This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1824756

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

** Tags added: bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1824756

Title:
  update-grub crashes on ubuntu 18.04

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Hi:

  When I use update-grub as root it crashes:

  update-grub
  Segmentation fault
  Segmentation fault
  Sourcing file `/etc/default/grub'
  Generating grub configuration file ...
  Segmentation fault
  Segmentation fault
  Found linux image: /boot/vmlinuz-4.15.0-47-generic
  Found initrd image: /boot/initrd.img-4.15.0-47-generic
  Segmentation fault
  Segmentation fault
  Segmentation fault
  Segmentation fault
  Found linux image: /boot/vmlinuz-4.15.0-46-generic
  Found initrd image: /boot/initrd.img-4.15.0-46-generic
  Segmentation fault
  Segmentation fault
  Found linux image: /boot/vmlinuz-4.15.0-44-generic
  Found initrd image: /boot/initrd.img-4.15.0-44-generic
  Segmentation fault
  Segmentation fault
  Segmentation fault
  Found memtest86+ image: /memtest86+.elf
  Found memtest86+ image: /memtest86+.bin
  done


  [30655.190608] general protection fault: 0000 [#133] SMP PTI
  [30655.190612] Modules linked in: btrfs zstd_compress xor raid6_pq ufs qnx4 
hfsplus hfs minix ntfs msdos jfs xfs hid_generic usbhid hid nls_iso8859_1 uas 
usb_storage ccm rfcomm ipt_REJECT nf_reject_ipv4 nf_log_ipv4 nf_log_common 
xt_LOG xt_limit xt_pkttype xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack nf_conntrack libcrc32c ipt_rpfilter iptable_raw pci_stub 
vboxpci(OE) vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) iptable_filter bnep 
binfmt_misc arc4 uvcvideo intel_rapl snd_hda_codec_hdmi btusb videobuf2_vmalloc 
videobuf2_memops btrtl x86_pkg_temp_thermal btbcm videobuf2_v4l2 
intel_powerclamp videobuf2_core btintel videodev bluetooth 
snd_hda_codec_realtek media snd_hda_codec_generic coretemp ecdh_generic 
snd_hda_intel iwlmvm snd_hda_codec kvm_intel snd_hda_core snd_hwdep mac80211 
kvm snd_pcm snd_seq_midi
  [30655.190669]  irqbypass snd_seq_midi_event snd_rawmidi intel_cstate 
intel_rapl_perf snd_seq iwlwifi input_leds joydev asus_nb_wmi snd_seq_device 
asus_wmi snd_timer sparse_keymap serio_raw snd mei_me cfg80211 mei lpc_ich 
soundcore shpchp mac_hid asus_wireless sch_fq_codel parport_pc ppdev lp parport 
ip_tables x_tables autofs4 algif_skcipher af_alg dm_crypt crct10dif_pclmul 
nouveau crc32_pclmul i915 ghash_clmulni_intel pcbc rtsx_pci_sdmmc mxm_wmi ttm 
i2c_algo_bit aesni_intel drm_kms_helper ahci syscopyarea aes_x86_64 sysfillrect 
crypto_simd sysimgblt glue_helper fb_sys_fops cryptd libahci psmouse drm r8169 
rtsx_pci mii wmi video [last unloaded: msr]
  [30655.190715] CPU: 6 PID: 26988 Comm: grub-probe Tainted: G      D    OE    
4.15.0-47-generic #50-Ubuntu
  [30655.190716] Hardware name: ASUSTeK COMPUTER INC. G551JW/G551JW, BIOS 
G551JW.207 08/03/2015
  [30655.190725] RIP: 0010:find_get_entries+0x68/0x200
  [30655.190727] RSP: 0018:ffffadf20efbbbf8 EFLAGS: 00010246
  [30655.190729] RAX: 0000000000000000 RBX: 000000000000000e RCX: 
0000000000000000
  [30655.190731] RDX: 956a4e30dd497370 RSI: 0000000001d0c740 RDI: 
ffff892554fa6238
  [30655.190733] RBP: ffffadf20efbbc58 R08: 0000000001d0c71c R09: 
0000000000000000
  [30655.190734] R10: ffff892554fa6340 R11: 0000000000000000 R12: 
ffffadf20efbbd30
  [30655.190736] R13: ffffadf20efbbcb0 R14: 0000000000000000 R15: 
ffff892554fa6340
  [30655.190738] FS:  00007fac22a0afc0(0000) GS:ffff8928eef80000(0000) 
knlGS:0000000000000000
  [30655.190740] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [30655.190742] CR2: 00007fac22909000 CR3: 00000003a3662006 CR4: 
00000000001606e0
  [30655.190743] Call Trace:
  [30655.190752]  pagevec_lookup_entries+0x1e/0x30
  [30655.190756]  invalidate_mapping_pages+0x91/0x330
  [30655.190762]  ? wait_for_completion+0xc5/0x140
  [30655.190766]  ? wake_up_q+0x80/0x80
  [30655.190771]  ? radix_tree_lookup+0xd/0x10
  [30655.190774]  ? get_work_pool+0x2d/0x40
  [30655.190777]  ? flush_work+0x5b/0x1e0
  [30655.190780]  ? worker_detach_from_pool+0xa0/0xa0
  [30655.190785]  ? find_next_bit+0xb/0x10
  [30655.190788]  ? cpumask_next+0x1b/0x20
  [30655.190791]  ? lru_add_drain_all_cpuslocked+0x15d/0x1a0
  [30655.190795]  invalidate_bdev+0x50/0x60
  [30655.190800]  blkdev_ioctl+0x66a/0x970
  [30655.190803]  block_ioctl+0x3d/0x50
  [30655.190807]  do_vfs_ioctl+0xa8/0x630
  [30655.190813]  ? __audit_syscall_entry+0xbc/0x110
  [30655.190817]  ? syscall_trace_enter+0x1da/0x2d0
  [30655.190820]  SyS_ioctl+0x79/0x90
  [30655.190822]  do_syscall_64+0x73/0x130
  [30655.190826]  entry_SYSCALL_64_after_hwframe+0x3d/0xa2
  [30655.190828] RIP: 0033:0x7fac222c45d7
  [30655.190830] RSP: 002b:00007ffd05b75a38 EFLAGS: 00000246 ORIG_RAX: 
0000000000000010
  [30655.190832] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 
00007fac222c45d7
  [30655.190834] RDX: 0000000000000000 RSI: 0000000000001261 RDI: 
0000000000000004
  [30655.190835] RBP: 000055f6c30ede48 R08: 0000000000000000 R09: 
0000000000000000
  [30655.190837] R10: 0000000000000000 R11: 0000000000000246 R12: 
000055f6c44632f0
  [30655.190839] R13: 000055f6c44622e0 R14: 0000000000000001 R15: 
000055f6c44622c0
  [30655.190840] Code: 00 00 00 00 48 89 75 b0 45 31 f6 45 31 ff 4d 85 ff 0f 84 
01 01 00 00 49 8b 17 48 85 d2 74 69 48 89 d0 83 e0 03 0f 85 5f 01 00 00 <48> 8b 
42 20 48 8d 78 ff a8 01 48 0f 44 fa 8b 47 1c 85 c0 74 d7 
  [30655.190876] RIP: find_get_entries+0x68/0x200 RSP: ffffadf20efbbbf8
  [30655.190893] ---[ end trace ca2db52954dc4bcf ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824756/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to