[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic
Hi Seth, What's the right way to try your kernel? I created a test snap to reproduce the issue: https://github.com/pliu6/docker-kernel-panic-test With the test snap, I can reproduce the issue with official linux- image-4.4.0-59-generic, but after I tried to install the kernel image from the link you gave, I am not able to boot the machine. The issue can not be reproduced with an old version kernel on my machine (official 4.2.0-42-generic). Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1662754 Title: Calling docker command from a snap leads a kernel panic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic
** Changed in: linux (Ubuntu) Importance: Undecided => High ** Tags added: kernel-da-key ** Changed in: linux (Ubuntu) Status: Incomplete => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1662754 Title: Calling docker command from a snap leads a kernel panic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic
This is likely https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1660840 -- it's possible the kernel in http://people.canonical.com/~jj/linux+jj/ has a fix for this. Could you please test and report back? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1662754 Title: Calling docker command from a snap leads a kernel panic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic
This bug is similar to https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1651944, even though the steps to reproduce are different. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1662754 Title: Calling docker command from a snap leads a kernel panic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1662754] Re: Calling docker command from a snap leads a kernel panic
Kernel log is below: [ 3629.712878] BUG: unable to handle kernel paging request at fff3 [ 3629.796735] IP: [] strlen+0x0/0x20 [ 3629.856430] PGD 1e0d067 PUD 1e0f067 PMD 0 [ 3629.906140] Oops: [#4] SMP [ 3629.945243] Modules linked in: xt_nat xt_tcpudp veth xt_comment ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype xt_conntrack nf_nat nf_conntrack br_netfilter bridge stp llc overlay aufs arc4 ath10k_pci ath9k ath10k_core ath9k_common ath9k_hw ath mac80211 kvm_amd kvm uas irqbypass cfg80211 k10temp sp5100_tco r8169 i2c_piix4 mii shpchp mac_hid iptable_filter ip_tables ip6table_filter ip6_tables x_tables autofs4 mmc_block sdhci_acpi sdhci_pci sdhci virtio_scsi nls_iso8859_1 usb_storage ahci libahci [ 3630.543640] CPU: 0 PID: 2479 Comm: snap-confine Tainted: G D 4.4.0-59-generic #80-Ubuntu [ 3630.654077] Hardware name: PC Engines APU/APU, BIOS 4.0 09/08/2014 [ 3630.728123] task: 88007a338000 ti: 88007a388000 task.ti: 88007a388000 [ 3630.817768] RIP: 0010:[] [] strlen+0x0/0x20 [ 3630.906581] RSP: 0018:88007a38ba20 EFLAGS: 00010246 [ 3630.970226] RAX: 88007a38bb20 RBX: fff3 RCX: [ 3631.055710] RDX: 0151 RSI: fff3 RDI: fff3 [ 3631.141195] RBP: 88007a38ba38 R08: 880060a4c93b R09: 88007a38ba94 [ 3631.226679] R10: 000e R11: 880060a4c934 R12: 88007a701240 [ 3631.312163] R13: 88007a338000 R14: 8139b3d0 R15: fff3 [ 3631.397650] FS: 7f0e8d98b740() GS:88007de0() knlGS: [ 3631.494574] CS: 0010 DS: ES: CR0: 80050033 [ 3631.563417] CR2: fff3 CR3: 6719a000 CR4: 06f0 [ 3631.648901] Stack: [ 3631.673030] 8112333a 88007a701240 88007a38bb00 88007a38ba60 [ 3631.762464] 8139b438 88007a701240 88007a38bb00 88007a338000 [ 3631.851901] 88007a38bad8 81370498 81229680 88007a38baf0 [ 3631.941337] Call Trace: [ 3631.970675] [] ? audit_log_untrustedstring+0x1a/0x30 [ 3632.049919] [] audit_cb+0x68/0x3f0 [ 3632.110444] [] common_lsm_audit+0x1b8/0x740 [ 3632.180330] [] ? alloc_inode+0x50/0x90 [ 3632.245011] [] ? prepend_path+0xc6/0x2a0 [ 3632.311779] [] aa_audit+0x5f/0x170 [ 3632.372300] [] audit_mount+0x152/0x160 [ 3632.436988] [] match_mnt_path_str+0x1dd/0x490 [ 3632.508951] [] ? dentry_path+0x18/0x70 [ 3632.573638] [] match_mnt+0xda/0x150 [ 3632.635203] [] aa_bind_mount+0x100/0x180 [ 3632.701969] [] wrap_apparmor_sb_mount+0x1c0/0x270 [ 3632.778095] [] security_sb_mount+0x57/0x80 [ 3632.846939] [] do_mount+0xab/0xda0 [ 3632.907468] [] ? __kmalloc_track_caller+0x1b4/0x250 [ 3632.985668] [] ? hrtimer_try_to_cancel+0xd1/0x130 [ 3633.061798] [] ? memdup_user+0x42/0x70 [ 3633.126479] [] SyS_mount+0x9f/0x100 [ 3633.188050] [] entry_SYSCALL_64_fastpath+0x16/0x71 [ 3633.265205] Code: 89 f8 48 89 e5 f6 82 e0 0d a5 81 20 74 10 48 83 c0 01 0f b6 10 f6 82 e0 0d a5 81 20 75 f0 5d c3 90 66 2e 0f 1f 84 00 00 00 00 00 <80> 3f 00 55 48 89 e5 74 11 48 89 f8 48 83 c0 01 80 38 00 75 f7 [ 3633.504601] RIP [] strlen+0x0/0x20 [ 3633.565335] RSP [ 3633.607143] CR2: fff3 [ 3633.646880] ---[ end trace 23ca1e52db270fbd ]--- -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1662754 Title: Calling docker command from a snap leads a kernel panic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662754/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs