Sadly it died with this crash:

[Tue May 28 14:46:58 2019] ib0: enabling connected mode will cause multicast 
packet drops
[Tue May 28 14:46:58 2019] ib0: mtu > 4092 will cause multicast packet drops.
[Tue May 28 14:46:58 2019] IPv6: ADDRCONF(NETDEV_CHANGE): ib0: link becomes 
ready
[Tue May 28 14:46:58 2019] bpfilter: Loaded bpfilter_umh pid 1578
[Tue May 28 14:47:00 2019] igb 0000:07:00.0 enp7s0f0: igb: enp7s0f0 NIC Link is 
Up 1000 Mbps Full Duplex, Flow Control: RX/TX
[Tue May 28 14:47:00 2019] IPv6: ADDRCONF(NETDEV_CHANGE): enp7s0f0: link 
becomes ready
[Tue May 28 14:47:02 2019] new mount options do not match the existing 
superblock, will be ignored
[Tue May 28 14:47:26 2019] FS-Cache: Loaded
[Tue May 28 14:47:26 2019] FS-Cache: Netfs 'nfs' registered for caching
[Tue May 28 14:47:26 2019] NFS: Registering the id_resolver key type
[Tue May 28 14:47:26 2019] Key type id_resolver registered
[Tue May 28 14:47:26 2019] Key type id_legacy registered
[Tue May 28 15:33:23 2019] perf: interrupt took too long (2514 > 2500), 
lowering kernel.perf_event_max_sample_rate to 79500
[Tue May 28 16:13:30 2019] perf: interrupt took too long (3145 > 3142), 
lowering kernel.perf_event_max_sample_rate to 63500
[Tue May 28 16:38:47 2019] perf: interrupt took too long (3949 > 3931), 
lowering kernel.perf_event_max_sample_rate to 50500
[Tue May 28 16:54:39 2019] general protection fault: 0000 [#1] SMP PTI
[Tue May 28 16:54:39 2019] CPU: 23 PID: 153 Comm: ksoftirqd/23 Not tainted 
5.0.0-15-generic #16~18.04.1-Ubuntu
[Tue May 28 16:54:39 2019] Hardware name: Intel Corporation 
S2600TPFR/S2600TPFR, BIOS SE5C610.86B.01.01.0014.121820151719 12/18/2015
[Tue May 28 16:54:39 2019] RIP: 0010:kmem_cache_alloc_node+0x11d/0x200
[Tue May 28 16:54:39 2019] Code: 4d 89 f9 0f 84 59 ff ff ff 4c 89 ff e8 ac d3 
01 00 49 89 c1 e9 49 ff ff ff 41 8b 59 20 49 8b 39 48 8d 4a 01 4c 89 f0 4c 01 
f3 <48> 33 1b 49 33 99 38 01 00 00 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84
[Tue May 28 16:54:39 2019] RSP: 0018:ffff9c9cc6943a48 EFLAGS: 00010202
[Tue May 28 16:54:39 2019] RAX: 147c86247f800c6b RBX: 147c86247f800c6b RCX: 
000000000022a6f9
[Tue May 28 16:54:39 2019] RDX: 000000000022a6f8 RSI: 0000000000480020 RDI: 
00000000000293b0
[Tue May 28 16:54:39 2019] RBP: ffff9c9cc6943a80 R08: ffff91915fbe93b0 R09: 
ffff91915b41d380
[Tue May 28 16:54:39 2019] R10: 0000000000000011 R11: ffff91915f4001d0 R12: 
0000000000480020
[Tue May 28 16:54:39 2019] R13: 00000000ffffffff R14: 147c86247f800c6b R15: 
ffff91915b41d380
[Tue May 28 16:54:39 2019] FS:  0000000000000000(0000) 
GS:ffff91915fbc0000(0000) knlGS:0000000000000000
[Tue May 28 16:54:39 2019] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[Tue May 28 16:54:39 2019] CR2: 00007fb784340000 CR3: 00000003c0a0e004 CR4: 
00000000001606e0
[Tue May 28 16:54:39 2019] Call Trace:
[Tue May 28 16:54:39 2019]  ? __alloc_skb+0x5b/0x1d0
[Tue May 28 16:54:39 2019]  __alloc_skb+0x5b/0x1d0
[Tue May 28 16:54:39 2019]  skb_segment+0x24d/0xd40
[Tue May 28 16:54:39 2019]  ? skb_send_sock_locked+0x280/0x280
[Tue May 28 16:54:39 2019]  ? reqsk_fastopen_remove+0x150/0x150
[Tue May 28 16:54:39 2019]  tcp_gso_segment+0xee/0x520
