Public bug reported:
I'm working on the capturing of kernel crashes. To test I use:
"# echo c > /proc/sysreq-trigger"
(or pressing sysreq-c). This used to work until 2.6.30-9. With the current
2.6.31-2 I get:
[ 107.901870] SysRq : Trigger a crash
[ 107.904110] BUG: unable to handle kernel NULL pointer dereference at (null)
[ 107.904504] IP: [<c03917a3>] sysrq_handle_crash+0x3/0x10
[ 107.904504] *pde = 7ddbf067
[ 107.904504] Oops: 0002 [#1] SMP
[ 107.904504] last sysfs file:
/sys/devices/system/cpu/cpu1/cpufreq/scaling_governor
[ 107.904504] Modules linked in: binfmt_misc bridge stp bnep lp
snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_pcm_oss snd_mixer_oss
snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event
snd_seq snd_timer snd_seq_device snd iTCO_wdt iTCO_vendor_support ppdev
soundcore parport_pc psmouse snd_page_alloc parport pcspkr serio_raw usbhid
r8169 mii fbcon tileblit font bitblit softcursor i915 drm i2c_algo_bit video
output intel_agp agpgart
[ 107.904504]
[ 107.904504] Pid: 2987, comm: bash Not tainted (2.6.31-2-generic #16-Ubuntu)
MS-7528
[ 107.904504] EIP: 0060:[<c03917a3>] EFLAGS: 00010086 CPU: 1
[ 107.904504] EIP is at sysrq_handle_crash+0x3/0x10
[ 107.904504] EAX: 00000063 EBX: 00000063 ECX: ffffffd6 EDX: 00000000
[ 107.904504] ESI: c075b1f0 EDI: 00000000 EBP: f738ff04 ESP: f738ff04
[ 107.904504] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[ 107.904504] Process bash (pid: 2987, ti=f738e000 task=f54c3ed0
task.ti=f738e000)
[ 107.904504] Stack:
[ 107.904504] f738ff2c c03919c6 c06d4bab c06d42d2 00000000 00000004 00000292
00000002
[ 107.904504] <0> f68ffb00 c0391a20 f738ff3c c0391a5f 09a3d808 f7375e00
f738ff64 c0223502
[ 107.904504] <0> f738ff98 0000000a f7375e48 00000002 09a3d808 f68ffb00
00000002 09a3d808
[ 107.904504] Call Trace:
[ 107.904504] [<c03919c6>] ? __handle_sysrq+0xf6/0x150
[ 107.904504] [<c0391a20>] ? write_sysrq_trigger+0x0/0x50
[ 107.904504] [<c0391a5f>] ? write_sysrq_trigger+0x3f/0x50
[ 107.904504] [<c0223502>] ? proc_reg_write+0x62/0x90
[ 107.904504] [<c01e1c8c>] ? vfs_write+0x9c/0x1a0
[ 107.904504] [<c02234a0>] ? proc_reg_write+0x0/0x90
[ 107.904504] [<c01e2781>] ? sys_write+0x41/0x70
[ 107.904504] [<c010338c>] ? syscall_call+0x7/0xb
[ 107.904504] Code: c0 01 0f b6 41 03 19 d2 f7 d2 83 e2 03 83 e0 cf c1 e2 04
09 d0 88 41 03 5d c3 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 55 89 e5 <c6> 05
00 00 00 00 01 5d c3 8d 74 26 00 8d 50 d0 55 83 fa 09 89
[ 107.904504] EIP: [<c03917a3>] sysrq_handle_crash+0x3/0x10 SS:ESP
0068:f738ff04
[ 107.980006] CR2: 0000000000000000
[ 107.980006] ---[ end trace 3116ab2cc2767431 ]---
[ 146.372280] hda-intel: Invalid position buffer, using LPIB read method
instead.
[ 146.379175] hda-intel: IRQ timing workaround is activated for card #0.
Suggest a bigger bdl_pos_adj.
from the "echo" and a complete hang von sysreq-c.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
crashkernel capability no longer working
https://bugs.launchpad.net/bugs/397326
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs