The most recent F14 updates damage my system

James Laska jlaska at redhat.com
Tue Sep 28 14:12:25 UTC 2010


On Tue, 2010-09-28 at 07:21 -0400, Paul Frields wrote:
> On Tue, Sep 28, 2010 at 7:14 AM, Paul Frields <stickster at gmail.com> wrote:
> > On Tue, Sep 28, 2010 at 5:31 AM, Joachim Backes
> > <joachim.backes at rhrk.uni-kl.de> wrote:
> >> Hi,
> >>
> >> Sombody has seen this:
> >>
> >> I applied the recent updates for F14 (most are coming from
> >> updates-testing repo).
> >>
> >> Then I rebooted: system still runs.
> >>
> >> Then, after some time (say about 1/2 to 1 hour), getting zillions of
> >> crash messages (in /var/log/messages), for example
> >>
> >> Sep 28 10:25:02 eule kernel: Process 17042(abrt-hook-ccpp) has
> >> RLIMIT_CORE set to 1
> >> Sep 28 10:25:02 eule kernel: Aborting core
> >> Sep 28 10:25:02 eule kernel: eu-unstrip[17043]: segfault at 962dfc ip
> >> 00945689 sp bf9ad844 error 7 in ld-2.12.90.so[942000+20000].
> >>
> >> I tried to reboot with ctrl+alt+del: nothing happens.
> >>
> >> Pressing reset, going into grub: system starts booting, than hangs.
> >>
> >> My impression: the *glibc* or *glibc-common* update make my system buggy.
> >>
> >> Restoring my system, then updating without the updates-testing repo: No
> >> more such messages in /var/log/messages.
> >
> > I also get a kernel panic after last night's updates.  Here's the
> > relevant section of boot messages. I'm transcribing this and will try
> > to be careful with my typing. ;-)
> >
> > * * *
> > dracut: Switching root
> > init[1]: segfault at 3df641fbf8 ip 0000003df62033c7 sp 00007fff2e7bf5f0 error 7 in ld-2.12.90.so[3df6200000+1f000]
> > init used greatest stack depth: 3880 bytes left
> > Kernel panic - not syncing: Attempted to kill init!
> > Pid: 1, comm: init Not tainted 2.6.35.4-28.fc14.x86_64 #1
> > Call Trace:
> >  [<ffffffff8149b08b>] panic+0x8b/0x110
> >  [<ffffffff81054a89>] do_exit+0x7b/0x7d0
> >  [<ffffffff81055474>] do_group_exit+0x88/0xb6
> >  [<ffffffff810628f4>] get_signal_to_deliver+0x3d6/0x3f5
> >  [<ffffffff81008f91>] do_signal+0x72/0x690
> >  [<ffffffff8149b178>] ? printk+0x68/0x70
> >  [<ffffffff81033874>] ? bad_area_access_error+0x47/0x4e
> >  [<ffffffff8107f15e>] ? lockdep_sys_exit+0x20/0x76
> >  [<ffffffff810095f0>] do_notify_resume+0x28,0x86
> >  [<ffffffff8149e39b>] retint_signal+0x4d/0x92
> > panic occurred, switching back to text console
> > * * *
> 
> Artem Goncharov helpfully filed this, which looks to be the same issue:
> https://bugzilla.redhat.com/show_bug.cgi?id=638091

Thanks Artem, I've added this to F14Blocker list, as it clearly impacts
the final release criteria if all systems fail to boot.

This updated required a few additional steps in order to rollback the
glibc update to return to a working system.  As with anything, there are
many different ways to accomplish this.  In case folks are interested, I
included my recovery procedure below ...

     1. Boot into a rescue system (this could be the F14 installer
        rescue-mode, a previously installed Fedora on another partition,
        or a Fedora Live image).  In my case, I have an F13 partition on
        my system.
     2. Identify and mount your F-14 installationrescue-mode will locate
        and mount the partition for you).  If not ... some manual steps
        may be required.  For me, it involved unlocking the encrypted
        partition ...
              * UUID=$(cryptsetup
                luksUUID /dev/mapper/vg_flatline-f14_root)
              * cryptsetup luksOpen /dev/mapper/vg_flatline-f14_root
                luks-$UUID
              * mount /dev/mapper/luks-$UUID /tmp/f14
              * mount -t proc proc /tmp/f14/proc
              * mount -t sysfs sysfs /tmp/f14/sys
              * mount -t selinuxfs selinuxfs /tmp/f14/selinux
              * mount -o bind /dev /tmp/f14/dev
     3. Downgrade glibc* packages.  Again, for my recovery procedure,
        this involved ...
              * yum --installroot=/tmp/f14 downgrade glibc*
     4. Reboot your system into Fedora 14 ... and wait for a new and
        improved glibc update to test

Thanks,
James

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part
Url : http://lists.fedoraproject.org/pipermail/test/attachments/20100928/3dfd9052/attachment-0001.bin 


More information about the test mailing list