Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug Operating Systems Linux

Linux Kernel 4.6.1 Released; Some Users Report Boot Issue 161

Marius Nestor, reporting for Softpedia (condensed): Linux kernel 4.6.1 is already here, only two weeks after the official launch of the Linux 4.6 kernel series. For those not in the loop, Linux 4.6 branch is the latest and most advanced kernel branch available right now for GNU/Linux operating systems, but it looks like its adoption is a little slow at the moment. "I'm announcing the release of the 4.6.1 kernel. All users of the 4.6 kernel series must upgrade," says Greg Kroah-Hartman. "The updated 4.6.y git tree can be browsed at the normal kernel.org git web browser."
Some users are apparently facing boot failure issue on the latest version. An anonymous tipster tells Slashdot: Several folks on the web have reported a regression in the latest Linux kernels, starting with 4.6.1 and including the 4.7 beta that prevents booting and drops to busybox, at least the one supplied by the Ubuntu PPA. The boot sequence ends with "address family not supported by protocol: error getting socket" and then, "error initializing udev control socket" (screenshot here).
This discussion has been archived. No new comments can be posted.

Linux Kernel 4.6.1 Released; Some Users Report Boot Issue

Comments Filter:
  • by Anonymous Coward on Thursday June 02, 2016 @01:09PM (#52234707)

    It was just a few days ago that I saw an article here Slashdot about how systemd changes are breaking software like screen and tmux [slashdot.org].

    Could systemd also be responsible for these booting problems described in the summary?

    I know I experienced problems booting my Debian computers after upgrading to systemd. I've seen a lot of bug reports from other people describing similar problems involving systemd, too.

    • by jandrese ( 485 ) <kensama@vt.edu> on Thursday June 02, 2016 @01:37PM (#52234957) Homepage Journal
      Looks to me like a problem with rSCSI or nfs or something is horking the boot process when it tries to mount root.

      I'm not surprised. I had to struggle like crazy to get nfsroot working on Ubuntu 14 (diving deep into support forums to find the one completely undocumented option required to make it work). I would have given up except that Ubuntu has (had?) a trial thing that did nfsroot so I knew there had to be a way to make it work.

      It's kind of dumb just how hard it is to make an old style thinclient these days. In the old days you would add the nfsroot option in DHCP and a tftp link for the kernel. Super easy. Now you need to jump through several hoops to even get to the point where you need a completely magical kernel commandline option to make it work. Even when you do systemd gets really upset with you because it really really wants to check UUIDs on everything and that doesn't make sense on a thin client. While it's possible to hack out the UUID checks, they get added back in with every minor kernel update (so every couple of days on Ubuntu) and require hacking several files to properly disable. Even then you get a 30 second wait because some message wasn't sent through the message queue (debugging mass message queues sucks) during boot and you have to rely on the fallback to finish booting.
      • I have seen the message "Address family not supported by protocol" when a program has IPv6 support but the kernel does not.
    • by F.Ultra ( 1673484 ) on Thursday June 02, 2016 @04:41PM (#52236713)
      Looking at the screenshot from the summary shows that the error occurs in the initramfs so this happens long before any init is called by the kernel. That it dropped to busybox in the first place was a big indicator that this happened long before init was called.
  • by raymorris ( 2726007 ) on Thursday June 02, 2016 @01:14PM (#52234753) Journal

    I know Greg's been using that "must upgrade" line for a while. For example in 2013 he did "The Linux Kernel 3.12.1 is now available for the users and all the users of 3.12 kernel series must upgrade". Does anybody know if that's a reference to some pop culture or something?

    • by fche ( 36607 )

      at least it's such a silly imperial phrase, it must be a joke ... surely?

      • It means "don't blame me for what happens to you if you don't upgrade". This is what you say if you don't want to tell the world about the fixed security issues, but you want everyone to have the fix.
        • by fche ( 36607 )

          Such coyness is unseemly. Besides, GKH is immune to blame already by virtue of the NO WARRANTY clause of the GPL.

          • Unseemly? No. Just good process. Greg is not worried about legal liability, he's worried about what happens to you if you don't update the kernel. And he's not interested in feeding the script kiddies. People who want to know what the security problems are should read the kernel lists and diffs.

    • by higuita ( 129722 ) on Thursday June 02, 2016 @01:42PM (#52235007) Homepage

      This is just a empty way to say that this build may or not fix security problems.

      In the past, several people complained that linux announces did not warn about fixed security problems,but failing to understand that many fixes are made even without notice that the bug was a security problem in the first place. So some people would only update the kernel when they saw any warning about a security fix and ignored the other ones... and then complained that the previous release notes were broken when it was found that some of the already fixed bug were really security holes and how easy it would be for the developers to add a note to the commit/release notes that everyone should/MUST upgrade the kernel.

      As there is no "security team" in linux and the linux code rapid development, no one is really in charge of analyzing each patch security implication. Greg, tired of the complains decided to say that in every release there are bug fixed (except very simple bugs, documentation, etc), so if later it is found that any of those patches where fixing a security problem, they could just say that they were warned to upgrade. Also, some bug fixes are more important than others, so "should" is used for minor problems, but if there is any known bigger problem (security,corruption, stability), Greg usually uses the "must" word

      Finally, only a few linux versions are "supported", so when one version is set to be EOL, people are warned to upgrade to one of the supported version, usually the latest

    • I know Greg's been using that "must upgrade" line for a while. For example in 2013 he did "The Linux Kernel 3.12.1 is now available for the users and all the users of 3.12 kernel series must upgrade". Does anybody know if that's a reference to some pop culture or something?

      I assumed it was because his first language is German.

    • This release contains security fixes. At least this one [openwall.com] stood out, but more of the changelog sounds like it might fix exploitable issues.

  • lets get that out of the way, early ;)

    anyone know if systemd, our favorite component of late, has anything to do with this?

    • by JSkier ( 4101343 )
      Looks like it's before systemd..
      • by Anonymous Coward

        It's dying in udevd which has been hijacked by systemd.

        • It's dying in udevd which has been hijacked by systemd.

          Due to a crap call by a kernel which worked in the previous release. Try again.

        • No it breaks in initramfs which is clearly shown in the provided screen shot (also the fact that it dropped to busybox is an indicator of this) which is long before any init (i.e systemd) is executed.
    • If the new release of the kernel is causing problems that weren't present in the previous version, it's a regression, no?
  • by no-body ( 127863 )

    if your system is hosed, what do you do?
    Screenshot at Ubuntu is great proof, seen this stuff before, but does it help?

    Do you have a FS backup to go back before the upgrade and how long did it take you to do the FS backup + restore the IM backups you took?
    Honesty !
    Maybe you can to into Grub cl and do it, but if your system is under LiLo because your HW can't take grub - go RIP with disk and try it from there - figure out the cl...

    Good luck with it hope it does not take you 1/2 night or day to get it worked

    • if your system is hosed, what do you do? Screenshot at Ubuntu is great proof, seen this stuff before, but does it help?

      Do you have a FS backup to go back before the upgrade and how long did it take you to do the FS backup + restore the IM backups you took? Honesty ! Maybe you can to into Grub cl and do it, but if your system is under LiLo because your HW can't take grub - go RIP with disk and try it from there - figure out the cl...

      Good luck with it hope it does not take you 1/2 night or day to get it worked out. Yukk!

      Ubuntu by default saves the last three or so kernels that you've gone through, so that if the new release is unbootable, you can still use an older one. It's selectable from GRUB.

      LILO is now maintained by Slackware, so you'll have to ask a slacker what they do in that case. Probably the same thing, I would guess.

    • Yes it does help because you have access to a shell via busybox so if you know your way around that then you can mount everything manually. Or atleast try :-). But as LichtSpektren already commented you can simply hold in left shit during boot to get to the "select kernel to boot" screen in grub and choose the previous version of the kernel that worked and boot with that.
  • I have a Dell Inspiron 13, and the kernel boots fine. But, I got my wife an XPS 13 9350 a few weeks ago and tried 4.6. I get the exact same behavior as shown in the screenshot linked in the summary. This is interesting, because 4.6's release notes specifically mentioned new features for the 9350.
  • Sometimes this is true...

  • by Thierry titi ( 4597899 ) on Thursday June 02, 2016 @03:37PM (#52236187)
    This solution worked for me on ubuntu 16.04 with kernel from http://kernel.ubuntu.com/~kern... [ubuntu.com]: https://www.phoronix.com/forum... [phoronix.com]
  • by Anonymous Coward

    Seriously, there's a bug in a development version of Ubuntu so you (1) report it in a headline on Slashdot and (2) mention "Linux Kernel", not "Ubuntu" in that headline.

    Report it on launchpad, that should get it fixed.

    The clickbaiting needs to stop!

Children begin by loving their parents. After a time they judge them. Rarely, if ever, do they forgive them. - Oscar Wilde

Working...