Sadly it died with this crash: [Tue May 28 14:46:58 2019] ib0: enabling connected mode will cause multicast packet drops [Tue May 28 14:46:58 2019] ib0: mtu > 4092 will cause multicast packet drops. [Tue May 28 14:46:58 2019] IPv6: ADDRCONF(NETDEV_CHANGE): ib0: link becomes ready [Tue May 28 14:46:58 2019] bpfilter: Loaded bpfilter_umh pid 1578 [Tue May 28 14:47:00 2019] igb 0000:07:00.0 enp7s0f0: igb: enp7s0f0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX/TX [Tue May 28 14:47:00 2019] IPv6: ADDRCONF(NETDEV_CHANGE): enp7s0f0: link becomes ready [Tue May 28 14:47:02 2019] new mount options do not match the existing superblock, will be ignored [Tue May 28 14:47:26 2019] FS-Cache: Loaded [Tue May 28 14:47:26 2019] FS-Cache: Netfs 'nfs' registered for caching [Tue May 28 14:47:26 2019] NFS: Registering the id_resolver key type [Tue May 28 14:47:26 2019] Key type id_resolver registered [Tue May 28 14:47:26 2019] Key type id_legacy registered [Tue May 28 15:33:23 2019] perf: interrupt took too long (2514 > 2500), lowering kernel.perf_event_max_sample_rate to 79500 [Tue May 28 16:13:30 2019] perf: interrupt took too long (3145 > 3142), lowering kernel.perf_event_max_sample_rate to 63500 [Tue May 28 16:38:47 2019] perf: interrupt took too long (3949 > 3931), lowering kernel.perf_event_max_sample_rate to 50500 [Tue May 28 16:54:39 2019] general protection fault: 0000 [#1] SMP PTI [Tue May 28 16:54:39 2019] CPU: 23 PID: 153 Comm: ksoftirqd/23 Not tainted 5.0.0-15-generic #16~18.04.1-Ubuntu [Tue May 28 16:54:39 2019] Hardware name: Intel Corporation S2600TPFR/S2600TPFR, BIOS SE5C610.86B.01.01.0014.121820151719 12/18/2015 [Tue May 28 16:54:39 2019] RIP: 0010:kmem_cache_alloc_node+0x11d/0x200 [Tue May 28 16:54:39 2019] Code: 4d 89 f9 0f 84 59 ff ff ff 4c 89 ff e8 ac d3 01 00 49 89 c1 e9 49 ff ff ff 41 8b 59 20 49 8b 39 48 8d 4a 01 4c 89 f0 4c 01 f3 <48> 33 1b 49 33 99 38 01 00 00 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84 [Tue May 28 16:54:39 2019] RSP: 0018:ffff9c9cc6943a48 EFLAGS: 00010202 [Tue May 28 16:54:39 2019] RAX: 147c86247f800c6b RBX: 147c86247f800c6b RCX: 000000000022a6f9 [Tue May 28 16:54:39 2019] RDX: 000000000022a6f8 RSI: 0000000000480020 RDI: 00000000000293b0 [Tue May 28 16:54:39 2019] RBP: ffff9c9cc6943a80 R08: ffff91915fbe93b0 R09: ffff91915b41d380 [Tue May 28 16:54:39 2019] R10: 0000000000000011 R11: ffff91915f4001d0 R12: 0000000000480020 [Tue May 28 16:54:39 2019] R13: 00000000ffffffff R14: 147c86247f800c6b R15: ffff91915b41d380 [Tue May 28 16:54:39 2019] FS: 0000000000000000(0000) GS:ffff91915fbc0000(0000) knlGS:0000000000000000 [Tue May 28 16:54:39 2019] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Tue May 28 16:54:39 2019] CR2: 00007fb784340000 CR3: 00000003c0a0e004 CR4: 00000000001606e0 [Tue May 28 16:54:39 2019] Call Trace: [Tue May 28 16:54:39 2019] ? __alloc_skb+0x5b/0x1d0 [Tue May 28 16:54:39 2019] __alloc_skb+0x5b/0x1d0 [Tue May 28 16:54:39 2019] skb_segment+0x24d/0xd40 [Tue May 28 16:54:39 2019] ? skb_send_sock_locked+0x280/0x280 [Tue May 28 16:54:39 2019] ? reqsk_fastopen_remove+0x150/0x150 [Tue May 28 16:54:39 2019] tcp_gso_segment+0xee/0x520 [Tue May 28 16:54:39 2019] ? tcp_event_new_data_sent+0xa0/0xa0 [Tue May 28 16:54:39 2019] tcp4_gso_segment+0x54/0xc0 [Tue May 28 16:54:39 2019] inet_gso_segment+0x15d/0x3b0 [Tue May 28 16:54:39 2019] skb_mac_gso_segment+0xad/0x110 [Tue May 28 16:54:39 2019] __skb_gso_segment+0xc4/0x1a0 [Tue May 28 16:54:39 2019] validate_xmit_skb+0x161/0x2f0 [Tue May 28 16:54:39 2019] validate_xmit_skb_list+0x4b/0x70 [Tue May 28 16:54:39 2019] sch_direct_xmit+0xd5/0x390 [Tue May 28 16:54:39 2019] __qdisc_run+0x149/0x4f0 [Tue May 28 16:54:39 2019] ? net_rx_action+0x231/0x3a0 [Tue May 28 16:54:39 2019] net_tx_action+0x10d/0x220 [Tue May 28 16:54:39 2019] __do_softirq+0xe4/0x2f3 [Tue May 28 16:54:39 2019] run_ksoftirqd+0x2b/0x40 [Tue May 28 16:54:39 2019] smpboot_thread_fn+0xfc/0x170 [Tue May 28 16:54:39 2019] kthread+0x121/0x140 [Tue May 28 16:54:39 2019] ? sort_range+0x30/0x30 [Tue May 28 16:54:39 2019] ? kthread_park+0x90/0x90 [Tue May 28 16:54:39 2019] ret_from_fork+0x35/0x40 [Tue May 28 16:54:39 2019] Modules linked in: auth_rpcgss nfsv4 nfs lockd grace fscache xt_tcpudp ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6table_filter ip6_tables iptable_filter bpfilter intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm irqbypass intel_cstate ipmi_si intel_rapl_perf input_leds joydev ipmi_devintf ipmi_msghandler lpc_ich mei_me mei ioatdma acpi_power_meter acpi_pad mac_hid binfmt_misc sch_fq_codel ib_iser iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi 8021q garp mrp stp llc ib_ipoib ib_umad rdma_ucm rdma_cm iw_cm ib_cm mlx4_ib mlx4_core lp sunrpc parport ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid0 multipath linear mlx5_ib ib_uverbs ib_core raid1 crct10dif_pclmul mgag200 crc32_pclmul ttm hid_generic ghash_clmulni_intel drm_kms_helper syscopyarea sysfillrect aesni_intel sysimgblt mlx5_core [Tue May 28 16:54:39 2019] aes_x86_64 usbhid fb_sys_fops crypto_simd ixgbe tls ahci mxm_wmi igb cryptd xfrm_algo mlxfw drm hid glue_helper i2c_algo_bit libahci dca devlink mdio wmi [Tue May 28 16:54:39 2019] ---[ end trace ce3e44cf7c9e00e8 ]--- [Tue May 28 16:54:39 2019] RIP: 0010:kmem_cache_alloc_node+0x11d/0x200 [Tue May 28 16:54:39 2019] Code: 4d 89 f9 0f 84 59 ff ff ff 4c 89 ff e8 ac d3 01 00 49 89 c1 e9 49 ff ff ff 41 8b 59 20 49 8b 39 48 8d 4a 01 4c 89 f0 4c 01 f3 <48> 33 1b 49 33 99 38 01 00 00 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84 [Tue May 28 16:54:39 2019] RSP: 0018:ffff9c9cc6943a48 EFLAGS: 00010202 [Tue May 28 16:54:39 2019] RAX: 147c86247f800c6b RBX: 147c86247f800c6b RCX: 000000000022a6f9 [Tue May 28 16:54:39 2019] RDX: 000000000022a6f8 RSI: 0000000000480020 RDI: 00000000000293b0 [Tue May 28 16:54:39 2019] RBP: ffff9c9cc6943a80 R08: ffff91915fbe93b0 R09: ffff91915b41d380 [Tue May 28 16:54:39 2019] R10: 0000000000000011 R11: ffff91915f4001d0 R12: 0000000000480020
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1778932 Title: rsync can trigger system crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1778932/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs