** Changed in: ubuntu-kernel-tests
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645
Title:
Unable to handle kernel pointer dereference in virtual kernel
This bug was fixed in the package linux - 5.4.0-42.46
---
linux (5.4.0-42.46) focal; urgency=medium
* focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069)
* linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668)
- SAUCE: Revert "netprio_cgroup: Fix
That's an unfortunate typo
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645
Title:
Unable to handle kernel pointer dereference in virtual kernel address
space on Eoan
To manage
It's too late now, but there's a typo in the changelog: "shitfs".
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645
Title:
Unable to handle kernel pointer dereference in virtual kernel address
This bug was fixed in the package linux - 5.3.0-53.47
---
linux (5.3.0-53.47) eoan; urgency=medium
* eoan/linux: 5.3.0-53.47 -proposed tracker (LP: #1877257)
* Intermittent display blackouts on event (LP: #1875254)
- drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK
This bug was fixed in the package linux - 5.4.0-31.35
---
linux (5.4.0-31.35) focal; urgency=medium
* focal/linux: 5.4.0-31.35 -proposed tracker (LP: #1877253)
* Intermittent display blackouts on event (LP: #1875254)
- drm/i915: Limit audio CDCLK>=2*BCLK constraint back to
Overlayfs related tests completed successfully with eoan kernel in -proposed
(5.3.0-53.47):
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-eoan/eoan/amd64/l/linux/20200508_151853_8b200@/log.gz
- ubuntu_unionmount_ovlfs.overlayfs
-
Overlayfs related tests completed successfully with focal kernel in -proposed
(5.4.0-31.35):
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/amd64/l/linux/20200508_160250_2f8e2@/log.gz
- ubuntu_unionmount_ovlfs.overlayfs
-
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
eoan' to 'verification-done-eoan'. If the problem still exists, change
the tag
** Changed in: linux (Ubuntu Eoan)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Focal)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
On Wed, May 06, 2020 at 10:32:19AM -, Kleber Sacilotto de Souza wrote:
> With the fixup patch applied, I could not reproduce the issue anymore on
> both Eoan and Focal running ubuntu_fan_smoke_test and
> ubuntu_docker_smoke_test.
Sweet, thank you and sorry for the rebase mess-up with Andrei's
With the fixup patch applied, I could not reproduce the issue anymore on
both Eoan and Focal running ubuntu_fan_smoke_test and
ubuntu_docker_smoke_test.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Eoan)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner
I can reproduce this issue on Focal (5.4.0-30-generic) AMD64 KVM as well
with the ubuntu_docker_smoke_test:
4331.987024] general protection fault: [#1] SMP PTI
[ 4331.989188] CPU: 0 PID: 34912 Comm: dockerd Not tainted 5.4.0-30-generic
#34-Ubuntu
[ 4331.992158] Hardware name: QEMU Standard
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645
Title:
Unable to handle kernel pointer dereference in virtual
Fix here:
https://lists.ubuntu.com/archives/kernel-team/2020-May/109617.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645
Title:
Unable to handle kernel pointer dereference in virtual
That patch was submitted as a fix for bug 1857257, which was applied for
Focal as well. Therefore this bug might affect Focal too, we are waiting
for some test results to confirm it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This commit looks highly suspicious:
"UBUNTU: SAUCE: overlayfs: use shiftfs hacks only with shiftfs as
underlay"
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645
Title:
Unable to handle
** Also affects: linux (Ubuntu Eoan)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Eoan)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Tags added: regression-proposed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645
Title:
Unable to handle kernel pointer dereference in virtual kernel address
space on Eoan
To manage
You can triggered a general protection fault by running the
ubuntu_docker_smoke_test, the test passed with older Eoan kernel in
-updates, but failed with this one in proposed.
[ 101.715152] general protection fault: [#1] SMP PTI
[ 101.717403] CPU: 1 PID: 1236 Comm: dockerd Not tainted
This issue can be found on E PowerPC as well, test will stop at the fan
smoke test as well.
[ 1316.676714] BUG: Unable to handle kernel data access at 0xd9d4a05293989f60
[ 1316.676743] Faulting instruction address: 0xc0080cd9b164
[ 1316.676755] Oops: Kernel access of bad area, sig: 11 [#1]
[
23 matches
Mail list logo