← Back to team overview

firmware-testing-team team mailing list archive

[Bug 1052735] Re: kernel oops on scp large file

 

** Patch added: "0001-UBUNTU-Config-Remove-CONFIG_NET_SKB_RECYCLE.patch"
   https://bugs.launchpad.net/ubuntu/+source/linux-armadaxp/+bug/1052735/+attachment/3340895/+files/0001-UBUNTU-Config-Remove-CONFIG_NET_SKB_RECYCLE.patch

** Changed in: hwe-eilt
       Status: In Progress => Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
       Status: In Progress => Fix Committed

** Changed in: eilt
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Firmware
Testing Team, which is subscribed to Canonical HWE Projects.
https://bugs.launchpad.net/bugs/1052735

Title:
  kernel oops on scp large file

Status in The Eilt project:
  Fix Committed
Status in Canonical HWE Eilt:
  Fix Committed
Status in “linux-armadaxp” package in Ubuntu:
  Fix Committed
Status in “linux-armadaxp” source package in Quantal:
  Fix Committed

Bug description:
  This is based on 3.5 based kernel at
  http://kernel.ubuntu.com/git?p=hwe/ubuntu-quantal-
  armadaxp.git;a=summary

  When scp a large file into armadaxp system, console shows kernel oops.

  [10395.086252] ------------[ cut here ]------------
  [10395.090894] Kernel BUG at c00ede34 [verbose debug info unavailable]
  [10395.097178] Internal error: Oops - BUG: 0 [#1] SMP ARM
  [10395.102329] Modules linked in: dm_multipath dm_raid45 dm_mirror dm_region_hash dm_log
  [10395.110256] CPU: 0    Not tainted  (3.5.0-1600-armadaxp #2)
  [10395.115850] PC is at kfree+0x58/0xac
  [10395.119438] LR is at skb_free_head+0x4c/0x54
  [10395.123722] pc : [<c00ede34>]    lr : [<c05201a4>]    psr: 40070093
  [10395.123722] sp : eb225d30  ip : eb225d50  fp : eb225d4c
  [10395.135230] r10: ebaf239c  r9 : eb224000  r8 : 00000b50
  [10395.140469] r7 : 00000770  r6 : eb0ab000  r5 : a0070013  r4 : eb0a3480
  [10395.147014] r3 : c18d3560  r2 : 00000000  r1 : 0002b0ab  r0 : eb0ab000
  [10395.153559] Flags: nZcv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment user
  [10395.160801] Control: 10c53c7d  Table: 2b12806a  DAC: 00000015
  [10395.166563] Process sshd (pid: 8662, stack limit = 0xeb2242f0)
  [10395.172412] Stack: (0xeb225d30 to 0xeb226000)
  [10395.176783] 5d20:                                     00000000 eb0a3480 00000001 eb0a3480
  [10395.184986] 5d40: eb225d5c eb225d50 c05201a4 c00edde8 eb225d74 eb225d60 c0520398 c0520164
  [10395.193189] 5d60: ebaf2040 00003890 eb225ddc eb225d78 c05732e0 c05201b8 ef3404f8 ef2a8040
  [10395.201391] 5d80: 00000000 ef3404c0 00000000 ebaf2088 00000000 00000000 00000000 00000001
  [10395.209594] 5da0: 00000000 eb225e40 eb225de4 00000000 ef2a8040 eb225e40 00004000 eb225ea0
  [10395.217797] 5dc0: eec6c6c0 eb225e20 00000040 eb225e40 eb225e14 eb225de0 c0592030 c0572ad8
  [10395.226000] 5de0: 00000040 00000000 eb225df4 eb225df8 c02f872c 00000000 eb225e14 00000000
  [10395.234202] 5e00: 00004000 eb225ea0 eb225e8c eb225e18 c0519190 c0591fb0 00000040 00000000
  [10395.242405] 5e20: ec76e680 00000001 00000040 00004000 eec6c6c0 ec4c1000 00000000 eb225e40
  [10395.250607] 5e40: 00000000 00000000 eb225e98 00000001 00000000 00000000 00000040 eb225ea0
  [10395.258810] 5e60: ef2a8078 00000000 00000000 eb225f78 ec71d6c0 00004000 eb224000 00000000
  [10395.267012] 5e80: eb225f3c eb225e90 c00f7bb4 c0519070 00000000 00000000 bef62b64 00000770
  [10395.275214] 5ea0: 00000000 00000000 00000000 00000001 ffffffff ec71d6c0 00000000 00000000
  [10395.283416] 5ec0: 00000000 00000000 ef2a8040 eb225ed8 00000000 00000000 00000000 00000000
  [10395.291619] 5ee0: eb225e20 00000000 00004000 00004000 00004000 eb225f00 c00f8140 c02c376c
  [10395.299822] 5f00: ef2a8040 ef3404c0 eb224000 c08db9e8 eb225f34 eb225f20 ec71d6c0 bef5f2d4
  [10395.308025] 5f20: ec71d6c0 bef5f2d4 00004000 eb225f78 eb225f6c eb225f40 c00f8670 c00f7b20
  [10395.316228] 5f40: eb225f9c eb225f50 c06540c0 00000000 00000000 ec71d6c0 bef5f2d4 00004000
  [10395.324430] 5f60: eb225fa4 eb225f70 c00f877c c00f85c4 000000d3 00000000 00000000 00000000
  [10395.332633] 5f80: b6fb3f50 00000003 bef5f2d0 b6f54f10 00000003 c000db88 00000000 eb225fa8
  [10395.340835] 5fa0: c000d9c0 c00f8748 00000003 bef5f2d0 00000003 bef5f2d4 00004000 bef5f2d0
  [10395.349038] 5fc0: 00000003 bef5f2d0 b6f54f10 00000003 b6faf87c b6f965a8 000021c3 b8946bd0
  [10395.357240] 5fe0: 00000000 bef5f2bc b6f78f37 b6c522fc 40070010 00000003 00000000 00000000
  [10395.365437] Backtrace: 
  [10395.367908] [<c00edddc>] (kfree+0x0/0xac) from [<c05201a4>] (skb_free_head+0x4c/0x54)
  [10395.375758]  r6:eb0a3480 r5:00000001 r4:eb0a3480 r3:00000000
  [10395.381486] [<c0520158>] (skb_free_head+0x0/0x54) from [<c0520398>] (__kfree_skb+0x1ec/0x2c4)
  [10395.390039] [<c05201ac>] (__kfree_skb+0x0/0x2c4) from [<c05732e0>] (tcp_recvmsg+0x814/0xb24)
  [10395.398497]  r5:00003890 r4:ebaf2040
  [10395.402113] [<c0572acc>] (tcp_recvmsg+0x0/0xb24) from [<c0592030>] (inet_recvmsg+0x8c/0xa4)
  [10395.410495] [<c0591fa4>] (inet_recvmsg+0x0/0xa4) from [<c0519190>] (sock_aio_read+0x12c/0x154)
  [10395.419127]  r6:eb225ea0 r5:00004000 r4:00000000
  [10395.423799] [<c0519064>] (sock_aio_read+0x0/0x154) from [<c00f7bb4>] (do_sync_read+0xa0/0xe0)
  [10395.432350] [<c00f7b14>] (do_sync_read+0x0/0xe0) from [<c00f8670>] (vfs_read+0xb8/0x184)
  [10395.440460]  r7:eb225f78 r6:00004000 r5:bef5f2d4 r4:ec71d6c0
  [10395.446188] [<c00f85b8>] (vfs_read+0x0/0x184) from [<c00f877c>] (sys_read+0x40/0x74)
  [10395.453949]  r8:00004000 r7:bef5f2d4 r6:ec71d6c0 r5:00000000 r4:00000000
  [10395.460736] [<c00f873c>] (sys_read+0x0/0x74) from [<c000d9c0>] (ret_fast_syscall+0x0/0x30)
  [10395.469021]  r8:c000db88 r7:00000003 r6:b6f54f10 r5:bef5f2d0 r4:00000003
  [10395.475804] Code: 1593301c e5932000 e3120080 1a000000 (e7f001f2) 
  [10395.482005] ---[ end trace f327461be6edf7de ]---

  This bug only affect 3.5 based kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/eilt/+bug/1052735/+subscriptions


References