[Kernel-packages] [Bug 1642709] Re: linux-firmware on Trusty is missing i915 binaries
Adding Timo explicitly who said in https://bugs.launchpad.net/ubuntu/+source/linux- firmware/+bug/1624164/comments/5 that kbl_dmc is optional and for power saving, but skl_guc_ver6 is actually needed on Skylake. Skylake devices are what we have and which don't properly work without the firmware. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/1642709 Title: linux-firmware on Trusty is missing i915 binaries Status in linux-firmware package in Ubuntu: Confirmed Bug description: Linux-firmware is missing the following i915 firmware files, required by the i915 driver in 4.4.0-47-generic: $ update-initramfs -k 4.4.0-47-generic -c W: Possible missing firmware /lib/firmware/i915/kbl_dmc_ver1.bin for module i915_bpo W: Possible missing firmware /lib/firmware/i915/skl_guc_ver6.bin for module i915_bpo To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1642709/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 994931] Re: Altering use_tempaddr drops all IPv6 addresses
Verified on trusty. Unfortunately I don't have a precise machine anymore. After toggling use_tempaddr not all public addresses disappeared with the new kernel while it happened with the old pre- reboot. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/994931 Title: Altering use_tempaddr drops all IPv6 addresses Status in Linux: Invalid Status in linux package in Ubuntu: Confirmed Status in linux source package in Precise: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux source package in Utopic: Invalid Bug description: $ uname -a Linux expvr-alnilam 3.2.0-24-generic-pae #37-Ubuntu SMP Wed Apr 25 10:47:59 UTC 2012 i686 i686 i386 GNU/Linux $ sysctl net.ipv6.conf.eth2.use_tempaddr net.ipv6.conf.eth2.use_tempaddr = 2 # (as per the default /etc/sysctl.d/10-ipv6-privacy.conf in 12.04) # Add a static IPv6 address: $ sudo ip addr add 2001:470:9321:f003::1122/64 dev eth2 # Verify that it has been set up, and that a temporary address and a SLAAC address also exist: $ ip -6 addr list dev eth2 4: eth2:mtu 1500 qlen 1000 inet6 2001:470:9321:f003:74e3:aa2b:7ee5:c002/64 scope global temporary dynamic valid_lft 86393sec preferred_lft 14393sec inet6 2001:470:9321:f003:6c97:24ff:fe3f:263b/64 scope global dynamic valid_lft 86393sec preferred_lft 14393sec inet6 2001:470:9321:f003::1122/64 scope global valid_lft forever preferred_lft forever inet6 fe80::6c97:24ff:fe3f:263b/64 scope link valid_lft forever preferred_lft forever # Disable RFC 4941 temporary addresses: $ sudo sysctl net.ipv6.conf.eth2.use_tempaddr=0 net.ipv6.conf.eth2.use_tempaddr = 0 $ ip -6 addr list dev eth2 4: eth2: mtu 1500 qlen 1000 inet6 fe80::6c97:24ff:fe3f:263b/64 scope link tentative valid_lft forever preferred_lft forever I.e. on setting use_tempaddr=0, _all_ IPv6 addresses are removed, including statically-configured and non-temporary SLAAC-configured addresses. (The link-local address reappears quickly but the 'tentative' flag indicates that it has been newly re-added. The SLAAC address reappears after a slightly longer interval as the kernel continues to undergo SLAAC, but the static address is gone forever unless manually reinstated.) The same happens if use_tempaddr is changed from 0 back to 2. The expected outcome is that only temporary addresses are affected by a change to use_tempaddr. --- AcpiTables: AlsaDevices: total 0 crw-rw---T 1 root audio 116, 1 May 5 03:53 seq crw-rw---T 1 root audio 116, 33 May 5 03:53 timer AplayDevices: Error: [Errno 2] No such file or directory ApportVersion: 2.0.1-0ubuntu7 Architecture: i386 ArecordDevices: Error: [Errno 2] No such file or directory AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found. CurrentDmesg: DistroRelease: Ubuntu 12.04 IwConfig: Error: [Errno 2] No such file or directory Lspci: Error: [Errno 2] No such file or directory Lsusb: Error: [Errno 2] No such file or directory Package: linux (not installed) PciMultimedia: ProcEnviron: TERM=screen.linux PATH=(custom, no user) LANG=en_GB.UTF-8 SHELL=/bin/bash ProcFB: ProcKernelCmdLine: root=UUID=b16ffd9c-a54a-4dd3-a839-16c382ea8787 ro console=hvc0 ProcModules: lp 17455 0 - Live 0x parport 40930 1 lp, Live 0x xenfs 17877 1 - Live 0x ProcVersionSignature: Ubuntu 3.2.0-24.37-generic-pae 3.2.14 RelatedPackageVersions: linux-restricted-modules-3.2.0-24-generic-pae N/A linux-backports-modules-3.2.0-24-generic-pae N/A linux-firmware1.79 RfKill: Error: [Errno 2] No such file or directory Tags: precise Uname: Linux 3.2.0-24-generic-pae i686 UpgradeStatus: Upgraded to precise on 2012-05-05 (0 days ago) UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/994931/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 994931] Re: Altering use_tempaddr drops all IPv6 addresses
Thanks, Kamal! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/994931 Title: Altering use_tempaddr drops all IPv6 addresses Status in Linux: Invalid Status in linux package in Ubuntu: Confirmed Status in linux source package in Precise: In Progress Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: Invalid Bug description: $ uname -a Linux expvr-alnilam 3.2.0-24-generic-pae #37-Ubuntu SMP Wed Apr 25 10:47:59 UTC 2012 i686 i686 i386 GNU/Linux $ sysctl net.ipv6.conf.eth2.use_tempaddr net.ipv6.conf.eth2.use_tempaddr = 2 # (as per the default /etc/sysctl.d/10-ipv6-privacy.conf in 12.04) # Add a static IPv6 address: $ sudo ip addr add 2001:470:9321:f003::1122/64 dev eth2 # Verify that it has been set up, and that a temporary address and a SLAAC address also exist: $ ip -6 addr list dev eth2 4: eth2:mtu 1500 qlen 1000 inet6 2001:470:9321:f003:74e3:aa2b:7ee5:c002/64 scope global temporary dynamic valid_lft 86393sec preferred_lft 14393sec inet6 2001:470:9321:f003:6c97:24ff:fe3f:263b/64 scope global dynamic valid_lft 86393sec preferred_lft 14393sec inet6 2001:470:9321:f003::1122/64 scope global valid_lft forever preferred_lft forever inet6 fe80::6c97:24ff:fe3f:263b/64 scope link valid_lft forever preferred_lft forever # Disable RFC 4941 temporary addresses: $ sudo sysctl net.ipv6.conf.eth2.use_tempaddr=0 net.ipv6.conf.eth2.use_tempaddr = 0 $ ip -6 addr list dev eth2 4: eth2: mtu 1500 qlen 1000 inet6 fe80::6c97:24ff:fe3f:263b/64 scope link tentative valid_lft forever preferred_lft forever I.e. on setting use_tempaddr=0, _all_ IPv6 addresses are removed, including statically-configured and non-temporary SLAAC-configured addresses. (The link-local address reappears quickly but the 'tentative' flag indicates that it has been newly re-added. The SLAAC address reappears after a slightly longer interval as the kernel continues to undergo SLAAC, but the static address is gone forever unless manually reinstated.) The same happens if use_tempaddr is changed from 0 back to 2. The expected outcome is that only temporary addresses are affected by a change to use_tempaddr. --- AcpiTables: AlsaDevices: total 0 crw-rw---T 1 root audio 116, 1 May 5 03:53 seq crw-rw---T 1 root audio 116, 33 May 5 03:53 timer AplayDevices: Error: [Errno 2] No such file or directory ApportVersion: 2.0.1-0ubuntu7 Architecture: i386 ArecordDevices: Error: [Errno 2] No such file or directory AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found. CurrentDmesg: DistroRelease: Ubuntu 12.04 IwConfig: Error: [Errno 2] No such file or directory Lspci: Error: [Errno 2] No such file or directory Lsusb: Error: [Errno 2] No such file or directory Package: linux (not installed) PciMultimedia: ProcEnviron: TERM=screen.linux PATH=(custom, no user) LANG=en_GB.UTF-8 SHELL=/bin/bash ProcFB: ProcKernelCmdLine: root=UUID=b16ffd9c-a54a-4dd3-a839-16c382ea8787 ro console=hvc0 ProcModules: lp 17455 0 - Live 0x parport 40930 1 lp, Live 0x xenfs 17877 1 - Live 0x ProcVersionSignature: Ubuntu 3.2.0-24.37-generic-pae 3.2.14 RelatedPackageVersions: linux-restricted-modules-3.2.0-24-generic-pae N/A linux-backports-modules-3.2.0-24-generic-pae N/A linux-firmware1.79 RfKill: Error: [Errno 2] No such file or directory Tags: precise Uname: Linux 3.2.0-24-generic-pae i686 UpgradeStatus: Upgraded to precise on 2012-05-05 (0 days ago) UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/994931/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 994931] Re: Altering use_tempaddr drops all IPv6 addresses
Where did this get stuck? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/994931 Title: Altering use_tempaddr drops all IPv6 addresses Status in Linux: Invalid Status in linux package in Ubuntu: Confirmed Status in linux source package in Precise: In Progress Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: Invalid Bug description: $ uname -a Linux expvr-alnilam 3.2.0-24-generic-pae #37-Ubuntu SMP Wed Apr 25 10:47:59 UTC 2012 i686 i686 i386 GNU/Linux $ sysctl net.ipv6.conf.eth2.use_tempaddr net.ipv6.conf.eth2.use_tempaddr = 2 # (as per the default /etc/sysctl.d/10-ipv6-privacy.conf in 12.04) # Add a static IPv6 address: $ sudo ip addr add 2001:470:9321:f003::1122/64 dev eth2 # Verify that it has been set up, and that a temporary address and a SLAAC address also exist: $ ip -6 addr list dev eth2 4: eth2:mtu 1500 qlen 1000 inet6 2001:470:9321:f003:74e3:aa2b:7ee5:c002/64 scope global temporary dynamic valid_lft 86393sec preferred_lft 14393sec inet6 2001:470:9321:f003:6c97:24ff:fe3f:263b/64 scope global dynamic valid_lft 86393sec preferred_lft 14393sec inet6 2001:470:9321:f003::1122/64 scope global valid_lft forever preferred_lft forever inet6 fe80::6c97:24ff:fe3f:263b/64 scope link valid_lft forever preferred_lft forever # Disable RFC 4941 temporary addresses: $ sudo sysctl net.ipv6.conf.eth2.use_tempaddr=0 net.ipv6.conf.eth2.use_tempaddr = 0 $ ip -6 addr list dev eth2 4: eth2: mtu 1500 qlen 1000 inet6 fe80::6c97:24ff:fe3f:263b/64 scope link tentative valid_lft forever preferred_lft forever I.e. on setting use_tempaddr=0, _all_ IPv6 addresses are removed, including statically-configured and non-temporary SLAAC-configured addresses. (The link-local address reappears quickly but the 'tentative' flag indicates that it has been newly re-added. The SLAAC address reappears after a slightly longer interval as the kernel continues to undergo SLAAC, but the static address is gone forever unless manually reinstated.) The same happens if use_tempaddr is changed from 0 back to 2. The expected outcome is that only temporary addresses are affected by a change to use_tempaddr. --- AcpiTables: AlsaDevices: total 0 crw-rw---T 1 root audio 116, 1 May 5 03:53 seq crw-rw---T 1 root audio 116, 33 May 5 03:53 timer AplayDevices: Error: [Errno 2] No such file or directory ApportVersion: 2.0.1-0ubuntu7 Architecture: i386 ArecordDevices: Error: [Errno 2] No such file or directory AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found. CurrentDmesg: DistroRelease: Ubuntu 12.04 IwConfig: Error: [Errno 2] No such file or directory Lspci: Error: [Errno 2] No such file or directory Lsusb: Error: [Errno 2] No such file or directory Package: linux (not installed) PciMultimedia: ProcEnviron: TERM=screen.linux PATH=(custom, no user) LANG=en_GB.UTF-8 SHELL=/bin/bash ProcFB: ProcKernelCmdLine: root=UUID=b16ffd9c-a54a-4dd3-a839-16c382ea8787 ro console=hvc0 ProcModules: lp 17455 0 - Live 0x parport 40930 1 lp, Live 0x xenfs 17877 1 - Live 0x ProcVersionSignature: Ubuntu 3.2.0-24.37-generic-pae 3.2.14 RelatedPackageVersions: linux-restricted-modules-3.2.0-24-generic-pae N/A linux-backports-modules-3.2.0-24-generic-pae N/A linux-firmware1.79 RfKill: Error: [Errno 2] No such file or directory Tags: precise Uname: Linux 3.2.0-24-generic-pae i686 UpgradeStatus: Upgraded to precise on 2012-05-05 (0 days ago) UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/994931/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1582864] Re: use after free of BOS in usb_reset_and_verify_device
It'd be helpful if this memory corruption regression could be accelerated. It means that unplugging a USB3 device can mess up the memory enough that file lookups that happen afterwards break if apparmor is enabled - just because the allocation size is similar by chance. The resulting oops is very misleading and it took a long time to track this down. It also causes process hangs. Thanks. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1582864 Title: use after free of BOS in usb_reset_and_verify_device Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Committed Bug description: Should be fixed with upstream commit e5bdfd50d6f76077bf8441d130c606229e100d40, which reverts upstream commit d8f00cd685f5c8e0def8593e520a7fef12c22407. With slub_debug enabled this manifests as a deref of 0x6b6b... in usb_disable_ltm [ 218.235302] general protection fault: [#1] SMP [ 218.235311] Modules linked in: usb_storage tcp_diag inet_diag iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables autofs4 rpcsec_gss_krb5 rfcomm bnep bluetooth snd_hda_codec_hdmi binfmt_misc nvidia(POX) snd_hda_codec_realtek snd_hda_intel snd_usb_audio snd_hda_codec snd_usbmidi_lib uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_core snd_hwdep snd_seq_midi joydev snd_pcm videodev snd_page_alloc snd_seq_midi_event nfsd snd_rawmidi snd_seq auth_rpcgss parport_pc nfs_acl ppdev nfs lockd sunrpc fscache honeevent(OX) snd_seq_device snd_timer snd drm lp parport sb_edac mei_me hp_wmi sparse_keymap gpio_ich hpuefi(OX) intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm soundcore edac_core mei serio_raw tpm_infineon lpc_ich mac_hid wmi shpchp dm_crypt hid_generic usbhid hid crct10dif_pclmul crc32_pclmul aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd psmouse isci e1000e ahci libsas lib ahci ptp pps_core scsi_transport_sas pata_acpi [ 218.235410] CPU: 15 PID: 243 Comm: khubd Tainted: P OX 3.13.0-85-generic #129-Ubuntu [ 218.235414] Hardware name: Hewlett-Packard HP Z620 Workstation/158A, BIOS J61 v03.87 02/09/2015 [ 218.235418] task: 8807eff98000 ti: 8807effa task.ti: 8807effa [ 218.235421] RIP: 0010:[] [] usb_disable_ltm+0x56/0xb0 [ 218.235437] RSP: 0018:8807effa1cd0 EFLAGS: 00010202 [ 218.235440] RAX: RBX: 8807ea532e68 RCX: [ 218.235443] RDX: 6b6b6b6b6b6b6b6b RSI: 00300021 RDI: 8807ea532e68 [ 218.235446] RBP: 8807effa1d08 R08: R09: [ 218.235449] R10: 8807ff804240 R11: 8136d2a1 R12: [ 218.235451] R13: 8807ebddd480 R14: 0001 R15: 0012 [ 218.235455] FS: () GS:88101fce() knlGS: [ 218.235458] CS: 0010 DS: ES: CR0: 80050033 [ 218.235461] CR2: 013b1c08 CR3: 01c0e000 CR4: 000407e0 [ 218.235463] Stack: [ 218.235465] 81551236 8807ea532ef0 8807ea532e68 [ 218.235476] 8807ea532ef0 8807ebddbf60 8807effa1d48 [ 218.235483] 81545c4d 8807ea532f50 8807ebddb4d0 02a0 [ 218.235490] Call Trace: [ 218.235499] [] ? usb_disable_device+0x126/0x290 [ 218.235506] [] usb_disconnect+0xad/0x200 [ 218.235511] [] hub_port_connect_change+0xd3/0xb20 [ 218.235518] [] ? hub_port_status+0xdd/0x120 [ 218.235523] [] hub_events+0x4d4/0xa20 [ 218.235528] [] hub_thread+0x35/0x160 [ 218.235535] [] ? prepare_to_wait_event+0x100/0x100 [ 218.235540] [] ? hub_events+0xa20/0xa20 [ 218.235549] [] kthread+0xd2/0xf0 [ 218.235554] [] ? kthread_create_on_node+0x1c0/0x1c0 [ 218.235564] [] ret_from_fork+0x58/0x90 [ 218.235570] [] ? kthread_create_on_node+0x1c0/0x1c0 [ 218.235572] Code: e9 48 8b 52 10 48 85 d2 74 e0 f6 42 03 02 74 da 83 7f 1c 05 75 d4 48 8b 97 40 03 00 00 48 85 d2 74 c8 48 8b 52 10 48 85 d2 74 bf 42 03 02 74 b9 48 83 bf 50 03 00 00 00 74 af 55 45 31 c9 41 [ 218.235618] RIP [] usb_disable_ltm+0x56/0xb0 [ 218.235624] RSP [ 218.235655] ---[ end trace 954cac763165b767 ]--- Without slub_debug you end up getting a double free and messing up the allocator and apparmor tends to be the first one to notice: [ 574.027518] hub 4-0:1.0: Cannot enable port 3. Maybe the USB cable is bad? [ 574.548076] usb 4-3: USB disconnect, device number 2 [ 576.040995] [ cut here ] [ 576.041003] WARNING: CPU: 17 PID: 11627 at /build/linux-03BQvT/linux-3.13.0/include/linux/kref.h:47
[Kernel-packages] [Bug 1475662] Re: Kernel postrm calls /etc/kernel/postinst.d/*
This is a straightforward coding error that does not require any logs. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1475662 Title: Kernel postrm calls /etc/kernel/postinst.d/* Status in linux package in Ubuntu: Confirmed Bug description: Looking at linux-image-extra-3.19.0-18-generic here, but I expect this to be pretty pervasive. This is its postrm: #!/bin/sh set -e case $0::$1 in *.postinst::configure|*.postrm::remove) depmod -a -F /boot/System.map-3.19.0-18-generic 3.19.0-18-generic || true for dir in /etc/kernel/postinst.d /etc/kernel/postinst.d/3.19.0-18-generic do if [ -d $dir ]; then run-parts --verbose --exit-on-error --arg=3.19.0-18-generic --arg=/boot/vmlinuz-3.19.0-18-generic $dir fi done ;; esac As you can see it executes /etc/kernel/postinst.d/* instead of /etc/kernel/postrm.d/* even if it's called as a postrm script. Why? The problem for us is that this re-executes dkms's autoinstaller, which recompiles certain modules even if the kernel is being removed. But I find this behavior pretty surprising regardless of this. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1475662/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1475662] [NEW] Kernel postrm calls /etc/kernel/postinst.d/*
Public bug reported: Looking at linux-image-extra-3.19.0-18-generic here, but I expect this to be pretty pervasive. This is its postrm: #!/bin/sh set -e case $0::$1 in *.postinst::configure|*.postrm::remove) depmod -a -F /boot/System.map-3.19.0-18-generic 3.19.0-18-generic || true for dir in /etc/kernel/postinst.d /etc/kernel/postinst.d/3.19.0-18-generic do if [ -d $dir ]; then run-parts --verbose --exit-on-error --arg=3.19.0-18-generic --arg=/boot/vmlinuz-3.19.0-18-generic $dir fi done ;; esac As you can see it executes /etc/kernel/postinst.d/* instead of /etc/kernel/postrm.d/* even if it's called as a postrm script. Why? The problem for us is that this re-executes dkms's autoinstaller, which recompiles certain modules even if the kernel is being removed. But I find this behavior pretty surprising regardless of this. ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1475662 Title: Kernel postrm calls /etc/kernel/postinst.d/* Status in linux package in Ubuntu: New Bug description: Looking at linux-image-extra-3.19.0-18-generic here, but I expect this to be pretty pervasive. This is its postrm: #!/bin/sh set -e case $0::$1 in *.postinst::configure|*.postrm::remove) depmod -a -F /boot/System.map-3.19.0-18-generic 3.19.0-18-generic || true for dir in /etc/kernel/postinst.d /etc/kernel/postinst.d/3.19.0-18-generic do if [ -d $dir ]; then run-parts --verbose --exit-on-error --arg=3.19.0-18-generic --arg=/boot/vmlinuz-3.19.0-18-generic $dir fi done ;; esac As you can see it executes /etc/kernel/postinst.d/* instead of /etc/kernel/postrm.d/* even if it's called as a postrm script. Why? The problem for us is that this re-executes dkms's autoinstaller, which recompiles certain modules even if the kernel is being removed. But I find this behavior pretty surprising regardless of this. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1475662/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
What's the ETA for trusty? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1398465] Re: Memory allocation failure, presumably in FUSE
Seems fixed in -26. That one didn't crash for me yet while -25 crashed within hours. The changelog looks quite horrible to me with quite a few memory corruptions, including thp (on always for me), compound page freeing, FUSE, and vfs. Let's close this unless I see it again on -26. ** Changed in: linux (Ubuntu) Status: Incomplete = Invalid ** Changed in: linux (Ubuntu) Status: Invalid = Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1398465 Title: Memory allocation failure, presumably in FUSE Status in linux package in Ubuntu: Won't Fix Bug description: I just tried out linux-lts-utopic on trusty and hit a few backtraces. We make intensive use of FUSE and the FS operation I conducted on FUSE hung post-backtrace. [ 1951.617813] [ cut here ] [ 1951.617818] kernel BUG at /build/buildd/linux-lts-utopic-3.16.0/mm/slub.c:3380! [ 1951.617819] invalid opcode: [#1] SMP [ 1951.617821] Modules linked in: des_generic nfsv3 nfsv4 vmnet(OE) parport_pc vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) xt_addrtype ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat bridge stp llc aufs netconsole configfs nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables xt_NFLOG xt_comment xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_multiport xt_connmark xt_conntrack nf_conntrack xt_mark cuse iptable_filter ip_tables x_tables rpcsec_gss_krb5 nfnetlink_log nfnetlink autofs4 rfcomm bnep bluetooth 6lowpan_iphc binfmt_misc snd_hda_codec_hdmi hp_wmi sparse_keymap intel_rapl x86_pkg_temp_thermal snd_hda_codec_realtek intel_powerclamp coretemp snd_hda_codec_generic kvm_intel kvm ppdev crct10dif_pclmul crc32_pclmul snd_hda_intel ghash_clmulni_intel aesni_intel snd_hda_controller aes_x86_64 lrw snd_hda_codec gf128mul glue_helper ablk_helper cryptd snd_hwdep lp snd_pcm parport serio_raw sb_edac edac_core snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq nvidia(POE) snd_se q_device snd_timer lpc_ich snd drm ioatdma dca soundcore wmi tpm_infineon mac_hid nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache nls_iso8859_1 hid_generic usbhid hid isci firewire_ohci e1000e psmouse(OE) libsas firewire_core ahci libahci ptp crc_itu_t scsi_transport_sas pps_core [last unloaded: vmnet] [ 1951.617874] CPU: 2 PID: 13631 Comm: srcfsd Tainted: P OE 3.16.0-25-generic #33-Ubuntu [ 1951.617876] Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.65 12/19/2013 [ 1951.617877] task: 88061f5cb2f0 ti: 880800cdc000 task.ti: 880800cdc000 [ 1951.617878] RIP: 0010:[811b61a3] [811b61a3] kfree+0x133/0x140 [ 1951.617884] RSP: 0018:880800cdfbf8 EFLAGS: 00010246 [ 1951.617885] RAX: 00000400 RBX: 88007833 RCX: 00018020001f [ 1951.617886] RDX: 0000 RSI: ea0002716f80 RDI: 88007833 [ 1951.617887] RBP: 880800cdfc10 R08: 88009c5bf400 R09: 00018020001f [ 1951.617888] R10: ea0001c0 R11: 812bfd95 R12: 8807addaf800 [ 1951.617889] R13: 812bfda1 R14: 00020010 R15: 880800cdfd58 [ 1951.617890] FS: 7fccdb950700() GS:88082fc4() knlGS: [ 1951.617891] CS: 0010 DS: ES: CR0: 80050033 [ 1951.617892] CR2: 08a89ff0 CR3: 0007c8fb7000 CR4: 000407e0 [ 1951.617893] Stack: [ 1951.617894] 8807a1e296c0 8807addaf800 880800cdfc28 [ 1951.617896] 812bfda1 8807a1e296c0 880800cdfc58 812bfe88 [ 1951.617897] 8807a1e296c0 8807addaf800 812c71c0 00020010 [ 1951.617899] Call Trace: [ 1951.617904] [812bfda1] fuse_request_free+0x31/0x50 [ 1951.617906] [812bfe88] fuse_put_request+0xc8/0x110 [ 1951.617908] [812c71c0] ? fuse_short_read+0x160/0x160 [ 1951.617910] [812bffdc] request_end+0x10c/0x1c0 [ 1951.617911] [812c1436] fuse_dev_do_write+0x826/0xd10 [ 1951.617914] [811d36e0] ? do_sync_read+0x90/0x90 [ 1951.617916] [812c1c79] fuse_dev_write+0x69/0x80 [ 1951.617918] [811d37bc] do_sync_readv_writev+0x4c/0x80 [ 1951.617920] [811d510d] do_readv_writev+0x1bd/0x240 [ 1951.617922] [811d5219] vfs_writev+0x39/0x50 [ 1951.617924] [811d534a] SyS_writev+0x4a/0xd0 [ 1951.617927] [817690ad] system_call_fastpath+0x1a/0x1f [ 1951.617928] Code: 49 8b 02 31 f6 f6 c4 40 74 04 41 8b 72 68 4c 89 d7 e8 92 3d fb ff eb 8f 4c 8b 50 30 48 8b 10 80 e6 80 4c 0f 44 d0 e9 32 ff ff ff 0f 0b 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 66 66 90 55 89 f1 [ 1951.617946] RIP [811b61a3] kfree+0x133/0x140 [ 1951.617948] RSP 880800cdfbf8 [ 1951.617950] ---[ end trace a783e9182f5a2f00 ]--- [ 1953.884500] general protection fault: [#2] SMP [
[Kernel-packages] [Bug 1396065] [NEW] GPF in lru_put_end called from nfsd_cache_lookup
Public bug reported: https://access.redhat.com/solutions/720473 still applies to the trusty kernel. In fact https://lists.ubuntu.com/archives/kernel- team/2014-July/045459.html did apply one of the two patches to 3.11, but it was not applied to 3.13 and is not present in master-next. The other one is http://kernel.ubuntu.com/git?p=ubuntu/linux.git;a=blobdiff;f=fs/nfsd/nfscache.c;h=e5e4675b7e755fd5c69ea52bc194a25501ef286b;hp=02e8e9ad57502fa2ff294181d6f261425bbc5969;hb=92f9180a0bdcec4a579a4b380cc0fa664f88d47d;hpb=9696a6f0ee3a1ea18b9b705a70eb76883cebe7a0 -- which also landed in 3.11 but didn't make it to 3.13. Please apply both to fix this backtrace: Nov 20 16:41:28 REDACTED kernel: [319683.547563] general protection fault: [#1] SMP Nov 20 16:41:28 REDACTED kernel: [319683.552668] Modules linked in: cts des_generic nfsv3 nfsv4 autofs4 binfmt_misc gpio_ich rpcsec_gss_krb5 nfsd nfs_acl auth_rpcgss nfs fscache lockd sunrpc cdc_acm sb_edac edac_core lpc_ich serio_raw mei_me mei mac_hid lp parport raid10 raid456 async_pq async_xor xor async_memcpy async_raid6_recov raid6_pq async_tx bnx2x mpt2sas raid1 ahci scsi_transport_sas libcrc32c libahci mdio raid_class raid0 multipath linear Nov 20 16:41:28 REDACTED kernel: [319683.590384] CPU: 14 PID: 2576 Comm: nfsd Not tainted 3.13.0-39-generic #66~precise1-Ubuntu Nov 20 16:41:28 REDACTED kernel: [319683.598737] Hardware name: REDACTED Nov 20 16:41:28 REDACTED kernel: [319683.605802] task: 88202704b000 ti: 882025e7a000 task.ti: 882025e7a000 Nov 20 16:41:28 REDACTED kernel: [319683.613379] RIP: 0010:[a030be70] [a030be70] lru_put_end+0x20/0x70 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.622040] RSP: 0018:882025e7bd58 EFLAGS: 00010206 Nov 20 16:41:28 REDACTED kernel: [319683.627440] RAX: dead00200200 RBX: 880135386e70 RCX: dead00100100 Nov 20 16:41:28 REDACTED kernel: [319683.634654] RDX: 880135386e80 RSI: 8802c2a9904c RDI: 880135386e70 Nov 20 16:41:28 REDACTED kernel: [319683.641878] RBP: 882025e7bd58 R08: 88207fcd7220 R09: 88103f803b00 Nov 20 16:41:28 REDACTED kernel: [319683.649108] R10: a030c908 R11: 00014480 R12: 882025b6a000 Nov 20 16:41:28 REDACTED kernel: [319683.656332] R13: 0002 R14: 8802c2a9901c R15: 0030 Nov 20 16:41:28 REDACTED kernel: [319683.663565] FS: () GS:88207fcc() knlGS: Nov 20 16:41:28 REDACTED kernel: [319683.671749] CS: 0010 DS: ES: CR0: 80050033 Nov 20 16:41:28 REDACTED kernel: [319683.677581] CR2: 7fc557e3b504 CR3: 01c0d000 CR4: 000407e0 Nov 20 16:41:28 REDACTED kernel: [319683.684799] Stack: Nov 20 16:41:28 REDACTED kernel: [319683.686913] 882025e7bda8 a030c896 8820289c9240 0030 Nov 20 16:41:28 REDACTED kernel: [319683.694477] a0339ff8 882025b6a000 a0339ff8 8802c2a99018 Nov 20 16:41:28 REDACTED kernel: [319683.702026] 001c 8802c2a99000 882025e7bde8 a0300e7a Nov 20 16:41:28 REDACTED kernel: [319683.709575] Call Trace: Nov 20 16:41:28 REDACTED kernel: [319683.712132] [a030c896] nfsd_cache_update+0x86/0x150 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.718653] [a0300e7a] nfsd_dispatch+0x1ba/0x230 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.724936] [a0238565] svc_process_common+0x345/0x680 [sunrpc] Nov 20 16:41:28 REDACTED kernel: [319683.731812] [a0238bf3] svc_process+0x103/0x160 [sunrpc] Nov 20 16:41:28 REDACTED kernel: [319683.738084] [a03008ff] nfsd+0xbf/0x130 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.743490] [a0300840] ? nfsd_destroy+0x80/0x80 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.749679] [8108fb29] kthread+0xc9/0xe0 Nov 20 16:41:28 REDACTED kernel: [319683.754640] [8108fa60] ? flush_kthread_worker+0xb0/0xb0 Nov 20 16:41:28 REDACTED kernel: [319683.760932] [8176b5bc] ret_from_fork+0x7c/0xb0 Nov 20 16:41:28 REDACTED kernel: [319683.766417] [8108fa60] ? flush_kthread_worker+0xb0/0xb0 Nov 20 16:41:28 REDACTED kernel: [319683.772697] Code: 5b 5d c3 0f 1f 84 00 00 00 00 00 66 66 66 66 90 48 8b 05 a4 11 a1 e1 55 48 8d 57 10 48 8b 4f 10 48 89 e5 48 89 47 58 48 8b 47 18 48 89 41 08 48 89 08 b9 30 75 00 00 48 8b 05 55 0d 03 00 48 c7 Nov 20 16:41:28 REDACTED kernel: [319683.792771] RIP [a030be70] lru_put_end+0x20/0x70 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.799061] RSP 882025e7bd58 Nov 20 16:41:28 REDACTED kernel: [319683.802679] ---[ end trace e4c61e4b0608416b ]--- ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided
[Kernel-packages] [Bug 1371316] Re: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
Reproduced with our configuration before (broken) and after (working). Looks good to me, thanks! ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA Status in “linux” package in Ubuntu: Invalid Status in “linux-lts-trusty” package in Ubuntu: Invalid Status in “linux” source package in Precise: Invalid Status in “linux-lts-trusty” source package in Precise: In Progress Status in “linux” source package in Trusty: Fix Committed Status in “linux-lts-trusty” source package in Trusty: Invalid Bug description: SRU justification Impact: when using IMA with aufs in trusty potential exists for very hard to diagnose lockups. Testcase: enable IMA and use an aufs filesystem. Regression Potential: the fix is an upstream cherry-pick from the version of aufs in Utopic which is used widly for lxc there so regression potential is low. The fix removes code which also lessens the risk. === The trusty kernel misses the following patch that already landed in utopic with the recent aufs update: https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67 This unbreaks aufs with IMA (Integrity Measurement Architecture) enabled. When IMA is enabled and mmaps are being tracked, the kernel hits a lock ordering bug because a needed semaphore is already held. This patch fixes this issue by not calling out to IMA for the access to the underlying file. However IMA will still see the access to the file in the merged aufs, which should be good enough. Please cherry-pick above patch. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1371316] Re: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
Did this also miss the current cycle? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA Status in “linux” package in Ubuntu: Invalid Status in “linux-lts-trusty” package in Ubuntu: Invalid Status in “linux” source package in Precise: Invalid Status in “linux-lts-trusty” source package in Precise: In Progress Status in “linux” source package in Trusty: Fix Committed Status in “linux-lts-trusty” source package in Trusty: Invalid Bug description: SRU justification Impact: when using IMA with aufs in trusty potential exists for very hard to diagnose lockups. Testcase: enable IMA and use an aufs filesystem. Regression Potential: the fix is an upstream cherry-pick from the version of aufs in Utopic which is used widly for lxc there so regression potential is low. The fix removes code which also lessens the risk. === The trusty kernel misses the following patch that already landed in utopic with the recent aufs update: https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67 This unbreaks aufs with IMA (Integrity Measurement Architecture) enabled. When IMA is enabled and mmaps are being tracked, the kernel hits a lock ordering bug because a needed semaphore is already held. This patch fixes this issue by not calling out to IMA for the access to the underlying file. However IMA will still see the access to the file in the merged aufs, which should be good enough. Please cherry-pick above patch. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1368444] Re: Add support for ForcePads found on HP EliteBook Folio 1040
I don't see it in 3.13.11.7 nor in the 3.13.y queue. Are you sure that it'll make it? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1368444 Title: Add support for ForcePads found on HP EliteBook Folio 1040 Status in “linux” package in Ubuntu: Triaged Bug description: Please include the following commit from mainline in Ubuntu kernel: From 5715fc764f7753d464dbe094b5ef9cffa6e479a4 Mon Sep 17 00:00:00 2001 From: Dmitry Torokhov dmitry.torok...@gmail.com Date: Sat, 30 Aug 2014 13:51:06 -0700 Subject: Input: synaptics - add support for ForcePads ForcePads are found on HP EliteBook 1040 laptops. They lack any kind of physical buttons, instead they generate primary button click when user presses somewhat hard on the surface of the touchpad. Unfortunately they also report primary button click whenever there are 2 or more contacts on the pad, messing up all multi-finger gestures (2-finger scrolling, multi-finger tapping, etc). To cope with this behavior we introduce a delay (currently 50 msecs) in reporting primary press in case more contacts appear. Cc: sta...@vger.kernel.org Reviewed-by: Hans de Goede hdego...@redhat.com Signed-off-by: Dmitry Torokhov dmitry.torok...@gmail.com To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1368444/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1371316] Re: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
I confirm that the patched kernel fixes the issue. Thanks. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA Status in “linux” package in Ubuntu: Invalid Status in “linux-lts-trusty” package in Ubuntu: Invalid Status in “linux” source package in Precise: Invalid Status in “linux-lts-trusty” source package in Precise: In Progress Status in “linux” source package in Trusty: In Progress Status in “linux-lts-trusty” source package in Trusty: Invalid Bug description: The trusty kernel misses the following patch that already landed in utopic with the recent aufs update: https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67 This unbreaks aufs with IMA (Integrity Measurement Architecture) enabled. When IMA is enabled and mmaps are being tracked, the kernel hits a lock ordering bug because a needed semaphore is already held. This patch fixes this issue by not calling out to IMA for the access to the underlying file. However IMA will still see the access to the file in the merged aufs, which should be good enough. Please cherry-pick above patch. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1371316] [NEW] Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
Public bug reported: The trusty kernel misses the following patch that already landed in utopic with the recent aufs update: https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67 This unbreaks aufs with IMA (Integrity Measurement Architecture) enabled. When IMA is enabled and mmaps are being tracked, the kernel hits a lock ordering bug because a needed semaphore is already held. This patch fixes this issue by not calling out to IMA for the access to the underlying file. However IMA will still see the access to the file in the merged aufs, which should be good enough. Please cherry-pick above patch. ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA Status in “linux” package in Ubuntu: Incomplete Status in “linux-lts-trusty” package in Ubuntu: New Bug description: The trusty kernel misses the following patch that already landed in utopic with the recent aufs update: https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67 This unbreaks aufs with IMA (Integrity Measurement Architecture) enabled. When IMA is enabled and mmaps are being tracked, the kernel hits a lock ordering bug because a needed semaphore is already held. This patch fixes this issue by not calling out to IMA for the access to the underlying file. However IMA will still see the access to the file in the merged aufs, which should be good enough. Please cherry-pick above patch. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
Thanks, Dave. I'm deploying it from there then. :) @dkpeall: It's in trusty-proposed, too. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers Status in Keepalived. Loadbalancing High-Avaibility: New Status in “keepalived” package in Ubuntu: Invalid Status in “linux” package in Ubuntu: Fix Released Status in “keepalived” source package in Trusty: Invalid Status in “linux” source package in Trusty: Fix Committed Status in “keepalived” source package in Utopic: Invalid Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: Keepalived is no longer able to load any IPv6 virtual servers for load balancing purposes. Fix: Re-enable CONFIG_IP_VS_IPV6=y Testcase: Attempt to load ipv6 virtual servers. _ I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any IPv6 virtual servers. I get the following message when trying to list a virtual service: ipvsadm -L -t [2001::::xxx]:xxx Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: keepalived 1:1.2.7-1ubuntu1 ProcVersionSignature: Ubuntu 3.13.0-20.42-generic 3.13.7 Uname: Linux 3.13.0-20-generic x86_64 ApportVersion: 2.14-0ubuntu1 Architecture: amd64 Date: Tue Apr 1 13:45:51 2014 ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_ZA.UTF-8 SHELL=/bin/bash SourcePackage: keepalived UpgradeStatus: Upgraded to trusty on 2014-03-31 (0 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1302605] Re: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
The following commit landed upstream that at least intends to fix the bug outlined here, even though it does not enable proper auditing for x32. commit a3c54931199565930d6d84f4c3456f6440aefd41 Author: Andy Lutomirski l...@amacapital.net Date: Wed May 28 23:09:58 2014 -0400 auditsc: audit_krule mask accesses need bounds checking Fixes an easy DoS and possible information disclosure. This does nothing about the broken state of x32 auditing. eparis: If the admin has enabled auditd and has specifically loaded audit rules. This bug has been around since before git. Wow... Cc: sta...@vger.kernel.org Signed-off-by: Andy Lutomirski l...@amacapital.net Signed-off-by: Eric Paris epa...@redhat.com Signed-off-by: Linus Torvalds torva...@linux-foundation.org -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1302605 Title: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: New Bug description: I'm running trusty on a bunch of machines, doing frequent dist- upgrades. My hosts have gcc-multilib installed. Yesterday, I noticed that initramfs generation was hanging. Today I investigated further and found out that what was hanging were the calls to /libx32/ld-linux-x32.so.2. This is triggered in initramfs generation because there are at some hooks that incorrectly use copy_exec to copy shell scripts into the initramfs image. In a working machine, when ldd encounters a shell script, it will first call the 64bit linker and since it fails, it will then call the 32bit linker which will also fail. However, in a machine affected by this bug, the second call will hang forever, preventing new image generation, and package updates in general, when this happens as a trigger for update-initramfs. Originally I thought this was related to the kernel version, since I was unable to reproduce in a freshly installed machine running -22 and was reproducing it in a machine running -20, but now I'm also reproducing it in a machine running -22, so it must be something else. I'm sorry I can't provide the exact cause right now, but I think it's worth noting that in some situation there might be a problem, and try to find out which those situations are. I now have one host running 3.13.0-22-generic, with libc6-x32=2.19-0ubuntu3, where doing ldd /usr/bin/ldd hangs, and another host, with the exact same kernel and libc6-x32 version where doing ldd /usr/bin/ldd produces the expected error message (not a dynamic executable). The main difference is that the first one was installed yesterday and the second one was installed today. Both are dist-upgraded to the latest version of everything. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
This should also go into precise-proposed through the LTS backport. I mainly need it there. ;-) I installed the trusty kernel from -proposed on precise directly and it works. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers Status in Keepalived. Loadbalancing High-Avaibility: New Status in “keepalived” package in Ubuntu: Invalid Status in “linux” package in Ubuntu: Fix Released Status in “keepalived” source package in Trusty: New Status in “linux” source package in Trusty: Fix Committed Status in “keepalived” source package in Utopic: Invalid Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: Keepalived is no longer able to load any IPv6 virtual servers for load balancing purposes. Fix: Re-enable CONFIG_IP_VS_IPV6=y Testcase: Attempt to load ipv6 virtual servers. _ I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any IPv6 virtual servers. I get the following message when trying to list a virtual service: ipvsadm -L -t [2001::::xxx]:xxx Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: keepalived 1:1.2.7-1ubuntu1 ProcVersionSignature: Ubuntu 3.13.0-20.42-generic 3.13.7 Uname: Linux 3.13.0-20-generic x86_64 ApportVersion: 2.14-0ubuntu1 Architecture: amd64 Date: Tue Apr 1 13:45:51 2014 ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_ZA.UTF-8 SHELL=/bin/bash SourcePackage: keepalived UpgradeStatus: Upgraded to trusty on 2014-03-31 (0 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
FWIW, it's 3.13.0-30-generic with 3.13.0-30.54. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers Status in Keepalived. Loadbalancing High-Avaibility: New Status in “keepalived” package in Ubuntu: Invalid Status in “linux” package in Ubuntu: Fix Released Status in “keepalived” source package in Trusty: New Status in “linux” source package in Trusty: Fix Committed Status in “keepalived” source package in Utopic: Invalid Status in “linux” source package in Utopic: Fix Released Bug description: SRU Justification: Impact: Keepalived is no longer able to load any IPv6 virtual servers for load balancing purposes. Fix: Re-enable CONFIG_IP_VS_IPV6=y Testcase: Attempt to load ipv6 virtual servers. _ I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any IPv6 virtual servers. I get the following message when trying to list a virtual service: ipvsadm -L -t [2001::::xxx]:xxx Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: keepalived 1:1.2.7-1ubuntu1 ProcVersionSignature: Ubuntu 3.13.0-20.42-generic 3.13.7 Uname: Linux 3.13.0-20-generic x86_64 ApportVersion: 2.14-0ubuntu1 Architecture: amd64 Date: Tue Apr 1 13:45:51 2014 ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_ZA.UTF-8 SHELL=/bin/bash SourcePackage: keepalived UpgradeStatus: Upgraded to trusty on 2014-03-31 (0 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1323165] Re: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756!
The commit removing the BUG_ON landed upstream in 3.16 (linus/master). commit 107437febd495a50e2cd09c81bbaa84d30e57b07 Author: Rik van Riel r...@redhat.com Date: Tue Apr 29 15:36:15 2014 -0400 mm/numa: Remove BUG_ON() in __handle_mm_fault() Changing PTEs and PMDs to pte_numa pmd_numa is done with the mmap_sem held for reading, which means a pmd can be instantiated and turned into a numa one while __handle_mm_fault() is examining the value of old_pmd. If that happens, __handle_mm_fault() should just return and let the page fault retry, instead of throwing an oops. This is handled by the test for pmd_trans_huge(*pmd) below. Signed-off-by: Rik van Riel r...@redhat.com Reviewed-by: Naoya Horiguchi n-horigu...@ah.jp.nec.com Reported-by: Sunil Pandey sunil.k.pan...@intel.com Signed-off-by: Peter Zijlstra pet...@infradead.org Cc: Andrew Morton a...@linux-foundation.org Cc: Johannes Weiner han...@cmpxchg.org Cc: Kirill A. Shutemov kirill.shute...@linux.intel.com Cc: Linus Torvalds torva...@linux-foundation.org Cc: Mel Gorman mgor...@suse.de Cc: linux...@kvack.org Cc: lwood...@redhat.com Cc: dave.han...@intel.com Link: http://lkml.kernel.org/r/20140429153615.2d720...@annuminas.surriel.com Signed-off-by: Ingo Molnar mi...@kernel.org -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1323165 Title: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! Status in “linux” package in Ubuntu: Confirmed Bug description: The machine becomes non-responsive, unable to ssh, high load average, trying to access the running java process does not work as per syslog: May 26 06:19:38 server06 kernel: [75831.929529] [ cut here ] May 26 06:19:38 server06 kernel: [75831.930191] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! May 26 06:19:38 server06 kernel: [75831.931129] invalid opcode: [#1] SMP May 26 06:19:38 server06 kernel: [75831.931729] Modules linked in: xt_multiport ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables gpio_ich nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack iptable_filter ip_tables x_tables intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd serio_raw sb_edac edac_core lpc_ich hpwdt hpilo ioatdma lp dca ipmi_si parport acpi_power_meter mac_hid tg3 ptp psmouse hpsa pps_core May 26 06:19:38 server06 kernel: [75831.941585] CPU: 4 PID: 2930 Comm: java Not tainted 3.13.0-24-generic #47-Ubuntu May 26 06:19:38 server06 kernel: [75831.942633] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 02/10/2014 May 26 06:19:38 server06 kernel: [75831.943583] task: 881fe8372fe0 ti: 881fe632a000 task.ti: 881fe632a000 May 26 06:19:38 server06 kernel: [75831.944654] RIP: 0010:[81179051] [81179051] handle_mm_fault+0xe61/0xf10 May 26 06:19:38 server06 kernel: [75831.946137] RSP: :881fe632bd98 EFLAGS: 00010246 May 26 06:19:38 server06 kernel: [75831.946885] RAX: 0100 RBX: 7fc37320a370 RCX: 881fe632bb18 May 26 06:19:38 server06 kernel: [75831.947902] RDX: 881fe8372fe0 RSI: RDI: 800100c009e6 May 26 06:19:38 server06 kernel: [75831.948932] RBP: 881fe632be20 R08: R09: 00a9 May 26 06:19:38 server06 kernel: [75831.949952] R10: 0001 R11: R12: 881fd83a7cc8 May 26 06:19:38 server06 kernel: [75831.950961] R13: 880fe6787d40 R14: 880fe5d95780 R15: 0080 May 26 06:19:38 server06 kernel: [75831.951985] FS: 7fc938145700() GS:880fffa8() knlGS: May 26 06:19:38 server06 kernel: [75831.976736] CS: 0010 DS: ES: CR0: 80050033 May 26 06:19:38 server06 kernel: [75832.005183] CR2: 7fc373620930 CR3: 000fe63fe000 CR4: 000407e0 May 26 06:19:38 server06 kernel: [75832.033473] Stack: May 26 06:19:38 server06 kernel: [75832.060551] 0001 881fe632bdb0 8109a780 881fe632bdd0 May 26 06:19:38 server06 kernel: [75832.117385] 810d7ad6 0001 81f1ea20 881fe632be78 May 26 06:19:38 server06 kernel: [75832.173599] 810d983d 881fe632be48 88a9 0001 May 26 06:19:38 server06 kernel: [75832.231813] Call Trace: May 26 06:19:38 server06 kernel: [75832.258781] [8109a780] ? wake_up_state+0x10/0x20 May 26 06:19:38 server06 kernel: [75832.286702] [810d7ad6] ?
[Kernel-packages] [Bug 1323165] Re: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756!
Did the workaround work? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1323165 Title: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! Status in “linux” package in Ubuntu: Confirmed Bug description: The machine becomes non-responsive, unable to ssh, high load average, trying to access the running java process does not work as per syslog: May 26 06:19:38 server06 kernel: [75831.929529] [ cut here ] May 26 06:19:38 server06 kernel: [75831.930191] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! May 26 06:19:38 server06 kernel: [75831.931129] invalid opcode: [#1] SMP May 26 06:19:38 server06 kernel: [75831.931729] Modules linked in: xt_multiport ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables gpio_ich nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack iptable_filter ip_tables x_tables intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd serio_raw sb_edac edac_core lpc_ich hpwdt hpilo ioatdma lp dca ipmi_si parport acpi_power_meter mac_hid tg3 ptp psmouse hpsa pps_core May 26 06:19:38 server06 kernel: [75831.941585] CPU: 4 PID: 2930 Comm: java Not tainted 3.13.0-24-generic #47-Ubuntu May 26 06:19:38 server06 kernel: [75831.942633] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 02/10/2014 May 26 06:19:38 server06 kernel: [75831.943583] task: 881fe8372fe0 ti: 881fe632a000 task.ti: 881fe632a000 May 26 06:19:38 server06 kernel: [75831.944654] RIP: 0010:[81179051] [81179051] handle_mm_fault+0xe61/0xf10 May 26 06:19:38 server06 kernel: [75831.946137] RSP: :881fe632bd98 EFLAGS: 00010246 May 26 06:19:38 server06 kernel: [75831.946885] RAX: 0100 RBX: 7fc37320a370 RCX: 881fe632bb18 May 26 06:19:38 server06 kernel: [75831.947902] RDX: 881fe8372fe0 RSI: RDI: 800100c009e6 May 26 06:19:38 server06 kernel: [75831.948932] RBP: 881fe632be20 R08: R09: 00a9 May 26 06:19:38 server06 kernel: [75831.949952] R10: 0001 R11: R12: 881fd83a7cc8 May 26 06:19:38 server06 kernel: [75831.950961] R13: 880fe6787d40 R14: 880fe5d95780 R15: 0080 May 26 06:19:38 server06 kernel: [75831.951985] FS: 7fc938145700() GS:880fffa8() knlGS: May 26 06:19:38 server06 kernel: [75831.976736] CS: 0010 DS: ES: CR0: 80050033 May 26 06:19:38 server06 kernel: [75832.005183] CR2: 7fc373620930 CR3: 000fe63fe000 CR4: 000407e0 May 26 06:19:38 server06 kernel: [75832.033473] Stack: May 26 06:19:38 server06 kernel: [75832.060551] 0001 881fe632bdb0 8109a780 881fe632bdd0 May 26 06:19:38 server06 kernel: [75832.117385] 810d7ad6 0001 81f1ea20 881fe632be78 May 26 06:19:38 server06 kernel: [75832.173599] 810d983d 881fe632be48 88a9 0001 May 26 06:19:38 server06 kernel: [75832.231813] Call Trace: May 26 06:19:38 server06 kernel: [75832.258781] [8109a780] ? wake_up_state+0x10/0x20 May 26 06:19:38 server06 kernel: [75832.286702] [810d7ad6] ? wake_futex+0x66/0x90 May 26 06:19:38 server06 kernel: [75832.311849] [810d983d] ? futex_wake_op+0x4ed/0x620 May 26 06:19:38 server06 kernel: [75832.337329] [81721a24] __do_page_fault+0x184/0x560 May 26 06:19:38 server06 kernel: [75832.363061] [82fc] ? acct_account_cputime+0x1c/0x20 May 26 06:19:38 server06 kernel: [75832.387739] [8109d76b] ? account_user_time+0x8b/0xa0 May 26 06:19:38 server06 kernel: [75832.411608] [8109dd84] ? vtime_account_user+0x54/0x60 May 26 06:19:38 server06 kernel: [75832.436126] [81721e1a] do_page_fault+0x1a/0x70 May 26 06:19:38 server06 kernel: [75832.458239] [8171e288] page_fault+0x28/0x30 May 26 06:19:38 server06 kernel: [75832.481780] Code: ff 48 89 d9 4c 89 e2 4c 89 ee 4c 89 f7 44 89 4d c8 e8 34 c1 ff ff 85 c0 0f 85 94 f5 ff ff 49 8b 3c 24 44 8b 4d c8 e9 68 f3 ff ff 0f 0b be 8e 00 00 00 48 c7 c7 18 25 a6 81 44 89 4d c8 e8 18 e7 May 26 06:19:38 server06 kernel: [75832.551672] RIP [81179051] handle_mm_fault+0xe61/0xf10 May 26 06:19:38 server06 kernel: [75832.574254] RSP 881fe632bd98 May 26 06:19:38 server06 kernel: [75832.630392] ---[ end trace e41b58adf8e0d72b ]--- With Precise, it runs with 16 threads with no problem so it would appear a regression. WORKAROUND: Run the task
[Kernel-packages] [Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
Dave, when is this change going out approximately? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers Status in Keepalived. Loadbalancing High-Avaibility: New Status in “keepalived” package in Ubuntu: Invalid Status in “linux” package in Ubuntu: Fix Committed Status in “keepalived” source package in Trusty: New Status in “linux” source package in Trusty: Fix Committed Status in “keepalived” source package in Utopic: Invalid Status in “linux” source package in Utopic: Fix Committed Bug description: SRU Justification: Impact: Keepalived is no longer able to load any IPv6 virtual servers for load balancing purposes. Fix: Re-enable CONFIG_IP_VS_IPV6=y Testcase: Attempt to load ipv6 virtual servers. _ I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any IPv6 virtual servers. I get the following message when trying to list a virtual service: ipvsadm -L -t [2001::::xxx]:xxx Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: keepalived 1:1.2.7-1ubuntu1 ProcVersionSignature: Ubuntu 3.13.0-20.42-generic 3.13.7 Uname: Linux 3.13.0-20-generic x86_64 ApportVersion: 2.14-0ubuntu1 Architecture: amd64 Date: Tue Apr 1 13:45:51 2014 ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_ZA.UTF-8 SHELL=/bin/bash SourcePackage: keepalived UpgradeStatus: Upgraded to trusty on 2014-03-31 (0 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1323165] Re: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756!
The following might help (untested, as root): echo never /sys/kernel/mm/transparent_hugepage/enabled -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1323165 Title: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! Status in “linux” package in Ubuntu: Confirmed Bug description: The machine becomes non-responsive, unable to ssh, high load average, trying to access the running java process does not work as per syslog: May 26 06:19:38 server06 kernel: [75831.929529] [ cut here ] May 26 06:19:38 server06 kernel: [75831.930191] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! May 26 06:19:38 server06 kernel: [75831.931129] invalid opcode: [#1] SMP May 26 06:19:38 server06 kernel: [75831.931729] Modules linked in: xt_multiport ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables gpio_ich nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack iptable_filter ip_tables x_tables intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd serio_raw sb_edac edac_core lpc_ich hpwdt hpilo ioatdma lp dca ipmi_si parport acpi_power_meter mac_hid tg3 ptp psmouse hpsa pps_core May 26 06:19:38 server06 kernel: [75831.941585] CPU: 4 PID: 2930 Comm: java Not tainted 3.13.0-24-generic #47-Ubuntu May 26 06:19:38 server06 kernel: [75831.942633] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 02/10/2014 May 26 06:19:38 server06 kernel: [75831.943583] task: 881fe8372fe0 ti: 881fe632a000 task.ti: 881fe632a000 May 26 06:19:38 server06 kernel: [75831.944654] RIP: 0010:[81179051] [81179051] handle_mm_fault+0xe61/0xf10 May 26 06:19:38 server06 kernel: [75831.946137] RSP: :881fe632bd98 EFLAGS: 00010246 May 26 06:19:38 server06 kernel: [75831.946885] RAX: 0100 RBX: 7fc37320a370 RCX: 881fe632bb18 May 26 06:19:38 server06 kernel: [75831.947902] RDX: 881fe8372fe0 RSI: RDI: 800100c009e6 May 26 06:19:38 server06 kernel: [75831.948932] RBP: 881fe632be20 R08: R09: 00a9 May 26 06:19:38 server06 kernel: [75831.949952] R10: 0001 R11: R12: 881fd83a7cc8 May 26 06:19:38 server06 kernel: [75831.950961] R13: 880fe6787d40 R14: 880fe5d95780 R15: 0080 May 26 06:19:38 server06 kernel: [75831.951985] FS: 7fc938145700() GS:880fffa8() knlGS: May 26 06:19:38 server06 kernel: [75831.976736] CS: 0010 DS: ES: CR0: 80050033 May 26 06:19:38 server06 kernel: [75832.005183] CR2: 7fc373620930 CR3: 000fe63fe000 CR4: 000407e0 May 26 06:19:38 server06 kernel: [75832.033473] Stack: May 26 06:19:38 server06 kernel: [75832.060551] 0001 881fe632bdb0 8109a780 881fe632bdd0 May 26 06:19:38 server06 kernel: [75832.117385] 810d7ad6 0001 81f1ea20 881fe632be78 May 26 06:19:38 server06 kernel: [75832.173599] 810d983d 881fe632be48 88a9 0001 May 26 06:19:38 server06 kernel: [75832.231813] Call Trace: May 26 06:19:38 server06 kernel: [75832.258781] [8109a780] ? wake_up_state+0x10/0x20 May 26 06:19:38 server06 kernel: [75832.286702] [810d7ad6] ? wake_futex+0x66/0x90 May 26 06:19:38 server06 kernel: [75832.311849] [810d983d] ? futex_wake_op+0x4ed/0x620 May 26 06:19:38 server06 kernel: [75832.337329] [81721a24] __do_page_fault+0x184/0x560 May 26 06:19:38 server06 kernel: [75832.363061] [82fc] ? acct_account_cputime+0x1c/0x20 May 26 06:19:38 server06 kernel: [75832.387739] [8109d76b] ? account_user_time+0x8b/0xa0 May 26 06:19:38 server06 kernel: [75832.411608] [8109dd84] ? vtime_account_user+0x54/0x60 May 26 06:19:38 server06 kernel: [75832.436126] [81721e1a] do_page_fault+0x1a/0x70 May 26 06:19:38 server06 kernel: [75832.458239] [8171e288] page_fault+0x28/0x30 May 26 06:19:38 server06 kernel: [75832.481780] Code: ff 48 89 d9 4c 89 e2 4c 89 ee 4c 89 f7 44 89 4d c8 e8 34 c1 ff ff 85 c0 0f 85 94 f5 ff ff 49 8b 3c 24 44 8b 4d c8 e9 68 f3 ff ff 0f 0b be 8e 00 00 00 48 c7 c7 18 25 a6 81 44 89 4d c8 e8 18 e7 May 26 06:19:38 server06 kernel: [75832.551672] RIP [81179051] handle_mm_fault+0xe61/0xf10 May 26 06:19:38 server06 kernel: [75832.574254] RSP 881fe632bd98 May 26 06:19:38 server06 kernel: [75832.630392] ---[ end trace e41b58adf8e0d72b ]--- With Precise, it runs with 16 threads
[Kernel-packages] [Bug 1302605] Re: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
CVE-2014-3917 has been assigned to this issue: http://seclists.org/oss- sec/2014/q2/377 Another proposed patch for this has been posted here: http://article.gmane.org/gmane.linux.kernel/1713179 — This one adds a guard around the array access but also drops syscall auditing for x32 calls. ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3917 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1302605 Title: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: New Bug description: I'm running trusty on a bunch of machines, doing frequent dist- upgrades. My hosts have gcc-multilib installed. Yesterday, I noticed that initramfs generation was hanging. Today I investigated further and found out that what was hanging were the calls to /libx32/ld-linux-x32.so.2. This is triggered in initramfs generation because there are at some hooks that incorrectly use copy_exec to copy shell scripts into the initramfs image. In a working machine, when ldd encounters a shell script, it will first call the 64bit linker and since it fails, it will then call the 32bit linker which will also fail. However, in a machine affected by this bug, the second call will hang forever, preventing new image generation, and package updates in general, when this happens as a trigger for update-initramfs. Originally I thought this was related to the kernel version, since I was unable to reproduce in a freshly installed machine running -22 and was reproducing it in a machine running -20, but now I'm also reproducing it in a machine running -22, so it must be something else. I'm sorry I can't provide the exact cause right now, but I think it's worth noting that in some situation there might be a problem, and try to find out which those situations are. I now have one host running 3.13.0-22-generic, with libc6-x32=2.19-0ubuntu3, where doing ldd /usr/bin/ldd hangs, and another host, with the exact same kernel and libc6-x32 version where doing ldd /usr/bin/ldd produces the expected error message (not a dynamic executable). The main difference is that the first one was installed yesterday and the second one was installed today. Both are dist-upgraded to the latest version of everything. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1323165] Re: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756!
This is not HP-specific and also happens on Dell HW. I'll take this as the tracking bug. This commit suggests that the BUG_ON is actually bogus: http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=107437febd495a50e2cd09c81bbaa84d30e57b07 In the referenced thread there was a Cc to stable@, but that apparently got dropped when the patch was put into tip. This is *not* part of 3.15 yet. Instead it's currently staged for the next merge window. ** Tags removed: needs-upstream-testing ** Tags added: kernel-bug-exists-upstream ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1323165 Title: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! Status in “linux” package in Ubuntu: Confirmed Bug description: The machine becomes non-responsive, unable to ssh, high load average, trying to access the running java process does not work as per syslog: May 26 06:19:38 server06 kernel: [75831.929529] [ cut here ] May 26 06:19:38 server06 kernel: [75831.930191] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! May 26 06:19:38 server06 kernel: [75831.931129] invalid opcode: [#1] SMP May 26 06:19:38 server06 kernel: [75831.931729] Modules linked in: xt_multiport ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables gpio_ich nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack iptable_filter ip_tables x_tables intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd serio_raw sb_edac edac_core lpc_ich hpwdt hpilo ioatdma lp dca ipmi_si parport acpi_power_meter mac_hid tg3 ptp psmouse hpsa pps_core May 26 06:19:38 server06 kernel: [75831.941585] CPU: 4 PID: 2930 Comm: java Not tainted 3.13.0-24-generic #47-Ubuntu May 26 06:19:38 server06 kernel: [75831.942633] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 02/10/2014 May 26 06:19:38 server06 kernel: [75831.943583] task: 881fe8372fe0 ti: 881fe632a000 task.ti: 881fe632a000 May 26 06:19:38 server06 kernel: [75831.944654] RIP: 0010:[81179051] [81179051] handle_mm_fault+0xe61/0xf10 May 26 06:19:38 server06 kernel: [75831.946137] RSP: :881fe632bd98 EFLAGS: 00010246 May 26 06:19:38 server06 kernel: [75831.946885] RAX: 0100 RBX: 7fc37320a370 RCX: 881fe632bb18 May 26 06:19:38 server06 kernel: [75831.947902] RDX: 881fe8372fe0 RSI: RDI: 800100c009e6 May 26 06:19:38 server06 kernel: [75831.948932] RBP: 881fe632be20 R08: R09: 00a9 May 26 06:19:38 server06 kernel: [75831.949952] R10: 0001 R11: R12: 881fd83a7cc8 May 26 06:19:38 server06 kernel: [75831.950961] R13: 880fe6787d40 R14: 880fe5d95780 R15: 0080 May 26 06:19:38 server06 kernel: [75831.951985] FS: 7fc938145700() GS:880fffa8() knlGS: May 26 06:19:38 server06 kernel: [75831.976736] CS: 0010 DS: ES: CR0: 80050033 May 26 06:19:38 server06 kernel: [75832.005183] CR2: 7fc373620930 CR3: 000fe63fe000 CR4: 000407e0 May 26 06:19:38 server06 kernel: [75832.033473] Stack: May 26 06:19:38 server06 kernel: [75832.060551] 0001 881fe632bdb0 8109a780 881fe632bdd0 May 26 06:19:38 server06 kernel: [75832.117385] 810d7ad6 0001 81f1ea20 881fe632be78 May 26 06:19:38 server06 kernel: [75832.173599] 810d983d 881fe632be48 88a9 0001 May 26 06:19:38 server06 kernel: [75832.231813] Call Trace: May 26 06:19:38 server06 kernel: [75832.258781] [8109a780] ? wake_up_state+0x10/0x20 May 26 06:19:38 server06 kernel: [75832.286702] [810d7ad6] ? wake_futex+0x66/0x90 May 26 06:19:38 server06 kernel: [75832.311849] [810d983d] ? futex_wake_op+0x4ed/0x620 May 26 06:19:38 server06 kernel: [75832.337329] [81721a24] __do_page_fault+0x184/0x560 May 26 06:19:38 server06 kernel: [75832.363061] [82fc] ? acct_account_cputime+0x1c/0x20 May 26 06:19:38 server06 kernel: [75832.387739] [8109d76b] ? account_user_time+0x8b/0xa0 May 26 06:19:38 server06 kernel: [75832.411608] [8109dd84] ? vtime_account_user+0x54/0x60 May 26 06:19:38 server06 kernel: [75832.436126] [81721e1a] do_page_fault+0x1a/0x70 May 26 06:19:38 server06 kernel: [75832.458239] [8171e288] page_fault+0x28/0x30 May 26 06:19:38 server06 kernel:
[Kernel-packages] [Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
So the IPv6 support works as expected as soon as you enable CONFIG_IP_VS_IPV6=y in the kernel config and recompile it. This is an issue purely in the kernel and not in ipvsadm. I'd like to ask the kernel maintainers to turn on that configuration option, as it also breaks IPv6 load balancing using ipvs even if keepalived is not in use. ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Changed in: keepalived (Ubuntu) Status: Confirmed = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers Status in Keepalived. Loadbalancing High-Avaibility: New Status in “keepalived” package in Ubuntu: Invalid Status in “linux” package in Ubuntu: Incomplete Bug description: I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any IPv6 virtual servers. I get the following message when trying to list a virtual service: ipvsadm -L -t [2001::::xxx]:xxx Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: keepalived 1:1.2.7-1ubuntu1 ProcVersionSignature: Ubuntu 3.13.0-20.42-generic 3.13.7 Uname: Linux 3.13.0-20-generic x86_64 ApportVersion: 2.14-0ubuntu1 Architecture: amd64 Date: Tue Apr 1 13:45:51 2014 ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_ZA.UTF-8 SHELL=/bin/bash SourcePackage: keepalived UpgradeStatus: Upgraded to trusty on 2014-03-31 (0 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
There is no crash to collect and this is a feature request to reenable something that was apparently enabled before and then broke. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers Status in Keepalived. Loadbalancing High-Avaibility: New Status in “keepalived” package in Ubuntu: Invalid Status in “linux” package in Ubuntu: Confirmed Bug description: I've upgraded from 12.04 to 14.04 and the keepalived no longer loads any IPv6 virtual servers. I get the following message when trying to list a virtual service: ipvsadm -L -t [2001::::xxx]:xxx Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: keepalived 1:1.2.7-1ubuntu1 ProcVersionSignature: Ubuntu 3.13.0-20.42-generic 3.13.7 Uname: Linux 3.13.0-20-generic x86_64 ApportVersion: 2.14-0ubuntu1 Architecture: amd64 Date: Tue Apr 1 13:45:51 2014 ProcEnviron: TERM=screen PATH=(custom, no user) LANG=en_ZA.UTF-8 SHELL=/bin/bash SourcePackage: keepalived UpgradeStatus: Upgraded to trusty on 2014-03-31 (0 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1302605] Re: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
It seems that my patch was applied in the wrong place. You put it after the 4th arg instead of after %rsi is written (easy to miss given the vastly different assembly argument orders). We actually need to fix up %rsi / 2nd arg syscall number and instead it is now overwritten by the movq %rax,%rsi later. So this test kernel does not fix the issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1302605 Title: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: New Bug description: I'm running trusty on a bunch of machines, doing frequent dist- upgrades. My hosts have gcc-multilib installed. Yesterday, I noticed that initramfs generation was hanging. Today I investigated further and found out that what was hanging were the calls to /libx32/ld-linux-x32.so.2. This is triggered in initramfs generation because there are at some hooks that incorrectly use copy_exec to copy shell scripts into the initramfs image. In a working machine, when ldd encounters a shell script, it will first call the 64bit linker and since it fails, it will then call the 32bit linker which will also fail. However, in a machine affected by this bug, the second call will hang forever, preventing new image generation, and package updates in general, when this happens as a trigger for update-initramfs. Originally I thought this was related to the kernel version, since I was unable to reproduce in a freshly installed machine running -22 and was reproducing it in a machine running -20, but now I'm also reproducing it in a machine running -22, so it must be something else. I'm sorry I can't provide the exact cause right now, but I think it's worth noting that in some situation there might be a problem, and try to find out which those situations are. I now have one host running 3.13.0-22-generic, with libc6-x32=2.19-0ubuntu3, where doing ldd /usr/bin/ldd hangs, and another host, with the exact same kernel and libc6-x32 version where doing ldd /usr/bin/ldd produces the expected error message (not a dynamic executable). The main difference is that the first one was installed yesterday and the second one was installed today. Both are dist-upgraded to the latest version of everything. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1302605] Re: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
Sadly we need a second patch, after which it runs stable in my testing. I'm not into the intrinsic details of x32, but apparently the syscalls come in through both the 64bit and 32bit paths, which I find a bit weird. (At least my first patch made it occur significantly less often.) Patch attached this time. IS_IA32 is defined like this: #elif defined CONFIG_IA32_EMULATION # define IS_IA32is_compat_task() process_64.c says this about is_compat_task(): /* is_compat_task() uses the presence of the x32 syscall bit flag to determine compat status */ And indeed: static inline bool is_compat_task(void) { return is_ia32_task() || is_x32_task(); } ** Patch added: ptrace.diff https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+attachment/4120171/+files/ptrace.diff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1302605 Title: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: New Bug description: I'm running trusty on a bunch of machines, doing frequent dist- upgrades. My hosts have gcc-multilib installed. Yesterday, I noticed that initramfs generation was hanging. Today I investigated further and found out that what was hanging were the calls to /libx32/ld-linux-x32.so.2. This is triggered in initramfs generation because there are at some hooks that incorrectly use copy_exec to copy shell scripts into the initramfs image. In a working machine, when ldd encounters a shell script, it will first call the 64bit linker and since it fails, it will then call the 32bit linker which will also fail. However, in a machine affected by this bug, the second call will hang forever, preventing new image generation, and package updates in general, when this happens as a trigger for update-initramfs. Originally I thought this was related to the kernel version, since I was unable to reproduce in a freshly installed machine running -22 and was reproducing it in a machine running -20, but now I'm also reproducing it in a machine running -22, so it must be something else. I'm sorry I can't provide the exact cause right now, but I think it's worth noting that in some situation there might be a problem, and try to find out which those situations are. I now have one host running 3.13.0-22-generic, with libc6-x32=2.19-0ubuntu3, where doing ldd /usr/bin/ldd hangs, and another host, with the exact same kernel and libc6-x32 version where doing ldd /usr/bin/ldd produces the expected error message (not a dynamic executable). The main difference is that the first one was installed yesterday and the second one was installed today. Both are dist-upgraded to the latest version of everything. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1221995] Re: Bluetooth Dongle (Cambridge Silicon Radio, Ltd) doesnt work on ubuntu 13.10
** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1221995 Title: Bluetooth Dongle (Cambridge Silicon Radio, Ltd) doesnt work on ubuntu 13.10 Status in “linux” package in Ubuntu: Confirmed Bug description: Bluetooth device stopped working after upgrading ubuntu to 13.10. ~$ lsusb: Bus 001 Device 004: ID 0a12:0001 Cambridge Silicon Radio, Ltd Bluetooth Dongle (HCI mode) ~$ hciconfig hci0: Type: BR/EDR Bus: USB BD Address: 00:1B:10:00:0F:46 ACL MTU: 1017:8 SCO MTU: 64:0 DOWN RX bytes:457 acl:0 sco:0 events:16 errors:0 TX bytes:68 acl:0 sco:0 commands:16 errors:0 ~$ hcitool dev Devices: device simply doesnt appear on bluetooth manager. blueman UI is broken. ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: linux-image-3.11.0-4-generic 3.11.0-4.9 ProcVersionSignature: Ubuntu 3.11.0-4.9-generic 3.11.0-rc7 Uname: Linux 3.11.0-4-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.12.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: jorge 1954 F pulseaudio /dev/snd/controlC0: jorge 1954 F pulseaudio Date: Fri Sep 6 22:32:45 2013 HibernationDevice: RESUME=UUID=707ce71f-40a6-4fc3-b0a1-d24329b1c781 IwConfig: eth0 no wireless extensions. lono wireless extensions. MachineType: MEGAWARE MW-H61M-2H MarkForUpload: True ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-4-generic root=UUID=3480d68a-ee68-452e-b349-a2398ce3da52 ro quiet splash RelatedPackageVersions: linux-restricted-modules-3.11.0-4-generic N/A linux-backports-modules-3.11.0-4-generic N/A linux-firmware1.113 RfKill: 0: hci0: Bluetooth Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: Upgraded to saucy on 2013-08-23 (15 days ago) dmi.bios.date: 08/28/2012 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: F5 MW dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: MW-H61M-2H dmi.board.vendor: MEGAWARE dmi.board.version: v1.3 - 17/07/2012 - MWX dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: MEGAWARE dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrF5MW:bd08/28/2012:svnMEGAWARE:pnMW-H61M-2H:pvrv1.3-17/07/2012-MWX:rvnMEGAWARE:rnMW-H61M-2H:rvrv1.3-17/07/2012-MWX:cvnMEGAWARE:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: MW-H61M-2H dmi.product.version: v1.3 - 17/07/2012 - MWX dmi.sys.vendor: MEGAWARE To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1221995/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1259570] Re: kexec should get a disabling sysctl
Trying to kexec with the sysctl enabled correctly gives kexec_load failed: Operation not permitted. Re-enabling it does not work, as expected. With the sysctl untouched kexec works just fine. ** Tags removed: verification-needed-saucy ** Tags added: verification-done-saucy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1259570 Title: kexec should get a disabling sysctl Status in “linux” package in Ubuntu: Fix Released Status in “linux-lts-saucy” package in Ubuntu: Invalid Status in “linux” source package in Precise: Won't Fix Status in “linux-lts-saucy” source package in Precise: Fix Committed Status in “linux” source package in Quantal: Won't Fix Status in “linux-lts-saucy” source package in Quantal: Invalid Status in “linux” source package in Raring: Invalid Status in “linux-lts-saucy” source package in Raring: Invalid Status in “linux” source package in Saucy: Fix Committed Status in “linux-lts-saucy” source package in Saucy: Invalid Status in “linux” source package in Trusty: Fix Released Status in “linux-lts-saucy” source package in Trusty: Invalid Bug description: To enable kexec makes sense for a generic distro kernel. But if your users have root in their virtual machines, and you want to make it hard for them to run code in ring 0, you commonly disable further module loading and you also want to disable kexec[1]. Kees Cook wrote up a patch[2] that we'd like to see applied to the Ubuntu kernel to avoid recompilation of the distro kernel. I'm marking this as a security issue on the ground that it's quite surprising that setting kernel.modules_disabled=1 as a hardening feature can be subverted by using kexec. [1] http://mjg59.dreamwidth.org/28746.html [2] https://lkml.org/lkml/2013/12/9/765 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1259570/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1244627] Re: Please enable CONFIG_IMA in the ubuntu kernel
Also I want to make the point, even if it can possibly be discarded quickly, that the saucy stack is, to my knowledge, not supported yet on precise. So changes in there could be held to a different standard than in saucy proper. But I sort of understand if you avoid divergence between saucy's kernel and its backported version. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1244627 Title: Please enable CONFIG_IMA in the ubuntu kernel Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Saucy: Opinion Status in “linux” source package in Trusty: Fix Released Bug description: I would be doubly happy if this also went into the raring backport kernel. I chatted with apw and kees on #ubuntu-kernel earlier in the week. From a security engineer on our team: so I was mistaken. if CONFIG_IMA=y, the default policy is NULL unless you boot with ima_tcb=on. without ima_tcb=y, nothing is measured, nothing is audited, no performance/memory hit is incurred. Same is true for CONFIG_IMA_APPRAISE, except with the ima_appraise_tcb=on commandline parameter. ima appraise gives us the ability to sign binaries at installation time and check the signature at runtime. So we are asking that you enable CONFIG_IMA, but to not enable it via the kernel command line options. IMA would boot with an empty policy and should incur no overhead. Enterprising folks who want to run IMA can enable it in grub at their option. CONFIG_IMA=y and possibly: CONFIG_IMA_MEASURE_PCR_IDX=10 CONFIG_IMA_AUDIT=y CONFIG_IMA_LSM_RULES=y -A To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1244627/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1244627] Re: Please enable CONFIG_IMA in the ubuntu kernel
Oh ok. I was under the impression that it was only supported from 12.04.4, to be released in a week or two. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1244627 Title: Please enable CONFIG_IMA in the ubuntu kernel Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Saucy: Opinion Status in “linux” source package in Trusty: Fix Released Bug description: I would be doubly happy if this also went into the raring backport kernel. I chatted with apw and kees on #ubuntu-kernel earlier in the week. From a security engineer on our team: so I was mistaken. if CONFIG_IMA=y, the default policy is NULL unless you boot with ima_tcb=on. without ima_tcb=y, nothing is measured, nothing is audited, no performance/memory hit is incurred. Same is true for CONFIG_IMA_APPRAISE, except with the ima_appraise_tcb=on commandline parameter. ima appraise gives us the ability to sign binaries at installation time and check the signature at runtime. So we are asking that you enable CONFIG_IMA, but to not enable it via the kernel command line options. IMA would boot with an empty policy and should incur no overhead. Enterprising folks who want to run IMA can enable it in grub at their option. CONFIG_IMA=y and possibly: CONFIG_IMA_MEASURE_PCR_IDX=10 CONFIG_IMA_AUDIT=y CONFIG_IMA_LSM_RULES=y -A To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1244627/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1244627] Re: Please enable CONFIG_IMA in the ubuntu kernel
Could this be enabled in the saucy LTS backport kernel in precise as well, please? It will take a while until the trusty kernel becomes available there and this blocks our switch to the saucy kernel. Thanks! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1244627 Title: Please enable CONFIG_IMA in the ubuntu kernel Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Saucy: Triaged Status in “linux” source package in Trusty: Fix Released Bug description: I would be doubly happy if this also went into the raring backport kernel. I chatted with apw and kees on #ubuntu-kernel earlier in the week. From a security engineer on our team: so I was mistaken. if CONFIG_IMA=y, the default policy is NULL unless you boot with ima_tcb=on. without ima_tcb=y, nothing is measured, nothing is audited, no performance/memory hit is incurred. Same is true for CONFIG_IMA_APPRAISE, except with the ima_appraise_tcb=on commandline parameter. ima appraise gives us the ability to sign binaries at installation time and check the signature at runtime. So we are asking that you enable CONFIG_IMA, but to not enable it via the kernel command line options. IMA would boot with an empty policy and should incur no overhead. Enterprising folks who want to run IMA can enable it in grub at their option. CONFIG_IMA=y and possibly: CONFIG_IMA_MEASURE_PCR_IDX=10 CONFIG_IMA_AUDIT=y CONFIG_IMA_LSM_RULES=y -A To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1244627/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1259570] [NEW] kexec should get a disabling sysctl
*** This bug is a security vulnerability *** Public security bug reported: To enable kexec makes sense for a generic distro kernel. But if your users have root and you want to make it hard for them to run code in ring 0, you commonly disable further module loading and you also want to disable kexec[1]. Kees Cook wrote up a patch[2] that we'd like to see applied to the Ubuntu kernel to avoid recompilation of the distro kernel. I'm marking this as a security issue on the ground that it's quite surprising that setting kernel.modules_disabled=1 as a hardening feature can be subverted by using kexec. [1] http://mjg59.dreamwidth.org/28746.html [2] https://lkml.org/lkml/2013/12/9/765 ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1259570 Title: kexec should get a disabling sysctl Status in “linux” package in Ubuntu: Incomplete Bug description: To enable kexec makes sense for a generic distro kernel. But if your users have root and you want to make it hard for them to run code in ring 0, you commonly disable further module loading and you also want to disable kexec[1]. Kees Cook wrote up a patch[2] that we'd like to see applied to the Ubuntu kernel to avoid recompilation of the distro kernel. I'm marking this as a security issue on the ground that it's quite surprising that setting kernel.modules_disabled=1 as a hardening feature can be subverted by using kexec. [1] http://mjg59.dreamwidth.org/28746.html [2] https://lkml.org/lkml/2013/12/9/765 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1259570/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp