[Bug 1301439] Re: General Protection fault

2014-04-03 Thread Rob Schmidt
I can't test easily against mainline due to some API changes in the
kernel that are blocking stable zfs builds.

In any case I have tested in against 3.11 and it doesn't appear there.
I'll close 'kernel-fixed-upstream' based on the 3.11 test and will open
a different ticket if it reoccurs in trusty.

** Tags added: kernel-fixed-upstream

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1301439

Title:
  General Protection fault

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1301439/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1301439] Re: General Protection fault

2014-04-02 Thread Rob Schmidt
apport information

** Tags added: apport-collected precise

** Description changed:

  I've found a reproducible bug in 3.8.0 kernels installed in precise.
  
  We did an EFI install and it used this newer kernel which seemed to be
  selected from:
  
  linux-signed-generic-lts-raring
  
  dmesg output:
  
  [366681.745292] general protection fault:  [#1] SMP
  [366681.745640] Modules linked in: btrfs(F) ufs(F) qnx4(F) hfsplus(F) hfs(F) 
minix(F) ntfs(F) msdos(F) jfs(F) xfs(F) libcrc32c(F)
  reiserfs(F) vhost_net(F) macvtap(F) macvlan(F) ip6table_filter(F) 
ip6_tables(F) iptable_filter(F) ip_tables(F) ipmi_devintf(F) ebt
  able_nat(F) ebtables(F) x_tables(F) ipmi_si(F) ipmi_msghandler(F) coretemp(F) 
kvm_intel(F) kvm(F) ghash_clmulni_intel(F) aesni_int
  el(F) ablk_helper(F) cryptd(F) lrw(F) bridge(F) aes_x86_64(F) xts(F) 
gf128mul(F) stp(F) llc(F) gpio_ich(F) dm_multipath(F) scsi_dh
  (F) sb_edac(F) microcode(F) edac_core(F) ioatdma(F) mei(F) joydev(F) 
lpc_ich(F) nfsd(F) mac_hid(F) wmi(F) nfs_acl(F) auth_rpcgss(F
  ) nfs(F) lp(F) parport(F) fscache(F) lockd(F) sunrpc(F) nls_iso8859_1(F) 
ext2(F) zfs(POF) zcommon(POF) znvpair(POF) zavl(POF) zuni
  code(POF) spl(OF) zlib_deflate(F) ses(F) enclosure(F) hid_generic(F) igb(F) 
mpt2sas(F) usbhid(F) ahci(F) dca(F) ptp(F) scsi_transp
  ort_sas(F) hid(F) megaraid_sas(F) libahci(F) pps_core(F) raid_class(F)
  [366681.752501] CPU 18
  [366681.752644] Pid: 5937, comm: vhost-9024 Tainted: PF  O 
3.8.0-29-generic #42~precise1-Ubuntu Supermicro X9DRD-7LN4F(-JB
  OD)/X9DRD-EF/X9DRD-7LN4F
  [366681.753558] RIP: 0010:[816df39e]  [816df39e] 
put_compound_page.part.12+0x34/0x11f
  [366681.754192] RSP: 0018:88178840bbb8  EFLAGS: 00010292
  [366681.754547] RAX: 8817d750b200 RBX: 2424242424242424 RCX: 
8817d750b6c0
  [366681.755033] RDX:  RSI: 8817d750b600 RDI: 
8817d750b600
  [366681.755514] RBP: 88178840bbc8 R08: 0001 R09: 
1000
  [366681.755995] R10: 8817689a4518 R11: 0001 R12: 
8817d750b600
  [366681.756474] R13: edd2 R14: 814f354b R15: 
0042
  [366681.756957] FS:  () GS:88207fcc() 
knlGS:
  [366681.757500] CS:  0010 DS:  ES:  CR0: 80050033
  [366681.757886] CR2: 7fa51d6e6590 CR3: 002027561000 CR4: 
000427e0
  [366681.758380] DR0:  DR1:  DR2: 

  [366681.759020] DR3:  DR6: 0ff0 DR7: 
0400
  [366681.759480] Process vhost-9024 (pid: 5937, threadinfo 88178840a000, 
task 88101ad5dd00)
  [366681.759962] Stack:
  [366681.760103]  881f86698f00 0012 88178840bbd8 
81141b7c
  [366681.760646]  88178840bbe8 81141f4c 88178840bc08 
815d57a8
  [366681.761188]  881f86698f00 881f86698f00 88178840bc18 
815d58c5
  [366681.761725] Call Trace:
  [366681.761899]  [81141b7c] put_compound_page+0x3c/0x50
  [366681.777499]  [81141f4c] put_page+0x2c/0x40
  [366681.795022]  [815d57a8] skb_release_data.part.43+0x48/0x110
  [366681.811077]  [815d58c5] skb_release_data+0x55/0x60
  [366681.826501]  [815d58ee] __kfree_skb+0x1e/0x30
  [366681.841922]  [815d5945] kfree_skb+0x45/0xc0
  [366681.856525]  [814f354b] tun_get_user+0x61b/0x640
  [366681.871554]  [814f35c4] tun_sendmsg+0x54/0x80
  [366681.885502]  [a04b8ca7] handle_tx+0x307/0x5e0 [vhost_net]
  [366681.899875]  [a04b8fb5] handle_tx_kick+0x15/0x20 [vhost_net]
  [366681.913024]  [a04b5e9d] vhost_worker+0xfd/0x1a0 [vhost_net]
  [366681.926011]  [a04b5da0] ? vhost_set_memory+0x130/0x130 
[vhost_net]
  [366681.939190]  [8107f1b0] kthread+0xc0/0xd0
  [366681.951561]  [8107f0f0] ? flush_kthread_worker+0xb0/0xb0
  [366681.964097]  [816fc82c] ret_from_fork+0x7c/0xb0
  [366681.976040]  [8107f0f0] ? flush_kthread_worker+0xb0/0xb0
  [366681.988050] Code: 41 54 49 89 fc 53 48 8b 07 f6 c4 80 0f 84 9f 00 00 00 
48 8b 5f 30 48 8b 07 f6 c4 80 0f 84 8f 00 00 00 48 39
  df 0f 84 86 00 00 00 8b 53 1c 85 d2 74 7f 8d 4a 01 48 8d 73 1c 89 d0 f0 0f 
b1 4b 1c
  [366682.024399] RIP  [816df39e] put_compound_page.part.12+0x34/0x11f
  [366682.036323]  RSP 88178840bbb8
  [366682.073799] ---[ end trace ab95cd543919cb1f ]---
  
  
  reproduced by doing an nfs export from zfs running on the host (It is 
possible it is related to zfs, but it doesn't show up in the call trace).
  
  I've reproduced it on two similar machines.
  
- I've also checked it against newer version of qemu (1.5) didn't resolve
- the problem.
+ I've also checked it against newer version of qemu (1.5) didn't resolve the 
problem.
+ --- 
+ AlsaDevices:
+  total 0
+  crw-rw---T 1 root audio 116,  1 Apr  1 16:05 seq
+  crw-rw---T 1 root audio 116, 33 Apr  1 16:05 timer
+ AplayDevices: 

[Bug 1301439] Re: General Protection fault

2014-04-02 Thread Rob Schmidt
downgrading the kernel (to the precise kernel) seems to eliminate the
problem. Can try upgrading to the newest too if that is helpful.

root@toma:/usr/src# uname -a
Linux toma 3.2.0-60-generic #91-Ubuntu SMP Wed Feb 19 03:54:44 UTC 2014 x86_64 
x86_64 x86_64 GNU/Linux

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1301439

Title:
  General Protection fault

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1301439/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1301439] Re: General Protection fault

2014-04-02 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.14 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, 
please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as 
Confirmed.


Thanks in advance.


[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.14-trusty/

** Changed in: linux (Ubuntu)
   Importance: Undecided = Medium

** Changed in: linux (Ubuntu)
   Status: Confirmed = Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1301439

Title:
  General Protection fault

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1301439/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 1301439] Re: General Protection fault

2014-04-02 Thread Rob Schmidt
On Wed, Apr 2, 2014 at 3:34 PM, Joseph Salisbury
joseph.salisb...@canonical.com wrote:
 Would it be possible for you to test the latest upstream kernel? Refer
 to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
 v3.14 kernel[0].

 If this bug is fixed in the mainline kernel, please add the following
 tag 'kernel-fixed-upstream'.

 If the mainline kernel does not fix this bug, please add the tag:
 'kernel-bug-exists-upstream'.

 If you are unable to test the mainline kernel, for example it will not boot, 
 please add the tag: 'kernel-unable-to-test-upstream'.
 Once testing of the upstream kernel is complete, please mark this bug as 
 Confirmed.


 Thanks in advance.


 [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.14-trusty/

 ** Changed in: linux (Ubuntu)
Importance: Undecided = Medium

 ** Changed in: linux (Ubuntu)
Status: Confirmed = Incomplete

 --
 You received this bug notification because you are subscribed to the bug
 report.
 https://bugs.launchpad.net/bugs/1301439

 Title:
   General Protection fault

 Status in linux package in Ubuntu:
   Incomplete

 Bug description:
   I've found a reproducible bug in 3.8.0 kernels installed in precise.

   We did an EFI install and it used this newer kernel which seemed to be
   selected from:

   linux-signed-generic-lts-raring

   dmesg output:

   [366681.745292] general protection fault:  [#1] SMP
   [366681.745640] Modules linked in: btrfs(F) ufs(F) qnx4(F) hfsplus(F) 
 hfs(F) minix(F) ntfs(F) msdos(F) jfs(F) xfs(F) libcrc32c(F)
   reiserfs(F) vhost_net(F) macvtap(F) macvlan(F) ip6table_filter(F) 
 ip6_tables(F) iptable_filter(F) ip_tables(F) ipmi_devintf(F) ebt
   able_nat(F) ebtables(F) x_tables(F) ipmi_si(F) ipmi_msghandler(F) 
 coretemp(F) kvm_intel(F) kvm(F) ghash_clmulni_intel(F) aesni_int
   el(F) ablk_helper(F) cryptd(F) lrw(F) bridge(F) aes_x86_64(F) xts(F) 
 gf128mul(F) stp(F) llc(F) gpio_ich(F) dm_multipath(F) scsi_dh
   (F) sb_edac(F) microcode(F) edac_core(F) ioatdma(F) mei(F) joydev(F) 
 lpc_ich(F) nfsd(F) mac_hid(F) wmi(F) nfs_acl(F) auth_rpcgss(F
   ) nfs(F) lp(F) parport(F) fscache(F) lockd(F) sunrpc(F) nls_iso8859_1(F) 
 ext2(F) zfs(POF) zcommon(POF) znvpair(POF) zavl(POF) zuni
   code(POF) spl(OF) zlib_deflate(F) ses(F) enclosure(F) hid_generic(F) igb(F) 
 mpt2sas(F) usbhid(F) ahci(F) dca(F) ptp(F) scsi_transp
   ort_sas(F) hid(F) megaraid_sas(F) libahci(F) pps_core(F) raid_class(F)
   [366681.752501] CPU 18
   [366681.752644] Pid: 5937, comm: vhost-9024 Tainted: PF  O 
 3.8.0-29-generic #42~precise1-Ubuntu Supermicro X9DRD-7LN4F(-JB
   OD)/X9DRD-EF/X9DRD-7LN4F
   [366681.753558] RIP: 0010:[816df39e]  [816df39e] 
 put_compound_page.part.12+0x34/0x11f
   [366681.754192] RSP: 0018:88178840bbb8  EFLAGS: 00010292
   [366681.754547] RAX: 8817d750b200 RBX: 2424242424242424 RCX: 
 8817d750b6c0
   [366681.755033] RDX:  RSI: 8817d750b600 RDI: 
 8817d750b600
   [366681.755514] RBP: 88178840bbc8 R08: 0001 R09: 
 1000
   [366681.755995] R10: 8817689a4518 R11: 0001 R12: 
 8817d750b600
   [366681.756474] R13: edd2 R14: 814f354b R15: 
 0042
   [366681.756957] FS:  () GS:88207fcc() 
 knlGS:
   [366681.757500] CS:  0010 DS:  ES:  CR0: 80050033
   [366681.757886] CR2: 7fa51d6e6590 CR3: 002027561000 CR4: 
 000427e0
   [366681.758380] DR0:  DR1:  DR2: 
 
   [366681.759020] DR3:  DR6: 0ff0 DR7: 
 0400
   [366681.759480] Process vhost-9024 (pid: 5937, threadinfo 88178840a000, 
 task 88101ad5dd00)
   [366681.759962] Stack:
   [366681.760103]  881f86698f00 0012 88178840bbd8 
 81141b7c
   [366681.760646]  88178840bbe8 81141f4c 88178840bc08 
 815d57a8
   [366681.761188]  881f86698f00 881f86698f00 88178840bc18 
 815d58c5
   [366681.761725] Call Trace:
   [366681.761899]  [81141b7c] put_compound_page+0x3c/0x50
   [366681.777499]  [81141f4c] put_page+0x2c/0x40
   [366681.795022]  [815d57a8] skb_release_data.part.43+0x48/0x110
   [366681.811077]  [815d58c5] skb_release_data+0x55/0x60
   [366681.826501]  [815d58ee] __kfree_skb+0x1e/0x30
   [366681.841922]  [815d5945] kfree_skb+0x45/0xc0
   [366681.856525]  [814f354b] tun_get_user+0x61b/0x640
   [366681.871554]  [814f35c4] tun_sendmsg+0x54/0x80
   [366681.885502]  [a04b8ca7] handle_tx+0x307/0x5e0 [vhost_net]
   [366681.899875]  [a04b8fb5] handle_tx_kick+0x15/0x20 [vhost_net]
   [366681.913024]  [a04b5e9d] vhost_worker+0xfd/0x1a0 [vhost_net]
   [366681.926011]  [a04b5da0] ? vhost_set_memory+0x130/0x130 
 [vhost_net]
   [366681.939190]  [8107f1b0] kthread+0xc0/0xd0
   [366681.951561]  

[Bug 1301439] Re: General Protection fault

2014-04-02 Thread Rob Schmidt
I have tested it against a newer kernel (3.11) from saucy and the bug is
fixed there.


I'll test it against the newest mainline just for completeness, but suspect it 
is fixed there as well.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1301439

Title:
  General Protection fault

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1301439/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs