← Back to team overview

kernel-packages team mailing list archive

[Bug 1568532] Re: Ubuntu kernel 3.13.0-85-generic locks with VirtualBox 5.0.14

 

Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v3.13 stable kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as "Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.13.11-ckt39-trusty/

** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Tags added: kernel-da-key regression-update

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1568532

Title:
  Ubuntu kernel 3.13.0-85-generic locks with VirtualBox 5.0.14

Status in linux package in Ubuntu:
  Confirmed

Bug description:
    affects ubuntu

  The kernel 3.13.0-85 locks with Virtual Box 5.0.14. After the lock,
  keyboard and mouse are completely unresponsive and screen is frozen. The
  problem started with 3.13.0-83-generic, and does not happen with kernel
  3.13.0-79-generic.

  Unfortunately I was not able to capture dmesg for any of the official
  kernel locks, but I was able to capture it for a kernel I compiled
  (which uses 3.13.8-83 as its base). The kernel I compiled has minimal
  changes to drivers/usb/core/quirks.c, which are necessary for some tests
  I do, and uses the exact same configuration file as the official kernel.
  Just after booting the kernel I compiled and before doing any tests, I
  noticed the strange Virtual Box behavior and was able to capture the
  dmesg, which follows. Note, however, that both 3.13.0-83-generic and
  3.13.0-85-generic official versions kernels are locking. I am not sure
  if the lock is related to Virtual Box. I believe that the lock I saw on
  the kernel I compiled has the same cause as the locks on the official
  kernels.

  [ 357.821643] general protection fault: 0000 [#1] SMP

  [ 357.821654] Modules linked in: usb_storage(X) pci_stub(X) vboxpci(OX)
  vboxnetadp(OX) vboxnetflt(OX) vboxdrv(OX) arc4(X) md4(X) bridge(X)
  stp(X) llc(X) snd_hda_codec_hdmi(X) hid_generic(X) gpio_ich(X) hp_wmi(X)
  sparse_keymap(X) intel_rapl(X) x86_pkg_temp_thermal(X)
  intel_powerclamp(X) coretemp(X) kvm_intel(X) nvidia(POX) kvm(X)
  crct10dif_pclmul(X) crc32_pclmul(X) aesni_intel(X) aes_x86_64(X) lrw(X)
  gf128mul(X) snd_hda_codec_realtek(X) glue_helper(X) dm_multipath(X)
  ablk_helper(X) cryptd(X) scsi_dh(X) snd_usb_audio(X) usbhid(X)
  snd_usbmidi_lib(X) snd_hda_intel(X) hid(X) snd_hda_codec(X) snd_hwdep(X)
  snd_pcm(X) serio_raw(X) snd_page_alloc(X) snd_seq_midi(X)
  snd_seq_midi_event(X) snd_rawmidi(X) bnep(X) rfcomm(X) sb_edac(X)
  snd_seq(X) edac_core(X) bluetooth(X) snd_seq_device(X) snd_timer(X)
  lpc_ich(X) snd(X) drm(X) soundcore(X) wmi(X) ioatdma(X) dca(X) shpchp(X)
  mac_hid(X) parport_pc(X) ppdev(X) binfmt_misc(X) lp(X) parport(X)
  nls_utf8(X) cifs(X) fscache(X) nls_iso8859_1(X) psmouse(X) e1000e(X)
  isci(X) firewire_ohci(X) libsas(X) ahci(X) ptp(X) firewire_core(X)
  libahci(X) crc_itu_t(X) scsi_transport_sas(X) pps_core(X)

  [ 357.821751] CPU: 11 PID: 4035 Comm: EMT-3 Tainted: P OX
  3.13.11-ckt35-bcm5892 #1

  [ 357.821756] Hardware name: Hewlett-Packard HP Z620 Workstation/158A,
  BIOS J61 v03.15 05/09/2013

  [ 357.821761] task: ffff880ff0c59800 ti: ffff880fbd4b8000 task.ti:
  ffff880fbd4b8000

  [ 357.821763] RIP: 0010:[<ffffffff811a3390>] [<ffffffff811a3390>]
  kmem_cache_alloc_trace+0x80/0x1f0

  [ 357.821779] RSP: 0018:ffff880fbd4b9920 EFLAGS: 00010282

  [ 357.821782] RAX: 0000000000000000 RBX: ffff8807ff810430 RCX:
  00000000000035ad

  [ 357.821785] RDX: 00000000000035ac RSI: 00000000000080d0 RDI:
  ffff8807ff803c00

  [ 357.821788] RBP: ffff880fbd4b9958 R08: 0000000000015f00 R09:
  ffff8807ff803c00

  [ 357.821790] R10: ffffffff8131785b R11: 00007f590b480000 R12:
  0210070200160f05

  [ 357.821793] R13: 00000000000080d0 R14: 0000000000000018 R15:
  ffff8807ff803c00

  [ 357.821797] FS: 00007f5a6ae57700(0000) GS:ffff88101fca0000(0000)
  knlGS:0000000000000000

  [ 357.821800] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033

  [ 357.821803] CR2: fffff880017d7159 CR3: 0000000fbdb87000 CR4:
  00000000000427e0

  [ 357.821806] Stack:

  [ 357.821808] ffff8807ff803c00 ffffffff8131785b ffff8807ff810430
  ffff880f60520700

  [ 357.821817] 0000000000000003 ffffffff8181e700 0000000000000000
  ffff880fbd4b9980

  [ 357.821823] ffffffff8131785b 0000000000000000 ffff880f60520700
  ffff880fde875bc0

  [ 357.821829] Call Trace:

  [ 357.821844] [<ffffffff8131785b>] ?
  apparmor_file_alloc_security+0x5b/0x180

  [ 357.821851] [<ffffffff8131785b>]
  apparmor_file_alloc_security+0x5b/0x180

  [ 357.821860] [<ffffffff812d9d06>] security_file_alloc+0x16/0x20

  [ 357.821869] [<ffffffff811bff80>] get_empty_filp+0x90/0x1a0

  [ 357.821875] [<ffffffff811c00ae>] alloc_file+0x1e/0xf0

  [ 357.821883] [<ffffffff811679d4>] __shmem_file_setup+0x104/0x1d0

  [ 357.821891] [<ffffffff8116a8b8>] shmem_zero_setup+0x28/0x70

  [ 357.821900] [<ffffffff811814cf>] mmap_region+0x57f/0x600

  [ 357.821906] [<ffffffff8118189e>] do_mmap_pgoff+0x34e/0x3d0

  [ 357.821912] [<ffffffff8116c29d>] vm_mmap_pgoff+0x8d/0xc0

  [ 357.821918] [<ffffffff8116c2fd>] vm_mmap+0x2d/0x40

  [ 357.821943] [<ffffffffa0545c4a>]
  rtR0MemObjLinuxDoMmap.isra.6+0x6a/0x70 [vboxdrv]

  [ 357.821961] [<ffffffffa0546a71>] rtR0MemObjNativeMapUser+0x81/0x320
  [vboxdrv]

  [ 357.821977] [<ffffffffa0544437>]
  VBoxHost_RTR0MemObjMapUserTag+0xe7/0x1b0 [vboxdrv]

  [ 357.821990] [<ffffffff810b0b7e>] ? down+0x2e/0x50

  [ 357.822005] [<ffffffff811a2cb5>] ? __kmalloc+0x55/0x230

  [ 357.822021] [<ffffffffa0545435>] ? rtR0MemAllocEx+0x185/0x260
  [vboxdrv]

  [ 357.822035] [<ffffffffa053717e>] ? supdrvIOCtl+0xb7e/0x3400
  [vboxdrv]

  [ 357.822048] [<ffffffffa0532551>] ?
  VBoxDrvLinuxIOCtl_5_0_14+0x121/0x210 [vboxdrv]

  [ 357.822058] [<ffffffff811d1470>] ? do_vfs_ioctl+0x2e0/0x4c0

  [ 357.822063] [<ffffffff811be26c>] ? vfs_write+0x15c/0x1f0

  [ 357.822075] [<ffffffff81727dc4>] ? __schedule+0x384/0x7e0

  [ 357.822081] [<ffffffff811d16d1>] ? SyS_ioctl+0x81/0xa0

  [ 357.822090] [<ffffffff8173495d>] ? system_call_fastpath+0x1a/0x1f

  [ 357.822092] Code: cd 00 00 49 8b 50 08 4d 8b 20 49 8b 40 10 4d 85 e4
  0f 84 14 01 00 00 48 85 c0 0f 84 0b 01 00 00 49 63 47 20 48 8d 4a 01 4d
  8b 07 <49> 8b 1c 04 4c 89 e0 65 49 0f c7 08 0f 94 c0 84 c0 74 b9 49 63

  [ 357.822139] RIP [<ffffffff811a3390>]
  kmem_cache_alloc_trace+0x80/0x1f0

  [ 357.822145] RSP <ffff880fbd4b9920>

  [ 357.822151] ---[ end trace faf27bff00c1b275 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1568532/+subscriptions