This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1756099 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete ** Tags added: xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1756099 Title: general protection fault in __d_lookup Status in linux package in Ubuntu: Incomplete Bug description: Found one of my VMs with dmesg many such traces: general protection fault: 0000 [#1] SMP Modules linked in: ip6table_filter ip6_tables xt_tcpudp xt_conntrack iptable_filter ip_tables x_tables zfs(PO) zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) input_leds sch_fq_codel nf_conntrack_ipv CPU: 0 PID: 5110 Comm: sshd Tainted: P O 4.4.0-116-generic #140-Ubuntu Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Ubuntu-1.8.2-1ubuntu1 04/01/2014 task: ffff88007867e600 ti: ffff8800787d8000 task.ti: ffff8800787d8000 RIP: 0010:[<ffffffff8922da28>] [<ffffffff8922da28>] __d_lookup+0x68/0x150 RSP: 0018:ffff8800787dbc00 EFLAGS: 00010206 RAX: ffffc900000659b8 RBX: 0020000000000000 RCX: 000000000000000e RDX: ffffc90000007000 RSI: ffff8800787dbd40 RDI: ffff88006bc06300 RBP: ffff8800787dbc40 R08: ffff88006bc06300 R09: ffff88006b1ca01d R10: 00000000c2223581 R11: 8080808080808080 R12: ffff88006bc06300 R13: ffff8800787dbd40 R14: 000000006cdac1d0 R15: ffff8800793a8020 FS: 00007f43b8a238c0(0000) GS:ffff88007fc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000561b09c1aed8 CR3: 0000000074498000 CR4: 0000000000000670 Stack: ffffffff8922b3d4 ffff88006b1ca039 0000000c00000000 ffff8800787dbd30 0000000000000000 ffff8800787dbcb8 ffff8800787dbcb0 ffff8800793a8020 ffff8800787dbc98 ffffffff8921ed04 ffff88006b1ca039 ffff8800787dbcac Call Trace: [<ffffffff8922b3d4>] ? dput+0x34/0x230 [<ffffffff8921ed04>] lookup_fast+0xe4/0x340 [<ffffffff8921e488>] ? __inode_permission+0x48/0xc0 [<ffffffff89220549>] walk_component+0x49/0x310 [<ffffffff8921ff3b>] ? path_init+0x1eb/0x3c0 [<ffffffff892220ad>] path_lookupat+0x5d/0x110 [<ffffffff892225a4>] ? path_openat+0x1b4/0x1340 [<ffffffff89223d01>] filename_lookup+0xb1/0x180 [<ffffffff891f2109>] ? kmem_cache_alloc+0x189/0x1f0 [<ffffffff89223906>] ? getname_flags+0x56/0x1f0 [<ffffffff89223ea6>] user_path_at_empty+0x36/0x40 [<ffffffff89218d76>] vfs_fstatat+0x66/0xc0 [<ffffffff891b8aed>] ? kzfree+0x2d/0x40 [<ffffffff89219331>] SYSC_newlstat+0x31/0x60 [<ffffffff89212e7f>] ? do_sys_open+0x1bf/0x2a0 [<ffffffff8921946e>] SyS_newlstat+0xe/0x10 [<ffffffff8984efc8>] entry_SYSCALL_64_fastpath+0x1c/0xbb Code: 45 c8 48 89 f8 48 c1 e8 06 44 01 f0 69 c0 01 00 37 9e d3 e8 48 8d 04 c2 48 8b 18 48 83 e3 fe 75 0a eb 32 48 8b 1b 48 85 db 74 2a <44> 3b 73 18 75 f2 4c 8d 7b 50 4c 89 ff e8 86 12 62 00 4c 3b 63 RIP [<ffffffff8922da28>] __d_lookup+0x68/0x150 RSP <ffff8800787dbc00> ---[ end trace d60d4c228fda67f5 ]--- The problem was apparently triggered by a SFTP transfer to the VM and files were (tentatively) saved to a ZFS mount. This has been working for over a year and it's the first time I see such traces. I don't know if that matters but the VM also suffered from one occurrence of LP: #1749715 a month ago and under different conditions. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1756099/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp