Fails the same on 3.8 RC2:
Jan 9 14:07:50 xango3 kernel: [ 388.374077] general protection fault: 0000
[#1] SMP
Jan 9 14:07:50 xango3 kernel: [ 388.374285] Modules linked in:
lib80211_crypt_tkip wl(POF) lib80211 cfg80211 pci_stub vboxpci(OF)
vboxnetadp(OF) vboxnetflt(OF) vboxdrv(OF) nfnetlink_log nfnetlink
ip6table_filter ip6_tables ebtable_nat ebtables xt_state ipt_REJECT xt_CHECKSUM
iptable_mangle xt_tcpudp iptable_filter ipt_MASQUERADE iptable_nat
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables
x_tables bridge stp llc bnep rfcomm snd_hda_codec_hdmi nvidia(POF) uvcvideo
videobuf2_vmalloc snd_hda_codec_idt snd_hda_intel videobuf2_memops
snd_hda_codec videobuf2_core snd_hwdep joydev coretemp videodev snd_pcm
snd_page_alloc snd_seq_midi kvm_intel snd_seq_midi_event btusb snd_rawmidi kvm
snd_seq bluetooth snd_seq_device snd_timer snd psmouse dm_multipath dell_laptop
soundcore lpc_ich microcode dcdbas dell_wmi sparse_keymap serio_raw intel_ips
scsi_dh wmi ppdev mac_hid parport_pc tpm_rng tpm_tis lp parport dm_crypt nbd
hid_logitech_dj usbhid hid ghash_clmulni_intel aesni_intel aes_x86_64 ablk_hel
Jan 9 14:07:50 xango3 kernel: per cryptd xts lrw gf128mul video sdhci_pci
sdhci firewire_ohci firewire_core crc_itu_t e1000e
Jan 9 14:07:50 xango3 kernel: [ 388.380425] CPU 3
Jan 9 14:07:50 xango3 kernel: [ 388.380489] Pid: 4141, comm: wpa_supplicant
Tainted: PF O 3.8.0-030800rc2-generic #201301022235 Dell Inc. Latitude
E6410/0K42JR
Jan 9 14:07:50 xango3 kernel: [ 388.380664] RIP: 0010:[<ffffffffa0f66783>]
[<ffffffffa0f66783>] wl_cfg80211_scan+0x43/0x380 [wl]
Jan 9 14:07:50 xango3 kernel: [ 388.380867] RSP: 0018:ffff880222a81970
EFLAGS: 00010286
Jan 9 14:07:50 xango3 kernel: [ 388.380946] RAX: ffffffffa1122b98 RBX:
ffff88021ff57800 RCX: 0000000000000000
Jan 9 14:07:50 xango3 kernel: [ 388.381029] RDX: ffff880220bf3200 RSI:
ffff88021ff57800 RDI: ffff880220bf3200
Jan 9 14:07:50 xango3 kernel: [ 388.381110] RBP: ffff880222a81998 R08:
0000000000000003 R09: 0000000000000000
Jan 9 14:07:50 xango3 kernel: [ 388.381193] R10: ffffffffa11223a0 R11:
000000000000006e R12: 0086162600000001
Jan 9 14:07:50 xango3 kernel: [ 388.381275] R13: ffff880222a81a20 R14:
ffff88021ff57800 R15: 0000000000000000
Jan 9 14:07:50 xango3 kernel: [ 388.381359] FS: 00007f0cd8ec9740(0000)
GS:ffff88022fcc0000(0000) knlGS:0000000000000000
Jan 9 14:07:50 xango3 kernel: [ 388.381457] CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033
Jan 9 14:07:50 xango3 kernel: [ 388.381537] CR2: 0000000001ea8058 CR3:
0000000221f8b000 CR4: 00000000000007e0
Jan 9 14:07:50 xango3 kernel: [ 388.381620] DR0: 0000000000000000 DR1:
0000000000000000 DR2: 0000000000000000
Jan 9 14:07:50 xango3 kernel: [ 388.381703] DR3: 0000000000000000 DR6:
00000000ffff0ff0 DR7: 0000000000000400
Jan 9 14:07:50 xango3 kernel: [ 388.381785] Process wpa_supplicant (pid:
4141, threadinfo ffff880222a80000, task ffff88021f831720)
Jan 9 14:07:50 xango3 kernel: [ 388.381884] Stack:
Jan 9 14:07:50 xango3 kernel: [ 388.381959] ffff88021ff57800
ffff880220bf3000 ffff880222a81a20 0000000000000000
Jan 9 14:07:50 xango3 kernel: [ 388.382282] 0000000000000000
ffff880222a819f8 ffffffffa0dc96db 000000000000007c
Jan 9 14:07:50 xango3 kernel: [ 388.382600] 0000000000000000
ffff880222fc6c00 ffff880220bf3200 ffff880222a819e8
Jan 9 14:07:50 xango3 kernel: [ 388.382990] Call Trace:
Jan 9 14:07:50 xango3 kernel: [ 388.383130] [<ffffffffa0dc96db>]
nl80211_trigger_scan+0x4fb/0x710 [cfg80211]
Jan 9 14:07:50 xango3 kernel: [ 388.383223] [<ffffffff8160416d>]
genl_rcv_msg+0x22d/0x2b0
Jan 9 14:07:50 xango3 kernel: [ 388.383313] [<ffffffff815cd25b>] ?
__alloc_skb+0x8b/0x2a0
Jan 9 14:07:50 xango3 kernel: [ 388.383396] [<ffffffff81603f40>] ?
genl_rcv+0x40/0x40
Jan 9 14:07:50 xango3 kernel: [ 388.383479] [<ffffffff81603919>]
netlink_rcv_skb+0xa9/0xd0
Jan 9 14:07:50 xango3 kernel: [ 388.383566] [<ffffffff81603f25>]
genl_rcv+0x25/0x40
Jan 9 14:07:50 xango3 kernel: [ 388.383649] [<ffffffff81603261>]
netlink_unicast+0x1b1/0x230
Jan 9 14:07:50 xango3 kernel: [ 388.383732] [<ffffffff816035de>]
netlink_sendmsg+0x2fe/0x3b0
Jan 9 14:07:50 xango3 kernel: [ 388.383816] [<ffffffff815c0272>]
sock_sendmsg+0xd2/0xf0
Jan 9 14:07:50 xango3 kernel: [ 388.383907] [<ffffffff8115a59f>] ?
do_anonymous_page.isra.40+0x23f/0x2f0
Jan 9 14:07:50 xango3 kernel: [ 388.383996] [<ffffffff815c2b0a>] ?
move_addr_to_kernel+0x5a/0xa0
Jan 9 14:07:50 xango3 kernel: [ 388.384080] [<ffffffff815cf346>] ?
verify_iovec+0x56/0xd0
Jan 9 14:07:50 xango3 kernel: [ 388.384162] [<ffffffff815c201c>]
__sys_sendmsg+0x38c/0x3a0
Jan 9 14:07:50 xango3 kernel: [ 388.384248] [<ffffffff816ec830>] ?
__do_page_fault+0x240/0x540
Jan 9 14:07:50 xango3 kernel: [ 388.384337] [<ffffffff81014c96>] ?
do_signal+0xc6/0x130
Jan 9 14:07:50 xango3 kernel: [ 388.384425] [<ffffffff8106d63f>] ?
recalc_sigpending+0x1f/0x60
Jan 9 14:07:50 xango3 kernel: [ 388.384512] [<ffffffff815c3b29>]
sys_sendmsg+0x49/0x90
Jan 9 14:07:50 xango3 kernel: [ 388.384596] [<ffffffff816f14dd>]
system_call_fastpath+0x1a/0x1f
Jan 9 14:07:50 xango3 kernel: [ 388.384682] Code: 4c 89 65 e0 4c 89 6d e8 4c
89 7d f8 48 8b 86 58 02 00 00 48 85 c0 0f 84 e7 02 00 00 4c 8b 20 4d 85 e4 0f
84 db 02 00 00 48 85 d2 <49> 8b 9c 24 60 06 00 00 0f 84 bf 02 00 00 f6 c3 01 49
89 94 24
Jan 9 14:07:50 xango3 kernel: [ 388.388498] RIP [<ffffffffa0f66783>]
wl_cfg80211_scan+0x43/0x380 [wl]
Jan 9 14:07:50 xango3 kernel: [ 388.388678] RSP <ffff880222a81970>
Jan 9 14:07:50 xango3 kernel: [ 388.388780] ---[ end trace 03e9aa52bc8998ea
]---
Note that this is related to the bcmwl package: the kernel works OK
until the 'wl' module is loaded, when it immediately crashes. This test
was run with the current bcmwl (6.20.155.1+bdcom-0ubuntu4; all of the
6.20.155.1 bcmwl packages cause the failure).
The associated bug is bug 1089114.
Additionally. Until 3.7.0-6 and the first bcmwl 6.20.155.1, all was
fine. On 3.7.0-6 bcmwl 5.100.82.112+bdcom-0ubuntu4 caused a kernel crash
(see bug 1089114). I have been running Raring through all kernels
released without any problems until 3.7.0-6 *and* bcmwl 6.20.155.1.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1089114
Title:
general protection fault: 0000 [#1] SMP on
wl_cfg80211_scan+0x43/0x380 [wl]
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1089114/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs