screen to another in a dual-head config - jumps too far

2011-10-10 Thread Heikki Hannikainen
Public bug reported:

I have two displays on my Ubuntu 10.04 LTS system, ATI Radeon RV620 LE,
configured as individual screens (no xinerama). One is new and wide-
screen, 1920x1200, and the other is older, running in 1600x1200.

When I move the mouse cursor over the right edge of the left (1920x1200)
screen, it appears on the right screen (1600x1200), but not at it's left
edge, but at quite exactly 320 pixels (1920-1600!) away from the left
edge. The same happens when I move the cursor back to the left screen -
the cursor appears 320 pixels away from it's right edge. Here's a little
video which shows the effect:

http://www.youtube.com/watch?v=luk00_3XTpU

The offset is quite exactly 320 pixels (I verified by creating a 320px
wide image in gimp and using it as a scale in 1:1 mode).

I am not sure which package I should point to, xorg, xserver-xorg-video-
ati, or compiz. The problem appeared when I last upgraded to a new
Ubuntu release, it used to work fine before that.

ProblemType: Bug
DistroRelease: Ubuntu 10.04
Package: xserver-xorg 1:7.5+5ubuntu1
ProcVersionSignature: Ubuntu 2.6.32-34.77-generic 2.6.32.44+drm33.19
Uname: Linux 2.6.32-34-generic x86_64
NonfreeKernelModules: fglrx
Architecture: amd64
Date: Mon Oct 10 12:42:29 2011
InstallationMedia: Ubuntu 9.10 Karmic Koala - Release amd64 (20091027)
MachineType: Dell Inc. OptiPlex 760
ProcCmdLine: BOOT_IMAGE=/boot/vmlinuz-2.6.32-34-generic 
root=UUID=971fd32d-b5fd-4a21-aed6-d9a2ff1f8a48 ro quiet splash
ProcEnviron:
 PATH=(custom, user)
 LANG=en_US.utf8
 SHELL=/bin/bash
SourcePackage: xorg
dmi.bios.date: 08/17/2009
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A05
dmi.board.name: 0M858N
dmi.board.vendor: Dell Inc.
dmi.board.version: A01
dmi.chassis.type: 6
dmi.chassis.vendor: Dell Inc.
dmi.modalias: 
dmi:bvnDellInc.:bvrA05:bd08/17/2009:svnDellInc.:pnOptiPlex760:pvr:rvnDellInc.:rn0M858N:rvrA01:cvnDellInc.:ct6:cvr:
dmi.product.name: OptiPlex 760
dmi.sys.vendor: Dell Inc.
system:
 distro: Ubuntu
 codename:   lucid
 architecture:   x86_64
 kernel: 2.6.32-34-generic

** Affects: xorg (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug lucid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/871665

Title:
  Mouse pointer does not move correctly from a screen to another in a
  dual-head config - jumps too far

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/871665/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 871665] Re: Mouse pointer does not move correctly from a screen to another in a dual-head config - jumps too far

2011-10-10 Thread Heikki Hannikainen
-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/871665

Title:
  Mouse pointer does not move correctly from a screen to another in a
  dual-head config - jumps too far

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/871665/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs