Public bug reported:
[SRU Justification]
== Impact ==
Upstream stable v5.15.189 / CVE-2025-38465 added
ae8f160e7eb2 ("netlink: Fix wraparounds of sk->sk_rmem_alloc.")
which is reported to cause soft-lockups / hangs on boot when loading auditd
rules.
Message from syslogd@usw745 at Sep 26 12:45:22 ...
kernel:[22208.861925] watchdog: BUG: soft lockup - CPU#65 stuck for 26s!
[kauditd:593]
[22208.862003] FS: 0000000000000000(0000) GS:ffff8e7f84c40000(0000)
knlGS:0000000000000000
[22208.862004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[22208.862005] CR2: 00007f6c313b1110 CR3: 0000006fa5c30005 CR4: 00000000007706e0
[22208.862009] PKRU: 55555554
[22208.862010] Call Trace:
[22208.862012] <TASK>
[22208.862017] ? wake_up_q+0x90/0x90
[22208.862022] netlink_unicast+0xb0/0x290
[22208.862024] kauditd_send_queue+0xb2/0x180
== Fix ==
This was fixed upstream with the following commit which is part of pending
v5.15.190
759dfc7d04ba netlink: avoid infinite retry looping in netlink_unicast()
== Testcase ==
Creating and loading auditd rules on boot (details TBD)
== Regression Potential ==
Anything related to netlink sockets.
** Affects: linux (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: High
Status: Triaged
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Jammy)
Status: New => Triaged
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => High
** Changed in: linux (Ubuntu)
Status: Triaged => Invalid
** Description changed:
[SRU Justification]
== Impact ==
Upstream stable v5.15.189 / CVE-2025-38465 added
- ae8f160e7eb2 ("netlink: Fix wraparounds of sk->sk_rmem_alloc.")
+ ae8f160e7eb2 ("netlink: Fix wraparounds of sk->sk_rmem_alloc.")
which is reported to cause soft-lockups / hangs on boot when loading auditd
rules.
+
+ Message from syslogd@usw745 at Sep 26 12:45:22 ...
+ kernel:[22208.861925] watchdog: BUG: soft lockup - CPU#65 stuck for 26s!
[kauditd:593]
+ [22208.862003] FS: 0000000000000000(0000) GS:ffff8e7f84c40000(0000)
knlGS:0000000000000000
+ [22208.862004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
+ [22208.862005] CR2: 00007f6c313b1110 CR3: 0000006fa5c30005 CR4:
00000000007706e0
+ [22208.862009] PKRU: 55555554
+ [22208.862010] Call Trace:
+ [22208.862012] <TASK>
+ [22208.862017] ? wake_up_q+0x90/0x90
+ [22208.862022] netlink_unicast+0xb0/0x290
+ [22208.862024] kauditd_send_queue+0xb2/0x180
== Fix ==
This was fixed upstream with the following commit which is part of pending
v5.15.190
- 759dfc7d04ba netlink: avoid infinite retry looping in netlink_unicast()
+ 759dfc7d04ba netlink: avoid infinite retry looping in netlink_unicast()
== Testcase ==
Creating and loading auditd rules on boot (details TBD)
== Regression Potential ==
Anything related to netlink sockets.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2126434
Title:
[Regression Updates] System hangs when loading audit rules
(5.15.0-156.166)
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Jammy:
Triaged
Bug description:
[SRU Justification]
== Impact ==
Upstream stable v5.15.189 / CVE-2025-38465 added
ae8f160e7eb2 ("netlink: Fix wraparounds of sk->sk_rmem_alloc.")
which is reported to cause soft-lockups / hangs on boot when loading auditd
rules.
Message from syslogd@usw745 at Sep 26 12:45:22 ...
kernel:[22208.861925] watchdog: BUG: soft lockup - CPU#65 stuck for 26s!
[kauditd:593]
[22208.862003] FS: 0000000000000000(0000) GS:ffff8e7f84c40000(0000)
knlGS:0000000000000000
[22208.862004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[22208.862005] CR2: 00007f6c313b1110 CR3: 0000006fa5c30005 CR4:
00000000007706e0
[22208.862009] PKRU: 55555554
[22208.862010] Call Trace:
[22208.862012] <TASK>
[22208.862017] ? wake_up_q+0x90/0x90
[22208.862022] netlink_unicast+0xb0/0x290
[22208.862024] kauditd_send_queue+0xb2/0x180
== Fix ==
This was fixed upstream with the following commit which is part of pending
v5.15.190
759dfc7d04ba netlink: avoid infinite retry looping in netlink_unicast()
== Testcase ==
Creating and loading auditd rules on boot (details TBD)
== Regression Potential ==
Anything related to netlink sockets.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126434/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp