Bug#736227: linux-headers-3.12-1-amd64: general protection fault when using aptitude

2014-01-22 Thread Ben Hutchings
I'm sending this on to the btrfs developers to see if they can help.

On Tue, 2014-01-21 at 11:00 +0200, Giorgos Pallas wrote:
[...]
> I just installed 3.12-amd64 stock kernel. It booted OK, I opened a konsole
> and just tried to installed the kernel headers.  Just as aptitude tried to
> start downloading packages, I got:
> E: Method http has died unexpectedly!
> E: Sub-process http received a segmentation fault.
> and btrfs has crashed as seen in dmesg.
> 
> It should be noted that I use btrfs without problems with 3.7-trunk-amd64
> for almost a year.
[...]

The full message can be seen at ; here is
the crash log:

> [  322.368186] general protection fault:  [#1] SMP 
> [  322.368233] Modules linked in: cpufreq_userspace cpufreq_stats 
> cpufreq_powersave cpufreq_conservative xt_multiport uinput ib_iser rdma_cm 
> ib_addr iw_cm ib_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi_tcp libiscsi 
> scsi_transport_iscsi fuse ip6table_filter ip6table_mangle ip6_tables 
> xt_tcpudp iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 
> nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle ip_tables x_tables ext4 crc16 
> mbcache jbd2 loop firewire_sbp2 uvcvideo arc4 videobuf2_vmalloc 
> videobuf2_memops videobuf2_core videodev media b43 joydev bcma 
> snd_hda_codec_hdmi mac80211 cfg80211 snd_hda_codec_idt ir_lirc_codec rfkill 
> snd_hda_intel snd_hda_codec rng_core iTCO_wdt snd_hwdep snd_pcm r852 lirc_dev 
> iTCO_vendor_support ir_mce_kbd_decoder snd_page_alloc snd_seq ir_sony_decoder 
> ir_sanyo_decoder dell_wmi ir_jvc_decoder sm_common nand ir_nec_decoder 
> ir_rc6_decoder ir_rc5_decoder nand_ecc rc_rc6_mce nand_ids mtd lpc_ich 
> i2c_i801 dell_laptop coretemp acpi_cpufreq snd_seq_device !
>  r592 snd_timer mfd_core sparse_keymap dcdbas psmouse snd ite_cir rc_core 
> memstick soundcore processor pcspkr wmi serio_raw battery ac evdev btrfs xor 
> raid6_pq crc32c libcrc32c sha256_generic cbc dm_crypt dm_mod sg sd_mod 
> crct10dif_generic sr_mod crc_t10dif cdrom crct10dif_common firewire_ohci 
> sdhci_pci sdhci firewire_core crc_itu_t thermal ahci libahci tg3 libata ssb 
> mmc_core pcmcia i915 ptp pps_core libphy pcmcia_core video scsi_mod ehci_pci 
> uhci_hcd ehci_hcd button i2c_algo_bit drm_kms_helper drm i2c_core thermal_sys 
> usbcore usb_common
> [  322.369458] CPU: 0 PID: 4353 Comm: http Not tainted 3.12-1-amd64 #1 Debian 
> 3.12.6-2
> [  322.369493] Hardware name: Dell Inc. Studio 1737/0P792H, BIOS A09 
> 04/14/2011
> [  322.369534] task: 880036e80840 ti: 88009bf7e000 task.ti: 
> 88009bf7e000
> [  322.369569] RIP: 0010:[]  [] 
> memcpy+0x12/0x110
> [  322.369615] RSP: 0018:88009bf7f968  EFLAGS: 00010202
> [  322.369646] RAX: 88008e2eaf39 RBX: 0001 RCX: 
> 0001
> [  322.369679] RDX: 0001 RSI: db738800 RDI: 
> 88008e2eaf39
> [  322.369711] RBP: 880131ca9770 R08: 1000 R09: 
> 88009bf7f978
> [  322.369744] R10:  R11:  R12: 
> 6db6db6db6db6db7
> [  322.369776] R13: 1600 R14: 88008e2eaf3a R15: 
> 0001
> [  322.369810] FS:  7f00804a4720() GS:88013fc0() 
> knlGS:
> [  322.369855] CS:  0010 DS:  ES:  CR0: 80050033
> [  322.369881] CR2: ff600400 CR3: 9d52b000 CR4: 
> 07f0
> [  322.369914] Stack:
> [  322.369928]  a034a568  8801378a 
> 
> [  322.369980]  88013b3a9250 88008e2ea000 8800aa637d50 
> 8800925c3260
> [  322.370032]  a032f510 1000 880131ca96a0 
> ea0001f1a330
> [  322.370085] Call Trace:
> [  322.370119]  [] ? read_extent_buffer+0xc8/0x120 [btrfs]
> [  322.370164]  [] ? btrfs_get_extent+0x910/0x990 [btrfs]
> [  322.370214]  [] ? __do_readpage+0x398/0x780 [btrfs]
> [  322.370256]  [] ? btrfs_real_readdir+0x550/0x550 [btrfs]
> [  322.370307]  [] ? 
> __extent_readpages.constprop.43+0x2d2/0x2f0 [btrfs]
> [  322.370355]  [] ? btrfs_real_readdir+0x550/0x550 [btrfs]
> [  322.370406]  [] ? extent_readpages+0x182/0x190 [btrfs]
> [  322.370457]  [] ? btrfs_real_readdir+0x550/0x550 [btrfs]
> [  322.370499]  [] ? kmem_getpages+0x15b/0x1a0
> [  322.370527]  [] ? alloc_pages_current+0x9d/0x160
> [  322.370565]  [] ? __do_page_cache_readahead+0x193/0x240
> [  322.370598]  [] ? ondemand_readahead+0x14a/0x280
> [  322.370636]  [] ? generic_file_aio_read+0x4a6/0x6f0
> [  322.370668]  [] ? do_sync_read+0x57/0x90
> [  322.370701]  [] ? vfs_read+0x94/0x160
> [  322.370726]  [] ? SyS_read+0x43/0xa0
> [  322.370759]  [] ? system_call_fastpath+0x16/0x1b
> [  322.370795] Code: 43 58 48 2b 43 50 88 43 4e eb e9 90 90 90 90 90 90 90 90 
> 90 90 90 90 90 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1  
> a4 c3 20 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b 5e 18 48 8d 
> [  322.371118] RIP  [] memcpy+0x12/0x110
> [  322.371154]  RSP 
> [  322.378460] ---[ end trace 4d0836c03317ee9d ]---

Bug#736227: linux-headers-3.12-1-amd64: general protection fault when using aptitude

2014-01-22 Thread Γιώργος Πάλλας


In case this may help: Today the hard disk has reported unreadable 
sectors, so the issue reported could be related to some kind of emerging 
disk failure.


Giorgos

On 23/01/2014 07:47 πμ, Ben Hutchings wrote:

I'm sending this on to the btrfs developers to see if they can help.

On Tue, 2014-01-21 at 11:00 +0200, Giorgos Pallas wrote:
[...]

I just installed 3.12-amd64 stock kernel. It booted OK, I opened a konsole
and just tried to installed the kernel headers.  Just as aptitude tried to
start downloading packages, I got:
E: Method http has died unexpectedly!
E: Sub-process http received a segmentation fault.
and btrfs has crashed as seen in dmesg.

It should be noted that I use btrfs without problems with 3.7-trunk-amd64
for almost a year.

[...]

The full message can be seen at ; here is
the crash log:


[  322.368186] general protection fault:  [#1] SMP
[  322.368233] Modules linked in: cpufreq_userspace cpufreq_stats 
cpufreq_powersave cpufreq_conservative xt_multiport uinput ib_iser rdma_cm 
ib_addr iw_cm ib_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi fuse ip6table_filter ip6table_mangle ip6_tables xt_tcpudp 
iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat 
nf_conntrack iptable_mangle ip_tables x_tables ext4 crc16 mbcache jbd2 loop 
firewire_sbp2 uvcvideo arc4 videobuf2_vmalloc videobuf2_memops videobuf2_core 
videodev media b43 joydev bcma snd_hda_codec_hdmi mac80211 cfg80211 
snd_hda_codec_idt ir_lirc_codec rfkill snd_hda_intel snd_hda_codec rng_core 
iTCO_wdt snd_hwdep snd_pcm r852 lirc_dev iTCO_vendor_support ir_mce_kbd_decoder 
snd_page_alloc snd_seq ir_sony_decoder ir_sanyo_decoder dell_wmi ir_jvc_decoder 
sm_common nand ir_nec_decoder ir_rc6_decoder ir_rc5_decoder nand_ecc rc_rc6_mce 
nand_ids mtd lpc_ich i2c_i801 dell_laptop coretemp acpi_cpufreq snd_seq_device !
  r592 snd_timer mfd_core sparse_keymap dcdbas psmouse snd ite_cir rc_core 
memstick soundcore processor pcspkr wmi serio_raw battery ac evdev btrfs xor 
raid6_pq crc32c libcrc32c sha256_generic cbc dm_crypt dm_mod sg sd_mod 
crct10dif_generic sr_mod crc_t10dif cdrom crct10dif_common firewire_ohci 
sdhci_pci sdhci firewire_core crc_itu_t thermal ahci libahci tg3 libata ssb 
mmc_core pcmcia i915 ptp pps_core libphy pcmcia_core video scsi_mod ehci_pci 
uhci_hcd ehci_hcd button i2c_algo_bit drm_kms_helper drm i2c_core thermal_sys 
usbcore usb_common
[  322.369458] CPU: 0 PID: 4353 Comm: http Not tainted 3.12-1-amd64 #1 Debian 
3.12.6-2
[  322.369493] Hardware name: Dell Inc. Studio 1737/0P792H, BIOS A09 04/14/2011
[  322.369534] task: 880036e80840 ti: 88009bf7e000 task.ti: 
88009bf7e000
[  322.369569] RIP: 0010:[]  [] 
memcpy+0x12/0x110
[  322.369615] RSP: 0018:88009bf7f968  EFLAGS: 00010202
[  322.369646] RAX: 88008e2eaf39 RBX: 0001 RCX: 0001
[  322.369679] RDX: 0001 RSI: db738800 RDI: 88008e2eaf39
[  322.369711] RBP: 880131ca9770 R08: 1000 R09: 88009bf7f978
[  322.369744] R10:  R11:  R12: 6db6db6db6db6db7
[  322.369776] R13: 1600 R14: 88008e2eaf3a R15: 0001
[  322.369810] FS:  7f00804a4720() GS:88013fc0() 
knlGS:
[  322.369855] CS:  0010 DS:  ES:  CR0: 80050033
[  322.369881] CR2: ff600400 CR3: 9d52b000 CR4: 07f0
[  322.369914] Stack:
[  322.369928]  a034a568  8801378a 

[  322.369980]  88013b3a9250 88008e2ea000 8800aa637d50 
8800925c3260
[  322.370032]  a032f510 1000 880131ca96a0 
ea0001f1a330
[  322.370085] Call Trace:
[  322.370119]  [] ? read_extent_buffer+0xc8/0x120 [btrfs]
[  322.370164]  [] ? btrfs_get_extent+0x910/0x990 [btrfs]
[  322.370214]  [] ? __do_readpage+0x398/0x780 [btrfs]
[  322.370256]  [] ? btrfs_real_readdir+0x550/0x550 [btrfs]
[  322.370307]  [] ? 
__extent_readpages.constprop.43+0x2d2/0x2f0 [btrfs]
[  322.370355]  [] ? btrfs_real_readdir+0x550/0x550 [btrfs]
[  322.370406]  [] ? extent_readpages+0x182/0x190 [btrfs]
[  322.370457]  [] ? btrfs_real_readdir+0x550/0x550 [btrfs]
[  322.370499]  [] ? kmem_getpages+0x15b/0x1a0
[  322.370527]  [] ? alloc_pages_current+0x9d/0x160
[  322.370565]  [] ? __do_page_cache_readahead+0x193/0x240
[  322.370598]  [] ? ondemand_readahead+0x14a/0x280
[  322.370636]  [] ? generic_file_aio_read+0x4a6/0x6f0
[  322.370668]  [] ? do_sync_read+0x57/0x90
[  322.370701]  [] ? vfs_read+0x94/0x160
[  322.370726]  [] ? SyS_read+0x43/0xa0
[  322.370759]  [] ? system_call_fastpath+0x16/0x1b
[  322.370795] Code: 43 58 48 2b 43 50 88 43 4e eb e9 90 90 90 90 90 90 90 90 90 90 
90 90 90 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1  a4 c3 20 
4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b 5e 18 48 8d
[  322.371118] RIP  [] memcpy+0x12/0x110
[  322.371154]  RSP 
[  322.378460] ---[

Bug#736227: linux-headers-3.12-1-amd64: general protection fault when using aptitude

2014-01-23 Thread David Sterba
On Thu, Jan 23, 2014 at 05:47:02AM +, Ben Hutchings wrote:
> I'm sending this on to the btrfs developers to see if they can help.
> 
> On Tue, 2014-01-21 at 11:00 +0200, Giorgos Pallas wrote:
> [...]
> > I just installed 3.12-amd64 stock kernel. It booted OK, I opened a konsole
> > and just tried to installed the kernel headers.  Just as aptitude tried to
> > start downloading packages, I got:
> > E: Method http has died unexpectedly!
> > E: Sub-process http received a segmentation fault.
> > and btrfs has crashed as seen in dmesg.
> > 
> > It should be noted that I use btrfs without problems with 3.7-trunk-amd64
> > for almost a year.
> [...]
> 
> > [  322.369569] RIP: 0010:[]  [] 
> > memcpy+0x12/0x110
> > [  322.370085] Call Trace:
> > [  322.370119]  [] ? read_extent_buffer+0xc8/0x120 [btrfs]
> > [  322.370164]  [] ? btrfs_get_extent+0x910/0x990 [btrfs]
> > [  322.370214]  [] ? __do_readpage+0x398/0x780 [btrfs]
> > [  322.370256]  [] ? btrfs_real_readdir+0x550/0x550 
> > [btrfs]
> > [  322.370307]  [] ? 
> > __extent_readpages.constprop.43+0x2d2/0x2f0 [btrfs]
> > [  322.370355]  [] ? btrfs_real_readdir+0x550/0x550 
> > [btrfs]
> > [  322.370406]  [] ? extent_readpages+0x182/0x190 [btrfs]
> > [  322.370457]  [] ? btrfs_real_readdir+0x550/0x550 
> > [btrfs]
> > [  322.370499]  [] ? kmem_getpages+0x15b/0x1a0
> > [  322.370527]  [] ? alloc_pages_current+0x9d/0x160
> > [  322.370565]  [] ? __do_page_cache_readahead+0x193/0x240
> > [  322.370598]  [] ? ondemand_readahead+0x14a/0x280
> > [  322.370636]  [] ? generic_file_aio_read+0x4a6/0x6f0
> > [  322.370668]  [] ? do_sync_read+0x57/0x90
> > [  322.370701]  [] ? vfs_read+0x94/0x160
> > [  322.370726]  [] ? SyS_read+0x43/0xa0
> > [  322.370759]  [] ? system_call_fastpath+0x16/0x1b

Known issue, a patch will be ready soon

https://bugzilla.kernel.org/show_bug.cgi?id=68411


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20140123125032.gl6...@twin.jikos.cz