[Kernel-packages] [Bug 1788321] Re: swapon failed: invalid argument

2018-09-03 Thread Roman Fiedler
This is the failing "swapon" sequence from updated Xenial i386 on vmware: 3915 open("/dev/sda2", O_RDONLY|O_LARGEFILE) = 3 3915 uname({sysname="Linux", nodename="v3ls1717", ...}) = 0 3915 ioctl(3, BLKGETSIZE64, [535822336]) = 0 3915 read(3, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\

[Kernel-packages] [Bug 1788321] Re: swapon failed: invalid argument

2018-09-17 Thread Roman Fiedler
On Xenial, update to "linux-image-4.4.0-135-generic 4.4.0-135.161" did not fix the problem, but I noticed a message, that might be related to the issue: [3.083083] Truncating oversized swap area, only using 0k out of 261116k -- You received this bug notification because you are a member of K

[Kernel-packages] [Bug 1788321] Re: swapon failed: invalid argument

2018-09-17 Thread Roman Fiedler
Maybe this is the fix: x86/speculation/l1tf: fix overflow on l1tf_pfn_limit() on 32bit https://lkml.org/lkml/2018/8/20/222 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1788321 Title: s

[Kernel-packages] [Bug 1508737] Re: unix domain socket bind causes kernel audit NULL pointer deference

2016-05-11 Thread Roman Fiedler
Rediscovered also on our systems, then found this bug report. Reproducer for Ubuntu Trusty LTS: auditctl -a always,exit -F arch=b64 -S bind #!/usr/bin/python2 -BEsSt import socket testSocket=socket.socket(socket.AF_UNIX, socket.SOCK_STREAM) testSocket.bind('sock') # dmesg -c [ 145.499064] BUG:

[Kernel-packages] [Bug 1508737] Re: unix domain socket bind causes kernel audit NULL pointer deference

2016-05-11 Thread Roman Fiedler
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1508737 Title: unix domain socket bind causes kernel audit NULL pointer deferenc

[Kernel-packages] [Bug 1508737] Re: unix domain socket bind causes kernel audit NULL pointer deference

2016-05-30 Thread Roman Fiedler
Re-reported via apport/ubuntu-bug, see https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1586997 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1508737 Title: unix domain socket bind

[Kernel-packages] [Bug 1158500] Re: auditd fails to add rules when used in precise with -lts-quantal kernel

2014-07-14 Thread Roman Fiedler
Just noticed, that [1] is most likely a duplicate of this. [1] https://bugs.launchpad.net/ubuntu/+source/audit/+bug/1317188 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1158500 Title:

[Kernel-packages] [Bug 1451360] [NEW] Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

2015-05-04 Thread Roman Fiedler
Public bug reported: After update, desktop and production machines, both using i386 and amd64 kernels fail. The crash may only occur after loading of syscall audit rules, hence boot up to initrd is still possible. Login is still possible but many integral functions fail, e.g. sending signals to

[Kernel-packages] [Bug 1451360] Re: Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

2015-05-04 Thread Roman Fiedler
Isn't apport for reporting of application crashes? Apart from that sudo fails also to get privileges to access logs. Network, X and many other command line utilities also failing, so I'm not sure how apport could succeed. Also syslog is crashed, the dmesg log was created manually since dmesg and

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0

2015-05-04 Thread Roman Fiedler
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360 is marked as duplicate. The fix from here changes the behaviour of the duplicate (SSH login now working again, but still kernel OOPS). So if both have common cause (very likely), then 3.13.0-52.85 is only incomplete fix. -- You receive

[Kernel-packages] [Bug 1451360] Re: Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

2015-05-04 Thread Roman Fiedler
*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442 The fix from 3.13.0-52.85 changes behavior (now SSH login working also after first OOPS) but fix might be incomplete or there are two very similar bugs. New trace when using proposed: [ 31.077681] BUG: u

[Kernel-packages] [Bug 1451360] Re: Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

2015-05-04 Thread Roman Fiedler
*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442 Sorry, was too fast. The patch works with some audit rulesets, but not all. And here is also the new OOPS for amd64: [ 424.803949] BUG: unable to handle kernel NULL pointer dereference at 003