It seems to have started shortly after a recent kernel upgrade (within the
last two weeks).  I keep all updates fresh.

On Tue, Sep 22, 2015 at 2:53 PM, Joseph Salisbury <
[email protected]> wrote:

> Did this issue start happening after an update/upgrade? Was there a
> kernel version where you were not having this particular problem? This
> will help determine if the problem you are seeing is the result of a
> regression, and when this regression was introduced.   If this is a
> regression, we can perform a kernel bisect to identify the commit that
> introduced the problem.
>
>
> ** Tags added: kernel-da-key
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1498602
>
> Title:
>   kernel crash apparently involving telepathy
>
> Status in linux package in Ubuntu:
>   Confirmed
>
> Bug description:
>   http://askubuntu.com/questions/677032/what-caused-this-crash-shown-in-
>   syslog
>
>   Sep 21 12:38:02 pratchett
> org.freedesktop.Telepathy.AccountManager[2233]: (process:2488):
> GLib-GIO-WARNING **: netlink message was truncated; shouldn't happen...
>   Sep 21 12:38:02 pratchett kernel: [45277.692643] BUG: unable to handle
> kernel NULL pointer dereference at           (null)
>   Sep 21 12:38:02 pratchett kernel: [45277.692685] IP:
> [<ffffffff816ad857>] skb_queue_tail+0x37/0x60
>   Sep 21 12:38:02 pratchett kernel: [45277.692714] PGD 877fe067 PUD 0
>   Sep 21 12:38:02 pratchett kernel: [45277.692731] Oops: 0002 [#1] SMP
>   Sep 21 12:38:02 pratchett kernel: [45277.692748] Modules linked in:
> xt_conntrack ipt_REJECT nf_reject_ipv4 ebtable_filter ebtables
> ip6table_filter ip6_tables pci_stub vboxpci(OE) vboxnetadp(OE)
> vboxnetflt(OE) vboxdrv(OE) ctr ccm xt_CHECKSUM iptable_mangle
> ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4
> nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp bridge stp llc
> iptable_filter ip_tables x_tables binfmt_misc rfcomm bnep dell_wmi
> sparse_keymap dell_laptop dcdbas snd_hda_codec_hdmi snd_hda_codec_realtek
> snd_hda_codec_generic dm_multipath scsi_dh intel_rapl iosf_mbi
> snd_hda_intel x86_pkg_temp_thermal intel_powerclamp snd_hda_controller
> coretemp snd_hda_codec arc4 kvm_intel snd_hwdep kvm crct10dif_pclmul ath9k
> crc32_pclmul snd_pcm ath9k_common uvcvideo ghash_clmulni_intel
> videobuf2_vmalloc videobuf2_memops ath9k_hw videobuf2_core v4l2_common
> videodev aesni_intel ath media aes_x86_64 lrw gf128mul snd_seq_midi
> glue_helper snd_seq_midi_event ablk_helper cryptd mac80211 ath3k btusb
> snd_rawmidi joydev bluetooth serio_raw snd_seq cfg80211 snd_seq_device
> snd_timer lpc_ich snd soundcore shpchp mei_me mei mac_hid parport_pc ppdev
> lp parport autofs4 btrfs xor raid6_pq hid_generic usbhid hid i915
> i2c_algo_bit drm_kms_helper psmouse drm ahci libahci wmi video
>   Sep 21 12:38:02 pratchett kernel: [45277.693306] CPU: 2 PID: 9668 Comm:
> Chrome_ChildIOT Tainted: G           OE  3.19.0-29-generic #31-Ubuntu
>   Sep 21 12:38:02 pratchett kernel: [45277.693345] Hardware name: Dell
> Inc.          Dell System XPS L322X/0PJHXN, BIOS A09 05/15/2013
>   Sep 21 12:38:02 pratchett kernel: [45277.693383] task: ffff8801bf7489d0
> ti: ffff8801f8c4c000 task.ti: ffff8801f8c4c000
>   Sep 21 12:38:02 pratchett kernel: [45277.693426] RIP:
> 0010:[<ffffffff816ad857>]  [<ffffffff816ad857>] skb_queue_tail+0x37/0x60
>   Sep 21 12:38:02 pratchett kernel: [45277.693462] RSP:
> 0018:ffff8801f8c4fb38  EFLAGS: 00010046
>   Sep 21 12:38:02 pratchett kernel: [45277.693493] RAX: 0000000000000292
> RBX: ffff8801c1ddb510 RCX: 0000000000000000
>   Sep 21 12:38:02 pratchett kernel: [45277.693533] RDX: 0000000000000000
> RSI: 0000000000000292 RDI: ffff8801c1ddb524
>   Sep 21 12:38:02 pratchett kernel: [45277.693574] RBP: ffff8801f8c4fb58
> R08: 0000000000000300 R09: ffff880236c03600
>   Sep 21 12:38:02 pratchett kernel: [45277.693605] R10: 0000000000000292
> R11: ffff8801f8c4ffd8 R12: ffff8801c1ddb510
>   Sep 21 12:38:02 pratchett kernel: [45277.693635] R13: ffff8801c1ddb524
> R14: ffff8801c1ddb480 R15: ffff8801c1ddaa00
>   Sep 21 12:38:02 pratchett kernel: [45277.693666] FS:
> 00007fb4c2de3700(0000) GS:ffff88023f280000(0000) knlGS:0000000000000000
>   Sep 21 12:38:02 pratchett kernel: [45277.693700] CS:  0010 DS: 0000 ES:
> 0000 CR0: 0000000080050033
>   Sep 21 12:38:02 pratchett kernel: [45277.693724] CR2: 0000000000000000
> CR3: 00000001724bf000 CR4: 00000000001407e0
>   Sep 21 12:38:02 pratchett kernel: [45277.693754] Stack:
>   Sep 21 12:38:02 pratchett kernel: [45277.693763]  0000000000000000
> 000000000000001c 0000000000000000 ffff8801c1ddb510
>   Sep 21 12:38:02 pratchett kernel: [45277.693796]  ffff8801f8c4fc18
> ffffffff81762ce4 ffff880200000000 ffff8801c1ddb510
>   Sep 21 12:38:02 pratchett kernel: [45277.693837]  ffff8801f8c4ff08
> ffff8801f8c4fc88 0000001c0000001c 000000000000001c
>   Sep 21 12:38:02 pratchett kernel: [45277.693870] Call Trace:
>   Sep 21 12:38:02 pratchett kernel: [45277.693889]  [<ffffffff81762ce4>]
> unix_stream_sendmsg+0x1e4/0x450
>   Sep 21 12:38:02 pratchett kernel: [45277.693917]  [<ffffffff816a584c>]
> do_sock_sendmsg+0x8c/0x100
>   Sep 21 12:38:02 pratchett kernel: [45277.693942]  [<ffffffff816a51ec>] ?
> copy_msghdr_from_user+0x15c/0x210
>   Sep 21 12:38:02 pratchett kernel: [45277.693971]  [<ffffffff816a5ea8>]
> ___sys_sendmsg+0x348/0x360
>   Sep 21 12:38:02 pratchett kernel: [45277.693997]  [<ffffffff811fdcb0>] ?
> pipe_read+0x300/0x340
>   Sep 21 12:38:02 pratchett kernel: [45277.694022]  [<ffffffff811f46de>] ?
> new_sync_read+0x7e/0xb0
>   Sep 21 12:38:02 pratchett kernel: [45277.694047]  [<ffffffff8112c792>] ?
> seccomp_phase1+0x92/0x270
>   Sep 21 12:38:02 pratchett kernel: [45277.694073]  [<ffffffff816a65c2>]
> __sys_sendmsg+0x42/0x80
>   Sep 21 12:38:02 pratchett kernel: [45277.694097]  [<ffffffff816a6612>]
> SyS_sendmsg+0x12/0x20
>   Sep 21 12:38:02 pratchett kernel: [45277.694121]  [<ffffffff817cbe4d>]
> system_call_fastpath+0x16/0x1b
>   Sep 21 12:38:02 pratchett kernel: [45277.694147] Code: 8d 6f 14 41 54 53
> 48 89 fb 4c 89 ef 49 89 f4 48 83 ec 08 e8 9c de 11 00 48 8b 53 08 49 89 1c
> 24 4c 89 ef 48 89 c6 49 89 54 24 08 <4c> 89 22 83 43 10 01 4c 89 63 08 e8
> 59 dd 11 00 48 83 c4 08 5b
>   Sep 21 12:38:02 pratchett kernel: [45277.694274] RIP
> [<ffffffff816ad857>] skb_queue_tail+0x37/0x60
>   Sep 21 12:38:02 pratchett kernel: [45277.694308]  RSP <ffff8801f8c4fb38>
>
>
>   That is a kernel bug -- no action any program can take should ever lead
> to a kernel panic.
>
>   Judging from the stack trace:
>
>   Telepathy sends a message, using the sendmsg system call, on a socket of
> type PF_UNIX.
>   The process doing that is inside a seccomp compartment, i.e. does not
> have direct system access, so the system call is handled by marshalling the
> arguments to a data structure, and sending them to another process (so that
> process can look at whether the access is allowed, implementing more
> complex policies than what the kernel allows).
>   The message is appended to the socket that will transport it to the
> program handling this.
>   During this append operation, an invalid pointer is found. This can
> happen if a data structure is uninitialized, but this is certainly a kernel
> bug if there is a code path that can leave an uninitialized structure
> somewhere where it would be expected to be valid.
>
>   The second error is a repeat of the first -- the data structure didn't
>   get any better in the meantime.
>
>   I'd report this as a bug against the kernel package that you are
>   using, in this case linux-image-3.19.0-29-generic. If the problem can
>   be reproduced, please include instructions to do so.
>
>   This appears to be a weird interaction between Chrome and Telepathy
>   that might itself warrant investigation, but the primary issue is that
>   there is a way to reach an invalid state, and that should never
>   happen.
>
>   ProblemType: Bug
>   DistroRelease: Ubuntu 15.04
>   Package: linux-image-3.19.0-29-generic 3.19.0-29.31
>   ProcVersionSignature: Ubuntu 3.19.0-29.31-generic 3.19.8-ckt6
>   Uname: Linux 3.19.0-29-generic x86_64
>   ApportVersion: 2.17.2-0ubuntu1.4
>   Architecture: amd64
>   AudioDevicesInUse:
>    USER        PID ACCESS COMMAND
>    /dev/snd/controlC0:  fred       2638 F.... pulseaudio
>   CurrentDesktop: Unity
>   Date: Tue Sep 22 13:39:21 2015
>   DistributionChannelDescriptor:
>    # This is a distribution channel descriptor
>    # For more information see
> http://wiki.ubuntu.com/DistributionChannelDescriptor
>    canonical-oem-somerville-precise-amd64-20120703-2
>   HibernationDevice: RESUME=UUID=7d5dc495-ada4-4ace-9665-639b9152a33d
>   InstallationDate: Installed on 2013-08-21 (762 days ago)
>   InstallationMedia: Ubuntu 12.04 "Precise" - Build amd64 LIVE Binary
> 20120703-15:08
>   MachineType: Dell Inc. Dell System XPS L322X
>   ProcFB: 0 inteldrmfb
>   ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-29-generic
> root=UUID=0a96aa74-804d-4bdc-a152-9de72390e1e3 ro quiet splash vt.handoff=7
>   RelatedPackageVersions:
>    linux-restricted-modules-3.19.0-29-generic N/A
>    linux-backports-modules-3.19.0-29-generic  N/A
>    linux-firmware                             1.143.3
>   SourcePackage: linux
>   UpgradeStatus: Upgraded to vivid on 2015-04-24 (150 days ago)
>   dmi.bios.date: 05/15/2013
>   dmi.bios.vendor: Dell Inc.
>   dmi.bios.version: A09
>   dmi.board.name: 0PJHXN
>   dmi.board.vendor: Dell Inc.
>   dmi.board.version: A00
>   dmi.chassis.type: 8
>   dmi.chassis.vendor: Dell Inc.
>   dmi.chassis.version: 0.1
>   dmi.modalias:
> dmi:bvnDellInc.:bvrA09:bd05/15/2013:svnDellInc.:pnDellSystemXPSL322X:pvr:rvnDellInc.:rn0PJHXN:rvrA00:cvnDellInc.:ct8:cvr0.1:
>   dmi.product.name: Dell System XPS L322X
>   dmi.sys.vendor: Dell Inc.
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1498602/+subscriptions
>

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1498602

Title:
  kernel crash apparently involving telepathy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1498602/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to