[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-07-28 Thread Po-Hsu Lin
** Changed in: ubuntu-kernel-tests
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-07-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-42.46

---
linux (5.4.0-42.46) focal; urgency=medium

  * focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069)

  * linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668)
- SAUCE: Revert "netprio_cgroup: Fix unlimited memory leak of v2 cgroups"

linux (5.4.0-41.45) focal; urgency=medium

  * focal/linux: 5.4.0-41.45 -proposed tracker (LP: #1885855)

  * Packaging resync (LP: #1786013)
- update dkms package versions

  * CVE-2019-19642
- kernel/relay.c: handle alloc_percpu returning NULL in relay_open

  * CVE-2019-16089
- SAUCE: nbd_genl_status: null check for nla_nest_start

  * CVE-2020-11935
- aufs: do not call i_readcount_inc()

  * ip_defrag.sh in net from ubuntu_kernel_selftests failed with 5.0 / 5.3 / 5.4
kernel (LP: #1826848)
- selftests: net: ip_defrag: ignore EPERM

  * Update lockdown patches (LP: #1884159)
- SAUCE: acpi: disallow loading configfs acpi tables when locked down

  * seccomp_bpf fails on powerpc (LP: #1885757)
- SAUCE: selftests/seccomp: fix ptrace tests on powerpc

  * Introduce the new NVIDIA 418-server and 440-server series, and update the
current NVIDIA drivers (LP: #1881137)
- [packaging] add signed modules for the 418-server and the 440-server
  flavours

 -- Khalid Elmously   Thu, 09 Jul 2020
19:50:26 -0400

** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-16089

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-19642

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-11935

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-20 Thread Colin Ian King
That's an unfortunate typo

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-20 Thread Florian W.
It's too late now, but there's a typo in the changelog: "shitfs".

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.3.0-53.47

---
linux (5.3.0-53.47) eoan; urgency=medium

  * eoan/linux: 5.3.0-53.47 -proposed tracker (LP: #1877257)

  * Intermittent display blackouts on event (LP: #1875254)
- drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only

  * Unable to handle kernel pointer dereference in virtual kernel address space
on Eoan (LP: #1876645)
- SAUCE: overlayfs: fix shitfs special-casing

linux (5.3.0-52.46) eoan; urgency=medium

  * eoan/linux: 5.3.0-52.46 -proposed tracker (LP: #1874752)

  * alsa: make the dmic detection align to the mainline kernel-5.6
(LP: #1871284)
- ALSA: hda: add Intel DSP configuration / probe code
- ALSA: hda: fix intel DSP config
- ALSA: hda: Allow non-Intel device probe gracefully
- ALSA: hda: More constifications
- ALSA: hda: Rename back to dmic_detect option
- [Config] SND_INTEL_DSP_CONFIG=m
- [packaging] Remove snd-intel-nhlt from modules

  * built-using constraints preventing uploads (LP: #1875601)
- temporarily drop Built-Using data

  * ubuntu/focal64 fails to mount Vagrant shared folders  (LP: #1873506)
- [Packaging] Move virtualbox modules to linux-modules
- [Packaging] Remove vbox and zfs modules from generic.inclusion-list

  * linux-image-5.0.0-35-generic breaks checkpointing of container
(LP: #1857257)
- SAUCE: overlayfs: use shiftfs hacks only with shiftfs as underlay

  * shiftfs: broken shiftfs nesting (LP: #1872094)
- SAUCE: shiftfs: record correct creator credentials

  * Add debian/rules targets to compile/run kernel selftests (LP: #1874286)
- [Packaging] add support to compile/run selftests

  * shiftfs: O_TMPFILE reports ESTALE (LP: #1872757)
- SAUCE: shiftfs: fix dentry revalidation

  * getitimer returns it_value=0 erroneously (LP: #1349028)
- [Config] CONTEXT_TRACKING_FORCE policy should be unset

  * 5.3.0-46-generic - i915 - frequent GPU hangs  / resets rcs0 (LP: #1872001)
- drm/i915/execlists: Preempt-to-busy
- drm/i915/gt: Detect if we miss WaIdleLiteRestore
- drm/i915/execlists: Always force a context reload when rewinding RING_TAIL

  * alsa/sof: external mic can't be deteced on Lenovo and HP laptops
(LP: #1872569)
- SAUCE: ASoC: intel/skl/hda - set autosuspend timeout for hda codecs

  * Eoan update: upstream stable patchset 2020-04-22 (LP: #1874325)
- ARM: dts: sun8i-a83t-tbs-a711: HM5065 doesn't like such a high voltage
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads
- net: vxge: fix wrong __VA_ARGS__ usage
- hinic: fix a bug of waitting for IO stopped
- hinic: fix wrong para of wait_for_completion_timeout
- cxgb4/ptp: pass the sign of offset delta in FW CMD
- qlcnic: Fix bad kzalloc null test
- i2c: st: fix missing struct parameter description
- cpufreq: imx6q: Fixes unwanted cpu overclocking on i.MX6ULL
- media: venus: hfi_parser: Ignore HEVC encoding for V1
- firmware: arm_sdei: fix double-lock on hibernate with shared events
- null_blk: Fix the null_add_dev() error path
- null_blk: Handle null_add_dev() failures properly
- null_blk: fix spurious IO errors after failed past-wp access
- xhci: bail out early if driver can't accress host in resume
- x86: Don't let pgprot_modify() change the page encryption bit
- block: keep bdi->io_pages in sync with max_sectors_kb for stacked devices
- irqchip/versatile-fpga: Handle chained IRQs properly
- sched: Avoid scale real weight down to zero
- selftests/x86/ptrace_syscall_32: Fix no-vDSO segfault
- PCI/switchtec: Fix init_completion race condition with poll_wait()
- media: i2c: video-i2c: fix build errors due to 'imply hwmon'
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts()
- pstore/platform: fix potential mem leak if pstore_init_fs failed
- gfs2: Don't demote a glock until its revokes are written
- x86/boot: Use unsigned comparison for addresses
- efi/x86: Ignore the memory attributes table on i386
- genirq/irqdomain: Check pointer in irq_domain_alloc_irqs_hierarchy()
- block: Fix use-after-free issue accessing struct io_cq
- media: i2c: ov5695: Fix power on and off sequences
- usb: dwc3: core: add support for disabling SS instances in park mode
- irqchip/gic-v4: Provide irq_retrigger to avoid circular locking dependency
- md: check arrays is suspended in mddev_detach before call quiesce 
operations
- firmware: fix a double abort case with fw_load_sysfs_fallback
- locking/lockdep: Avoid recursion in lockdep_count_{for,back}ward_deps()
- block, bfq: fix use-after-free in bfq_idle_slice_timer_body
- btrfs: qgroup: ensure qgroup_rescan_running is only set when the worker is
  at least queued
- btrfs: remove a BUG_ON() from merge_reloc_roots()
- btrfs: track reloc roots based on their commit root bytenr
- ASoC: fix regwmask
- ASoC: dapm: connect 

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-31.35

---
linux (5.4.0-31.35) focal; urgency=medium

  * focal/linux: 5.4.0-31.35 -proposed tracker (LP: #1877253)

  * Intermittent display blackouts on event (LP: #1875254)
- drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only

  * Unable to handle kernel pointer dereference in virtual kernel address space
on Eoan (LP: #1876645)
- SAUCE: overlayfs: fix shitfs special-casing

linux (5.4.0-30.34) focal; urgency=medium

  * focal/linux: 5.4.0-30.34 -proposed tracker (LP: #1875385)

  * ubuntu/focal64 fails to mount Vagrant shared folders  (LP: #1873506)
- [Packaging] Move virtualbox modules to linux-modules
- [Packaging] Remove vbox and zfs modules from generic.inclusion-list

  * linux-image-5.0.0-35-generic breaks checkpointing of container
(LP: #1857257)
- SAUCE: overlayfs: use shiftfs hacks only with shiftfs as underlay

  * shiftfs: broken shiftfs nesting (LP: #1872094)
- SAUCE: shiftfs: record correct creator credentials

  * Add debian/rules targets to compile/run kernel selftests (LP: #1874286)
- [Packaging] add support to compile/run selftests

  * shiftfs: O_TMPFILE reports ESTALE (LP: #1872757)
- SAUCE: shiftfs: fix dentry revalidation

  * LIO hanging in iscsit_free_session and iscsit_stop_session (LP: #1871688)
- scsi: target: iscsi: calling iscsit_stop_session() inside
  iscsit_close_session() has no effect

  * [ICL] TC port in legacy/static mode can't be detected due TCCOLD
(LP: #1868936)
- SAUCE: drm/i915: Align power domain names with port names
- SAUCE: drm/i915/display: Move out code to return the digital_port of the 
aux
  ch
- SAUCE: drm/i915/display: Add intel_legacy_aux_to_power_domain()
- SAUCE: drm/i915/display: Split hsw_power_well_enable() into two
- SAUCE: drm/i915/tc/icl: Implement TC cold sequences
- SAUCE: drm/i915/tc: Skip ref held check for TC legacy aux power wells
- SAUCE: drm/i915/tc/tgl: Implement TC cold sequences
- SAUCE: drm/i915/tc: Catch TC users accessing FIA registers without enable
  aux
- SAUCE: drm/i915/tc: Do not warn when aux power well of static TC ports
  timeout

  * alsa/sof: external mic can't be deteced on Lenovo and HP laptops
(LP: #1872569)
- SAUCE: ASoC: intel/skl/hda - set autosuspend timeout for hda codecs

  * amdgpu kernel errors in Linux 5.4 (LP: #1871248)
- drm/amd/display: Stop if retimer is not available

  * Focal update: v5.4.34 upstream stable release (LP: #1874111)
- amd-xgbe: Use __napi_schedule() in BH context
- hsr: check protocol version in hsr_newlink()
- l2tp: Allow management of tunnels and session in user namespace
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin
- net: ipv6: do not consider routes via gateways for anycast address check
- net: phy: micrel: use genphy_read_status for KSZ9131
- net: qrtr: send msgs from local of same id as broadcast
- net: revert default NAPI poll timeout to 2 jiffies
- net: tun: record RX queue in skb before do_xdp_generic()
- net: dsa: mt7530: move mt7623 settings out off the mt7530
- net: ethernet: mediatek: move mt7623 settings out off the mt7530
- net/mlx5: Fix frequent ioread PCI access during recovery
- net/mlx5e: Add missing release firmware call
- net/mlx5e: Fix nest_level for vlan pop action
- net/mlx5e: Fix pfnum in devlink port attribute
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes
- ovl: fix value of i_ino for lower hardlink corner case
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic
- platform/chrome: cros_ec_rpmsg: Fix race with host event
- jbd2: improve comments about freeing data buffers whose page mapping is 
NULL
- acpi/nfit: improve bounds checking for 'func'
- perf report: Fix no branch type statistics report issue
- pwm: pca9685: Fix PWM/GPIO inter-operation
- ext4: fix incorrect group count in ext4_fill_super error message
- ext4: fix incorrect inodes per group in error message
- clk: at91: sam9x60: fix usb clock parents
- clk: at91: usb: use proper usbs_mask
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin
- arm64: dts: librem5-devkit: add a vbus supply to usb0
- usb: dwc3: gadget: Don't clear flags before transfer ended
- ASoC: Intel: mrfld: fix incorrect check on p->sink
- ASoC: Intel: mrfld: return error codes when an error occurs
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT
- ALSA: usb-audio: Filter error from connector kctl ops, too
- ALSA: usb-audio: Don't override ignore_ctl_error value from the map
- ALSA: usb-audio: Don't create jack controls for PCM terminals
- ALSA: usb-audio: Check mapping at creating connector controls, too
- arm64: vdso: don't free unallocated pages
- keys: Fix 

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-13 Thread Kleber Sacilotto de Souza
Overlayfs related tests completed successfully with eoan kernel in -proposed 
(5.3.0-53.47):
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-eoan/eoan/amd64/l/linux/20200508_151853_8b200@/log.gz

- ubuntu_unionmount_ovlfs.overlayfs
- ubuntu_overlayfs_smoke_test.overlayfs-smoke-test

** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-13 Thread Kleber Sacilotto de Souza
Overlayfs related tests completed successfully with focal kernel in -proposed 
(5.4.0-31.35):
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/amd64/l/linux/20200508_160250_2f8e2@/log.gz

- ubuntu_unionmount_ovlfs.overlayfs
- ubuntu_overlayfs_smoke_test.overlayfs-smoke-test

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-08 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

** Tags added: verification-needed-eoan

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-08 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
eoan' to 'verification-done-eoan'. If the problem still exists, change
the tag 'verification-needed-eoan' to 'verification-failed-eoan'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Khaled El Mously
** Changed in: linux (Ubuntu Eoan)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Christian Brauner
On Wed, May 06, 2020 at 10:32:19AM -, Kleber Sacilotto de Souza wrote:
> With the fixup patch applied, I could not reproduce the issue anymore on
> both Eoan and Focal running ubuntu_fan_smoke_test and
> ubuntu_docker_smoke_test.

