[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic

2017-02-08 Thread Peng
Hi Seth,

What's the right way to try your kernel?
I created a test snap to reproduce the issue:
https://github.com/pliu6/docker-kernel-panic-test

With the test snap, I can reproduce the issue with official linux-
image-4.4.0-59-generic, but after I tried to install the kernel image
from the link you gave, I am not able to boot the machine.

The issue can not be reproduced with an old version kernel on my machine
(official 4.2.0-42-generic).

Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662754

Title:
  Calling docker command from a snap leads a kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic

2017-02-08 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Tags added: kernel-da-key

** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662754

Title:
  Calling docker command from a snap leads a kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic

2017-02-07 Thread Seth Arnold
This is likely
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1660840 -- it's
possible the kernel in http://people.canonical.com/~jj/linux+jj/ has a
fix for this.

Could you please test and report back?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662754

Title:
  Calling docker command from a snap leads a kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic

2017-02-07 Thread Peng
This bug is similar to
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1651944, even
though the steps to reproduce are different.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662754

Title:
  Calling docker command from a snap leads a kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic

2017-02-07 Thread Peng
Kernel log is below:
[ 3629.712878] BUG: unable to handle kernel paging request at fff3
[ 3629.796735] IP: [] strlen+0x0/0x20
[ 3629.856430] PGD 1e0d067 PUD 1e0f067 PMD 0 
[ 3629.906140] Oops:  [#4] SMP 
[ 3629.945243] Modules linked in: xt_nat xt_tcpudp veth xt_comment 
ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype xt_conntrack nf_nat nf_conntrack 
br_netfilter bridge stp llc overlay aufs arc4 ath10k_pci ath9k ath10k_core 
ath9k_common ath9k_hw ath mac80211 kvm_amd kvm uas irqbypass cfg80211 k10temp 
sp5100_tco r8169 i2c_piix4 mii shpchp mac_hid iptable_filter ip_tables 
ip6table_filter ip6_tables x_tables autofs4 mmc_block sdhci_acpi sdhci_pci 
sdhci virtio_scsi nls_iso8859_1 usb_storage ahci libahci
[ 3630.543640] CPU: 0 PID: 2479 Comm: snap-confine Tainted: G  D 
4.4.0-59-generic #80-Ubuntu
[ 3630.654077] Hardware name: PC Engines APU/APU, BIOS 4.0 09/08/2014
[ 3630.728123] task: 88007a338000 ti: 88007a388000 task.ti: 
88007a388000
[ 3630.817768] RIP: 0010:[]  [] 
strlen+0x0/0x20
[ 3630.906581] RSP: 0018:88007a38ba20  EFLAGS: 00010246
[ 3630.970226] RAX: 88007a38bb20 RBX: fff3 RCX: 
[ 3631.055710] RDX: 0151 RSI: fff3 RDI: fff3
[ 3631.141195] RBP: 88007a38ba38 R08: 880060a4c93b R09: 88007a38ba94
[ 3631.226679] R10: 000e R11: 880060a4c934 R12: 88007a701240
[ 3631.312163] R13: 88007a338000 R14: 8139b3d0 R15: fff3
[ 3631.397650] FS:  7f0e8d98b740() GS:88007de0() 
knlGS:
[ 3631.494574] CS:  0010 DS:  ES:  CR0: 80050033
[ 3631.563417] CR2: fff3 CR3: 6719a000 CR4: 06f0
[ 3631.648901] Stack:
[ 3631.673030]  8112333a 88007a701240 88007a38bb00 
88007a38ba60
[ 3631.762464]  8139b438 88007a701240 88007a38bb00 
88007a338000
[ 3631.851901]  88007a38bad8 81370498 81229680 
88007a38baf0
[ 3631.941337] Call Trace:
[ 3631.970675]  [] ? audit_log_untrustedstring+0x1a/0x30
[ 3632.049919]  [] audit_cb+0x68/0x3f0
[ 3632.110444]  [] common_lsm_audit+0x1b8/0x740
[ 3632.180330]  [] ? alloc_inode+0x50/0x90
[ 3632.245011]  [] ? prepend_path+0xc6/0x2a0
[ 3632.311779]  [] aa_audit+0x5f/0x170
[ 3632.372300]  [] audit_mount+0x152/0x160
[ 3632.436988]  [] match_mnt_path_str+0x1dd/0x490
[ 3632.508951]  [] ? dentry_path+0x18/0x70
[ 3632.573638]  [] match_mnt+0xda/0x150
[ 3632.635203]  [] aa_bind_mount+0x100/0x180
[ 3632.701969]  [] wrap_apparmor_sb_mount+0x1c0/0x270
[ 3632.778095]  [] security_sb_mount+0x57/0x80
[ 3632.846939]  [] do_mount+0xab/0xda0
[ 3632.907468]  [] ? __kmalloc_track_caller+0x1b4/0x250
[ 3632.985668]  [] ? hrtimer_try_to_cancel+0xd1/0x130
[ 3633.061798]  [] ? memdup_user+0x42/0x70
[ 3633.126479]  [] SyS_mount+0x9f/0x100
[ 3633.188050]  [] entry_SYSCALL_64_fastpath+0x16/0x71
[ 3633.265205] Code: 89 f8 48 89 e5 f6 82 e0 0d a5 81 20 74 10 48 83 c0 01 0f 
b6 10 f6 82 e0 0d a5 81 20 75 f0 5d c3 90 66 2e 0f 1f 84 00 00 00 00 00 <80> 3f 
00 55 48 89 e5 74 11 48 89 f8 48 83 c0 01 80 38 00 75 f7 
[ 3633.504601] RIP  [] strlen+0x0/0x20
[ 3633.565335]  RSP 
[ 3633.607143] CR2: fff3
[ 3633.646880] ---[ end trace 23ca1e52db270fbd ]---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662754

Title:
  Calling docker command from a snap leads a kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs