[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13
Kernel 5.4.0-99-generic is now running without a fault for 40 days. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13
Kernel 5.4.0-99-generic is now running without a fault for 11 days. Kernels 5.11 and 5.13 crashed within 4-5 days of uptime. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13
The kernel BUG also happens with 5.11.0-46 and 5.13.0-28 kernels. In 5.11 the location of the fault is different, but the symptoms are very similar to crash in 5.13. Attached are kern.log excerpts for 5.11.0-46 and 5.13.0-28 crashes. I'm now testing 5.4.0-99-generic. ** Attachment added: "kern2.log" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+attachment/5560158/+files/kern2.log -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] acpidump.txt
apport information ** Attachment added: "acpidump.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560157/+files/acpidump.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560155/+files/UdevDb.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560153/+files/ProcModules.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560156/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] PulseList.txt
apport information ** Attachment added: "PulseList.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560154/+files/PulseList.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] ProcEnviron.txt
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560151/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] ProcCpuinfo.txt
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560149/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560152/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560150/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Lsusb-v.txt
apport information ** Attachment added: "Lsusb-v.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560148/+files/Lsusb-v.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Lsusb-t.txt
apport information ** Attachment added: "Lsusb-t.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560147/+files/Lsusb-t.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Lspci-vt.txt
apport information ** Attachment added: "Lspci-vt.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560145/+files/Lspci-vt.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Lsusb.txt
apport information ** Attachment added: "Lsusb.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560146/+files/Lsusb.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560144/+files/Lspci.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] CurrentDmesg.txt
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560143/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] CRDA.txt
apport information ** Attachment added: "CRDA.txt" https://bugs.launchpad.net/bugs/1959685/+attachment/5560142/+files/CRDA.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959685 Title: Kernel BUG with btrfs on linux 5.13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1959685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959685] Re: Kernel BUG with btrfs on linux 5.13
apport information ** Tags added: apport-collected focal ** Description changed: I am hitting the below kernel oops every 2-5 days on my home server box. RIP is always "0010:btrfs_evict_inode+0xa1/0x480 [btrfs]" and address is always "0068". I'm using btrfs in raid1 configuration for general storage. === Feb 1 01:40:38 server kernel: [172867.493851] BUG: kernel NULL pointer dereference, address: 0068 Feb 1 01:40:38 server kernel: [172867.493885] #PF: supervisor write access in kernel mode Feb 1 01:40:38 server kernel: [172867.493903] #PF: error_code(0x0002) - not-present page Feb 1 01:40:38 server kernel: [172867.493920] PGD 0 P4D 0 Feb 1 01:40:38 server kernel: [172867.493931] Oops: 0002 [#1] SMP PTI Feb 1 01:40:38 server kernel: [172867.493946] CPU: 2 PID: 104 Comm: kswapd0 Not tainted 5.13.0-27-generic #29~20.04.1-Ubuntu Feb 1 01:40:38 server kernel: [172867.493972] Hardware name: Gigabyte Technology Co., Ltd. H67MA-D2H-B3/H67MA-D2H-B3, BIOS F1 02/11/2011 Feb 1 01:40:38 server kernel: [172867.493999] RIP: 0010:btrfs_evict_inode+0xa1/0x480 [btrfs] Feb 1 01:40:38 server kernel: [172867.494070] Code: fd ff ff e8 d1 b1 9f c8 65 48 8b 04 25 c0 7b 01 00 48 89 45 b8 49 8b 84 24 f0 fd ff ff 48 85 c0 74 55 4d 8b b4 24 f8 fd ff ff 41 80 66 68 fe f0 41 80 66 68 f7 4c 89 f6 4c 89 ff e8 98 00 01 Feb 1 01:40:38 server kernel: [172867.494123] RSP: 0018:ab8dc042fad0 EFLAGS: 00010202 Feb 1 01:40:38 server kernel: [172867.494141] RAX: 0004 RBX: 8f01001251d8 RCX: 8f0100125040 Feb 1 01:40:38 server kernel: [172867.494163] RDX: 00ff RSI: RDI: 8f01001251d0 Feb 1 01:40:38 server kernel: [172867.494185] RBP: ab8dc042fb28 R08: R09: Feb 1 01:40:38 server kernel: [172867.494206] R10: 8f00c2ea6280 R11: 0001 R12: 8f01001253c0 Feb 1 01:40:38 server kernel: [172867.494228] R13: 8f01001251d0 R14: R15: 8f01001251b0 Feb 1 01:40:38 server kernel: [172867.494250] FS: () GS:8f03cfa8() knlGS: Feb 1 01:40:38 server kernel: [172867.494274] CS: 0010 DS: ES: CR0: 80050033 Feb 1 01:40:38 server kernel: [172867.494293] CR2: 0068 CR3: 000202810001 CR4: 000606e0 Feb 1 01:40:38 server kernel: [172867.494315] Call Trace: Feb 1 01:40:38 server kernel: [172867.494328] evict+0xd2/0x180 Feb 1 01:40:38 server kernel: [172867.494342] dispose_list+0x39/0x50 Feb 1 01:40:38 server kernel: [172867.494356] prune_icache_sb+0x5c/0x80 Feb 1 01:40:38 server kernel: [172867.494370] super_cache_scan+0x132/0x1b0 Feb 1 01:40:38 server kernel: [172867.494386] do_shrink_slab+0x144/0x2c0 Feb 1 01:40:38 server kernel: [172867.494402] shrink_slab+0x215/0x2b0 Feb 1 01:40:38 server kernel: [172867.494416] shrink_node+0x2dd/0x6f0 Feb 1 01:40:38 server kernel: [172867.494430] balance_pgdat+0x322/0x5f0 Feb 1 01:40:38 server kernel: [172867.494445] kswapd+0x1f8/0x380 Feb 1 01:40:38 server kernel: [172867.494458] ? wait_woken+0x80/0x80 Feb 1 01:40:38 server kernel: [172867.494473] ? balance_pgdat+0x5f0/0x5f0 Feb 1 01:40:38 server kernel: [172867.494487] kthread+0x12b/0x150 Feb 1 01:40:38 server kernel: [172867.494501] ? set_kthread_struct+0x40/0x40 Feb 1 01:40:38 server kernel: [172867.494516] ret_from_fork+0x22/0x30 Feb 1 01:40:38 server kernel: [172867.494532] Modules linked in: xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defra g_ipv6 nf_defrag_ipv4 bpfilter br_netfilter bridge stp llc aufs overlay snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_code c snd_hda_core snd_hwdep snd_pcm intel_rapl_msr snd_seq_midi snd_seq_midi_event mei_hdcp intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp snd_rawmidi kvm_intel kvm snd_seq crct10dif_pclmul ghash_ clmulni_intel snd_seq_device cryptd i915 rapl snd_timer intel_cstate serio_raw joydev drm_kms_helper input_leds cec snd rc_core i2c_algo_bit fb_sys_fops syscopyarea sysfillrect sysimgblt video soundcore mei_me m ei mac_hid sch_fq_codel msr parport_pc ppdev drm lp parport ip_tables x_tables autofs4 btrfs blake2b_generic xor zstd_compress raid6_pq libcrc32c uas usb_storage hid_generic usbhid hid Feb 1 01:40:38 server kernel: [172867.494581] gpio_ich crc32_pclmul lpc_ich r8169 i2c_i801 ahci i2c_smbus xhci_pci realtek libahci xhci_pci_renesas Feb 1 01:40:38 server kernel: [172867.497076] CR2: 0068 Feb 1 01:40:38 server kernel: [172867.497876] ---[ end trace 4ab76c62441acb52 ]--- Feb 1 01:40:38 server kernel: [172867.498695] RIP: 0010:btrfs_evict_inode+0xa1/0x480 [btrfs] Feb 1 01:40:38 server kerne
[Bug 1959685] [NEW] Kernel BUG with btrfs on linux 5.13
Public bug reported: I am hitting the below kernel oops every 2-5 days on my home server box. RIP is always "0010:btrfs_evict_inode+0xa1/0x480 [btrfs]" and address is always "0068". I'm using btrfs in raid1 configuration for general storage. === Feb 1 01:40:38 server kernel: [172867.493851] BUG: kernel NULL pointer dereference, address: 0068 Feb 1 01:40:38 server kernel: [172867.493885] #PF: supervisor write access in kernel mode Feb 1 01:40:38 server kernel: [172867.493903] #PF: error_code(0x0002) - not-present page Feb 1 01:40:38 server kernel: [172867.493920] PGD 0 P4D 0 Feb 1 01:40:38 server kernel: [172867.493931] Oops: 0002 [#1] SMP PTI Feb 1 01:40:38 server kernel: [172867.493946] CPU: 2 PID: 104 Comm: kswapd0 Not tainted 5.13.0-27-generic #29~20.04.1-Ubuntu Feb 1 01:40:38 server kernel: [172867.493972] Hardware name: Gigabyte Technology Co., Ltd. H67MA-D2H-B3/H67MA-D2H-B3, BIOS F1 02/11/2011 Feb 1 01:40:38 server kernel: [172867.493999] RIP: 0010:btrfs_evict_inode+0xa1/0x480 [btrfs] Feb 1 01:40:38 server kernel: [172867.494070] Code: fd ff ff e8 d1 b1 9f c8 65 48 8b 04 25 c0 7b 01 00 48 89 45 b8 49 8b 84 24 f0 fd ff ff 48 85 c0 74 55 4d 8b b4 24 f8 fd ff ff 41 80 66 68 fe f0 41 80 66 68 f7 4c 89 f6 4c 89 ff e8 98 00 01 Feb 1 01:40:38 server kernel: [172867.494123] RSP: 0018:ab8dc042fad0 EFLAGS: 00010202 Feb 1 01:40:38 server kernel: [172867.494141] RAX: 0004 RBX: 8f01001251d8 RCX: 8f0100125040 Feb 1 01:40:38 server kernel: [172867.494163] RDX: 00ff RSI: RDI: 8f01001251d0 Feb 1 01:40:38 server kernel: [172867.494185] RBP: ab8dc042fb28 R08: R09: Feb 1 01:40:38 server kernel: [172867.494206] R10: 8f00c2ea6280 R11: 0001 R12: 8f01001253c0 Feb 1 01:40:38 server kernel: [172867.494228] R13: 8f01001251d0 R14: R15: 8f01001251b0 Feb 1 01:40:38 server kernel: [172867.494250] FS: () GS:8f03cfa8() knlGS: Feb 1 01:40:38 server kernel: [172867.494274] CS: 0010 DS: ES: CR0: 80050033 Feb 1 01:40:38 server kernel: [172867.494293] CR2: 0068 CR3: 000202810001 CR4: 000606e0 Feb 1 01:40:38 server kernel: [172867.494315] Call Trace: Feb 1 01:40:38 server kernel: [172867.494328] evict+0xd2/0x180 Feb 1 01:40:38 server kernel: [172867.494342] dispose_list+0x39/0x50 Feb 1 01:40:38 server kernel: [172867.494356] prune_icache_sb+0x5c/0x80 Feb 1 01:40:38 server kernel: [172867.494370] super_cache_scan+0x132/0x1b0 Feb 1 01:40:38 server kernel: [172867.494386] do_shrink_slab+0x144/0x2c0 Feb 1 01:40:38 server kernel: [172867.494402] shrink_slab+0x215/0x2b0 Feb 1 01:40:38 server kernel: [172867.494416] shrink_node+0x2dd/0x6f0 Feb 1 01:40:38 server kernel: [172867.494430] balance_pgdat+0x322/0x5f0 Feb 1 01:40:38 server kernel: [172867.494445] kswapd+0x1f8/0x380 Feb 1 01:40:38 server kernel: [172867.494458] ? wait_woken+0x80/0x80 Feb 1 01:40:38 server kernel: [172867.494473] ? balance_pgdat+0x5f0/0x5f0 Feb 1 01:40:38 server kernel: [172867.494487] kthread+0x12b/0x150 Feb 1 01:40:38 server kernel: [172867.494501] ? set_kthread_struct+0x40/0x40 Feb 1 01:40:38 server kernel: [172867.494516] ret_from_fork+0x22/0x30 Feb 1 01:40:38 server kernel: [172867.494532] Modules linked in: xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defra g_ipv6 nf_defrag_ipv4 bpfilter br_netfilter bridge stp llc aufs overlay snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_code c snd_hda_core snd_hwdep snd_pcm intel_rapl_msr snd_seq_midi snd_seq_midi_event mei_hdcp intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp snd_rawmidi kvm_intel kvm snd_seq crct10dif_pclmul ghash_ clmulni_intel snd_seq_device cryptd i915 rapl snd_timer intel_cstate serio_raw joydev drm_kms_helper input_leds cec snd rc_core i2c_algo_bit fb_sys_fops syscopyarea sysfillrect sysimgblt video soundcore mei_me m ei mac_hid sch_fq_codel msr parport_pc ppdev drm lp parport ip_tables x_tables autofs4 btrfs blake2b_generic xor zstd_compress raid6_pq libcrc32c uas usb_storage hid_generic usbhid hid Feb 1 01:40:38 server kernel: [172867.494581] gpio_ich crc32_pclmul lpc_ich r8169 i2c_i801 ahci i2c_smbus xhci_pci realtek libahci xhci_pci_renesas Feb 1 01:40:38 server kernel: [172867.497076] CR2: 0068 Feb 1 01:40:38 server kernel: [172867.497876] ---[ end trace 4ab76c62441acb52 ]--- Feb 1 01:40:38 server kernel: [172867.498695] RIP: 0010:btrfs_evict_inode+0xa1/0x480 [btrfs] Feb 1 01:40:38 server kernel: [172867.499556] Code: fd ff ff e8 d1 b1 9f c8 65 48 8b 04 25 c0 7b 01 00 48 89 45 b8 49 8b 84 24 f0 fd ff ff 48 85 c0 74 55 4d 8b b4 24 f8 fd ff ff 41 80 66
[Bug 1766624] Re: AArch64 kernel panic on APM Mustang
No way to reproduce, unfortunately. This bug shows up once in a couple of months on otherwise a very stable machine. Bug manifests itself that "ps auxf" and related process-listing commands start to hang indefinitely. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1766624 Title: AArch64 kernel panic on APM Mustang To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1766624/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1766624] [NEW] AArch64 kernel panic on APM Mustang
Public bug reported: Random kernel panic on AArch64 APM Mustang running ubuntu xenial kernel. == [2244826.215921] Unhandled fault: alignment fault (0x9621) at 0x03b00a53 [2244826.223377] Internal error: : 9621 [#1] SMP [2244826.228057] Modules linked in: veth xt_nat xt_tcpudp ipt_MASQUERADE nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack x_tables nf_nat nf_conntrack br_netfilter bridge stp llc overlay shpchp xgene_edac edac_core xhci_plat_hcd xgene_rng uio_pdrv_genirq uio nfsd auth_rpcgss nfs_acl lockd grace ib_iser sunrpc rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear realtek ahci_xgene libahci_platform xgene_enet libahci mdio_xgene aes_neon_blk ablk_helper cryptd [2244826.293934] CPU: 3 PID: 7232 Comm: basename Not tainted 4.4.0-101-generic #124-Ubuntu [2244826.301896] Hardware name: AppliedMicro Mustang/Mustang, BIOS 1.1.0 Apr 22 2015 [2244826.309339] task: 800119bf6800 ti: 80013ec74000 task.ti: 80013ec74000 [2244826.316960] PC is at _raw_spin_lock_irqsave+0x24/0x60 [2244826.322158] LR is at try_to_wake_up+0x44/0x3a8 [2244826.326750] pc : [] lr : [] pstate: 61c5 [2244826.334279] sp : 80013ec77b40 [2244826.337746] x29: 80013ec77b40 x28: 0075 [2244826.343224] x27: 80001c1d3b80 x26: 800166d75a70 [2244826.348698] x25: 8000fad8c190 x24: 800166d75a80 [2244826.354175] x23: x22: 0003 [2244826.359652] x21: 03b00a53 x20: [2244826.365128] x19: 03b00a53 x18: [2244826.370603] x17: x16: 80210960 [2244826.376079] x15: x14: [2244826.381553] x13: x12: [2244826.387029] x11: 8003e9a36700 x10: 00d6 [2244826.392504] x9 : 8093fee8 x8 : [2244826.397978] x7 : 8000fad8ccf8 x6 : 8000fad8c258 [2244826.403452] x5 : x4 : 0001 [2244826.408927] x3 : x2 : [2244826.414402] x1 : 0003 x0 : 01c0 [2244826.421531] Process basename (pid: 7232, stack limit = 0x80013ec74020) [2244826.428543] Stack: (0x80013ec77b40 to 0x80013ec78000) [2244826.434432] 7b40: 80013ec77b60 800f28b4 03b003af 8003ee0c4000 [2244826.442393] 7b60: 80013ec77bc0 800f2c40 03b003af 0001 [2244826.450355] 7b80: 800166d75a70 800166d75a68 800166d75a70 800166d75a80 [2244826.458316] 7ba0: 8000fad8c190 800166d75a70 80001c1d3b80 0075 [2244826.466276] 7bc0: 80013ec77be0 8011433c 03b003af 8090ed94 [2244826.474237] 7be0: 80013ec77c20 8090ef30 800166d75a68 0001 [2244826.482199] 7c00: 80db2000 800166d75a40 8020b790 [2244826.490159] 7c20: 80013ec77cb0 8090e320 800166d75a68 [2244826.498121] 7c40: 8000fad8cd48 800166d75a40 [2244826.506082] 7c60: 8000fad8c190 800166d75a60 80001c1d3b80 8000fad8ccb0 [2244826.514044] 7c80: 8000fad8c960 800143927b68 800143927c88 800119bf6800 [2244826.522006] 7ca0: 8001 cb88537fdc8ba65f 80013ec77cd0 8020c640 [2244826.529966] 7cc0: 8000fad8cc80 80013ec77d70 8020ccb8 [2244826.537927] 7ce0: 8000fad8c190 8000fad8cc80 f7517000 [2244826.545889] 7d00: 80eb4000 80001c1d3b80 80013ec77eb0 [2244826.553850] 7d20: 0010 0075 80eb4000 [2244826.561812] 7d40: 1c1d3b80 00d6 8003e9a36700 f7507000 [2244826.569774] 7d60: f7517000 80013ec77db0 8020e104 [2244826.577736] 7d80: 80001c1d3b80 8000fad8cc80 f7517000 [2244826.585696] 7da0: f7507000 f7517000 80013ec77df0 80210920 [2244826.593657] 7dc0: 8000fad8cc80 0070 [2244826.601617] 7de0: 80013ec77e50 80210aa0 [2244826.609579] 7e00: f7517000 0070 f7517000 80db2000 [2244826.617541] 7e20: f7507000 [2244826.625502] 7e40: 8000fad8cc80 80013ec74000 80085df0 [2244826.633462] 7e60: 0040 f752ee26 [2244826.641423] 7e80: 2030 0011 0
[Bug 1759369] Re: kernel build fails on arm64
Tentative fix applied, see bugs.linaro.org #3718 . -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1759369 Title: kernel build fails on arm64 To manage notifications about this bug go to: https://bugs.launchpad.net/gcc-linaro/+bug/1759369/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1336794] Re: 9pfs does not honor open file handles on unlinked files
Hi Greg, Did you push the qemu patch upstream, and now it is a matter of fixing the kernel? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1336794 Title: 9pfs does not honor open file handles on unlinked files To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1336794/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1590236] Re: perf --call-graph dwarf doesn't record correct call graph
Perf utility from linux-tools is affected for AArch64. ** Also affects: linux-meta (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1590236 Title: perf --call-graph dwarf doesn't record correct call graph To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libunwind/+bug/1590236/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1590236] Re: perf --call-graph dwarf doesn't record correct call graph
IMO, the AArch64 libunwind port (included via AArch64-port.diff debian patch) should be setting enable_debug_frame to "yes" for aarch64 alongside arm in confirure.ac: AC_MSG_CHECKING([whether to load .debug_frame sections]) AC_ARG_ENABLE(debug_frame, AS_HELP_STRING([--enable-debug-frame],[Load the ".debug_frame" section if available]),, [ case "${target_arch}" in (arm) enable_debug_frame=yes;; (*) enable_debug_frame=no;; esac]) if test x$enable_debug_frame = xyes; then AC_DEFINE([CONFIG_DEBUG_FRAME], [], [Enable Debug Frame]) fi AC_MSG_RESULT([$enable_debug_frame]) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1590236 Title: perf --call-graph dwarf doesn't record correct call graph To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libunwind/+bug/1590236/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1251281] Re: gnome-session-flashback fails to start without hardware acceleration in cloud/remote environments (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting)
Hi, Would, please, someone clarify for users whether the fix will be backported to trusty's gnome-session or to any other released ubuntu version? Thank you. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1251281 Title: gnome-session-flashback fails to start without hardware acceleration in cloud/remote environments (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting) To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-session/+bug/1251281/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019
** Changed in: gcc-linaro Assignee: (unassigned) => Kumar Venkataramanan (venkataramanan-kumar) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1349570 Title: ICE in change_address_1, at emit-rtl.c:2019 To manage notifications about this bug go to: https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019
Also confirmed on linaro-4.8-branch as of yesterday ** Changed in: gcc-linaro Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1349570 Title: ICE in change_address_1, at emit-rtl.c:2019 To manage notifications about this bug go to: https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019
We track Linaro toolchain bugs on bugs.linaro.org. Please report future bugs there directly. This is now https://bugs.linaro.org/show_bug.cgi?id=307 ** Bug watch added: Linaro Bug Tracking System #307 https://bugs.linaro.org/show_bug.cgi?id=307 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1349570 Title: ICE in change_address_1, at emit-rtl.c:2019 To manage notifications about this bug go to: https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1349570] Re: ICE in change_address_1, at emit-rtl.c:2019
Thanks for the testcase. This is reproducible with 4.8 2014.04 (our latest 4.8), but not with 4.9 2014.06 (didn't test other 4.9 versions). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1349570 Title: ICE in change_address_1, at emit-rtl.c:2019 To manage notifications about this bug go to: https://bugs.launchpad.net/gcc-linaro/+bug/1349570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1325503] Re: gdb reports 'corrupt stack' on armhf without symbols
How was "sleep" and system glibc compiled? To get reliable stack traces GDB has to have access to either frame pointer (-fno-omit-frame-pointer compiler flag) or to unwind tables (-funwind-tables). In the absence of either of these, GDB has to guess where stack frame boundaries are. In this case GDB guesses wrong. The recommended way to get reliable stack traces is to use -funwind- tables, which does not have performance penalty (like -fno-omit-frame- pointer), and only increases disk footprint of binaries by several percent. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1325503 Title: gdb reports 'corrupt stack' on armhf without symbols To manage notifications about this bug go to: https://bugs.launchpad.net/gdb-linaro/+bug/1325503/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1321005] [NEW] Kernel crash: kswapd, rsync, overlayfs
Public bug reported: I've encountered the following kernel crash on a system that heavily uses overlayfs. While not necessarily an overlayfs problem, it (adding overlayfs) was the last major change to the system. During the crash rsync was synchronizing non-overlayfs directory which was bind-mounted on an overlayfs filesystem (i.e., /home under schroot). May 19 14:03:54 maximk kernel: [438288.554691] general protection fault: [#1] SMP May 19 14:03:54 maximk kernel: [438288.554735] Modules linked in: overlayfs vhost_net macvtap macvlan vhost ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp iptable_filter ip_tables x_tables bridge stp llc kvm_intel kvm rfcomm bnep parport_pc ppdev bluetooth binfmt_misc snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device dm_multipath scsi_dh snd soundcore i915 snd_page_alloc mei_me mei drm_kms_helper drm serio_raw gpio_ich mac_hid lp i2c_algo_bit video parport lpc_ich ahci libahci r8169 mii May 19 14:03:54 maximk kernel: [438288.555233] CPU: 1 PID: 59 Comm: kswapd0 Not tainted 3.11.0-20-generic #35~precise1-Ubuntu May 19 14:03:54 maximk kernel: [438288.555279] Hardware name: Gigabyte Technology Co., Ltd. H67MA-D2H-B3/H67MA-D2H-B3, BIOS F6 03/27/2012 May 19 14:03:54 maximk kernel: [438288.555331] task: 8804089f1770 ti: 8804089ec000 task.ti: 8804089ec000 May 19 14:03:54 maximk kernel: [438288.555372] RIP: 0010:[] [] prune_icache_sb+0x1a6/0x340 May 19 14:03:54 maximk kernel: [438288.555428] RSP: 0018:8804089edb98 EFLAGS: 00010206 May 19 14:03:54 maximk kernel: [438288.555458] RAX: 08fd15b88804 RBX: 8803e78269ac RCX: 0001 May 19 14:03:54 maximk kernel: [438288.555498] RDX: 88040529e508 RSI: 01c4 RDI: 8803e782693c May 19 14:03:54 maximk kernel: [438288.37] RBP: 8804089edbf8 R08: R09: May 19 14:03:54 maximk kernel: [438288.92] R10: 0001 R11: R12: 88040529e400 May 19 14:03:54 maximk kernel: [438288.555632] R13: 8803e782693c R14: 010d R15: 88040529e508 May 19 14:03:54 maximk kernel: [438288.555672] FS: () GS:88041fa4() knlGS: May 19 14:03:54 maximk kernel: [438288.555714] CS: 0010 DS: ES: CR0: 80050033 May 19 14:03:54 maximk kernel: [438288.556917] CR2: 7f265ae7a000 CR3: 01c0d000 CR4: 000427e0 May 19 14:03:54 maximk kernel: [438288.558432] Stack: May 19 14:03:54 maximk kernel: [438288.559943] 88041fdedd80 880319ff1800 88040529e500 May 19 14:03:54 maximk kernel: [438288.561481] 8804089edbb8 8804089edbb8 8804089edbd8 88040529e7b0 May 19 14:03:54 maximk kernel: [438288.563010] 88040529e400 01c4 8804089edd18 May 19 14:03:54 maximk kernel: [438288.564545] Call Trace: May 19 14:03:54 maximk kernel: [438288.566054] [] prune_super+0x193/0x1b0 May 19 14:03:54 maximk kernel: [438288.567552] [] shrink_slab+0x154/0x300 May 19 14:03:54 maximk kernel: [438288.569018] [] ? vmpressure+0x96/0xa0 May 19 14:03:54 maximk kernel: [438288.570491] [] kswapd_shrink_zone+0xfb/0x1a0 May 19 14:03:54 maximk kernel: [438288.571963] [] balance_pgdat+0x32c/0x470 May 19 14:03:54 maximk kernel: [438288.573439] [] ? vm_events_fold_cpu+0x50/0x50 May 19 14:03:54 maximk kernel: [438288.574922] [] kswapd+0x123/0x240 May 19 14:03:54 maximk kernel: [438288.576398] [] ? balance_pgdat+0x470/0x470 May 19 14:03:54 maximk kernel: [438288.577868] [] kthread+0xc0/0xd0 May 19 14:03:54 maximk kernel: [438288.579330] [] ? flush_kthread_worker+0xb0/0xb0 May 19 14:03:54 maximk kernel: [438288.580764] [] ret_from_fork+0x7c/0xb0 May 19 14:03:54 maximk kernel: [438288.582190] [] ? flush_kthread_worker+0xb0/0xb0 May 19 14:03:54 maximk kernel: [438288.583621] Code: 10 48 8d 7d c0 e8 cb ef ff ff 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 40 00 48 8b 13 48 8b 43 08 4c 89 ef 48 89 42 08 <48> 89 10 48 89 1b 48 89 5b 08 e8 2b 09 e8 ff 66 90 41 83 ac 24 May 19 14:03:54 maximk kernel: [438288.586816] RIP [] prune_icache_sb+0x1a6/0x340 May 19 14:03:54 maximk kernel: [438288.588370] RSP May 19 14:03:54 maximk kernel: [438288.595099] ---[ end trace b89f93acb0e5743d ]--- May 19 14:04:22 maximk kernel: [438316.982835] BUG: soft lockup - CPU#0 stuck for 22s! [rsync:21394] May 19 14:04:22 maximk kernel: [438316.982839] Modules linked in: overlayfs vhost_net macvtap macvlan vhost ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp iptable_filter ip_tabl
[Bug 1318635] Re: qtbase failed to build on arm64 on utopic
We can debug a compiler crash with PCH enabled. Please attach a tarball that has all the files to reproduce the crash and, ideally, a Makefile with command line. Thank you. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1318635 Title: qtbase failed to build on arm64 on utopic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gcc-defaults/+bug/1318635/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1262287] Re: SSH sockets on overlayfs report connection refused
*** This bug is a duplicate of bug 1214500 *** https://bugs.launchpad.net/bugs/1214500 ** This bug has been marked a duplicate of bug 1214500 consistent failure with overlayfs and unix sockets -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1262287 Title: SSH sockets on overlayfs report connection refused To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1262287/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1251281] Re: gnome-flashback (metacity) fails to start without hardware acceleration, cloud/remote environments (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting)
Hi Eugene, Any user-friendly instructions on how to install packages from your PPA? Or which packages need to be replaced? Thank you. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1251281 Title: gnome-flashback (metacity) fails to start without hardware acceleration, cloud/remote environments (Forwarded-X/XRDP/VNC/NX/X2GO/Chromoting) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/1251281/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1274013] Re: gnome-session is broken without 3d acceleration, breaking gnome-flashback on non-3D H/W and cloud environments (Forwarded-X, VNC and NX/X2GO)
*** This bug is a duplicate of bug 1251281 *** https://bugs.launchpad.net/bugs/1251281 Anyone has a workaround? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1274013 Title: gnome-session is broken without 3d acceleration, breaking gnome- flashback on non-3D H/W and cloud environments (Forwarded-X, VNC and NX/X2GO) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-session/+bug/1274013/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
Fixed on 2.18.1. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
Fixed in 2.16.1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
Fixed in 2.15.1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
Fixed in 2.17.1. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
Fixed on trunk only. I've pinged release managers to merge the fix to 2.15 onwards. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
[For the benefit of Carlos and other developers] There are two patches for this bug posted to libc-alpha@, one from Ondrej and one from myself. The attached Trusty Tahr reproduction testcase has line numbers for GDB breakpoints wrong, and one has to correct them to get the failure. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
Created attachment 7331 Trusty reproduction testcase Fixed trusty testcase. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1020210]
Fixed by the above commit. Real credit goes to Josh Pieper, whose carefully prepared testcase made it possible to investigate and fix the bug. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1020210 Title: Race condition using ATOMIC_FASTBINS in _int_free causes crash or heap corruption To manage notifications about this bug go to: https://bugs.launchpad.net/eglibc/+bug/1020210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs