[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#881116: marked as done (Call trace at debian stretch)



Your message dated Sat, 16 Oct 2021 05:52:47 -0700 (PDT)
with message-id <616acb1f.1c69fb81.4952.4be6@mx.google.com>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #881116,
regarding Call trace at debian stretch
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
881116: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881116
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-4.9.0-4-amd64
Version: 4.9.51-1
Severity: critical
Justification: breaks the whole system

Dear Mainteners

Actually I am using kernel from jessie because if I try to use kernel
from strech it hangs at boot  with this message bellow.

Let me know if I could help witn more details.

nov 07 18:10:12 zeus kernel: CPU: 0 PID: 5729 Comm: munin-update
Tainted: G      D    O    4.9.0-4-amd64 #1
 Debian 4.9.51-1
nov 07 18:10:12 zeus kernel: Hardware name: Gigabyte Technology Co.,
Ltd. P67A-D3-B3/P67A-D3-B3, BIOS F1 03
/03/2011
nov 07 18:10:12 zeus kernel: task: ffff98ebd40e0040 task.stack: ffffbd4cc8274000
nov 07 18:10:12 zeus kernel: RIP: 0010:[<ffffffff9309ac60>]
[<ffffffff9309ac60>] in_group_p+0x40/0x60
nov 07 18:10:12 zeus kernel: RSP: 0018:ffffbd4cc8277c98  EFLAGS: 00010a07
nov 07 18:10:12 zeus kernel: RAX: 000000007ffffced RBX:
00000000000041ed RCX: 0000000000000000
nov 07 18:10:13 zeus kernel: RDX: 00000000fffff9db RSI:
000000007ffffced RDI: 0000000000000000
nov 07 18:10:13 zeus kernel: RBP: ffff98ec6f651168 R08:
ffff98eba96d99c0 R09: 2f2f2f2f2f2f2f2f
nov 07 18:10:13 zeus kernel: R10: 0000000000000000 R11:
ffff98ebd40e0040 R12: 0000000000000081
nov 07 18:10:13 zeus kernel: R13: 0000000000000001 R14:
ffffbd4cc8277e90 R15: 0000000000000000
nov 07 18:10:13 zeus kernel: FS:  00007f576d6642c0(0000)
GS:ffff98ec7f400000(0000) knlGS:0000000000000000
nov 07 18:10:13 zeus kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
nov 07 18:10:13 zeus kernel: CR2: ffff98eda96d8d7c CR3:
0000000232656000 CR4: 00000000000426f0
nov 07 18:10:13 zeus kernel: Stack:
nov 07 18:10:13 zeus kernel:  ffffffff9320d625 cbf036f6ecc9a92c
ffff98ec6f651168 0000000000000081
nov 07 18:10:13 zeus kernel:  ffffbd4cc8277d80 0000000000000001
ffffffff9320d6c4 ffff98ec73ec101d
nov 07 18:10:13 zeus kernel:  fefefefefefefeff ffffbd4cc8277d80
ffffffff9320fea6 2f2f2f2f2f2f2f2f
nov 07 18:10:13 zeus kernel: Call Trace:
nov 07 18:10:13 zeus kernel:  [<ffffffff9320d625>] ?
generic_permission+0x105/0x180
nov 07 18:10:13 zeus kernel:  [<ffffffff9320d6c4>] ?
__inode_permission+0x24/0xc0
nov 07 18:10:13 zeus kernel:  [<ffffffff9320fea6>] ? link_path_walk+0x86/0x650
nov 07 18:10:13 zeus kernel:  [<ffffffff93210576>] ? path_lookupat+0x86/0x120
nov 07 18:10:13 zeus kernel:  [<ffffffff93212f11>] ? filename_lookup+0xb1/0x180
nov 07 18:10:13 zeus kernel:  [<ffffffff931fedba>] ?
__check_object_size+0xfa/0x1d8
nov 07 18:10:13 zeus kernel:  [<ffffffff93357cd8>] ?
strncpy_from_user+0x48/0x160
nov 07 18:10:13 zeus kernel:  [<ffffffff93212b4a>] ? getname_flags+0x6a/0x1e0
nov 07 18:10:13 zeus kernel:  [<ffffffff93207c99>] ? vfs_fstatat+0x59/0xb0
nov 07 18:10:13 zeus kernel:  [<ffffffff932081ea>] ? SYSC_newstat+0x2a/0x60
nov 07 18:10:13 zeus kernel:  [<ffffffff9305fdb1>] ? __do_page_fault+0x2d1/0x510
nov 07 18:10:13 zeus kernel:  [<ffffffff936085bb>] ?
system_call_fast_compare_end+0xc/0x9b
nov 07 18:10:13 zeus kernel: Code: 3b 78 20 74 38 4c 8b 80 90 00 00 00
4d 85 c0 74 29 41 8b 50 04 85 d2 74 21 31 c9 eb 07 8d 48 01 39 ca 76
16 8d 04 0a d1 e8 89 c6 <41> 3b 7c b0 08 77 eb 73 09 89 c2 39 ca 77 ea
31 c0 c3 b8 01 00
nov 07 18:10:13 zeus kernel: RIP  [<ffffffff9309ac60>] in_group_p+0x40/0x60
nov 07 18:10:13 zeus kernel:  RSP <ffffbd4cc8277c98>
nov 07 18:10:13 zeus kernel: CR2: ffff98eda96d8d7c
nov 07 18:10:13 zeus kernel: ---[ end trace 84c3ad992cd5b40b ]---

-- 
Paulo Ricardo Bruck consultor
tel 011 3596-4881/4882  011 98140-9184 (TIM)
http://www.contatogs.com.br
http://www.protejasuarede.com.br
gpg AAA59989 at wwwkeys.us.pgp.net

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: