Activity log for bug #1787258

Date Who What changed Old value New value Message
2018-08-15 18:21:59 Ryan Smith bug added bug
2018-08-15 18:21:59 Ryan Smith attachment added system.log.txt https://bugs.launchpad.net/bugs/1787258/+attachment/5175923/+files/system.log.txt
2018-08-15 18:30:06 Ubuntu Kernel Bot linux (Ubuntu): status New Incomplete
2018-08-15 18:30:07 Ubuntu Kernel Bot tags trusty
2018-08-15 18:39:37 Ryan Smith linux (Ubuntu): status Incomplete Confirmed
2018-08-15 18:56:37 Ryan Smith description We have updated our 14.04 aws ec2 instances from 3.13.0-153.204 to 3.13.0-155.205, and upon reboot the all kernel panic. full log attached. [ 0.064081] FEATURE SPEC_CTRL Not Present [ 0.068730] mce: CPU supports 2 MCE banks [ 0.072027] Last level iTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.072027] Last level dTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.080004] Spectre V2 mitigation: Mitigation: Full generic retpoline [ 0.084004] Spectre V2 mitigation: Speculation control IBPB not-supported IBRS not-supported [ 0.088005] Speculative Store Bypass: Vulnerable [ 0.092402] Freeing SMP alternatives memory: 32K (ffffffff81e7a000 - ffffffff81e82000) [ 0.104581] ACPI: Core revision 20131115 [ 0.111088] ACPI: All ACPI Tables successfully acquired [ 0.114991] ftrace: allocating 28746 entries in 113 pages [ 0.160066] divide error: 0000 [#1] SMP [ 0.163922] Modules linked in: [ 0.164000] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.13.0-155-generic #205-Ubuntu [ 0.164000] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006 [ 0.164000] task: ffff8801e4828000 ti: ffff8801e4826000 task.ti: ffff8801e4826000 [ 0.164000] RIP: 0010:[<ffffffff81d4b9f2>] [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP: 0000:ffff8801e4827e98 EFLAGS: 00010286 [ 0.164000] RAX: 000000000000000e RBX: ffffffff81d18980 RCX: 0000000000000000 [ 0.164000] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff8801efc13380 [ 0.164000] RBP: ffff8801e4827ec0 R08: ffffffff81d18988 R09: 0000000000000004 [ 0.164000] R10: ffffffff8180b6c0 R11: 0001f8ecf7bca282 R12: 0000000000013280 [ 0.164000] R13: 00000000ffffffff R14: 0000000000000100 R15: 000000000000d088 [ 0.164000] FS: 0000000000000000(0000) GS:ffff8801efc00000(0000) knlGS:0000000000000000 [ 0.164000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.164000] CR2: ffff8801effff000 CR3: 0000000001c0e000 CR4: 0000000000160670 [ 0.164000] Stack: [ 0.164000] ffffffff81d18980 0000000000013280 0000000000000246 0000000000000100 [ 0.164000] 0000000000000000 ffff8801e4827ef0 ffffffff81d4bb82 ffffffff81e5df18 [ 0.164000] ffff8801e4828650 0000000000000246 0000000000000001 ffff8801e4827f00 [ 0.164000] Call Trace: [ 0.164000] [<ffffffff81d4bb82>] native_smp_prepare_cpus+0x57/0x3e0 [ 0.164000] [<ffffffff81d404e1>] xen_hvm_smp_prepare_cpus+0x9/0x2e [ 0.164000] [<ffffffff81d3a01b>] kernel_init_freeable+0xa7/0x1eb [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] [<ffffffff8172750e>] kernel_init+0xe/0x130 [ 0.164000] [<ffffffff8174a88e>] ret_from_fork+0x6e/0xa0 [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] Code: 48 89 c7 41 83 cd ff 41 54 53 f3 a5 66 c7 80 da 00 00 00 00 00 be d0 00 00 00 0f b7 0d 20 a9 fc ff 8b 05 e2 c5 28 00 8d 44 01 ff <f7> f1 31 d2 89 05 c8 c2 fc ff 8d 81 ff 7f 00 00 f7 f1 89 c3 89 [ 0.164000] RIP [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP <ffff8801e4827e98> [ 0.324006] ---[ end trace 8671c9f8a4dc811d ]--- [ 0.328017] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 0.328017] We have updated our 14.04 aws ec2 instances from 3.13.0-153.204 to 3.13.0-155.205, and upon reboot they all kernel panic. full log attached. [ 0.064081] FEATURE SPEC_CTRL Not Present [ 0.068730] mce: CPU supports 2 MCE banks [ 0.072027] Last level iTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.072027] Last level dTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.080004] Spectre V2 mitigation: Mitigation: Full generic retpoline [ 0.084004] Spectre V2 mitigation: Speculation control IBPB not-supported IBRS not-supported [ 0.088005] Speculative Store Bypass: Vulnerable [ 0.092402] Freeing SMP alternatives memory: 32K (ffffffff81e7a000 - ffffffff81e82000) [ 0.104581] ACPI: Core revision 20131115 [ 0.111088] ACPI: All ACPI Tables successfully acquired [ 0.114991] ftrace: allocating 28746 entries in 113 pages [ 0.160066] divide error: 0000 [#1] SMP [ 0.163922] Modules linked in: [ 0.164000] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.13.0-155-generic #205-Ubuntu [ 0.164000] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006 [ 0.164000] task: ffff8801e4828000 ti: ffff8801e4826000 task.ti: ffff8801e4826000 [ 0.164000] RIP: 0010:[<ffffffff81d4b9f2>] [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP: 0000:ffff8801e4827e98 EFLAGS: 00010286 [ 0.164000] RAX: 000000000000000e RBX: ffffffff81d18980 RCX: 0000000000000000 [ 0.164000] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff8801efc13380 [ 0.164000] RBP: ffff8801e4827ec0 R08: ffffffff81d18988 R09: 0000000000000004 [ 0.164000] R10: ffffffff8180b6c0 R11: 0001f8ecf7bca282 R12: 0000000000013280 [ 0.164000] R13: 00000000ffffffff R14: 0000000000000100 R15: 000000000000d088 [ 0.164000] FS: 0000000000000000(0000) GS:ffff8801efc00000(0000) knlGS:0000000000000000 [ 0.164000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.164000] CR2: ffff8801effff000 CR3: 0000000001c0e000 CR4: 0000000000160670 [ 0.164000] Stack: [ 0.164000] ffffffff81d18980 0000000000013280 0000000000000246 0000000000000100 [ 0.164000] 0000000000000000 ffff8801e4827ef0 ffffffff81d4bb82 ffffffff81e5df18 [ 0.164000] ffff8801e4828650 0000000000000246 0000000000000001 ffff8801e4827f00 [ 0.164000] Call Trace: [ 0.164000] [<ffffffff81d4bb82>] native_smp_prepare_cpus+0x57/0x3e0 [ 0.164000] [<ffffffff81d404e1>] xen_hvm_smp_prepare_cpus+0x9/0x2e [ 0.164000] [<ffffffff81d3a01b>] kernel_init_freeable+0xa7/0x1eb [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] [<ffffffff8172750e>] kernel_init+0xe/0x130 [ 0.164000] [<ffffffff8174a88e>] ret_from_fork+0x6e/0xa0 [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] Code: 48 89 c7 41 83 cd ff 41 54 53 f3 a5 66 c7 80 da 00 00 00 00 00 be d0 00 00 00 0f b7 0d 20 a9 fc ff 8b 05 e2 c5 28 00 8d 44 01 ff <f7> f1 31 d2 89 05 c8 c2 fc ff 8d 81 ff 7f 00 00 f7 f1 89 c3 89 [ 0.164000] RIP [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP <ffff8801e4827e98> [ 0.324006] ---[ end trace 8671c9f8a4dc811d ]--- [ 0.328017] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 0.328017]
2018-08-15 20:39:35 David Coronel bug added subscriber David Coronel
2018-08-15 20:51:24 Bryan Quigley bug added subscriber Bryan Quigley
2018-08-15 21:11:15 Joseph Salisbury linux (Ubuntu): importance Undecided Critical
2018-08-15 21:11:19 Joseph Salisbury nominated for series Ubuntu Trusty
2018-08-15 21:11:19 Joseph Salisbury bug task added linux (Ubuntu Trusty)
2018-08-15 21:11:25 Joseph Salisbury linux (Ubuntu Trusty): importance Undecided Critical
2018-08-15 21:11:27 Joseph Salisbury linux (Ubuntu Trusty): status New Confirmed
2018-08-15 21:14:24 Tyler Hicks linux (Ubuntu Trusty): assignee Tyler Hicks (tyhicks)
2018-08-15 21:17:16 Joseph Salisbury marked as duplicate 1787127
2018-08-15 21:27:20 Jeremy Norris bug added subscriber Jeremy Norris
2018-08-15 21:44:57 Ryan Smith removed duplicate marker 1787127
2018-08-15 22:42:20 Tyler Hicks bug added subscriber Tyler Hicks
2018-08-15 23:48:56 Pac bug added subscriber Pac
2018-08-15 23:50:19 Tyler Hicks description We have updated our 14.04 aws ec2 instances from 3.13.0-153.204 to 3.13.0-155.205, and upon reboot they all kernel panic. full log attached. [ 0.064081] FEATURE SPEC_CTRL Not Present [ 0.068730] mce: CPU supports 2 MCE banks [ 0.072027] Last level iTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.072027] Last level dTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.080004] Spectre V2 mitigation: Mitigation: Full generic retpoline [ 0.084004] Spectre V2 mitigation: Speculation control IBPB not-supported IBRS not-supported [ 0.088005] Speculative Store Bypass: Vulnerable [ 0.092402] Freeing SMP alternatives memory: 32K (ffffffff81e7a000 - ffffffff81e82000) [ 0.104581] ACPI: Core revision 20131115 [ 0.111088] ACPI: All ACPI Tables successfully acquired [ 0.114991] ftrace: allocating 28746 entries in 113 pages [ 0.160066] divide error: 0000 [#1] SMP [ 0.163922] Modules linked in: [ 0.164000] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.13.0-155-generic #205-Ubuntu [ 0.164000] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006 [ 0.164000] task: ffff8801e4828000 ti: ffff8801e4826000 task.ti: ffff8801e4826000 [ 0.164000] RIP: 0010:[<ffffffff81d4b9f2>] [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP: 0000:ffff8801e4827e98 EFLAGS: 00010286 [ 0.164000] RAX: 000000000000000e RBX: ffffffff81d18980 RCX: 0000000000000000 [ 0.164000] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff8801efc13380 [ 0.164000] RBP: ffff8801e4827ec0 R08: ffffffff81d18988 R09: 0000000000000004 [ 0.164000] R10: ffffffff8180b6c0 R11: 0001f8ecf7bca282 R12: 0000000000013280 [ 0.164000] R13: 00000000ffffffff R14: 0000000000000100 R15: 000000000000d088 [ 0.164000] FS: 0000000000000000(0000) GS:ffff8801efc00000(0000) knlGS:0000000000000000 [ 0.164000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.164000] CR2: ffff8801effff000 CR3: 0000000001c0e000 CR4: 0000000000160670 [ 0.164000] Stack: [ 0.164000] ffffffff81d18980 0000000000013280 0000000000000246 0000000000000100 [ 0.164000] 0000000000000000 ffff8801e4827ef0 ffffffff81d4bb82 ffffffff81e5df18 [ 0.164000] ffff8801e4828650 0000000000000246 0000000000000001 ffff8801e4827f00 [ 0.164000] Call Trace: [ 0.164000] [<ffffffff81d4bb82>] native_smp_prepare_cpus+0x57/0x3e0 [ 0.164000] [<ffffffff81d404e1>] xen_hvm_smp_prepare_cpus+0x9/0x2e [ 0.164000] [<ffffffff81d3a01b>] kernel_init_freeable+0xa7/0x1eb [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] [<ffffffff8172750e>] kernel_init+0xe/0x130 [ 0.164000] [<ffffffff8174a88e>] ret_from_fork+0x6e/0xa0 [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] Code: 48 89 c7 41 83 cd ff 41 54 53 f3 a5 66 c7 80 da 00 00 00 00 00 be d0 00 00 00 0f b7 0d 20 a9 fc ff 8b 05 e2 c5 28 00 8d 44 01 ff <f7> f1 31 d2 89 05 c8 c2 fc ff 8d 81 ff 7f 00 00 f7 f1 89 c3 89 [ 0.164000] RIP [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP <ffff8801e4827e98> [ 0.324006] ---[ end trace 8671c9f8a4dc811d ]--- [ 0.328017] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 0.328017] [Impact] Booting the 3.13.0-155.205 generic kernel on a m3 AWS ec2 instance results in a kernel panic during boot. [Test Case] Boot with the 3.13.0-155.205 kernel on an m3 instance and verify that it panics on boot. Boot a patched kernel on an m3 instance and verify that it boots and that the following warning is present in the kernel logs: smpboot: x86_max_cores == zero !?!? [Regression Potential] The only potential for regressions is in systems that panic while bootnig. [Original Report] We have updated our 14.04 aws ec2 instances from 3.13.0-153.204 to 3.13.0-155.205, and upon reboot they all kernel panic. full log attached. [ 0.064081] FEATURE SPEC_CTRL Not Present [ 0.068730] mce: CPU supports 2 MCE banks [ 0.072027] Last level iTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.072027] Last level dTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.080004] Spectre V2 mitigation: Mitigation: Full generic retpoline [ 0.084004] Spectre V2 mitigation: Speculation control IBPB not-supported IBRS not-supported [ 0.088005] Speculative Store Bypass: Vulnerable [ 0.092402] Freeing SMP alternatives memory: 32K (ffffffff81e7a000 - ffffffff81e82000) [ 0.104581] ACPI: Core revision 20131115 [ 0.111088] ACPI: All ACPI Tables successfully acquired [ 0.114991] ftrace: allocating 28746 entries in 113 pages [ 0.160066] divide error: 0000 [#1] SMP [ 0.163922] Modules linked in: [ 0.164000] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.13.0-155-generic #205-Ubuntu [ 0.164000] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006 [ 0.164000] task: ffff8801e4828000 ti: ffff8801e4826000 task.ti: ffff8801e4826000 [ 0.164000] RIP: 0010:[<ffffffff81d4b9f2>] [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP: 0000:ffff8801e4827e98 EFLAGS: 00010286 [ 0.164000] RAX: 000000000000000e RBX: ffffffff81d18980 RCX: 0000000000000000 [ 0.164000] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff8801efc13380 [ 0.164000] RBP: ffff8801e4827ec0 R08: ffffffff81d18988 R09: 0000000000000004 [ 0.164000] R10: ffffffff8180b6c0 R11: 0001f8ecf7bca282 R12: 0000000000013280 [ 0.164000] R13: 00000000ffffffff R14: 0000000000000100 R15: 000000000000d088 [ 0.164000] FS: 0000000000000000(0000) GS:ffff8801efc00000(0000) knlGS:0000000000000000 [ 0.164000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.164000] CR2: ffff8801effff000 CR3: 0000000001c0e000 CR4: 0000000000160670 [ 0.164000] Stack: [ 0.164000] ffffffff81d18980 0000000000013280 0000000000000246 0000000000000100 [ 0.164000] 0000000000000000 ffff8801e4827ef0 ffffffff81d4bb82 ffffffff81e5df18 [ 0.164000] ffff8801e4828650 0000000000000246 0000000000000001 ffff8801e4827f00 [ 0.164000] Call Trace: [ 0.164000] [<ffffffff81d4bb82>] native_smp_prepare_cpus+0x57/0x3e0 [ 0.164000] [<ffffffff81d404e1>] xen_hvm_smp_prepare_cpus+0x9/0x2e [ 0.164000] [<ffffffff81d3a01b>] kernel_init_freeable+0xa7/0x1eb [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] [<ffffffff8172750e>] kernel_init+0xe/0x130 [ 0.164000] [<ffffffff8174a88e>] ret_from_fork+0x6e/0xa0 [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] Code: 48 89 c7 41 83 cd ff 41 54 53 f3 a5 66 c7 80 da 00 00 00 00 00 be d0 00 00 00 0f b7 0d 20 a9 fc ff 8b 05 e2 c5 28 00 8d 44 01 ff <f7> f1 31 d2 89 05 c8 c2 fc ff 8d 81 ff 7f 00 00 f7 f1 89 c3 89 [ 0.164000] RIP [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP <ffff8801e4827e98> [ 0.324006] ---[ end trace 8671c9f8a4dc811d ]--- [ 0.328017] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 0.328017]
2018-08-15 23:50:42 Tyler Hicks description [Impact] Booting the 3.13.0-155.205 generic kernel on a m3 AWS ec2 instance results in a kernel panic during boot. [Test Case] Boot with the 3.13.0-155.205 kernel on an m3 instance and verify that it panics on boot. Boot a patched kernel on an m3 instance and verify that it boots and that the following warning is present in the kernel logs: smpboot: x86_max_cores == zero !?!? [Regression Potential] The only potential for regressions is in systems that panic while bootnig. [Original Report] We have updated our 14.04 aws ec2 instances from 3.13.0-153.204 to 3.13.0-155.205, and upon reboot they all kernel panic. full log attached. [ 0.064081] FEATURE SPEC_CTRL Not Present [ 0.068730] mce: CPU supports 2 MCE banks [ 0.072027] Last level iTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.072027] Last level dTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.080004] Spectre V2 mitigation: Mitigation: Full generic retpoline [ 0.084004] Spectre V2 mitigation: Speculation control IBPB not-supported IBRS not-supported [ 0.088005] Speculative Store Bypass: Vulnerable [ 0.092402] Freeing SMP alternatives memory: 32K (ffffffff81e7a000 - ffffffff81e82000) [ 0.104581] ACPI: Core revision 20131115 [ 0.111088] ACPI: All ACPI Tables successfully acquired [ 0.114991] ftrace: allocating 28746 entries in 113 pages [ 0.160066] divide error: 0000 [#1] SMP [ 0.163922] Modules linked in: [ 0.164000] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.13.0-155-generic #205-Ubuntu [ 0.164000] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006 [ 0.164000] task: ffff8801e4828000 ti: ffff8801e4826000 task.ti: ffff8801e4826000 [ 0.164000] RIP: 0010:[<ffffffff81d4b9f2>] [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP: 0000:ffff8801e4827e98 EFLAGS: 00010286 [ 0.164000] RAX: 000000000000000e RBX: ffffffff81d18980 RCX: 0000000000000000 [ 0.164000] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff8801efc13380 [ 0.164000] RBP: ffff8801e4827ec0 R08: ffffffff81d18988 R09: 0000000000000004 [ 0.164000] R10: ffffffff8180b6c0 R11: 0001f8ecf7bca282 R12: 0000000000013280 [ 0.164000] R13: 00000000ffffffff R14: 0000000000000100 R15: 000000000000d088 [ 0.164000] FS: 0000000000000000(0000) GS:ffff8801efc00000(0000) knlGS:0000000000000000 [ 0.164000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.164000] CR2: ffff8801effff000 CR3: 0000000001c0e000 CR4: 0000000000160670 [ 0.164000] Stack: [ 0.164000] ffffffff81d18980 0000000000013280 0000000000000246 0000000000000100 [ 0.164000] 0000000000000000 ffff8801e4827ef0 ffffffff81d4bb82 ffffffff81e5df18 [ 0.164000] ffff8801e4828650 0000000000000246 0000000000000001 ffff8801e4827f00 [ 0.164000] Call Trace: [ 0.164000] [<ffffffff81d4bb82>] native_smp_prepare_cpus+0x57/0x3e0 [ 0.164000] [<ffffffff81d404e1>] xen_hvm_smp_prepare_cpus+0x9/0x2e [ 0.164000] [<ffffffff81d3a01b>] kernel_init_freeable+0xa7/0x1eb [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] [<ffffffff8172750e>] kernel_init+0xe/0x130 [ 0.164000] [<ffffffff8174a88e>] ret_from_fork+0x6e/0xa0 [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] Code: 48 89 c7 41 83 cd ff 41 54 53 f3 a5 66 c7 80 da 00 00 00 00 00 be d0 00 00 00 0f b7 0d 20 a9 fc ff 8b 05 e2 c5 28 00 8d 44 01 ff <f7> f1 31 d2 89 05 c8 c2 fc ff 8d 81 ff 7f 00 00 f7 f1 89 c3 89 [ 0.164000] RIP [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP <ffff8801e4827e98> [ 0.324006] ---[ end trace 8671c9f8a4dc811d ]--- [ 0.328017] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 0.328017] [Impact] Booting the 3.13.0-155.205 generic kernel on a m3 AWS ec2 instance results in a kernel panic during boot. [Test Case] Boot with the 3.13.0-155.205 kernel on an m3 instance and verify that it panics on boot. Boot a patched kernel on an m3 instance and verify that it boots, without a panic, and that the following warning is present in the kernel logs: smpboot: x86_max_cores == zero !?!? [Regression Potential] The only potential for regressions is in systems that panic while bootnig. [Original Report] We have updated our 14.04 aws ec2 instances from 3.13.0-153.204 to 3.13.0-155.205, and upon reboot they all kernel panic. full log attached. [ 0.064081] FEATURE SPEC_CTRL Not Present [ 0.068730] mce: CPU supports 2 MCE banks [ 0.072027] Last level iTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.072027] Last level dTLB entries: 4KB 512, 2MB 0, 4MB 0 [ 0.080004] Spectre V2 mitigation: Mitigation: Full generic retpoline [ 0.084004] Spectre V2 mitigation: Speculation control IBPB not-supported IBRS not-supported [ 0.088005] Speculative Store Bypass: Vulnerable [ 0.092402] Freeing SMP alternatives memory: 32K (ffffffff81e7a000 - ffffffff81e82000) [ 0.104581] ACPI: Core revision 20131115 [ 0.111088] ACPI: All ACPI Tables successfully acquired [ 0.114991] ftrace: allocating 28746 entries in 113 pages [ 0.160066] divide error: 0000 [#1] SMP [ 0.163922] Modules linked in: [ 0.164000] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.13.0-155-generic #205-Ubuntu [ 0.164000] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006 [ 0.164000] task: ffff8801e4828000 ti: ffff8801e4826000 task.ti: ffff8801e4826000 [ 0.164000] RIP: 0010:[<ffffffff81d4b9f2>] [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP: 0000:ffff8801e4827e98 EFLAGS: 00010286 [ 0.164000] RAX: 000000000000000e RBX: ffffffff81d18980 RCX: 0000000000000000 [ 0.164000] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: ffff8801efc13380 [ 0.164000] RBP: ffff8801e4827ec0 R08: ffffffff81d18988 R09: 0000000000000004 [ 0.164000] R10: ffffffff8180b6c0 R11: 0001f8ecf7bca282 R12: 0000000000013280 [ 0.164000] R13: 00000000ffffffff R14: 0000000000000100 R15: 000000000000d088 [ 0.164000] FS: 0000000000000000(0000) GS:ffff8801efc00000(0000) knlGS:0000000000000000 [ 0.164000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.164000] CR2: ffff8801effff000 CR3: 0000000001c0e000 CR4: 0000000000160670 [ 0.164000] Stack: [ 0.164000] ffffffff81d18980 0000000000013280 0000000000000246 0000000000000100 [ 0.164000] 0000000000000000 ffff8801e4827ef0 ffffffff81d4bb82 ffffffff81e5df18 [ 0.164000] ffff8801e4828650 0000000000000246 0000000000000001 ffff8801e4827f00 [ 0.164000] Call Trace: [ 0.164000] [<ffffffff81d4bb82>] native_smp_prepare_cpus+0x57/0x3e0 [ 0.164000] [<ffffffff81d404e1>] xen_hvm_smp_prepare_cpus+0x9/0x2e [ 0.164000] [<ffffffff81d3a01b>] kernel_init_freeable+0xa7/0x1eb [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] [<ffffffff8172750e>] kernel_init+0xe/0x130 [ 0.164000] [<ffffffff8174a88e>] ret_from_fork+0x6e/0xa0 [ 0.164000] [<ffffffff81727500>] ? rest_init+0x80/0x80 [ 0.164000] Code: 48 89 c7 41 83 cd ff 41 54 53 f3 a5 66 c7 80 da 00 00 00 00 00 be d0 00 00 00 0f b7 0d 20 a9 fc ff 8b 05 e2 c5 28 00 8d 44 01 ff <f7> f1 31 d2 89 05 c8 c2 fc ff 8d 81 ff 7f 00 00 f7 f1 89 c3 89 [ 0.164000] RIP [<ffffffff81d4b9f2>] smp_store_boot_cpu_info+0x58/0x191 [ 0.164000] RSP <ffff8801e4827e98> [ 0.324006] ---[ end trace 8671c9f8a4dc811d ]--- [ 0.328017] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 0.328017]
2018-08-16 08:38:52 Stefan Bader linux (Ubuntu Trusty): status Confirmed Fix Committed
2018-08-16 09:21:07 Jeroen Vijfhuizen bug added subscriber Jeroen Vijfhuizen
2018-08-16 10:22:56 Adam McMaster bug added subscriber Adam McMaster
2018-08-16 13:06:05 Th bug added subscriber Th
2018-08-16 14:14:48 Mauro bug added subscriber Mauro
2018-08-16 19:03:59 Pascal Ouellet bug added subscriber Pascal Ouellet
2018-08-16 19:04:14 Pascal Ouellet information type Public Public Security
2018-08-16 19:19:50 Pascal Ouellet information type Public Security Public
2018-08-17 09:54:24 Valentin DARRE linux (Ubuntu Trusty): status Fix Committed Fix Released
2018-08-18 02:04:40 Nathan Stratton Treadway bug added subscriber Nathan Stratton Treadway
2018-09-13 05:06:31 Tyler Hicks linux (Ubuntu): status Confirmed Invalid
2019-07-24 20:18:46 Brad Figg tags trusty cscc trusty