[Tue May 28 16:54:39 2019]  ? tcp_event_new_data_sent+0xa0/0xa0
[Tue May 28 16:54:39 2019]  tcp4_gso_segment+0x54/0xc0
[Tue May 28 16:54:39 2019]  inet_gso_segment+0x15d/0x3b0
[Tue May 28 16:54:39 2019]  skb_mac_gso_segment+0xad/0x110
[Tue May 28 16:54:39 2019]  __skb_gso_segment+0xc4/0x1a0
[Tue May 28 16:54:39 2019]  validate_xmit_skb+0x161/0x2f0
[Tue May 28 16:54:39 2019]  validate_xmit_skb_list+0x4b/0x70
[Tue May 28 16:54:39 2019]  sch_direct_xmit+0xd5/0x390
[Tue May 28 16:54:39 2019]  __qdisc_run+0x149/0x4f0
[Tue May 28 16:54:39 2019]  ? net_rx_action+0x231/0x3a0
[Tue May 28 16:54:39 2019]  net_tx_action+0x10d/0x220
[Tue May 28 16:54:39 2019]  __do_softirq+0xe4/0x2f3
[Tue May 28 16:54:39 2019]  run_ksoftirqd+0x2b/0x40
[Tue May 28 16:54:39 2019]  smpboot_thread_fn+0xfc/0x170
[Tue May 28 16:54:39 2019]  kthread+0x121/0x140
[Tue May 28 16:54:39 2019]  ? sort_range+0x30/0x30
[Tue May 28 16:54:39 2019]  ? kthread_park+0x90/0x90
[Tue May 28 16:54:39 2019]  ret_from_fork+0x35/0x40
[Tue May 28 16:54:39 2019] Modules linked in: auth_rpcgss nfsv4 nfs lockd grace 
fscache xt_tcpudp ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat xt_conntrack 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6table_filter ip6_tables 
iptable_filter bpfilter intel_rapl sb_edac x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm irqbypass intel_cstate ipmi_si intel_rapl_perf 
input_leds joydev ipmi_devintf ipmi_msghandler lpc_ich mei_me mei ioatdma 
acpi_power_meter acpi_pad mac_hid binfmt_misc sch_fq_codel ib_iser iscsi_tcp 
libiscsi_tcp libiscsi scsi_transport_iscsi 8021q garp mrp stp llc ib_ipoib 
ib_umad rdma_ucm rdma_cm iw_cm ib_cm mlx4_ib mlx4_core lp sunrpc parport 
ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid0 multipath 
linear mlx5_ib ib_uverbs ib_core raid1 crct10dif_pclmul mgag200 crc32_pclmul 
ttm hid_generic ghash_clmulni_intel drm_kms_helper syscopyarea sysfillrect 
aesni_intel sysimgblt mlx5_core
[Tue May 28 16:54:39 2019]  aes_x86_64 usbhid fb_sys_fops crypto_simd ixgbe tls 
ahci mxm_wmi igb cryptd xfrm_algo mlxfw drm hid glue_helper i2c_algo_bit 
libahci dca devlink mdio wmi
[Tue May 28 16:54:39 2019] ---[ end trace ce3e44cf7c9e00e8 ]---
[Tue May 28 16:54:39 2019] RIP: 0010:kmem_cache_alloc_node+0x11d/0x200
[Tue May 28 16:54:39 2019] Code: 4d 89 f9 0f 84 59 ff ff ff 4c 89 ff e8 ac d3 
01 00 49 89 c1 e9 49 ff ff ff 41 8b 59 20 49 8b 39 48 8d 4a 01 4c 89 f0 4c 01 
f3 <48> 33 1b 49 33 99 38 01 00 00 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84
[Tue May 28 16:54:39 2019] RSP: 0018:ffff9c9cc6943a48 EFLAGS: 00010202
[Tue May 28 16:54:39 2019] RAX: 147c86247f800c6b RBX: 147c86247f800c6b RCX: 
000000000022a6f9
[Tue May 28 16:54:39 2019] RDX: 000000000022a6f8 RSI: 0000000000480020 RDI: 
00000000000293b0
[Tue May 28 16:54:39 2019] RBP: ffff9c9cc6943a80 R08: ffff91915fbe93b0 R09: 
ffff91915b41d380
[Tue May 28 16:54:39 2019] R10: 0000000000000011 R11: ffff91915f4001d0 R12: 
0000000000480020

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1778932

Title:
  rsync can trigger system crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1778932/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to