[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13

2022-03-21 Thread Maxim Kuvyrkov
Kernel 5.4.0-99-generic is now running without a fault for 40 days.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13

2022-02-21 Thread Maxim Kuvyrkov
Kernel 5.4.0-99-generic is now running without a fault for 11 days.
Kernels 5.11 and 5.13 crashed within 4-5 days of uptime.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13

2022-02-10 Thread Maxim Kuvyrkov
The kernel BUG also happens with 5.11.0-46 and 5.13.0-28 kernels.  In
5.11 the location of the fault is different, but the symptoms are very
similar to crash in 5.13.

Attached are kern.log excerpts for 5.11.0-46 and 5.13.0-28 crashes.  I'm
now testing 5.4.0-99-generic.

** Attachment added: "kern2.log"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+attachment/5560158/+files/kern2.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] acpidump.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "acpidump.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560157/+files/acpidump.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] UdevDb.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1959685/+attachment/5560155/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] ProcModules.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560153/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] WifiSyslog.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560156/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] PulseList.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "PulseList.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560154/+files/PulseList.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] ProcEnviron.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560151/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] ProcCpuinfo.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560149/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] ProcInterrupts.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560152/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] ProcCpuinfoMinimal.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560150/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Lsusb-v.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "Lsusb-v.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560148/+files/Lsusb-v.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Lsusb-t.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "Lsusb-t.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560147/+files/Lsusb-t.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Lspci-vt.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "Lspci-vt.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560145/+files/Lspci-vt.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Lsusb.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1959685/+attachment/5560146/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Lspci.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1959685/+attachment/5560144/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] CurrentDmesg.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1959685/+attachment/5560143/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] CRDA.txt

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Attachment added: "CRDA.txt"
   https://bugs.launchpad.net/bugs/1959685/+attachment/5560142/+files/CRDA.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959685

Title:
  Kernel BUG with btrfs on linux 5.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13

2022-02-10 Thread Maxim Kuvyrkov
apport information

** Tags added: apport-collected focal

** Description changed:

  I am hitting the below kernel oops every 2-5 days on my home server box.
  RIP is always "0010:btrfs_evict_inode+0xa1/0x480 [btrfs]" and address is
  always "0068".  I'm using btrfs in raid1 configuration for
  general storage.
  
  ===
  Feb  1 01:40:38 server kernel: [172867.493851] BUG: kernel NULL pointer 
dereference, address: 0068
  Feb  1 01:40:38 server kernel: [172867.493885] #PF: supervisor write access 
in kernel mode
  Feb  1 01:40:38 server kernel: [172867.493903] #PF: error_code(0x0002) - 
not-present page
  Feb  1 01:40:38 server kernel: [172867.493920] PGD 0 P4D 0 
  Feb  1 01:40:38 server kernel: [172867.493931] Oops: 0002 [#1] SMP PTI
  Feb  1 01:40:38 server kernel: [172867.493946] CPU: 2 PID: 104 Comm: kswapd0 
Not tainted 5.13.0-27-generic #29~20.04.1-Ubuntu
  Feb  1 01:40:38 server kernel: [172867.493972] Hardware name: Gigabyte 
Technology Co., Ltd. H67MA-D2H-B3/H67MA-D2H-B3, BIOS F1 02/11/2011
  Feb  1 01:40:38 server kernel: [172867.493999] RIP: 
0010:btrfs_evict_inode+0xa1/0x480 [btrfs]
  Feb  1 01:40:38 server kernel: [172867.494070] Code: fd ff ff e8 d1 b1 9f c8 
65 48 8b 04 25 c0 7b 01 00 48 89 45 b8 49 8b 84 24 f0 fd ff ff 48 85 c0 74 55 
4d 8b b4 24 f8 fd ff ff  41 80 66 68 fe f0 41 80 66 
  68 f7 4c 89 f6 4c 89 ff e8 98 00 01
  Feb  1 01:40:38 server kernel: [172867.494123] RSP: 0018:ab8dc042fad0 
EFLAGS: 00010202
  Feb  1 01:40:38 server kernel: [172867.494141] RAX: 0004 RBX: 
8f01001251d8 RCX: 8f0100125040
  Feb  1 01:40:38 server kernel: [172867.494163] RDX: 00ff RSI: 
 RDI: 8f01001251d0
  Feb  1 01:40:38 server kernel: [172867.494185] RBP: ab8dc042fb28 R08: 
 R09: 
  Feb  1 01:40:38 server kernel: [172867.494206] R10: 8f00c2ea6280 R11: 
0001 R12: 8f01001253c0
  Feb  1 01:40:38 server kernel: [172867.494228] R13: 8f01001251d0 R14: 
 R15: 8f01001251b0
  Feb  1 01:40:38 server kernel: [172867.494250] FS:  () 
GS:8f03cfa8() knlGS:
  Feb  1 01:40:38 server kernel: [172867.494274] CS:  0010 DS:  ES:  
CR0: 80050033
  Feb  1 01:40:38 server kernel: [172867.494293] CR2: 0068 CR3: 
000202810001 CR4: 000606e0
  Feb  1 01:40:38 server kernel: [172867.494315] Call Trace:
  Feb  1 01:40:38 server kernel: [172867.494328]  evict+0xd2/0x180
  Feb  1 01:40:38 server kernel: [172867.494342]  dispose_list+0x39/0x50
  Feb  1 01:40:38 server kernel: [172867.494356]  prune_icache_sb+0x5c/0x80
  Feb  1 01:40:38 server kernel: [172867.494370]  super_cache_scan+0x132/0x1b0
  Feb  1 01:40:38 server kernel: [172867.494386]  do_shrink_slab+0x144/0x2c0
  Feb  1 01:40:38 server kernel: [172867.494402]  shrink_slab+0x215/0x2b0
  Feb  1 01:40:38 server kernel: [172867.494416]  shrink_node+0x2dd/0x6f0
  Feb  1 01:40:38 server kernel: [172867.494430]  balance_pgdat+0x322/0x5f0
  Feb  1 01:40:38 server kernel: [172867.494445]  kswapd+0x1f8/0x380
  Feb  1 01:40:38 server kernel: [172867.494458]  ? wait_woken+0x80/0x80
  Feb  1 01:40:38 server kernel: [172867.494473]  ? balance_pgdat+0x5f0/0x5f0
  Feb  1 01:40:38 server kernel: [172867.494487]  kthread+0x12b/0x150
  Feb  1 01:40:38 server kernel: [172867.494501]  ? set_kthread_struct+0x40/0x40
  Feb  1 01:40:38 server kernel: [172867.494516]  ret_from_fork+0x22/0x30
  Feb  1 01:40:38 server kernel: [172867.494532] Modules linked in: 
xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo 
xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defra
  g_ipv6 nf_defrag_ipv4 bpfilter br_netfilter bridge stp llc aufs overlay 
snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio 
snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_code
  c snd_hda_core snd_hwdep snd_pcm intel_rapl_msr snd_seq_midi 
snd_seq_midi_event mei_hdcp intel_rapl_common x86_pkg_temp_thermal 
intel_powerclamp coretemp snd_rawmidi kvm_intel kvm snd_seq crct10dif_pclmul 
ghash_
  clmulni_intel snd_seq_device cryptd i915 rapl snd_timer intel_cstate 
serio_raw joydev drm_kms_helper input_leds cec snd rc_core i2c_algo_bit 
fb_sys_fops syscopyarea sysfillrect sysimgblt video soundcore mei_me m
  ei mac_hid sch_fq_codel msr parport_pc ppdev drm lp parport ip_tables 
x_tables autofs4 btrfs blake2b_generic xor zstd_compress raid6_pq libcrc32c uas 
usb_storage hid_generic usbhid hid
  Feb  1 01:40:38 server kernel: [172867.494581]  gpio_ich crc32_pclmul lpc_ich 
r8169 i2c_i801 ahci i2c_smbus xhci_pci realtek libahci xhci_pci_renesas
  Feb  1 01:40:38 server kernel: [172867.497076] CR2: 0068
  Feb  1 01:40:38 server kernel: [172867.497876] ---[ end trace 
4ab76c62441acb52 ]---
  Feb  1 01:40:38 server kernel: [172867.498695] RIP: 
0010:btrfs_evict_inode+0xa1/0x480 [btrfs]
  Feb  1 01:40:38 server kerne

[Bug 1959685] [NEW] Kernel BUG with btrfs on linux 5.13

2022-02-01 Thread Maxim Kuvyrkov
Public bug reported:

I am hitting the below kernel oops every 2-5 days on my home server box.
RIP is always "0010:btrfs_evict_inode+0xa1/0x480 [btrfs]" and address is
always "0068".  I'm using btrfs in raid1 configuration for
general storage.

===
Feb  1 01:40:38 server kernel: [172867.493851] BUG: kernel NULL pointer 
dereference, address: 0068
Feb  1 01:40:38 server kernel: [172867.493885] #PF: supervisor write access in 
kernel mode
Feb  1 01:40:38 server kernel: [172867.493903] #PF: error_code(0x0002) - 
not-present page
Feb  1 01:40:38 server kernel: [172867.493920] PGD 0 P4D 0 
Feb  1 01:40:38 server kernel: [172867.493931] Oops: 0002 [#1] SMP PTI
Feb  1 01:40:38 server kernel: [172867.493946] CPU: 2 PID: 104 Comm: kswapd0 
Not tainted 5.13.0-27-generic #29~20.04.1-Ubuntu
Feb  1 01:40:38 server kernel: [172867.493972] Hardware name: Gigabyte 
Technology Co., Ltd. H67MA-D2H-B3/H67MA-D2H-B3, BIOS F1 02/11/2011
Feb  1 01:40:38 server kernel: [172867.493999] RIP: 
0010:btrfs_evict_inode+0xa1/0x480 [btrfs]
Feb  1 01:40:38 server kernel: [172867.494070] Code: fd ff ff e8 d1 b1 9f c8 65 
48 8b 04 25 c0 7b 01 00 48 89 45 b8 49 8b 84 24 f0 fd ff ff 48 85 c0 74 55 4d 
8b b4 24 f8 fd ff ff  41 80 66 68 fe f0 41 80 66 
68 f7 4c 89 f6 4c 89 ff e8 98 00 01
Feb  1 01:40:38 server kernel: [172867.494123] RSP: 0018:ab8dc042fad0 
EFLAGS: 00010202
Feb  1 01:40:38 server kernel: [172867.494141] RAX: 0004 RBX: 
8f01001251d8 RCX: 8f0100125040
Feb  1 01:40:38 server kernel: [172867.494163] RDX: 00ff RSI: 
 RDI: 8f01001251d0
Feb  1 01:40:38 server kernel: [172867.494185] RBP: ab8dc042fb28 R08: 
 R09: 
Feb  1 01:40:38 server kernel: [172867.494206] R10: 8f00c2ea6280 R11: 
0001 R12: 8f01001253c0
Feb  1 01:40:38 server kernel: [172867.494228] R13: 8f01001251d0 R14: 
 R15: 8f01001251b0
Feb  1 01:40:38 server kernel: [172867.494250] FS:  () 
GS:8f03cfa8() knlGS:
Feb  1 01:40:38 server kernel: [172867.494274] CS:  0010 DS:  ES:  CR0: 
80050033
Feb  1 01:40:38 server kernel: [172867.494293] CR2: 0068 CR3: 
000202810001 CR4: 000606e0
Feb  1 01:40:38 server kernel: [172867.494315] Call Trace:
Feb  1 01:40:38 server kernel: [172867.494328]  evict+0xd2/0x180
Feb  1 01:40:38 server kernel: [172867.494342]  dispose_list+0x39/0x50
Feb  1 01:40:38 server kernel: [172867.494356]  prune_icache_sb+0x5c/0x80
Feb  1 01:40:38 server kernel: [172867.494370]  super_cache_scan+0x132/0x1b0
Feb  1 01:40:38 server kernel: [172867.494386]  do_shrink_slab+0x144/0x2c0
Feb  1 01:40:38 server kernel: [172867.494402]  shrink_slab+0x215/0x2b0
Feb  1 01:40:38 server kernel: [172867.494416]  shrink_node+0x2dd/0x6f0
Feb  1 01:40:38 server kernel: [172867.494430]  balance_pgdat+0x322/0x5f0
Feb  1 01:40:38 server kernel: [172867.494445]  kswapd+0x1f8/0x380
Feb  1 01:40:38 server kernel: [172867.494458]  ? wait_woken+0x80/0x80
Feb  1 01:40:38 server kernel: [172867.494473]  ? balance_pgdat+0x5f0/0x5f0
Feb  1 01:40:38 server kernel: [172867.494487]  kthread+0x12b/0x150
Feb  1 01:40:38 server kernel: [172867.494501]  ? set_kthread_struct+0x40/0x40
Feb  1 01:40:38 server kernel: [172867.494516]  ret_from_fork+0x22/0x30
Feb  1 01:40:38 server kernel: [172867.494532] Modules linked in: xt_conntrack 
xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype 
iptable_filter iptable_nat nf_nat nf_conntrack nf_defra
g_ipv6 nf_defrag_ipv4 bpfilter br_netfilter bridge stp llc aufs overlay 
snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio 
snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_code
c snd_hda_core snd_hwdep snd_pcm intel_rapl_msr snd_seq_midi snd_seq_midi_event 
mei_hdcp intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp 
snd_rawmidi kvm_intel kvm snd_seq crct10dif_pclmul ghash_
clmulni_intel snd_seq_device cryptd i915 rapl snd_timer intel_cstate serio_raw 
joydev drm_kms_helper input_leds cec snd rc_core i2c_algo_bit fb_sys_fops 
syscopyarea sysfillrect sysimgblt video soundcore mei_me m
ei mac_hid sch_fq_codel msr parport_pc ppdev drm lp parport ip_tables x_tables 
autofs4 btrfs blake2b_generic xor zstd_compress raid6_pq libcrc32c uas 
usb_storage hid_generic usbhid hid
Feb  1 01:40:38 server kernel: [172867.494581]  gpio_ich crc32_pclmul lpc_ich 
r8169 i2c_i801 ahci i2c_smbus xhci_pci realtek libahci xhci_pci_renesas
Feb  1 01:40:38 server kernel: [172867.497076] CR2: 0068
Feb  1 01:40:38 server kernel: [172867.497876] ---[ end trace 4ab76c62441acb52 
]---
Feb  1 01:40:38 server kernel: [172867.498695] RIP: 
0010:btrfs_evict_inode+0xa1/0x480 [btrfs]
Feb  1 01:40:38 server kernel: [172867.499556] Code: fd ff ff e8 d1 b1 9f c8 65 
48 8b 04 25 c0 7b 01 00 48 89 45 b8 49 8b 84 24 f0 fd ff ff 48 85 c0 74 55 4d 
8b b4 24 f8 fd ff ff  41 80 66 

[Bug 1766624] Re: AArch64 kernel panic on APM Mustang

2018-04-24 Thread Maxim Kuvyrkov
No way to reproduce, unfortunately.  This bug shows up once in a couple
of months on otherwise a very stable machine.  Bug manifests itself that
"ps auxf" and related process-listing commands start to hang
indefinitely.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1766624

Title:
  AArch64 kernel panic on APM Mustang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1766624/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1766624] [NEW] AArch64 kernel panic on APM Mustang

2018-04-24 Thread Maxim Kuvyrkov
Public bug reported:

Random kernel panic on AArch64 APM Mustang running ubuntu xenial kernel.  
==
[2244826.215921] Unhandled fault: alignment fault (0x9621) at 
0x03b00a53
[2244826.223377] Internal error: : 9621 [#1] SMP
[2244826.228057] Modules linked in: veth xt_nat xt_tcpudp ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack 
x_tables nf_nat nf_conntrack br_netfilter bridge stp llc overlay shpchp 
xgene_edac edac_core xhci_plat_hcd xgene_rng uio_pdrv_genirq uio nfsd 
auth_rpcgss nfs_acl lockd grace ib_iser sunrpc rdma_cm iw_cm ib_cm ib_sa ib_mad 
ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 
btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx 
xor raid6_pq libcrc32c raid1 raid0 multipath linear realtek ahci_xgene 
libahci_platform xgene_enet libahci mdio_xgene aes_neon_blk ablk_helper cryptd
[2244826.293934] CPU: 3 PID: 7232 Comm: basename Not tainted 4.4.0-101-generic 
#124-Ubuntu
[2244826.301896] Hardware name: AppliedMicro Mustang/Mustang, BIOS 1.1.0 Apr 22 
2015
[2244826.309339] task: 800119bf6800 ti: 80013ec74000 task.ti: 
80013ec74000
[2244826.316960] PC is at _raw_spin_lock_irqsave+0x24/0x60
[2244826.322158] LR is at try_to_wake_up+0x44/0x3a8
[2244826.326750] pc : [] lr : [] pstate: 
61c5
[2244826.334279] sp : 80013ec77b40
[2244826.337746] x29: 80013ec77b40 x28: 0075 
[2244826.343224] x27: 80001c1d3b80 x26: 800166d75a70 
[2244826.348698] x25: 8000fad8c190 x24: 800166d75a80 
[2244826.354175] x23:  x22: 0003 
[2244826.359652] x21: 03b00a53 x20:  
[2244826.365128] x19: 03b00a53 x18:  
[2244826.370603] x17:  x16: 80210960 
[2244826.376079] x15:  x14:  
[2244826.381553] x13:  x12:  
[2244826.387029] x11: 8003e9a36700 x10: 00d6 
[2244826.392504] x9 : 8093fee8 x8 :  
[2244826.397978] x7 : 8000fad8ccf8 x6 : 8000fad8c258 
[2244826.403452] x5 :  x4 : 0001 
[2244826.408927] x3 :  x2 :  
[2244826.414402] x1 : 0003 x0 : 01c0 

[2244826.421531] Process basename (pid: 7232, stack limit = 0x80013ec74020)
[2244826.428543] Stack: (0x80013ec77b40 to 0x80013ec78000)
[2244826.434432] 7b40: 80013ec77b60 800f28b4 03b003af 
8003ee0c4000
[2244826.442393] 7b60: 80013ec77bc0 800f2c40 03b003af 
0001
[2244826.450355] 7b80: 800166d75a70 800166d75a68 800166d75a70 
800166d75a80
[2244826.458316] 7ba0: 8000fad8c190 800166d75a70 80001c1d3b80 
0075
[2244826.466276] 7bc0: 80013ec77be0 8011433c 03b003af 
8090ed94
[2244826.474237] 7be0: 80013ec77c20 8090ef30 800166d75a68 
0001
[2244826.482199] 7c00: 80db2000  800166d75a40 
8020b790
[2244826.490159] 7c20: 80013ec77cb0 8090e320 800166d75a68 

[2244826.498121] 7c40: 8000fad8cd48  800166d75a40 

[2244826.506082] 7c60: 8000fad8c190 800166d75a60 80001c1d3b80 
8000fad8ccb0
[2244826.514044] 7c80: 8000fad8c960 800143927b68 800143927c88 
800119bf6800
[2244826.522006] 7ca0: 8001 cb88537fdc8ba65f 80013ec77cd0 
8020c640
[2244826.529966] 7cc0: 8000fad8cc80  80013ec77d70 
8020ccb8
[2244826.537927] 7ce0: 8000fad8c190 8000fad8cc80  
f7517000
[2244826.545889] 7d00: 80eb4000  80001c1d3b80 
80013ec77eb0
[2244826.553850] 7d20: 0010 0075 80eb4000 

[2244826.561812] 7d40: 1c1d3b80 00d6 8003e9a36700 
f7507000
[2244826.569774] 7d60:  f7517000 80013ec77db0 
8020e104
[2244826.577736] 7d80: 80001c1d3b80 8000fad8cc80 f7517000 

[2244826.585696] 7da0: f7507000 f7517000 80013ec77df0 
80210920
[2244826.593657] 7dc0: 8000fad8cc80  0070 

[2244826.601617] 7de0:   80013ec77e50 
80210aa0
[2244826.609579] 7e00: f7517000 0070 f7517000 
80db2000
[2244826.617541] 7e20:    
f7507000
[2244826.625502] 7e40: 8000fad8cc80 80013ec74000  
80085df0
[2244826.633462] 7e60: 0040   
f752ee26
[2244826.641423] 7e80: 2030 0011 0

[Bug 1759369] Re: kernel build fails on arm64

2018-04-11 Thread Maxim Kuvyrkov
Tentative fix applied, see bugs.linaro.org #3718 .

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1759369

Title:
  kernel build fails on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc-linaro/+bug/1759369/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1336794] Re: 9pfs does not honor open file handles on unlinked files

2017-08-03 Thread Maxim Kuvyrkov
Hi Greg,

Did you push the qemu patch upstream, and now it is a matter of fixing
the kernel?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336794

Title:
  9pfs does not honor open file handles on unlinked files

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1336794/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1590236] Re: perf --call-graph dwarf doesn't record correct call graph

2016-09-19 Thread Maxim Kuvyrkov
Perf utility from linux-tools is affected for AArch64.

** Also affects: linux-meta (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1590236

Title:
  perf --call-graph dwarf doesn't record correct call graph

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libunwind/+bug/1590236/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1590236] Re: perf --call-graph dwarf doesn't record correct call graph

2016-09-19 Thread Maxim Kuvyrkov
IMO, the AArch64 libunwind port (included via AArch64-port.diff debian
patch) should be setting enable_debug_frame to "yes" for aarch64
alongside arm in confirure.ac:

AC_MSG_CHECKING([whether to load .debug_frame sections])
AC_ARG_ENABLE(debug_frame,
AS_HELP_STRING([--enable-debug-frame],[Load the ".debug_frame" section if 
available]),, [
case "${target_arch}" in
  (arm) enable_debug_frame=yes;;
  (*)   enable_debug_frame=no;;
esac])
if test x$enable_debug_frame = xyes; then
  AC_DEFINE([CONFIG_DEBUG_FRAME], [], [Enable Debug Frame])
fi
AC_MSG_RESULT([$enable_debug_frame])

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1590236

Title:
  perf --call-graph dwarf doesn't record correct call graph

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libunwind/+bug/1590236/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1251281] Re: gnome-session-flashback fails to start without hardware acceleration in cloud/remote environments (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting)

2014-11-26 Thread Maxim Kuvyrkov
Hi,

Would, please, someone clarify for users whether the fix will be
backported to trusty's gnome-session or to any other released ubuntu
version?

Thank you.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1251281

Title:
  gnome-session-flashback fails to start without hardware acceleration
  in cloud/remote environments (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting)

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-session/+bug/1251281/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019

2014-08-19 Thread Maxim Kuvyrkov
** Changed in: gcc-linaro
 Assignee: (unassigned) => Kumar Venkataramanan  (venkataramanan-kumar)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1349570

Title:
  ICE in change_address_1, at emit-rtl.c:2019

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019

2014-08-13 Thread Maxim Kuvyrkov
Also confirmed on linaro-4.8-branch as of yesterday

** Changed in: gcc-linaro
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1349570

Title:
  ICE in change_address_1, at emit-rtl.c:2019

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019

2014-08-01 Thread Maxim Kuvyrkov
We track Linaro toolchain bugs on bugs.linaro.org.  Please report future
bugs there directly.

This is now https://bugs.linaro.org/show_bug.cgi?id=307

** Bug watch added: Linaro Bug Tracking System #307
   https://bugs.linaro.org/show_bug.cgi?id=307

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1349570

Title:
  ICE in change_address_1, at emit-rtl.c:2019

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019

2014-08-01 Thread Maxim Kuvyrkov
Thanks for the testcase.  This is reproducible with 4.8 2014.04 (our
latest 4.8), but not with 4.9 2014.06 (didn't test other 4.9 versions).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1349570

Title:
  ICE in change_address_1, at emit-rtl.c:2019

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1325503] Re: gdb reports 'corrupt stack' on armhf without symbols

2014-06-25 Thread Maxim Kuvyrkov
How was "sleep" and system glibc compiled?

To get reliable stack traces GDB has to have access to either frame
pointer (-fno-omit-frame-pointer compiler flag) or to unwind tables
(-funwind-tables).  In the absence of either of these, GDB has to guess
where stack frame boundaries are.  In this case GDB guesses wrong.

The recommended way to get reliable stack traces is to use -funwind-
tables, which does not have performance penalty (like -fno-omit-frame-
pointer), and only increases disk footprint of binaries by several
percent.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1325503

Title:
  gdb reports 'corrupt stack' on armhf without symbols

To manage notifications about this bug go to:
https://bugs.launchpad.net/gdb-linaro/+bug/1325503/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1321005] [NEW] Kernel crash: kswapd, rsync, overlayfs

2014-05-19 Thread Maxim Kuvyrkov
Public bug reported:

I've encountered the following kernel crash on a system that heavily
uses overlayfs.  While not necessarily an overlayfs problem, it (adding
overlayfs) was the last major change to the system.

During the crash rsync was synchronizing non-overlayfs directory which
was bind-mounted on an overlayfs filesystem (i.e., /home under schroot).

May 19 14:03:54 maximk kernel: [438288.554691] general protection fault:  
[#1] SMP 
May 19 14:03:54 maximk kernel: [438288.554735] Modules linked in: overlayfs 
vhost_net macvtap macvlan vhost ip6table_filter ip6_tables ebtable_nat ebtables 
ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 
xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp 
iptable_filter ip_tables x_tables bridge stp llc kvm_intel kvm rfcomm bnep 
parport_pc ppdev bluetooth binfmt_misc snd_hda_codec_hdmi snd_hda_codec_realtek 
snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi snd_rawmidi 
snd_seq_midi_event snd_seq snd_timer snd_seq_device dm_multipath scsi_dh snd 
soundcore i915 snd_page_alloc mei_me mei drm_kms_helper drm serio_raw gpio_ich 
mac_hid lp i2c_algo_bit video parport lpc_ich ahci libahci r8169 mii
May 19 14:03:54 maximk kernel: [438288.555233] CPU: 1 PID: 59 Comm: kswapd0 Not 
tainted 3.11.0-20-generic #35~precise1-Ubuntu
May 19 14:03:54 maximk kernel: [438288.555279] Hardware name: Gigabyte 
Technology Co., Ltd. H67MA-D2H-B3/H67MA-D2H-B3, BIOS F6 03/27/2012
May 19 14:03:54 maximk kernel: [438288.555331] task: 8804089f1770 ti: 
8804089ec000 task.ti: 8804089ec000
May 19 14:03:54 maximk kernel: [438288.555372] RIP: 0010:[]  
[] prune_icache_sb+0x1a6/0x340
May 19 14:03:54 maximk kernel: [438288.555428] RSP: 0018:8804089edb98  
EFLAGS: 00010206
May 19 14:03:54 maximk kernel: [438288.555458] RAX: 08fd15b88804 RBX: 
8803e78269ac RCX: 0001
May 19 14:03:54 maximk kernel: [438288.555498] RDX: 88040529e508 RSI: 
01c4 RDI: 8803e782693c
May 19 14:03:54 maximk kernel: [438288.37] RBP: 8804089edbf8 R08: 
 R09: 
May 19 14:03:54 maximk kernel: [438288.92] R10: 0001 R11: 
 R12: 88040529e400
May 19 14:03:54 maximk kernel: [438288.555632] R13: 8803e782693c R14: 
010d R15: 88040529e508
May 19 14:03:54 maximk kernel: [438288.555672] FS:  () 
GS:88041fa4() knlGS:
May 19 14:03:54 maximk kernel: [438288.555714] CS:  0010 DS:  ES:  CR0: 
80050033
May 19 14:03:54 maximk kernel: [438288.556917] CR2: 7f265ae7a000 CR3: 
01c0d000 CR4: 000427e0
May 19 14:03:54 maximk kernel: [438288.558432] Stack:
May 19 14:03:54 maximk kernel: [438288.559943]  88041fdedd80 
880319ff1800  88040529e500
May 19 14:03:54 maximk kernel: [438288.561481]  8804089edbb8 
8804089edbb8 8804089edbd8 88040529e7b0
May 19 14:03:54 maximk kernel: [438288.563010]  88040529e400 
 01c4 8804089edd18
May 19 14:03:54 maximk kernel: [438288.564545] Call Trace:
May 19 14:03:54 maximk kernel: [438288.566054]  [] 
prune_super+0x193/0x1b0
May 19 14:03:54 maximk kernel: [438288.567552]  [] 
shrink_slab+0x154/0x300
May 19 14:03:54 maximk kernel: [438288.569018]  [] ? 
vmpressure+0x96/0xa0
May 19 14:03:54 maximk kernel: [438288.570491]  [] 
kswapd_shrink_zone+0xfb/0x1a0
May 19 14:03:54 maximk kernel: [438288.571963]  [] 
balance_pgdat+0x32c/0x470
May 19 14:03:54 maximk kernel: [438288.573439]  [] ? 
vm_events_fold_cpu+0x50/0x50
May 19 14:03:54 maximk kernel: [438288.574922]  [] 
kswapd+0x123/0x240
May 19 14:03:54 maximk kernel: [438288.576398]  [] ? 
balance_pgdat+0x470/0x470
May 19 14:03:54 maximk kernel: [438288.577868]  [] 
kthread+0xc0/0xd0
May 19 14:03:54 maximk kernel: [438288.579330]  [] ? 
flush_kthread_worker+0xb0/0xb0
May 19 14:03:54 maximk kernel: [438288.580764]  [] 
ret_from_fork+0x7c/0xb0
May 19 14:03:54 maximk kernel: [438288.582190]  [] ? 
flush_kthread_worker+0xb0/0xb0
May 19 14:03:54 maximk kernel: [438288.583621] Code: 10 48 8d 7d c0 e8 cb ef ff 
ff 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 40 00 48 8b 13 48 8b 43 
08 4c 89 ef 48 89 42 08 <48> 89 10 48 89 1b 48 89 5b 08 e8 2b 09 e8 ff 66 90 41 
83 ac 24 
May 19 14:03:54 maximk kernel: [438288.586816] RIP  [] 
prune_icache_sb+0x1a6/0x340
May 19 14:03:54 maximk kernel: [438288.588370]  RSP 
May 19 14:03:54 maximk kernel: [438288.595099] ---[ end trace b89f93acb0e5743d 
]---
May 19 14:04:22 maximk kernel: [438316.982835] BUG: soft lockup - CPU#0 stuck 
for 22s! [rsync:21394]
May 19 14:04:22 maximk kernel: [438316.982839] Modules linked in: overlayfs 
vhost_net macvtap macvlan vhost ip6table_filter ip6_tables ebtable_nat ebtables 
ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 
xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp 
iptable_filter ip_tabl

[Bug 1318635] Re: qtbase failed to build on arm64 on utopic

2014-05-15 Thread Maxim Kuvyrkov
We can debug a compiler crash with PCH enabled.

Please attach a tarball that has all the files to reproduce the crash
and, ideally, a Makefile with command line.

Thank you.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1318635

Title:
  qtbase failed to build on arm64 on utopic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gcc-defaults/+bug/1318635/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1262287] Re: SSH sockets on overlayfs report connection refused

2014-05-09 Thread Maxim Kuvyrkov
*** This bug is a duplicate of bug 1214500 ***
https://bugs.launchpad.net/bugs/1214500

** This bug has been marked a duplicate of bug 1214500
   consistent failure with overlayfs and unix sockets

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1262287

Title:
  SSH sockets on overlayfs report connection refused

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1262287/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1251281] Re: gnome-flashback (metacity) fails to start without hardware acceleration, cloud/remote environments (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting)

2014-04-24 Thread Maxim Kuvyrkov
Hi Eugene,

Any user-friendly instructions on how to install packages from your PPA?
Or which packages need to be replaced?

Thank you.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1251281

Title:
  gnome-flashback (metacity) fails to start without hardware
  acceleration, cloud/remote environments
  (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/1251281/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1274013] Re: gnome-session is broken without 3d acceleration, breaking gnome-flashback on non-3D H/W and cloud environments (Forwarded-X, VNC and NX/X2GO)

2014-04-24 Thread Maxim Kuvyrkov
*** This bug is a duplicate of bug 1251281 ***
https://bugs.launchpad.net/bugs/1251281

Anyone has a workaround?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1274013

Title:
  gnome-session is broken without 3d acceleration, breaking gnome-
  flashback on non-3D H/W and cloud environments (Forwarded-X, VNC and
  NX/X2GO)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/1274013/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2014-01-08 Thread Maxim Kuvyrkov
Fixed on 2.18.1.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2014-01-08 Thread Maxim Kuvyrkov
Fixed in 2.16.1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2014-01-08 Thread Maxim Kuvyrkov
Fixed in 2.15.1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2014-01-08 Thread Maxim Kuvyrkov
Fixed in 2.17.1.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2014-01-01 Thread Maxim Kuvyrkov
Fixed on trunk only.  I've pinged release managers to merge the fix to
2.15 onwards.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2013-12-24 Thread Maxim Kuvyrkov
[For the benefit of Carlos and other developers]

There are two patches for this bug posted to libc-alpha@, one from
Ondrej and one from myself.

The attached Trusty Tahr reproduction testcase has line numbers for GDB
breakpoints wrong, and one has to correct them to get the failure.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2013-12-24 Thread Maxim Kuvyrkov
Created attachment 7331
Trusty reproduction testcase

Fixed trusty testcase.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1020210]

2013-12-24 Thread Maxim Kuvyrkov
Fixed by the above commit.

Real credit goes to Josh Pieper, whose carefully prepared testcase made
it possible to investigate and fix the bug.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1020210

Title:
  Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap
  corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs