[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
** Changed in: ubuntu-kernel-tests Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
This bug was fixed in the package linux - 5.4.0-42.46 --- linux (5.4.0-42.46) focal; urgency=medium * focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069) * linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668) - SAUCE: Revert "netprio_cgroup: Fix unlimited memory leak of v2 cgroups" linux (5.4.0-41.45) focal; urgency=medium * focal/linux: 5.4.0-41.45 -proposed tracker (LP: #1885855) * Packaging resync (LP: #1786013) - update dkms package versions * CVE-2019-19642 - kernel/relay.c: handle alloc_percpu returning NULL in relay_open * CVE-2019-16089 - SAUCE: nbd_genl_status: null check for nla_nest_start * CVE-2020-11935 - aufs: do not call i_readcount_inc() * ip_defrag.sh in net from ubuntu_kernel_selftests failed with 5.0 / 5.3 / 5.4 kernel (LP: #1826848) - selftests: net: ip_defrag: ignore EPERM * Update lockdown patches (LP: #1884159) - SAUCE: acpi: disallow loading configfs acpi tables when locked down * seccomp_bpf fails on powerpc (LP: #1885757) - SAUCE: selftests/seccomp: fix ptrace tests on powerpc * Introduce the new NVIDIA 418-server and 440-server series, and update the current NVIDIA drivers (LP: #1881137) - [packaging] add signed modules for the 418-server and the 440-server flavours -- Khalid Elmously Thu, 09 Jul 2020 19:50:26 -0400 ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-16089 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-19642 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-11935 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
That's an unfortunate typo -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
It's too late now, but there's a typo in the changelog: "shitfs". -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
This bug was fixed in the package linux - 5.3.0-53.47 --- linux (5.3.0-53.47) eoan; urgency=medium * eoan/linux: 5.3.0-53.47 -proposed tracker (LP: #1877257) * Intermittent display blackouts on event (LP: #1875254) - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only * Unable to handle kernel pointer dereference in virtual kernel address space on Eoan (LP: #1876645) - SAUCE: overlayfs: fix shitfs special-casing linux (5.3.0-52.46) eoan; urgency=medium * eoan/linux: 5.3.0-52.46 -proposed tracker (LP: #1874752) * alsa: make the dmic detection align to the mainline kernel-5.6 (LP: #1871284) - ALSA: hda: add Intel DSP configuration / probe code - ALSA: hda: fix intel DSP config - ALSA: hda: Allow non-Intel device probe gracefully - ALSA: hda: More constifications - ALSA: hda: Rename back to dmic_detect option - [Config] SND_INTEL_DSP_CONFIG=m - [packaging] Remove snd-intel-nhlt from modules * built-using constraints preventing uploads (LP: #1875601) - temporarily drop Built-Using data * ubuntu/focal64 fails to mount Vagrant shared folders (LP: #1873506) - [Packaging] Move virtualbox modules to linux-modules - [Packaging] Remove vbox and zfs modules from generic.inclusion-list * linux-image-5.0.0-35-generic breaks checkpointing of container (LP: #1857257) - SAUCE: overlayfs: use shiftfs hacks only with shiftfs as underlay * shiftfs: broken shiftfs nesting (LP: #1872094) - SAUCE: shiftfs: record correct creator credentials * Add debian/rules targets to compile/run kernel selftests (LP: #1874286) - [Packaging] add support to compile/run selftests * shiftfs: O_TMPFILE reports ESTALE (LP: #1872757) - SAUCE: shiftfs: fix dentry revalidation * getitimer returns it_value=0 erroneously (LP: #1349028) - [Config] CONTEXT_TRACKING_FORCE policy should be unset * 5.3.0-46-generic - i915 - frequent GPU hangs / resets rcs0 (LP: #1872001) - drm/i915/execlists: Preempt-to-busy - drm/i915/gt: Detect if we miss WaIdleLiteRestore - drm/i915/execlists: Always force a context reload when rewinding RING_TAIL * alsa/sof: external mic can't be deteced on Lenovo and HP laptops (LP: #1872569) - SAUCE: ASoC: intel/skl/hda - set autosuspend timeout for hda codecs * Eoan update: upstream stable patchset 2020-04-22 (LP: #1874325) - ARM: dts: sun8i-a83t-tbs-a711: HM5065 doesn't like such a high voltage - bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads - net: vxge: fix wrong __VA_ARGS__ usage - hinic: fix a bug of waitting for IO stopped - hinic: fix wrong para of wait_for_completion_timeout - cxgb4/ptp: pass the sign of offset delta in FW CMD - qlcnic: Fix bad kzalloc null test - i2c: st: fix missing struct parameter description - cpufreq: imx6q: Fixes unwanted cpu overclocking on i.MX6ULL - media: venus: hfi_parser: Ignore HEVC encoding for V1 - firmware: arm_sdei: fix double-lock on hibernate with shared events - null_blk: Fix the null_add_dev() error path - null_blk: Handle null_add_dev() failures properly - null_blk: fix spurious IO errors after failed past-wp access - xhci: bail out early if driver can't accress host in resume - x86: Don't let pgprot_modify() change the page encryption bit - block: keep bdi->io_pages in sync with max_sectors_kb for stacked devices - irqchip/versatile-fpga: Handle chained IRQs properly - sched: Avoid scale real weight down to zero - selftests/x86/ptrace_syscall_32: Fix no-vDSO segfault - PCI/switchtec: Fix init_completion race condition with poll_wait() - media: i2c: video-i2c: fix build errors due to 'imply hwmon' - libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() - pstore/platform: fix potential mem leak if pstore_init_fs failed - gfs2: Don't demote a glock until its revokes are written - x86/boot: Use unsigned comparison for addresses - efi/x86: Ignore the memory attributes table on i386 - genirq/irqdomain: Check pointer in irq_domain_alloc_irqs_hierarchy() - block: Fix use-after-free issue accessing struct io_cq - media: i2c: ov5695: Fix power on and off sequences - usb: dwc3: core: add support for disabling SS instances in park mode - irqchip/gic-v4: Provide irq_retrigger to avoid circular locking dependency - md: check arrays is suspended in mddev_detach before call quiesce operations - firmware: fix a double abort case with fw_load_sysfs_fallback - locking/lockdep: Avoid recursion in lockdep_count_{for,back}ward_deps() - block, bfq: fix use-after-free in bfq_idle_slice_timer_body - btrfs: qgroup: ensure qgroup_rescan_running is only set when the worker is at least queued - btrfs: remove a BUG_ON() from merge_reloc_roots() - btrfs: track reloc roots based on their commit root bytenr - ASoC: fix regwmask - ASoC: dapm: connect
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
This bug was fixed in the package linux - 5.4.0-31.35 --- linux (5.4.0-31.35) focal; urgency=medium * focal/linux: 5.4.0-31.35 -proposed tracker (LP: #1877253) * Intermittent display blackouts on event (LP: #1875254) - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only * Unable to handle kernel pointer dereference in virtual kernel address space on Eoan (LP: #1876645) - SAUCE: overlayfs: fix shitfs special-casing linux (5.4.0-30.34) focal; urgency=medium * focal/linux: 5.4.0-30.34 -proposed tracker (LP: #1875385) * ubuntu/focal64 fails to mount Vagrant shared folders (LP: #1873506) - [Packaging] Move virtualbox modules to linux-modules - [Packaging] Remove vbox and zfs modules from generic.inclusion-list * linux-image-5.0.0-35-generic breaks checkpointing of container (LP: #1857257) - SAUCE: overlayfs: use shiftfs hacks only with shiftfs as underlay * shiftfs: broken shiftfs nesting (LP: #1872094) - SAUCE: shiftfs: record correct creator credentials * Add debian/rules targets to compile/run kernel selftests (LP: #1874286) - [Packaging] add support to compile/run selftests * shiftfs: O_TMPFILE reports ESTALE (LP: #1872757) - SAUCE: shiftfs: fix dentry revalidation * LIO hanging in iscsit_free_session and iscsit_stop_session (LP: #1871688) - scsi: target: iscsi: calling iscsit_stop_session() inside iscsit_close_session() has no effect * [ICL] TC port in legacy/static mode can't be detected due TCCOLD (LP: #1868936) - SAUCE: drm/i915: Align power domain names with port names - SAUCE: drm/i915/display: Move out code to return the digital_port of the aux ch - SAUCE: drm/i915/display: Add intel_legacy_aux_to_power_domain() - SAUCE: drm/i915/display: Split hsw_power_well_enable() into two - SAUCE: drm/i915/tc/icl: Implement TC cold sequences - SAUCE: drm/i915/tc: Skip ref held check for TC legacy aux power wells - SAUCE: drm/i915/tc/tgl: Implement TC cold sequences - SAUCE: drm/i915/tc: Catch TC users accessing FIA registers without enable aux - SAUCE: drm/i915/tc: Do not warn when aux power well of static TC ports timeout * alsa/sof: external mic can't be deteced on Lenovo and HP laptops (LP: #1872569) - SAUCE: ASoC: intel/skl/hda - set autosuspend timeout for hda codecs * amdgpu kernel errors in Linux 5.4 (LP: #1871248) - drm/amd/display: Stop if retimer is not available * Focal update: v5.4.34 upstream stable release (LP: #1874111) - amd-xgbe: Use __napi_schedule() in BH context - hsr: check protocol version in hsr_newlink() - l2tp: Allow management of tunnels and session in user namespace - net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin - net: ipv6: do not consider routes via gateways for anycast address check - net: phy: micrel: use genphy_read_status for KSZ9131 - net: qrtr: send msgs from local of same id as broadcast - net: revert default NAPI poll timeout to 2 jiffies - net: tun: record RX queue in skb before do_xdp_generic() - net: dsa: mt7530: move mt7623 settings out off the mt7530 - net: ethernet: mediatek: move mt7623 settings out off the mt7530 - net/mlx5: Fix frequent ioread PCI access during recovery - net/mlx5e: Add missing release firmware call - net/mlx5e: Fix nest_level for vlan pop action - net/mlx5e: Fix pfnum in devlink port attribute - net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes - ovl: fix value of i_ino for lower hardlink corner case - scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic - platform/chrome: cros_ec_rpmsg: Fix race with host event - jbd2: improve comments about freeing data buffers whose page mapping is NULL - acpi/nfit: improve bounds checking for 'func' - perf report: Fix no branch type statistics report issue - pwm: pca9685: Fix PWM/GPIO inter-operation - ext4: fix incorrect group count in ext4_fill_super error message - ext4: fix incorrect inodes per group in error message - clk: at91: sam9x60: fix usb clock parents - clk: at91: usb: use proper usbs_mask - ARM: dts: imx7-colibri: fix muxing of usbc_det pin - arm64: dts: librem5-devkit: add a vbus supply to usb0 - usb: dwc3: gadget: Don't clear flags before transfer ended - ASoC: Intel: mrfld: fix incorrect check on p->sink - ASoC: Intel: mrfld: return error codes when an error occurs - ALSA: hda/realtek - Enable the headset mic on Asus FX505DT - ALSA: usb-audio: Filter error from connector kctl ops, too - ALSA: usb-audio: Don't override ignore_ctl_error value from the map - ALSA: usb-audio: Don't create jack controls for PCM terminals - ALSA: usb-audio: Check mapping at creating connector controls, too - arm64: vdso: don't free unallocated pages - keys: Fix
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
Overlayfs related tests completed successfully with eoan kernel in -proposed (5.3.0-53.47): https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-eoan/eoan/amd64/l/linux/20200508_151853_8b200@/log.gz - ubuntu_unionmount_ovlfs.overlayfs - ubuntu_overlayfs_smoke_test.overlayfs-smoke-test ** Tags removed: verification-needed-eoan ** Tags added: verification-done-eoan -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
Overlayfs related tests completed successfully with focal kernel in -proposed (5.4.0-31.35): https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/amd64/l/linux/20200508_160250_2f8e2@/log.gz - ubuntu_unionmount_ovlfs.overlayfs - ubuntu_overlayfs_smoke_test.overlayfs-smoke-test ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verification-needed-focal' to 'verification-failed-focal'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-focal ** Tags added: verification-needed-eoan -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- eoan' to 'verification-done-eoan'. If the problem still exists, change the tag 'verification-needed-eoan' to 'verification-failed-eoan'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
** Changed in: linux (Ubuntu Eoan) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Focal) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
On Wed, May 06, 2020 at 10:32:19AM -, Kleber Sacilotto de Souza wrote: > With the fixup patch applied, I could not reproduce the issue anymore on > both Eoan and Focal running ubuntu_fan_smoke_test and > ubuntu_docker_smoke_test. Sweet, thank you and sorry for the rebase mess-up with Andrei's patch. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
With the fixup patch applied, I could not reproduce the issue anymore on both Eoan and Focal running ubuntu_fan_smoke_test and ubuntu_docker_smoke_test. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
** Changed in: linux (Ubuntu) Status: Confirmed => In Progress ** Changed in: linux (Ubuntu Eoan) Status: Confirmed => In Progress ** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Christian Brauner (cbrauner) ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Christian Brauner (cbrauner) ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Christian Brauner (cbrauner) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
I can reproduce this issue on Focal (5.4.0-30-generic) AMD64 KVM as well with the ubuntu_docker_smoke_test: 4331.987024] general protection fault: [#1] SMP PTI [ 4331.989188] CPU: 0 PID: 34912 Comm: dockerd Not tainted 5.4.0-30-generic #34-Ubuntu [ 4331.992158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014 [ 4331.995189] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay] [ 4331.997100] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 49 8b 7e 28 41 81 cd 00 00 04 04 e8 9d d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04 [ 4332.003304] RSP: 0018:b10b00b33c08 EFLAGS: 00010202 [ 4332.004841] RAX: 5ebabec054698800 RBX: 8ed6b776a770 RCX: 0001 [ 4332.006838] RDX: 8ed6b774bf00 RSI: 8ed6b776a770 RDI: 8ed6affea3c0 [ 4332.008842] RBP: b10b00b33c50 R08: 8ed6afc79600 R09: [ 4332.010862] R10: 8ed6b774bf00 R11: R12: 8ed6b0a06c00 [ 4332.013003] R13: 04048001 R14: 8ed6b75b6b20 R15: 8ed6afc79600 [ 4332.015049] FS: 7f3a38941700() GS:8ed6bba0() knlGS: [ 4332.017326] CS: 0010 DS: ES: CR0: 80050033 [ 4332.019058] CR2: 56296e62b358 CR3: 000130f94000 CR4: 06f0 [ 4332.021028] DR0: DR1: DR2: [ 4332.023134] DR3: DR6: fffe0ff0 DR7: 0400 [ 4332.025142] Call Trace: [ 4332.025885] ? ovl_llseek+0x120/0x120 [overlay] [ 4332.027239] ovl_open+0x57/0x90 [overlay] [ 4332.028391] do_dentry_open+0x143/0x3a0 [ 4332.029490] vfs_open+0x2d/0x30 [ 4332.030422] do_last+0x194/0x900 [ 4332.031407] path_openat+0x8d/0x290 [ 4332.033084] ? __switch_to_asm+0x40/0x70 [ 4332.035151] ? __switch_to_asm+0x34/0x70 [ 4332.037142] do_filp_open+0x91/0x100 [ 4332.039032] ? __alloc_fd+0x46/0x150 [ 4332.040860] do_sys_open+0x17e/0x290 [ 4332.042954] __x64_sys_openat+0x20/0x30 [ 4332.044980] do_syscall_64+0x57/0x190 [ 4332.047058] entry_SYSCALL_64_after_hwframe+0x44/0xa9 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
Fix here: https://lists.ubuntu.com/archives/kernel-team/2020-May/109617.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
That patch was submitted as a fix for bug 1857257, which was applied for Focal as well. Therefore this bug might affect Focal too, we are waiting for some test results to confirm it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
This commit looks highly suspicious: "UBUNTU: SAUCE: overlayfs: use shiftfs hacks only with shiftfs as underlay" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Eoan) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
** Tags added: regression-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
You can triggered a general protection fault by running the ubuntu_docker_smoke_test, the test passed with older Eoan kernel in -updates, but failed with this one in proposed. [ 101.715152] general protection fault: [#1] SMP PTI [ 101.717403] CPU: 1 PID: 1236 Comm: dockerd Not tainted 5.3.0-52-generic #46-Ubuntu [ 101.720424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014 [ 101.723856] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay] [ 101.725826] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 49 8b 7e 28 41 81 cd 00 00 04 04 e8 cd d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04 [ 101.731311] RSP: 0018:aa28406afc08 EFLAGS: 00010202 [ 101.732773] RAX: 044555892ac42800 RBX: 9af67a149ea8 RCX: 0001 [ 101.734759] RDX: 8000 RSI: 9af67a149ea8 RDI: 9af67b3d9000 [ 101.736866] RBP: aa28406afc50 R08: 9af67b031240 R09: [ 101.738854] R10: 9af67a7d6900 R11: R12: 9af6799a1d00 [ 101.740883] R13: 04048001 R14: 9af67a1a4818 R15: 9af67b031240 [ 101.742902] FS: 7f58a57fa700() GS:9af67db0() knlGS: [ 101.745194] CS: 0010 DS: ES: CR0: 80050033 [ 101.746798] CR2: 01178b78 CR3: 7b06 CR4: 06e0 [ 101.748817] DR0: DR1: DR2: [ 101.750798] DR3: DR6: fffe0ff0 DR7: 0400 [ 101.752804] Call Trace: [ 101.753502] ? ovl_llseek+0x120/0x120 [overlay] [ 101.754770] ovl_open+0x57/0x90 [overlay] [ 101.755951] do_dentry_open+0x143/0x3a0 [ 101.757013] vfs_open+0x2d/0x30 [ 101.757949] do_last+0x194/0x8f0 [ 101.758843] path_openat+0x8d/0x270 [ 101.759908] ? __switch_to_asm+0x40/0x70 [ 101.760984] ? __switch_to_asm+0x34/0x70 [ 101.762099] do_filp_open+0x91/0x100 [ 101.763088] ? __alloc_fd+0x46/0x150 [ 101.764171] do_sys_open+0x17e/0x290 [ 101.765168] __x64_sys_openat+0x20/0x30 [ 101.766297] do_syscall_64+0x5a/0x130 [ 101.767512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.768932] RIP: 0033:0x56465af612ba [ 101.769922] Code: e8 8b 3d f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 101.775167] RSP: 002b:00c0009567a0 EFLAGS: 0202 ORIG_RAX: 0101 [ 101.777440] RAX: ffda RBX: 00c5e500 RCX: 56465af612ba [ 101.779553] RDX: 00080241 RSI: 00c000814e00 RDI: ff9c [ 101.781538] RBP: 00c000956818 R08: R09: [ 101.783650] R10: 01a4 R11: 0202 R12: [ 101.785789] R13: 0039 R14: 0038 R15: 0080 [ 101.787887] Modules linked in: xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bpfilter br_netfilter bridge stp llc aufs overlay dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua kvm_intel kvm irqbypass joydev input_leds serio_raw mac_hid qemu_fw_cfg sch_fq_codel ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear cirrus drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm virtio_net net_failover psmouse failover virtio_blk i2c_piix4 pata_acpi floppy [ 101.808815] ---[ end trace ef14f7485e54a2a6 ]--- [ 101.811218] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay] [ 101.814009] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 49 8b 7e 28 41 81 cd 00 00 04 04 e8 cd d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04 [ 101.821593] RSP: 0018:aa28406afc08 EFLAGS: 00010202 [ 101.823778] RAX: 044555892ac42800 RBX: 9af67a149ea8 RCX: 0001 [ 101.826528] RDX: 8000 RSI: 9af67a149ea8 RDI: 9af67b3d9000 [ 101.829350] RBP: aa28406afc50 R08: 9af67b031240 R09: [ 101.831910] R10: 9af67a7d6900 R11: R12: 9af6799a1d00 [ 101.834825] R13: 04048001 R14: 9af67a1a4818 R15: 9af67b031240 [ 101.837606] FS: 7f58a57fa700() GS:9af67db0() knlGS: [ 101.840678] CS: 0010 DS: ES: CR0: 80050033 [ 101.842914] CR2: 01178b78 CR3: 7b06 CR4: 06e0 [ 101.845479] DR0: DR1: DR2: [ 101.848015] DR3: DR6: fffe0ff0 DR7: 0400 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.
[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan
This issue can be found on E PowerPC as well, test will stop at the fan smoke test as well. [ 1316.676714] BUG: Unable to handle kernel data access at 0xd9d4a05293989f60 [ 1316.676743] Faulting instruction address: 0xc0080cd9b164 [ 1316.676755] Oops: Kernel access of bad area, sig: 11 [#1] [ 1316.676777] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV [ 1316.676788] Modules linked in: xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bpfilter br_netfilter bridge stp llc aufs overlay unix_diag binfmt_misc kvm_hv kvm zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) userio snd_seq snd_seq_device snd_timer snd soundcore hci_vhci bluetooth ecdh_generic ecc vhost_vsock vmw_vsock_virtio_transport_common vsock uhid vhost_net vhost tap cuse dccp_ipv4 dccp atm algif_rng aegis128 aegis128l aegis256 morus1280 morus640 algif_aead anubis fcrypt khazad seed sm4_generic tea crc32_generic md4 michael_mic nhpoly1305 poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic streebog_generic tgr192 wp512 xxhash_generic algif_hash blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic chacha_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic [ 1316.676839] twofish_common algif_skcipher af_alg dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua joydev input_leds mac_hid ofpart cmdlinepart ipmi_powernv powernv_flash ipmi_devintf mtd ipmi_msghandler at24 uio_pdrv_genirq opal_prd ibmpowernv uio vmx_crypto sch_fq_codel ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid ses enclosure scsi_transport_sas ast drm_vram_helper i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect crct10dif_vpmsum sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid drm_panel_orientation_quirks [ 1316.677182] CPU: 16 PID: 104008 Comm: dockerd Tainted: P O 5.3.0-52-generic #46-Ubuntu [ 1316.677214] NIP: c0080cd9b164 LR: c0080cd9b148 CTR: c0161290 [ 1316.677235] REGS: c00bbe603690 TRAP: 0380 Tainted: P O (5.3.0-52-generic) [ 1316.677256] MSR: 92009033 CR: 28402884 XER: [ 1316.677291] CFAR: c0080cd96ad0 IRQMASK: 0 GPR00: c0080cd9b148 c00bbe603920 c0080cdbca00 c00fecf26000 GPR04: 04050001 c0094cb4a910 0001 GPR08: c0095056e490 d9d4a05293989f00 6a656a62 c0080cda73a8 GPR12: c0161290 c00ed000 00c00040b340 0001 GPR16: 00c00040a000 004e 0001 GPR20: 0200 04e2c41b29c0 0010 41ed GPR24: 0200 c0095056e490 GPR28: c00fecf26000 c0095056e490 c009504f1628 c0094cb4a900 [ 1316.677485] NIP [c0080cd9b164] ovl_open_realfile+0x7c/0x1b0 [overlay] [ 1316.677516] LR [c0080cd9b148] ovl_open_realfile+0x60/0x1b0 [overlay] [ 1316.677535] Call Trace: [ 1316.677552] [c00bbe603920] [c0080cd9b148] ovl_open_realfile+0x60/0x1b0 [overlay] (unreliable) [ 1316.677586] [c00bbe6039e0] [c0080cd9c844] ovl_open+0x9c/0x110 [overlay] [ 1316.677619] [c00bbe603a20] [c0450a98] do_dentry_open+0x298/0x4d0 [ 1316.677650] [c00bbe603ab0] [c046fc70] do_last+0x1f0/0xb40 [ 1316.677680] [c00bbe603bb0] [c0470670] path_openat+0xb0/0x370 [ 1316.677709] [c00bbe603c70] [c0472470] do_filp_open+0x90/0x130 [ 1316.677730] [c00bbe603d90] [c0452f38] do_sys_open+0x268/0x410 [ 1316.677761] [c00bbe603e20] [c000b388] system_call+0x5c/0x70 [ 1316.677789] Instruction dump: [ 1316.677805] 65290404 e87b0028 7d2407b4 f8810068 4bffb95d 6000 e9210080 3d406a65 [ 1316.677838] e8810068 614a6a62 7c7c1b78 e9290068 7c295000 418200d4 e92d0968 [ 1316.677873] ---[ end trace 25b0ddfe848d368f ]--- -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1876645 Title: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs