[Bug 1691741] Re: Execute NX-protected page - 4.4.0-78-generic - kernel panic

2017-06-29 Thread Jordi de Wal
Still no crashes seen with 4.4.0-79-generic (and newer versions). Would
consider this fixed then.

** Changed in: linux (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1691741

Title:
  Execute NX-protected page - 4.4.0-78-generic - kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691741/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1691741] Re: Execute NX-protected page - 4.4.0-78-generic - kernel panic

2017-05-19 Thread Jordi de Wal
** Tags added: kernel-unable-to-test-upstream

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1691741

Title:
  Execute NX-protected page - 4.4.0-78-generic - kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691741/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1691741] Re: Execute NX-protected page - 4.4.0-78-generic - kernel panic

2017-05-18 Thread Jordi de Wal
Due to the nature of the data on the machine and the fact that I don't
know what apport will send, I'm unable to execute the apport-collect.

# Some data from /usr/bin/crash:
  KERNEL: /usr/lib/debug/boot/vmlinux-4.4.0-78-generic
DUMPFILE: dump.201705181342  [PARTIAL DUMP]
CPUS: 4
DATE: Thu May 18 13:42:12 2017
  UPTIME: 00:16:34
LOAD AVERAGE: 0.21, 0.05, 0.01
   TASKS: 547
NODENAME: 
 RELEASE: 4.4.0-78-generic
 VERSION: #99-Ubuntu SMP Thu Apr 27 15:29:09 UTC 2017
 MACHINE: x86_64  (2199 Mhz)
  MEMORY: 16 GB
   PANIC: "BUG: unable to handle kernel paging request at 88042a284000"
 PID: 0
 COMMAND: "swapper/1"
TASK: 88042a278000  (1 of 4)  [THREAD_INFO: 88042a28]
 CPU: 1
   STATE: TASK_RUNNING (PANIC)

# crash> bt
PID: 0  TASK: 88042a278000  CPU: 1   COMMAND: "swapper/1"
 #0 [88042a283b78] machine_kexec at 8105c0db
 #1 [88042a283bd8] crash_kexec at 8110e572
 #2 [88042a283ca8] oops_end at 81031c49
 #3 [88042a283cd0] no_context at 8106ad35
 #4 [88042a283d30] __bad_area_nosemaphore at 8106b000
 #5 [88042a283d78] bad_area_nosemaphore at 8106b183
 #6 [88042a283d88] __do_page_fault at 8106b447
 #7 [88042a283de0] trace_do_page_fault at 8106b7f7
 #8 [88042a283e10] do_async_page_fault at 81063ef9
 #9 [88042a283e20] async_page_fault at 81842be8
#10 [88042a283e38] tick_nohz_idle_exit at 810ff75e
#11 [88042a283ed8] cpu_startup_entry at 810c4736
#12 [88042a283f30] start_secondary at 810517c4


# crash> bt -f
#  #9 [88042a283e20] async_page_fault at 81842be8
88042a283e28: 88042a28  
88042a283e38: 810ff75e 
#10 [88042a283e38] tick_nohz_idle_exit at 810ff75e
88042a283e40: 88042a283ed0 81f38d40 
88042a283e50: 00e797438af0 4c00 
88042a283e60: 00010002a665  
88042a283e70: 000a 0001 
88042a283e80:  0001 
88042a283e90: 0083 0083 
88042a283ea0:  88042a284000 
88042a283eb0: 0010 00010082 
88042a283ec0: 88042a283ed0 0018 
88042a283ed0: 88042a283f28 810c4736 
#11 [88042a283ed8] cpu_startup_entry at 810c4736
88042a283ee0: 88042a28 88042a284000 
88042a283ef0: ee041b0196f77cc4 a1abbcd2b8b123ce 
88042a283f00:   
88042a283f10:   
88042a283f20:  88042a283f48 
88042a283f30: 810517c4 
#12 [88042a283f30] start_secondary at 810517c4

# crash> dis tick_nohz_idle_exit
0x810ff74f :   mov%r12,0xa8(%rbx)
0x810ff756 :   mov%r12,%rsi
0x810ff759 :   callq  0x810ff170 

0x810ff75e :   mov0xd0989b(%rip),%rdi  
  # 0x81e09000 
0x810ff765 :   sub0x78(%rbx),%rdi

# lsmod info's
Module  Size  Used by
zfs  2813952  5
zunicode  331776  1 zfs
zcommon57344  1 zfs
znvpair90112  2 zfs,zcommon
spl   102400  3 zfs,zcommon,znvpair
zavl   16384  1 zfs
ppdev  20480  0
input_leds 16384  0
shpchp 36864  0
serio_raw  16384  0
i2c_piix4  24576  0
8250_fintek16384  0
parport_pc 32768  0
parport49152  2 ppdev,parport_pc
mac_hid16384  0
autofs440960  2
ttm94208  0
drm_kms_helper155648  0
syscopyarea16384  1 drm_kms_helper
sysfillrect16384  1 drm_kms_helper
sysimgblt  16384  1 drm_kms_helper
fb_sys_fops16384  1 drm_kms_helper
psmouse   131072  0
drm   364544  2 ttm,drm_kms_helper
pata_acpi  16384  0
floppy 73728  0

No idea if this is useful though.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1691741

Title:
  Execute NX-protected page - 4.4.0-78-generic - kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691741/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1691741] [NEW] Execute NX-protected page - 4.4.0-78-generic - kernel panic

2017-05-18 Thread Jordi de Wal
Public bug reported:

After upgrading from 4.4.0-77 to 4.4.0-78 I started getting kernel
panics.

The crashes do not happen immediately, but have happened generally after
a couple of minutes, sometimes more.

After enabling linux-crashdump stuff, I managed to extract this dmesg.

[  995.103846] kernel tried to execute NX-protected page - exploit attempt? 
(uid: 0)
[  995.104141] BUG: unable to handle kernel paging request at 88042a284000
[  995.104407] IP: [] 0x88042a284000
[  995.104594] PGD 43f20b067 PUD 43f20e067 PMD 42a3da063 PTE 80042a284163
[  995.104946] Oops: 0011 [#1] SMP 
[  995.105143] Modules linked in: zfs(PO) zunicode(PO) zcommon(PO) znvpair(PO) 
spl(O) zavl(PO) ppdev input_leds shpchp serio_raw i2c_piix4 mac_hid parport_pc 
parport 8250_fintek autofs4 ttm drm_kms_helper syscopyarea sysfillrect 
sysimgblt fb_sys_fops drm psmouse floppy pata_acpi
[  995.107081] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P   O
4.4.0-78-generic #99-Ubuntu
[  995.107299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
rel-1.9.3-0-ge2fc41e-prebuilt.qemu-project.org 04/01/2014
[  995.107573] task: 88042a278000 ti: 88042a28 task.ti: 
88042a28
[  995.108070] RIP: 0010:[]  [] 
0x88042a284000
[  995.108637] RSP: 0018:88042a283ed0  EFLAGS: 00010082
[  995.109116] RAX: 0001 RBX: 00e797438af0 RCX: 
[  995.109638] RDX: 0001 RSI: 0083 RDI: 0083
[  995.110143] RBP: 81f38d40 R08: 000a R09: 
[  995.110665] R10: 00010002a665 R11: 4c00 R12: 88042a283ed0
[  995.82] R13: 810ff75e R14:  R15: 88042a28
[  995.111733] FS:  () GS:88043fc8() 
knlGS:
[  995.112486] CS:  0010 DS:  ES:  CR0: 8005003b
[  995.112978] CR2: 88042a284000 CR3: 00043d246000 CR4: 06e0
[  995.113497] DR0:  DR1:  DR2: 
[  995.114085] DR3:  DR6: fffe0ff0 DR7: 0400
[  995.114612] Stack:
[  995.114965]  88042a283f28 810c4736 88042a28 
88042a284000
[  995.116204]  ee041b0196f77cc4 a1abbcd2b8b123ce  

[  995.117389]     
88042a283f48
[  995.118425] Call Trace:
[  995.118811]  [] ? cpu_startup_entry+0x176/0x350
[  995.119293]  [] ? start_secondary+0x154/0x190
[  995.119775] Code: ff ff ff 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 
02 02 00 00 00 00 00 00 58 3f 28 2a 04 88 ff ff 18 00 00 00 00 00 00 00  8c 
27 2a 04 88 ff ff 00 00 00 00 00 00 00 00 02 00 00 00 00 
[  995.125554] RIP  [] 0x88042a284000
[  995.126088]  RSP 
[  995.126453] CR2: 88042a284000

I've upgraded other machines as well, and only this particular VM shows
this behaviour.

I have a crash dump, but I haven't looked into the contents yet. Getting
the dmesg was already a pain in the behind.

The VM this happens on is:
- a KVM guest
- x86_64, 4 cores
- 16gb ram

lsb_release:
Distributor ID: Ubuntu
Description:Ubuntu 16.04.2 LTS
Release:16.04
Codename:   xenial

lspci says:
00:00.0 Host bridge: Intel Corporation 440FX - 82441FX PMC [Natoma] (rev 02)
00:01.0 ISA bridge: Intel Corporation 82371SB PIIX3 ISA [Natoma/Triton II]
00:01.1 IDE interface: Intel Corporation 82371SB PIIX3 IDE [Natoma/Triton II]
00:01.2 USB controller: Intel Corporation 82371SB PIIX3 USB [Natoma/Triton II] 
(rev 01)
00:01.3 Bridge: Intel Corporation 82371AB/EB/MB PIIX4 ACPI (rev 03)
00:02.0 VGA compatible controller: VMware SVGA II Adapter
00:03.0 Unclassified device [00ff]: Red Hat, Inc Virtio memory balloon
00:0a.0 SCSI storage controller: Red Hat, Inc Virtio block device
00:0b.0 SCSI storage controller: Red Hat, Inc Virtio block device
00:12.0 Ethernet controller: Red Hat, Inc Virtio network device
00:1e.0 PCI bridge: Red Hat, Inc. QEMU PCI-PCI bridge
00:1f.0 PCI bridge: Red Hat, Inc. QEMU PCI-PCI bridge

Let me know if there are other helpful details I can provide. If I find
out more, I'll update this ticket.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1691741

Title:
  Execute NX-protected page - 4.4.0-78-generic - kernel panic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691741/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1547431] Re: Does not allow appstream files

2016-03-29 Thread Jordi de Wal
Just to confirm, works fine with Rolf's patch (tested on Trusty). Thanks
Stefan taking away the need to build it myself :-).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1547431

Title:
  Does not allow appstream files

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt-cacher-ng/+bug/1547431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs