← Back to team overview

kernel-packages team mailing list archive

[Bug 1515687] Re: Curtin booting after install failed on wily image with a kernel BUG at /build/linux-AxjFAn/linux-4.2.0/drivers/block/virtio_blk.c:172!

 

This does not affect curtin, rather it's a bug in dm_crypt, fixed in
upstream linux.

** Changed in: curtin
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1515687

Title:
  Curtin booting after install failed on wily image with a  kernel BUG
  at /build/linux-AxjFAn/linux-4.2.0/drivers/block/virtio_blk.c:172!

Status in curtin:
  Invalid
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  As seen here: http://10.245.162.130:8080/job/curtin-
  vmtest/144/consoleFull, vmtest failed to boot after a successful
  curtin install with the following call trace:

  [   28.476159] kernel BUG at /build/linux-AxjFAn/linux-4.2.0/drivers/block/virtio_blk.c:172!
  [   28.476159] invalid opcode: 0000 [#1] SMP 
  [   28.476159] Modules linked in: xfs libcrc32c dm_crypt drbg ansi_cprng xts gf128mul algif_skcipher af_alg nls_utf8 isofs xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp bridge stp llc iptable_filter ip_tables x_tables ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi kvm_intel ppdev kvm joydev input_leds serio_raw parport_pc mac_hid i2c_piix4 parport pvpanic 8250_fintek autofs4 btrfs raid10 multipath linear raid0 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor cirrus psmouse syscopyarea sysfillrect sysimgblt raid6_pq raid1 ttm drm_kms_helper drm pata_acpi floppy
  [   28.476159] CPU: 0 PID: 1454 Comm: dmcrypt_write Not tainted 4.2.0-16-generic #19-Ubuntu
  [   28.476159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
  [   28.476159] task: ffff880035523e80 ti: ffff8800382e4000 task.ti: ffff8800382e4000
  [   28.476159] RIP: 0010:[<ffffffff815456bf>]  [<ffffffff815456bf>] virtio_queue_rq+0x1ef/0x280
  [   28.476159] RSP: 0018:ffff8800382e7b78  EFLAGS: 00010202
  [   28.476159] RAX: 0000000000000082 RBX: ffff88000081ac00 RCX: ffff8800382e7bf8
  [   28.476159] RDX: 0000000000000001 RSI: ffff8800382e7c18 RDI: ffff88000081ac00
  [   28.476159] RBP: ffff8800382e7bc8 R08: ffff880035888e00 R09: ffff8800382e7bf8
  [   28.476159] R10: ffffffffc009387f R11: 0000000000000000 R12: 0000000000000000
  [   28.476159] R13: ffff880035888e00 R14: ffff880035888e00 R15: ffff880037f6acc0
  [   28.476159] FS:  0000000000000000(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000
  [   28.476159] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
  [   28.476159] CR2: 00007f489851c000 CR3: 000000003ad80000 CR4: 00000000000006f0
  [   28.476159] Stack:
  [   28.476159]  ffff8800382e7bd8 ffffffff813d6e1c ffff8800382e7b98 ffff880035888e00
  [   28.476159]  ffff8800382e7bc8 ffff88000081ac00 ffff8800382e7bf8 0000000000000000
  [   28.476159]  ffff880035888e00 0000000000000000 ffff8800382e7c68 ffffffff813a229c
  [   28.476159] Call Trace:
  [   28.476159]  [<ffffffff813d6e1c>] ? merge+0x5c/0xb0
  [   28.476159]  [<ffffffff813a229c>] __blk_mq_run_hw_queue+0x1dc/0x380
  [   28.476159]  [<ffffffff813a209e>] blk_mq_run_hw_queue+0x8e/0xb0
  [   28.476159]  [<ffffffff813a3543>] blk_mq_insert_requests+0xc3/0x110
  [   28.476159]  [<ffffffff813a4159>] blk_mq_flush_plug_list+0xb9/0x150
  [   28.476159]  [<ffffffff81399c06>] blk_flush_plug_list+0xd6/0x240
  [   28.476159]  [<ffffffff8139a0d4>] blk_finish_plug+0x34/0x50
  [   28.476159]  [<ffffffffc04c63af>] dmcrypt_write+0x20f/0x220 [dm_crypt]
  [   28.476159]  [<ffffffff810a5b60>] ? wake_up_q+0x70/0x70
  [   28.476159]  [<ffffffffc04c61a0>] ? crypt_ctr+0xa80/0xa80 [dm_crypt]
  [   28.476159]  [<ffffffff8109a7c8>] kthread+0xd8/0xf0
  [   28.476159]  [<ffffffff8109a6f0>] ? kthread_create_on_node+0x1f0/0x1f0
  [   28.476159]  [<ffffffff817efe1f>] ret_from_fork+0x3f/0x70
  [   28.476159]  [<ffffffff8109a6f0>] ? kthread_create_on_node+0x1f0/0x1f0
  [   28.476159] Code: ff 41 0f b7 85 f4 00 00 00 41 c7 85 78 01 00 00 08 00 00 00 49 c7 85 80 01 00 00 00 00 00 00 41 89 85 7c 01 00 00 e9 ab fe ff ff <0f> 0b 49 8b 87 b0 00 00 00 41 83 e6 ef 4a 8b 3c 20 e8 9b 4c f5 
  [   28.476159] RIP  [<ffffffff815456bf>] virtio_queue_rq+0x1ef/0x280
  [   28.476159]  RSP <ffff8800382e7b78>
  [   29.225842] ---[ end trace 3d5abd69189cb55d ]---

  
  rharper pointed out that this could be https://www.mail-archive.com/linux-scsi@xxxxxxxxxxxxxxx/msg42689.html and fixed on kernel 4.3. The image used on that test was

  vmtests: DEBUG: b"{'updated': 'Thu, 05 Nov 2015 12:17:51 +0000',
  'release': 'wily', 'release_title': '15.10', 'version_name':
  '20151029', 'size': '394278401', 'item_name': 'root-image.gz',
  'version': '15.10', 'subarch': 'hwe-w', 'label': 'daily', 'ftype':
  'root-image.gz', 'datatype': 'image-downloads', 'content_id':
  'com.ubuntu.maas:daily:v2:download', 'os': 'ubuntu', 'format':
  'products:1.0', 'subarches':
  'generic,hwe-p,hwe-q,hwe-r,hwe-s,hwe-t,hwe-u,hwe-v,hwe-w', 'arch':
  'amd64', 'product_name':
  'com.ubuntu.maas.daily:v2:boot:15.10:amd64:hwe-w', 'kflavor':
  'generic', 'krel': 'wily', 'release_codename': 'Wily Werewolf',
  'item_url': 'file:///srv/images/wily/amd64/20151029/root-image.gz',
  'path': 'wily/amd64/20151029/root-image.gz', 'sha256':
  '4ec483af2ddd587ea06b5728a383a41d2de716de86ebaa9df5947bc63db6db5c'}\n"

  which includes kernel 4.2.0-16-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/curtin/+bug/1515687/+subscriptions