Ubuntu kernel 3.13.0-85-generic locks with VirtualBox 5.0.14

Bug #1568532 reported by Alberto Sentieri
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Confirmed
High
Unassigned

Bug Description

  affects ubuntu

The kernel 3.13.0-85 locks with Virtual Box 5.0.14. After the lock,
keyboard and mouse are completely unresponsive and screen is frozen. The
problem started with 3.13.0-83-generic, and does not happen with kernel
3.13.0-79-generic.

Unfortunately I was not able to capture dmesg for any of the official
kernel locks, but I was able to capture it for a kernel I compiled
(which uses 3.13.8-83 as its base). The kernel I compiled has minimal
changes to drivers/usb/core/quirks.c, which are necessary for some tests
I do, and uses the exact same configuration file as the official kernel.
Just after booting the kernel I compiled and before doing any tests, I
noticed the strange Virtual Box behavior and was able to capture the
dmesg, which follows. Note, however, that both 3.13.0-83-generic and
3.13.0-85-generic official versions kernels are locking. I am not sure
if the lock is related to Virtual Box. I believe that the lock I saw on
the kernel I compiled has the same cause as the locks on the official
kernels.

[ 357.821643] general protection fault: 0000 [#1] SMP

[ 357.821654] Modules linked in: usb_storage(X) pci_stub(X) vboxpci(OX)
vboxnetadp(OX) vboxnetflt(OX) vboxdrv(OX) arc4(X) md4(X) bridge(X)
stp(X) llc(X) snd_hda_codec_hdmi(X) hid_generic(X) gpio_ich(X) hp_wmi(X)
sparse_keymap(X) intel_rapl(X) x86_pkg_temp_thermal(X)
intel_powerclamp(X) coretemp(X) kvm_intel(X) nvidia(POX) kvm(X)
crct10dif_pclmul(X) crc32_pclmul(X) aesni_intel(X) aes_x86_64(X) lrw(X)
gf128mul(X) snd_hda_codec_realtek(X) glue_helper(X) dm_multipath(X)
ablk_helper(X) cryptd(X) scsi_dh(X) snd_usb_audio(X) usbhid(X)
snd_usbmidi_lib(X) snd_hda_intel(X) hid(X) snd_hda_codec(X) snd_hwdep(X)
snd_pcm(X) serio_raw(X) snd_page_alloc(X) snd_seq_midi(X)
snd_seq_midi_event(X) snd_rawmidi(X) bnep(X) rfcomm(X) sb_edac(X)
snd_seq(X) edac_core(X) bluetooth(X) snd_seq_device(X) snd_timer(X)
lpc_ich(X) snd(X) drm(X) soundcore(X) wmi(X) ioatdma(X) dca(X) shpchp(X)
mac_hid(X) parport_pc(X) ppdev(X) binfmt_misc(X) lp(X) parport(X)
nls_utf8(X) cifs(X) fscache(X) nls_iso8859_1(X) psmouse(X) e1000e(X)
isci(X) firewire_ohci(X) libsas(X) ahci(X) ptp(X) firewire_core(X)
libahci(X) crc_itu_t(X) scsi_transport_sas(X) pps_core(X)

[ 357.821751] CPU: 11 PID: 4035 Comm: EMT-3 Tainted: P OX
3.13.11-ckt35-bcm5892 #1

[ 357.821756] Hardware name: Hewlett-Packard HP Z620 Workstation/158A,
BIOS J61 v03.15 05/09/2013

[ 357.821761] task: ffff880ff0c59800 ti: ffff880fbd4b8000 task.ti:
ffff880fbd4b8000

[ 357.821763] RIP: 0010:[<ffffffff811a3390>] [<ffffffff811a3390>]
kmem_cache_alloc_trace+0x80/0x1f0

[ 357.821779] RSP: 0018:ffff880fbd4b9920 EFLAGS: 00010282

[ 357.821782] RAX: 0000000000000000 RBX: ffff8807ff810430 RCX:
00000000000035ad

[ 357.821785] RDX: 00000000000035ac RSI: 00000000000080d0 RDI:
ffff8807ff803c00

[ 357.821788] RBP: ffff880fbd4b9958 R08: 0000000000015f00 R09:
ffff8807ff803c00

[ 357.821790] R10: ffffffff8131785b R11: 00007f590b480000 R12:
0210070200160f05

[ 357.821793] R13: 00000000000080d0 R14: 0000000000000018 R15:
ffff8807ff803c00

[ 357.821797] FS: 00007f5a6ae57700(0000) GS:ffff88101fca0000(0000)
knlGS:0000000000000000

[ 357.821800] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033

[ 357.821803] CR2: fffff880017d7159 CR3: 0000000fbdb87000 CR4:
00000000000427e0

[ 357.821806] Stack:

[ 357.821808] ffff8807ff803c00 ffffffff8131785b ffff8807ff810430
ffff880f60520700

[ 357.821817] 0000000000000003 ffffffff8181e700 0000000000000000
ffff880fbd4b9980

[ 357.821823] ffffffff8131785b 0000000000000000 ffff880f60520700
ffff880fde875bc0

[ 357.821829] Call Trace:

[ 357.821844] [<ffffffff8131785b>] ?
apparmor_file_alloc_security+0x5b/0x180

[ 357.821851] [<ffffffff8131785b>] apparmor_file_alloc_security+0x5b/0x180

[ 357.821860] [<ffffffff812d9d06>] security_file_alloc+0x16/0x20

[ 357.821869] [<ffffffff811bff80>] get_empty_filp+0x90/0x1a0

[ 357.821875] [<ffffffff811c00ae>] alloc_file+0x1e/0xf0

[ 357.821883] [<ffffffff811679d4>] __shmem_file_setup+0x104/0x1d0

[ 357.821891] [<ffffffff8116a8b8>] shmem_zero_setup+0x28/0x70

[ 357.821900] [<ffffffff811814cf>] mmap_region+0x57f/0x600

[ 357.821906] [<ffffffff8118189e>] do_mmap_pgoff+0x34e/0x3d0

[ 357.821912] [<ffffffff8116c29d>] vm_mmap_pgoff+0x8d/0xc0

[ 357.821918] [<ffffffff8116c2fd>] vm_mmap+0x2d/0x40

[ 357.821943] [<ffffffffa0545c4a>]
rtR0MemObjLinuxDoMmap.isra.6+0x6a/0x70 [vboxdrv]

[ 357.821961] [<ffffffffa0546a71>] rtR0MemObjNativeMapUser+0x81/0x320
[vboxdrv]

[ 357.821977] [<ffffffffa0544437>]
VBoxHost_RTR0MemObjMapUserTag+0xe7/0x1b0 [vboxdrv]

[ 357.821990] [<ffffffff810b0b7e>] ? down+0x2e/0x50

[ 357.822005] [<ffffffff811a2cb5>] ? __kmalloc+0x55/0x230

[ 357.822021] [<ffffffffa0545435>] ? rtR0MemAllocEx+0x185/0x260 [vboxdrv]

[ 357.822035] [<ffffffffa053717e>] ? supdrvIOCtl+0xb7e/0x3400 [vboxdrv]

[ 357.822048] [<ffffffffa0532551>] ?
VBoxDrvLinuxIOCtl_5_0_14+0x121/0x210 [vboxdrv]

[ 357.822058] [<ffffffff811d1470>] ? do_vfs_ioctl+0x2e0/0x4c0

[ 357.822063] [<ffffffff811be26c>] ? vfs_write+0x15c/0x1f0

[ 357.822075] [<ffffffff81727dc4>] ? __schedule+0x384/0x7e0

[ 357.822081] [<ffffffff811d16d1>] ? SyS_ioctl+0x81/0xa0

[ 357.822090] [<ffffffff8173495d>] ? system_call_fastpath+0x1a/0x1f

[ 357.822092] Code: cd 00 00 49 8b 50 08 4d 8b 20 49 8b 40 10 4d 85 e4
0f 84 14 01 00 00 48 85 c0 0f 84 0b 01 00 00 49 63 47 20 48 8d 4a 01 4d
8b 07 <49> 8b 1c 04 4c 89 e0 65 49 0f c7 08 0f 94 c0 84 c0 74 b9 49 63

[ 357.822139] RIP [<ffffffff811a3390>] kmem_cache_alloc_trace+0x80/0x1f0

[ 357.822145] RSP <ffff880fbd4b9920>

[ 357.822151] ---[ end trace faf27bff00c1b275 ]---

Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https://wiki.ubuntu.com/Bugs/FindRightPackage. You might also ask for help in the #ubuntu-bugs irc channel on Freenode.

To change the source package that this bug is filed about visit https://bugs.launchpad.net/ubuntu/+bug/1568532/+editstatus and add the package name in the text box next to the word Package.

[This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.]

tags: added: bot-comment
Alberto Sentieri (22t)
affects: ubuntu → linux (Ubuntu)
Revision history for this message
Brad Figg (brad-figg) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:

apport-collect 1568532

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
tags: added: trusty
Revision history for this message
Alberto Sentieri (22t) wrote :

The network where the machine is connect to restricts uploads.

Changed in linux (Ubuntu):
status: Incomplete → Confirmed
Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Would it be possible for you to test the latest upstream stable kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v3.13 stable kernel[0].

If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as "Confirmed".

Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.13.11-ckt39-trusty/

Changed in linux (Ubuntu):
importance: Undecided → High
tags: added: kernel-da-key regression-update
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.