'Kernel bug - invalid opcode: 0000 [#1] SMP' is reported at 'Preparing linux-image-extra-3.10.0-0-generic' stage of multi-lvm installations of amd64 saucy server
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Saucy |
Fix Released
|
High
|
Unassigned |
Bug Description
The following error is reported during multi-lvm saucy server installations of amd64 imges of 20130628. Occurs on both amd64 and i386 installations. The occurrence is not always but during majority of runs.
Please also see comment #7 for more information
Jun 28 09:25:47 kernel: [ 242.360845] Kernel BUG at ffffffff8125d351 [verbose debug info unavailable]
Jun 28 09:25:47 kernel: [ 242.360848] invalid opcode: 0000 [#1] SMP
Jun 28 09:25:47 kernel: [ 242.360851] Modules linked in: squashfs(F) xfs(F) reiserfs jfs btrfs(F) xor(F) zlib_deflate(F) raid6_pq(F) libcrc32c(F) ext2(F) virtio_balloon(F) nls_utf8(F) isofs(F) usb_storage(F) vga16fb(F) vgastate(F) floppy(F)
Jun 28 09:25:47 kernel: [ 242.360865] CPU: 0 PID: 20274 Comm: dpkg Tainted: GF 3.10.0-0-generic #7-Ubuntu
Jun 28 09:25:47 kernel: [ 242.360867] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2007
Jun 28 09:25:47 kernel: [ 242.360869] task: ffff88001c552ee0 ti: ffff880012c7a000 task.ti: ffff880012c7a000
Jun 28 09:25:47 kernel: [ 242.360871] RIP: 0010:[<
Jun 28 09:25:47 kernel: [ 242.360894] RSP: 0018:ffff880012
Jun 28 09:25:47 kernel: [ 242.360896] RAX: 0000000000000013 RBX: ffff88000fe82d00 RCX: 0000000000000000
Jun 28 09:25:47 kernel: [ 242.360897] RDX: 0000000000001fff RSI: 0000000000027fff RDI: 0000000000000001
Jun 28 09:25:47 kernel: [ 242.360899] RBP: ffff880012c7bab0 R08: 0000000000002000 R09: ffff880012c7ba80
Jun 28 09:25:47 kernel: [ 242.360900] R10: ffff880012c7ba84 R11: 0000000000000000 R12: ffff88001582a800
Jun 28 09:25:47 kernel: [ 242.360902] R13: ffff88000fe82d00 R14: ffff880012c7bae8 R15: 0000000000000014
Jun 28 09:25:47 kernel: [ 242.360904] FS: 00007fb1de04280
Jun 28 09:25:47 kernel: [ 242.360905] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 28 09:25:47 kernel: [ 242.360907] CR2: 00007fb1ddeb8000 CR3: 0000000014b9a000 CR4: 00000000000006f0
Jun 28 09:25:47 kernel: [ 242.360913] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jun 28 09:25:47 kernel: [ 242.360918] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Jun 28 09:25:47 kernel: [ 242.360919] Stack:
Jun 28 09:25:47 kernel: [ 242.360920] 00001fff00000013 ffff88000fe82d00 ffff880012c7bab8 ffff88000fe82d20
Jun 28 09:25:47 kernel: [ 242.360923] ffff88001582a800 0000000000000014 ffff880012c7bb48 ffffffff8125d5ba
Jun 28 09:25:47 kernel: [ 242.360926] ffff880012c7bae8 ffff88001bd6a500 ffff880012c7bae8 ffff88000fe82d20
Jun 28 09:25:47 kernel: [ 242.360928] Call Trace:
Jun 28 09:25:47 kernel: [ 242.360934] [<ffffffff8125d
Jun 28 09:25:47 kernel: [ 242.360937] [<ffffffff8125d
Jun 28 09:25:47 kernel: [ 242.360941] [<ffffffff81260
Jun 28 09:25:47 kernel: [ 242.360958] [<ffffffff8113c
Jun 28 09:25:47 kernel: [ 242.360961] [<ffffffff81257
Jun 28 09:25:47 kernel: [ 242.360967] [<ffffffff8122d
Jun 28 09:25:47 kernel: [ 242.360971] [<ffffffff81230
Jun 28 09:25:47 kernel: [ 242.360974] [<ffffffff81231
Jun 28 09:25:47 kernel: [ 242.360977] [<ffffffff81231
Jun 28 09:25:47 kernel: [ 242.360986] [<ffffffff8113b
Jun 28 09:25:47 kernel: [ 242.360989] [<ffffffff81130
Jun 28 09:25:47 kernel: [ 242.360991] [<ffffffff81130
Jun 28 09:25:47 kernel: [ 242.361000] [<ffffffff811c2
Jun 28 09:25:47 kernel: [ 242.361007] [<ffffffff816de
Jun 28 09:25:47 kernel: [ 242.361009] Code: c3 10 31 d2 45 89 e9 45 89 f0 44 89 f9 4c 89 e6 ff d0 48 8b 03 48 85 c0 75 e0 eb 88 41 8b 7d 4c 85 ff 75 07 31 c9 e9 46 ff ff ff <0f> 0b 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55
Jun 28 09:25:47 kernel: [ 242.361032] RIP [<ffffffff8125d
Jun 28 09:25:47 kernel: [ 242.361035] RSP <ffff880012c7ba80>
Jun 28 09:25:47 kernel: [ 242.361039] ---[ end trace e4be50d51f7681ce ]---
Jun 28 09:25:47 in-target: E
Jun 28 09:25:47 in-target: :
Jun 28 09:25:47 in-target: Sub-process /usr/bin/dpkg received a segmentation fault.
Jun 28 09:25:47 in-target:
Jun 28 09:25:47 in-target: debconf (developer): <-- STOP
Steps to reproduce:
1. Do the following to install utah
sudo apt-add-repository -y ppa:utah/stable
sudo apt-get update
sudo apt-get install utah
2. Now run,
sudo -u utah -i run_utah_tests.py -i /var/cache/
Note: multi-lvm tests possibly mean that there are multiple partitions with lvm. Please see the pressed file in http://
Attached is the console output saved in a txt file.
The impacted smoke test is:
https:/
description: | updated |
description: | updated |
description: | updated |
Changed in linux (Ubuntu): | |
importance: | Undecided → Medium |
importance: | Medium → High |
tags: | added: kernel-da-key |
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1195710
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.