Sweet, thank you and sorry for the rebase mess-up with Andrei's patch.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Kleber Sacilotto de Souza
With the fixup patch applied, I could not reproduce the issue anymore on
both Eoan and Focal running ubuntu_fan_smoke_test and
ubuntu_docker_smoke_test.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Christian Brauner
** Changed in: linux (Ubuntu)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Eoan)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Christian Brauner (cbrauner)

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Christian Brauner (cbrauner)

** Changed in: linux (Ubuntu Focal)
 Assignee: (unassigned) => Christian Brauner (cbrauner)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Po-Hsu Lin
I can reproduce this issue on Focal (5.4.0-30-generic) AMD64 KVM as well
with the ubuntu_docker_smoke_test:

 4331.987024] general protection fault:  [#1] SMP PTI
[ 4331.989188] CPU: 0 PID: 34912 Comm: dockerd Not tainted 5.4.0-30-generic 
#34-Ubuntu
[ 4331.992158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
[ 4331.995189] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay]
[ 4331.997100] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 
49 8b 7e 28 41 81 cd 00 00 04 04 e8 9d d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 
68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04
[ 4332.003304] RSP: 0018:b10b00b33c08 EFLAGS: 00010202
[ 4332.004841] RAX: 5ebabec054698800 RBX: 8ed6b776a770 RCX: 0001
[ 4332.006838] RDX: 8ed6b774bf00 RSI: 8ed6b776a770 RDI: 8ed6affea3c0
[ 4332.008842] RBP: b10b00b33c50 R08: 8ed6afc79600 R09: 
[ 4332.010862] R10: 8ed6b774bf00 R11:  R12: 8ed6b0a06c00
[ 4332.013003] R13: 04048001 R14: 8ed6b75b6b20 R15: 8ed6afc79600
[ 4332.015049] FS:  7f3a38941700() GS:8ed6bba0() 
knlGS:
[ 4332.017326] CS:  0010 DS:  ES:  CR0: 80050033
[ 4332.019058] CR2: 56296e62b358 CR3: 000130f94000 CR4: 06f0
[ 4332.021028] DR0:  DR1:  DR2: 
[ 4332.023134] DR3:  DR6: fffe0ff0 DR7: 0400
[ 4332.025142] Call Trace:
[ 4332.025885]  ? ovl_llseek+0x120/0x120 [overlay]
[ 4332.027239]  ovl_open+0x57/0x90 [overlay]
[ 4332.028391]  do_dentry_open+0x143/0x3a0
[ 4332.029490]  vfs_open+0x2d/0x30
[ 4332.030422]  do_last+0x194/0x900
[ 4332.031407]  path_openat+0x8d/0x290
[ 4332.033084]  ? __switch_to_asm+0x40/0x70
[ 4332.035151]  ? __switch_to_asm+0x34/0x70
[ 4332.037142]  do_filp_open+0x91/0x100
[ 4332.039032]  ? __alloc_fd+0x46/0x150
[ 4332.040860]  do_sys_open+0x17e/0x290
[ 4332.042954]  __x64_sys_openat+0x20/0x30
[ 4332.044980]  do_syscall_64+0x57/0x190
[ 4332.047058]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Po-Hsu Lin
** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Christian Brauner
Fix here:
https://lists.ubuntu.com/archives/kernel-team/2020-May/109617.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-06 Thread Kleber Sacilotto de Souza
That patch was submitted as a fix for bug 1857257, which was applied for
Focal as well. Therefore this bug might affect Focal too, we are waiting
for some test results to confirm it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-05 Thread Khaled El Mously
This commit looks highly suspicious:

"UBUNTU: SAUCE: overlayfs: use shiftfs hacks only with shiftfs as
underlay"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-05 Thread Kleber Sacilotto de Souza
** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Eoan)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-04 Thread Po-Hsu Lin
** Tags added: regression-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-04 Thread Po-Hsu Lin
You can triggered a general protection fault by running the
ubuntu_docker_smoke_test, the test passed with older Eoan kernel in
-updates, but failed with this one in proposed.


[  101.715152] general protection fault:  [#1] SMP PTI
[  101.717403] CPU: 1 PID: 1236 Comm: dockerd Not tainted 5.3.0-52-generic 
#46-Ubuntu
[  101.720424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
[  101.723856] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay]
[  101.725826] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 
49 8b 7e 28 41 81 cd 00 00 04 04 e8 cd d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 
68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04
[  101.731311] RSP: 0018:aa28406afc08 EFLAGS: 00010202
[  101.732773] RAX: 044555892ac42800 RBX: 9af67a149ea8 RCX: 0001
[  101.734759] RDX: 8000 RSI: 9af67a149ea8 RDI: 9af67b3d9000
[  101.736866] RBP: aa28406afc50 R08: 9af67b031240 R09: 
[  101.738854] R10: 9af67a7d6900 R11:  R12: 9af6799a1d00
[  101.740883] R13: 04048001 R14: 9af67a1a4818 R15: 9af67b031240
[  101.742902] FS:  7f58a57fa700() GS:9af67db0() 
knlGS:
[  101.745194] CS:  0010 DS:  ES:  CR0: 80050033
[  101.746798] CR2: 01178b78 CR3: 7b06 CR4: 06e0
[  101.748817] DR0:  DR1:  DR2: 
[  101.750798] DR3:  DR6: fffe0ff0 DR7: 0400
[  101.752804] Call Trace:
[  101.753502]  ? ovl_llseek+0x120/0x120 [overlay]
[  101.754770]  ovl_open+0x57/0x90 [overlay]
[  101.755951]  do_dentry_open+0x143/0x3a0
[  101.757013]  vfs_open+0x2d/0x30
[  101.757949]  do_last+0x194/0x8f0
[  101.758843]  path_openat+0x8d/0x270
[  101.759908]  ? __switch_to_asm+0x40/0x70
[  101.760984]  ? __switch_to_asm+0x34/0x70
[  101.762099]  do_filp_open+0x91/0x100
[  101.763088]  ? __alloc_fd+0x46/0x150
[  101.764171]  do_sys_open+0x17e/0x290
[  101.765168]  __x64_sys_openat+0x20/0x30
[  101.766297]  do_syscall_64+0x5a/0x130
[  101.767512]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  101.768932] RIP: 0033:0x56465af612ba
[  101.769922] Code: e8 8b 3d f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 
20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 
f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48
[  101.775167] RSP: 002b:00c0009567a0 EFLAGS: 0202 ORIG_RAX: 
0101
[  101.777440] RAX: ffda RBX: 00c5e500 RCX: 56465af612ba
[  101.779553] RDX: 00080241 RSI: 00c000814e00 RDI: ff9c
[  101.781538] RBP: 00c000956818 R08:  R09: 
[  101.783650] R10: 01a4 R11: 0202 R12: 
[  101.785789] R13: 0039 R14: 0038 R15: 0080
[  101.787887] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bpfilter 
br_netfilter bridge stp llc aufs overlay dm_multipath scsi_dh_rdac scsi_dh_emc 
scsi_dh_alua kvm_intel kvm irqbypass joydev input_leds serio_raw mac_hid 
qemu_fw_cfg sch_fq_codel ip_tables x_tables autofs4 btrfs zstd_compress raid10 
raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
libcrc32c raid1 raid0 multipath linear cirrus drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops drm virtio_net net_failover psmouse failover 
virtio_blk i2c_piix4 pata_acpi floppy
[  101.808815] ---[ end trace ef14f7485e54a2a6 ]---
[  101.811218] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay]
[  101.814009] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 
49 8b 7e 28 41 81 cd 00 00 04 04 e8 cd d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 
68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04
[  101.821593] RSP: 0018:aa28406afc08 EFLAGS: 00010202
[  101.823778] RAX: 044555892ac42800 RBX: 9af67a149ea8 RCX: 0001
[  101.826528] RDX: 8000 RSI: 9af67a149ea8 RDI: 9af67b3d9000
[  101.829350] RBP: aa28406afc50 R08: 9af67b031240 R09: 
[  101.831910] R10: 9af67a7d6900 R11:  R12: 9af6799a1d00
[  101.834825] R13: 04048001 R14: 9af67a1a4818 R15: 9af67b031240
[  101.837606] FS:  7f58a57fa700() GS:9af67db0() 
knlGS:
[  101.840678] CS:  0010 DS:  ES:  CR0: 80050033
[  101.842914] CR2: 01178b78 CR3: 7b06 CR4: 06e0
[  101.845479] DR0:  DR1:  DR2: 
[  101.848015] DR3:  DR6: fffe0ff0 DR7: 0400

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

[Bug 1876645] Re: Unable to handle kernel pointer dereference in virtual kernel address space on Eoan

2020-05-04 Thread Po-Hsu Lin
This issue can be found on E PowerPC as well, test will stop at the fan
smoke test as well.

[ 1316.676714] BUG: Unable to handle kernel data access at 0xd9d4a05293989f60
[ 1316.676743] Faulting instruction address: 0xc0080cd9b164
[ 1316.676755] Oops: Kernel access of bad area, sig: 11 [#1]
[ 1316.676777] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
[ 1316.676788] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bpfilter 
br_netfilter bridge stp llc aufs overlay unix_diag binfmt_misc kvm_hv kvm 
zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) 
userio snd_seq snd_seq_device snd_timer snd soundcore hci_vhci bluetooth 
ecdh_generic ecc vhost_vsock vmw_vsock_virtio_transport_common vsock uhid 
vhost_net vhost tap cuse dccp_ipv4 dccp atm algif_rng aegis128 aegis128l 
aegis256 morus1280 morus640 algif_aead anubis fcrypt khazad seed sm4_generic 
tea crc32_generic md4 michael_mic nhpoly1305 poly1305_generic rmd128 rmd160 
rmd256 rmd320 sha3_generic sm3_generic streebog_generic tgr192 wp512 
xxhash_generic algif_hash blowfish_generic blowfish_common cast5_generic 
des_generic salsa20_generic chacha_generic camellia_generic cast6_generic 
cast_common serpent_generic twofish_generic
[ 1316.676839]  twofish_common algif_skcipher af_alg dm_multipath scsi_dh_rdac 
scsi_dh_emc scsi_dh_alua joydev input_leds mac_hid ofpart cmdlinepart 
ipmi_powernv powernv_flash ipmi_devintf mtd ipmi_msghandler at24 
uio_pdrv_genirq opal_prd ibmpowernv uio vmx_crypto sch_fq_codel ip_tables 
x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid hid ses enclosure scsi_transport_sas ast 
drm_vram_helper i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect 
crct10dif_vpmsum sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid 
drm_panel_orientation_quirks
[ 1316.677182] CPU: 16 PID: 104008 Comm: dockerd Tainted: P   O  
5.3.0-52-generic #46-Ubuntu
[ 1316.677214] NIP:  c0080cd9b164 LR: c0080cd9b148 CTR: c0161290
[ 1316.677235] REGS: c00bbe603690 TRAP: 0380   Tainted: P   O   
(5.3.0-52-generic)
[ 1316.677256] MSR:  92009033   CR: 
28402884  XER: 
[ 1316.677291] CFAR: c0080cd96ad0 IRQMASK: 0 
   GPR00: c0080cd9b148 c00bbe603920 c0080cdbca00 
c00fecf26000 
   GPR04: 04050001 c0094cb4a910 0001 
 
   GPR08: c0095056e490 d9d4a05293989f00 6a656a62 
c0080cda73a8 
   GPR12: c0161290 c00ed000 00c00040b340 
0001 
   GPR16: 00c00040a000  004e 
0001 
   GPR20: 0200 04e2c41b29c0 0010 
41ed 
   GPR24:  0200  
c0095056e490 
   GPR28: c00fecf26000 c0095056e490 c009504f1628 
c0094cb4a900 
[ 1316.677485] NIP [c0080cd9b164] ovl_open_realfile+0x7c/0x1b0 [overlay]
[ 1316.677516] LR [c0080cd9b148] ovl_open_realfile+0x60/0x1b0 [overlay]
[ 1316.677535] Call Trace:
[ 1316.677552] [c00bbe603920] [c0080cd9b148] 
ovl_open_realfile+0x60/0x1b0 [overlay] (unreliable)
[ 1316.677586] [c00bbe6039e0] [c0080cd9c844] ovl_open+0x9c/0x110 
[overlay]
[ 1316.677619] [c00bbe603a20] [c0450a98] do_dentry_open+0x298/0x4d0
[ 1316.677650] [c00bbe603ab0] [c046fc70] do_last+0x1f0/0xb40
[ 1316.677680] [c00bbe603bb0] [c0470670] path_openat+0xb0/0x370
[ 1316.677709] [c00bbe603c70] [c0472470] do_filp_open+0x90/0x130
[ 1316.677730] [c00bbe603d90] [c0452f38] do_sys_open+0x268/0x410
[ 1316.677761] [c00bbe603e20] [c000b388] system_call+0x5c/0x70
[ 1316.677789] Instruction dump:
[ 1316.677805] 65290404 e87b0028 7d2407b4 f8810068 4bffb95d 6000 e9210080 
3d406a65 
[ 1316.677838] e8810068 614a6a62 7c7c1b78 e9290068  7c295000 418200d4 
e92d0968 
[ 1316.677873] ---[ end trace 25b0ddfe848d368f ]---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs