Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 250408 - kernel exception using scp
kernel exception using scp
Product: Fedora
Classification: Fedora
Component: kernel (Show other bugs)
ppc64 Linux
low Severity medium
: ---
: ---
Assigned To: Kernel Maintainer List
Fedora Extras Quality Assurance
Depends On:
  Show dependency treegraph
Reported: 2007-08-01 09:39 EDT by Istvan Szukacs
Modified: 2007-11-30 17:12 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-08-01 18:04:44 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Istvan Szukacs 2007-08-01 09:39:20 EDT
Linux cell 2.6.21-1.3194.fc7 #1 SMP Wed May 23 22:13:52 EDT 2007 ppc64 ppc64
ppc64 GNU/Linux

Steps to Reproduce:
1. scp anything to the server

Actual results:
Badness at kernel/softirq.c:138
Call Trace:
[C000000002EBF210] [C000000000010A24] .show_stack+0x68/0x1b0 (unreliable)
[C000000002EBF2B0] [C0000000001C3248] .report_bug+0x94/0xe8
[C000000002EBF340] [C00000000040DC2C] .program_check_exception+0x18c/0x5e8
[C000000002EBF410] [C0000000000053FC] program_check_common+0xfc/0x100
--- Exception: 700 at .local_bh_enable+0x34/0xb4
    LR = .cond_resched_softirq+0x64/0x98
[C000000002EBF700] [C0000000003C53BC] .tcp_v4_do_rcv+0x1c0/0x5dc (unreliable)
[C000000002EBF780] [C00000000040AD7C] .cond_resched_softirq+0x64/0x98
[C000000002EBF800] [C00000000036C208] .release_sock+0x9c/0x11c
[C000000002EBF890] [C0000000003B4A18] .tcp_recvmsg+0xaec/0xc24
[C000000002EBF9A0] [C00000000036B86C] .sock_common_recvmsg+0x5c/0x84
[C000000002EBFA30] [C000000000368534] .sock_aio_read+0x154/0x18c
[C000000002EBFB60] [C000000000103774] .do_sync_read+0xc4/0x124
[C000000002EBFCF0] [C0000000001041F0] .vfs_read+0x13c/0x208
[C000000002EBFD90] [C0000000001049C0] .sys_read+0x4c/0x8c
[C000000002EBFE30] [C0000000000087C8] syscall_exit+0x0/0x40

Expected results:

Additional info:

maybe the newer versions are not affected?

Note You need to log in before you can comment on or make changes to this bug.