This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1756099

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

** Tags added: xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1756099

Title:
  general protection fault in __d_lookup

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Found one of my VMs with dmesg many such traces:

  general protection fault: 0000 [#1] SMP 
  Modules linked in: ip6table_filter ip6_tables xt_tcpudp xt_conntrack 
iptable_filter ip_tables x_tables zfs(PO) zunicode(PO) zcommon(PO) znvpair(PO) 
spl(O) zavl(PO) input_leds sch_fq_codel nf_conntrack_ipv
  CPU: 0 PID: 5110 Comm: sshd Tainted: P           O    4.4.0-116-generic 
#140-Ubuntu
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
Ubuntu-1.8.2-1ubuntu1 04/01/2014
  task: ffff88007867e600 ti: ffff8800787d8000 task.ti: ffff8800787d8000
  RIP: 0010:[<ffffffff8922da28>]  [<ffffffff8922da28>] __d_lookup+0x68/0x150
  RSP: 0018:ffff8800787dbc00  EFLAGS: 00010206
  RAX: ffffc900000659b8 RBX: 0020000000000000 RCX: 000000000000000e
  RDX: ffffc90000007000 RSI: ffff8800787dbd40 RDI: ffff88006bc06300
  RBP: ffff8800787dbc40 R08: ffff88006bc06300 R09: ffff88006b1ca01d
  R10: 00000000c2223581 R11: 8080808080808080 R12: ffff88006bc06300
  R13: ffff8800787dbd40 R14: 000000006cdac1d0 R15: ffff8800793a8020
  FS:  00007f43b8a238c0(0000) GS:ffff88007fc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000561b09c1aed8 CR3: 0000000074498000 CR4: 0000000000000670
  Stack:
   ffffffff8922b3d4 ffff88006b1ca039 0000000c00000000 ffff8800787dbd30
   0000000000000000 ffff8800787dbcb8 ffff8800787dbcb0 ffff8800793a8020
   ffff8800787dbc98 ffffffff8921ed04 ffff88006b1ca039 ffff8800787dbcac
  Call Trace:
   [<ffffffff8922b3d4>] ? dput+0x34/0x230
   [<ffffffff8921ed04>] lookup_fast+0xe4/0x340
   [<ffffffff8921e488>] ? __inode_permission+0x48/0xc0
   [<ffffffff89220549>] walk_component+0x49/0x310
   [<ffffffff8921ff3b>] ? path_init+0x1eb/0x3c0
   [<ffffffff892220ad>] path_lookupat+0x5d/0x110
   [<ffffffff892225a4>] ? path_openat+0x1b4/0x1340
   [<ffffffff89223d01>] filename_lookup+0xb1/0x180
   [<ffffffff891f2109>] ? kmem_cache_alloc+0x189/0x1f0
   [<ffffffff89223906>] ? getname_flags+0x56/0x1f0
   [<ffffffff89223ea6>] user_path_at_empty+0x36/0x40
   [<ffffffff89218d76>] vfs_fstatat+0x66/0xc0
   [<ffffffff891b8aed>] ? kzfree+0x2d/0x40
   [<ffffffff89219331>] SYSC_newlstat+0x31/0x60
   [<ffffffff89212e7f>] ? do_sys_open+0x1bf/0x2a0
   [<ffffffff8921946e>] SyS_newlstat+0xe/0x10
   [<ffffffff8984efc8>] entry_SYSCALL_64_fastpath+0x1c/0xbb
  Code: 45 c8 48 89 f8 48 c1 e8 06 44 01 f0 69 c0 01 00 37 9e d3 e8 48 8d 04 c2 
48 8b 18 48 83 e3 fe 75 0a eb 32 48 8b 1b 48 85 db 74 2a <44> 3b 73 18 75 f2 4c 
8d 7b 50 4c 89 ff e8 86 12 62 00 4c 3b 63 
  RIP  [<ffffffff8922da28>] __d_lookup+0x68/0x150
   RSP <ffff8800787dbc00>
  ---[ end trace d60d4c228fda67f5 ]---

  The problem was apparently triggered by a SFTP transfer to the VM and
  files were (tentatively) saved to a ZFS mount. This has been working
  for over a year and it's the first time I see such traces.

  I don't know if that matters but the VM also suffered from one
  occurrence of LP: #1749715 a month ago and under different conditions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1756099/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to