Public bug reported:

I'm working on the capturing of kernel crashes. To test I use:
"# echo c > /proc/sysreq-trigger"
(or pressing sysreq-c).  This used to work until 2.6.30-9. With the current 
2.6.31-2 I get:

[  107.901870] SysRq : Trigger a crash
[  107.904110] BUG: unable to handle kernel NULL pointer dereference at (null)
[  107.904504] IP: [<c03917a3>] sysrq_handle_crash+0x3/0x10
[  107.904504] *pde = 7ddbf067 
[  107.904504] Oops: 0002 [#1] SMP 
[  107.904504] last sysfs file: 
/sys/devices/system/cpu/cpu1/cpufreq/scaling_governor
[  107.904504] Modules linked in: binfmt_misc bridge stp bnep lp 
snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_pcm_oss snd_mixer_oss 
snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event 
snd_seq snd_timer snd_seq_device snd iTCO_wdt iTCO_vendor_support ppdev 
soundcore parport_pc psmouse snd_page_alloc parport pcspkr serio_raw usbhid 
r8169 mii fbcon tileblit font bitblit softcursor i915 drm i2c_algo_bit video 
output intel_agp agpgart
[  107.904504] 
[  107.904504] Pid: 2987, comm: bash Not tainted (2.6.31-2-generic #16-Ubuntu) 
MS-7528
[  107.904504] EIP: 0060:[<c03917a3>] EFLAGS: 00010086 CPU: 1
[  107.904504] EIP is at sysrq_handle_crash+0x3/0x10
[  107.904504] EAX: 00000063 EBX: 00000063 ECX: ffffffd6 EDX: 00000000
[  107.904504] ESI: c075b1f0 EDI: 00000000 EBP: f738ff04 ESP: f738ff04
[  107.904504]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[  107.904504] Process bash (pid: 2987, ti=f738e000 task=f54c3ed0 
task.ti=f738e000)
[  107.904504] Stack:
[  107.904504]  f738ff2c c03919c6 c06d4bab c06d42d2 00000000 00000004 00000292 
00000002
[  107.904504] <0> f68ffb00 c0391a20 f738ff3c c0391a5f 09a3d808 f7375e00 
f738ff64 c0223502
[  107.904504] <0> f738ff98 0000000a f7375e48 00000002 09a3d808 f68ffb00 
00000002 09a3d808
[  107.904504] Call Trace:
[  107.904504]  [<c03919c6>] ? __handle_sysrq+0xf6/0x150
[  107.904504]  [<c0391a20>] ? write_sysrq_trigger+0x0/0x50
[  107.904504]  [<c0391a5f>] ? write_sysrq_trigger+0x3f/0x50
[  107.904504]  [<c0223502>] ? proc_reg_write+0x62/0x90
[  107.904504]  [<c01e1c8c>] ? vfs_write+0x9c/0x1a0
[  107.904504]  [<c02234a0>] ? proc_reg_write+0x0/0x90
[  107.904504]  [<c01e2781>] ? sys_write+0x41/0x70
[  107.904504]  [<c010338c>] ? syscall_call+0x7/0xb
[  107.904504] Code: c0 01 0f b6 41 03 19 d2 f7 d2 83 e2 03 83 e0 cf c1 e2 04 
09 d0 88 41 03 5d c3 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 55 89 e5 <c6> 05 
00 00 00 00 01 5d c3 8d 74 26 00 8d 50 d0 55 83 fa 09 89 
[  107.904504] EIP: [<c03917a3>] sysrq_handle_crash+0x3/0x10 SS:ESP 
0068:f738ff04
[  107.980006] CR2: 0000000000000000
[  107.980006] ---[ end trace 3116ab2cc2767431 ]---
[  146.372280] hda-intel: Invalid position buffer, using LPIB read method 
instead.
[  146.379175] hda-intel: IRQ timing workaround is activated for card #0. 
Suggest a bigger bdl_pos_adj.

from the "echo" and a complete hang von sysreq-c.

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
crashkernel capability no longer working
https://bugs.launchpad.net/bugs/397326
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to