[Bug 1970672] Re: makedumpfile falls back to cp with "__vtop4_x86_64: Can't get a valid pmd_pte."

2022-05-24 Thread Thadeu Lima de Souza Cascardo
Hi, Guilherme. I think you misunderstood and we are in agreement. What I mean by the first point is that, on Focal, we need to support 5.4 and 5.15. I don't even think we need to support 5.8 and 5.11 any longer, though 5.13, as it will still be supported for a while needs supporting. But I also

[Bug 1970672] Re: makedumpfile falls back to cp with "__vtop4_x86_64: Can't get a valid pmd_pte."

2022-05-23 Thread Thadeu Lima de Souza Cascardo
There are two risks with that plan that we should overcome. One is testing, such updates should not cause regressions. As of right now, the small testing that makedumpfile receives is not sufficient and gives a lot of false negatives. We should be testing that new kernels are still dumpable (and

[Bug 1972281] Re: ext4: limit length to bitmap_maxbytes

2022-05-21 Thread Thadeu Lima de Souza Cascardo
** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972281 Title: ext4: limit length to bitmap_maxbytes To manage

[Bug 1972740] Re: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

2022-05-21 Thread Thadeu Lima de Souza Cascardo
** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972740 Title: Unprivileged users may use PTRACE_SEIZE to set

[Bug 1972740] Re: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

2022-05-21 Thread Thadeu Lima de Souza Cascardo
** Tags removed: verification-needed-impish ** Tags added: verification-done-impish -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972740 Title: Unprivileged users may use PTRACE_SEIZE to set

[Bug 1972281] Re: ext4: limit length to bitmap_maxbytes

2022-05-21 Thread Thadeu Lima de Souza Cascardo
** Tags removed: verification-needed-impish ** Tags added: verification-done-impish -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972281 Title: ext4: limit length to bitmap_maxbytes To manage

[Bug 1972281] Re: ext4: limit length to bitmap_maxbytes

2022-05-20 Thread Thadeu Lima de Souza Cascardo
** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1972740] Re: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

2022-05-20 Thread Thadeu Lima de Souza Cascardo
** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1972740] Re: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

2022-05-09 Thread Thadeu Lima de Souza Cascardo
Ubuntu Impish) Status: New => In Progress ** Changed in: linux (Ubuntu Impish) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned)

[Bug 1972740] [NEW] Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

2022-05-09 Thread Thadeu Lima de Souza Cascardo
with seccomp. ** Affects: linux (Ubuntu) Importance: High Status: Fix Committed ** Affects: linux (Ubuntu Xenial) Importance: High Assignee: Thadeu Lima de Souza Cascardo (cascardo) Status: Triaged ** Affects: linux (Ubuntu Bionic) Importance: High

[Bug 1968340] Re: ip6gre driver does not hold device reference

2022-05-06 Thread Thadeu Lima de Souza Cascardo
Fails with the kernel in -updates, 4.15.0-176. Works with kernel in -proposed, 4.15.0-177. ubuntu@bionic:~$ uname -r 4.15.0-177-generic ubuntu@bionic:~$ sudo modprobe ip6_gre ubuntu@bionic:~$ unshare -Urn true ubuntu@bionic:~$ unshare -Urn true ubuntu@bionic:~$ unshare -Urn true ubuntu@bionic:~$

[Bug 1971480] [NEW] issuing invalid ioctl to /dev/vsock may spam dmesg

2022-05-03 Thread Thadeu Lima de Souza Cascardo
ay regress. ** Affects: linux (Ubuntu) Importance: Undecided Status: Fix Released ** Affects: linux (Ubuntu Xenial) Importance: Low Assignee: Thadeu Lima de Souza Cascardo (cascardo) Status: In Progress ** Affects: linux (Ubuntu Bionic) Importance: Low Assign

[Bug 1962315] Re: xenial upgrade of lockdown patches dropped ioport denial

2022-04-18 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Released ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of

[Bug 1968340] [NEW] ip6gre driver does not hold device reference

2022-04-08 Thread Thadeu Lima de Souza Cascardo
Importance: Medium Assignee: Thadeu Lima de Souza Cascardo (cascardo) Status: In Progress ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Bionic) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Bionic)

[Bug 1967579] Re: harden indirect calls against BHI attacks

2022-04-04 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: Incomplete ** Changed in: linux (Ubuntu Jammy) Status: Incomplete => In Progress ** Changed in: linux (Ubuntu Jammy) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in:

[Bug 1967579] [NEW] harden indirect calls against BHI attacks

2022-04-01 Thread Thadeu Lima de Souza Cascardo
*** This bug is a security vulnerability *** Public security bug reported: [Impact] Branch History Injection is made easier when all indirect calls are funneled through very few points where the retpolines were. By replacing the retpoline jumps by indirect calls whenever retpolines are

[Bug 1964636] Re: Incorrect handling of apparmor `bpf` capability

2022-03-12 Thread Thadeu Lima de Souza Cascardo
Does changing the sysctl kernel.unprivileged_bpf_disabled to 0 fix the issue? This has been recently changed in all kernels supporting ebpf to default to 2, even on those kernels that do not support CAP_BPF. Cascardo. -- You received this bug notification because you are a member of Ubuntu

[Bug 1961338] Re: Disable unprivileged BPF by default

2022-03-09 Thread Thadeu Lima de Souza Cascardo
** Information type changed from Private Security to Public Security ** Changed in: linux (Ubuntu Xenial) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1960059] Re: linux-4.4 scheduling while atomic on azure

2022-03-03 Thread Thadeu Lima de Souza Cascardo
80bfeeb9dd6b54ac108c884c792f0fc7d4912bee ("PCI: hv: Do not sleep in compose_msi_msg()") might fix this issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1960059 Title: linux-4.4 scheduling while

[Bug 1877533] Re: [20.10 FEAT] Increase the crashkernel setting if the root volume is luks2-encrypted

2022-02-24 Thread Thadeu Lima de Souza Cascardo
** Patch added: "fix for jammy" https://bugs.launchpad.net/ubuntu-z-systems/+bug/1877533/+attachment/5563543/+files/kdump-tools_1.6.10ubuntu1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1877533] Re: [20.10 FEAT] Increase the crashkernel setting if the root volume is luks2-encrypted

2022-02-24 Thread Thadeu Lima de Souza Cascardo
The build failed on jammy because of a new shellcheck warning, which was fixed in Debian already. See https://bugs.debian.org/cgi- bin/bugreport.cgi?bug=1002270. I have uploaded a merge to a PPA, where it built just fine. I am attaching the debdiff for that. Cascardo. ** Bug watch added: Debian

[Bug 1960059] [NEW] linux-4.4 scheduling while atomic on azure

2022-02-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported: [ 11.338145] BUG: scheduling while atomic: systemd-udevd/891/0x0002 [ 11.343832] Modules linked in: edac_core mlx4_core(+) kvm_intel input_leds kvm irqbypass nf_conntrack_ipv4 serio_raw hv_balloon pci_hyperv i2c_piix4 nf_defrag_ipv4 8250_fintek xt_conntrack joydev

[Bug 1958386] [NEW] bpfilter umh restarts

2022-01-19 Thread Thadeu Lima de Souza Cascardo
Public bug reported: [Impact] When booting a system, lots of error messages regarding bpfilter are observed, like below. These indicate that the bpfilter user mode helper is exiting after reading the request message. [Test case] Boot a system and do not observe messages like "bpfilter: read

[Bug 1950666] Re: system crash when removing ipmi_msghandler module

2021-12-18 Thread Thadeu Lima de Souza Cascardo
https://lore.kernel.org/all/20211217154410.1228673-1-casca...@canonical.com/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1950666 Title: system crash when removing ipmi_msghandler module To

[Bug 1954904] [NEW] bpf pointer tainted kaslr leak

2021-12-15 Thread Thadeu Lima de Souza Cascardo
*** This bug is a security vulnerability *** Private security bug reported: [Impact] adjust_ptr_min_max_vals will allow a pointer arithmetic with any value, but set the register to a SCALAR, preventing further pointer operations, leading to a pointer leak, aka, KASLR leak. [Potential

[Bug 1954815] Re: Support newer kernels

2021-12-14 Thread Thadeu Lima de Souza Cascardo
This debdiff for focal is against the version in impish. Contrary to the previous version of the debdiff, this one builds fine on focal. The versioned dependency on debhelper was changed from >= 13 to >= 12, as debhelper 13 is not currently available on focal. Cascardo. ** Patch added: "Proper

[Bug 1954815] Re: Support newer kernels

2021-12-14 Thread Thadeu Lima de Souza Cascardo
Notice the debdiff is against the version in impish (-release). ** Patch added: "Fix for hirsute" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/1954815/+attachment/5547608/+files/crash_7.3.0-1ubuntu1~21.04.1.debdiff -- You received this bug notification because you are a member of

[Bug 1954815] Re: Support newer kernels

2021-12-14 Thread Thadeu Lima de Souza Cascardo
Notice the debdiff is against the version in impish (-release), which is also the current version in jammy. ** Patch added: "Fix for focal" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/1954815/+attachment/5547607/+files/crash_7.3.0-1ubuntu1~20.04.1.debdiff -- You received this bug

[Bug 1954815] Re: Support newer kernels

2021-12-14 Thread Thadeu Lima de Souza Cascardo
Now building on ppa:cascardo/kdump2 for testing. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954815 Title: Support newer kernels To manage notifications about this bug go to:

[Bug 1954815] [NEW] Support newer kernels

2021-12-14 Thread Thadeu Lima de Souza Cascardo
Lima de Souza Cascardo (cascardo) Status: In Progress ** Affects: crash (Ubuntu Hirsute) Importance: Medium Assignee: Thadeu Lima de Souza Cascardo (cascardo) Status: In Progress ** Affects: crash (Ubuntu Impish) Importance: Undecided Status: Fix Released

[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants

2021-12-08 Thread Thadeu Lima de Souza Cascardo
Status: New ** Changed in: linux (Ubuntu) Status: New => Invalid ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubun

[Bug 1953366] Re: spectre_v2 from ubuntu_kernel_selftests ADT test failure with 5.13/5.11 ppc64el

2021-12-07 Thread Thadeu Lima de Souza Cascardo
https://lore.kernel.org/linuxppc- dev/20211207130557.40566-1-casca...@canonical.com/T/#u -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953366 Title: spectre_v2 from ubuntu_kernel_selftests ADT

[Bug 1953366] Re: spectre_v2 from ubuntu_kernel_selftests ADT test failure with 5.13/5.11 ppc64el

2021-12-07 Thread Thadeu Lima de Souza Cascardo
This looks like very similar to the vulnerable case that I changed to return as skipped. It's possible that the host is doing one mitigation while the guest is informed of a different mitigation, leading to this mis-match. I will take this upstream and see how it goes. Cascardo. -- You

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-12-07 Thread Thadeu Lima de Souza Cascardo
focal/linux-ibm has not been updated to the latest focal/master-next version (5.4.0-92.103), which has the fix. Cascardo. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1950239 Title: creat09 from

[Bug 1953366] Re: spectre_v2 from ubuntu_kernel_selftests ADT test failure with 5.13/5.11 ppc64el

2021-12-07 Thread Thadeu Lima de Souza Cascardo
As this is failing on ADT, it is failing on VMs on an environment we don't have much control of. This could be caused by host kernel, qemu or libvirt combinations that will make the guest kernel observe a given mitigation while it's not really in place. This test was added after 5.4, so the

[Bug 1877533] Re: [20.10 FEAT] Increase the crashkernel setting if the root volume is luks2-encrypted

2021-12-06 Thread Thadeu Lima de Souza Cascardo
There is already documentation about it. For example, from https://ubuntu.com/server/docs/kernel-crash-dump "If the dump does not work due to OOM (Out Of Memory) error, then try increasing the amount of reserved memory by editing /etc/default/grub.d/kdump-tools.cfg. For example, to reserve 512

[Bug 1877533] Re: [20.10 FEAT] Increase the crashkernel setting if the root volume is luks2-encrypted

2021-12-02 Thread Thadeu Lima de Souza Cascardo
This is a debdiff for the proposed solution for kdump-tools, based on latest version on impish. ** Patch added: "kdump-tools_1.6.9ubuntu1+cascardo1.debdiff" https://bugs.launchpad.net/ubuntu-z-systems/+bug/1877533/+attachment/5544958/+files/kdump-tools_1.6.9ubuntu1+cascardo1.debdiff -- You

[Bug 1877533] Re: [20.10 FEAT] Increase the crashkernel setting if the root volume is luks2-encrypted

2021-12-02 Thread Thadeu Lima de Souza Cascardo
Aside from the new default crashkernel (or rather, whether to keep the 2G-4G:320M option or simply not setup crashkernel for the 2G-4G case), how does the new version of kdump-tools on ppa:cascardo/kdump2 work? To give you an answer, it does upgrade the crashkernel value on zipl.conf to a new

[Bug 1952094] Re: CIFS mount error: iocharset utf8 not found

2021-11-29 Thread Thadeu Lima de Souza Cascardo
Maybe this is the case of a missing linux-modules-extra installed? nls_utf8 module seems to be shipped on linux-modules-extra, and the missing package would explain the failure. Cascardo. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-29 Thread Thadeu Lima de Souza Cascardo
Works fine on 5.10.0-1052-oem. Cascardo. ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1950239 Title: creat09

[Bug 1949516] Re: require CAP_NET_ADMIN to attach N_HCI ldisc

2021-11-29 Thread Thadeu Lima de Souza Cascardo
Working as expected on 5.4.0-91-generic and 5.10.0-1052-oem. $ ldattach HCI /dev/tty ldattach: cannot set line discipline: Operation not permitted ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member

[Bug 1949516] Re: require CAP_NET_ADMIN to attach N_HCI ldisc

2021-11-25 Thread Thadeu Lima de Souza Cascardo
ldattach HCI /dev/tty That command works on 4.15.0-162, and fails with EPERM on 4.15.0-163. ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1788578] Re: Some test in ubuntu_bpf test_verifier failed on i386 Bionic kernel

2021-11-25 Thread Thadeu Lima de Souza Cascardo
5 tests failed with 4.15.0-162. ALL pass with 4.15.0-163. ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788578

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-16 Thread Thadeu Lima de Souza Cascardo
** Description changed: + [Impact] + setgid files may be created on setgid directories owned by the directory + group by users not belonging to that group. That is restricted to XFS. + + [Fix/Backport] + The fix for 5.11 and 5.10 kernels is one simple commit with a minor + backport conflict

[Bug 1950644] Re: ubuntu_ltp / finit_module02 fails on v4.15 and other kernels

2021-11-16 Thread Thadeu Lima de Souza Cascardo
** Description changed: + [Impact] + Some uses of kernel_read_file_from_fd may lead to a WARN when the file is + not opened for reading. + + The WARNING, however, is not present on earlier kernels, which will return + a different error code. The fix, however, has been applied to upstream stable

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-16 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Hirsute) Status: Confirmed => In Progress ** Changed in: linux (Ubuntu Focal) Status: Confirmed => In Progress ** Changed in: linux (Ubuntu Bionic) Status: Confirmed => In Progress ** Changed in: linux-oem-5.10 (Ubuntu Focal) Status:

[Bug 1951132] Re: hirsute:linux-aws ubuntu_ltp Failed test cases : cve-2018-13405

2021-11-16 Thread Thadeu Lima de Souza Cascardo
*** This bug is a duplicate of bug 1950239 *** https://bugs.launchpad.net/bugs/1950239 Hey, Tim. This only fails on XFS, now that the test goes through all supported filesystems. This is being tracked and worked on as a different but, LP: #1950239. Marked as duplicate. Cascardo. ** This

[Bug 1950644] Re: ubuntu_ltp / finit_module02 fails on v4.15 and other kernels

2021-11-11 Thread Thadeu Lima de Souza Cascardo
. Cascardo. ** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubun

[Bug 1950644] Re: ubuntu_ltp / finit_module02 fails on v4.15 and other kernels

2021-11-11 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Impish) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Hirsute) Status: Confirmed => In Progress ** Changed in: linux (Ubuntu Hirsute) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-11 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux-oem-5.10 (Ubuntu Bionic) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1950239 Title: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-11 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-oem-5.14 (Ubuntu) Importance: Undecided Status: New ** Changed in: linux-oem-5.14 (Ubuntu Focal) Status: New => Fix Released ** Changed in: linux-oem-5.14 (Ubuntu Impish) Status: New => Invalid ** Changed in: linux-oem-5.14 (Ubuntu Hirsute)

[Bug 1950644] Re: ubuntu_ltp / finit_module02 fails on v4.15 and other kernels

2021-11-11 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hirsute) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Jammy)

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-11 Thread Thadeu Lima de Souza Cascardo
There is the in-disk inode structure that makes it complicated to backport the fix. Eventually, we would need something like the commit below in older releases. 542951592c99ff7b15c050954c051dd6dd6c0f97 ("xfs: remove the icdinode di_uid/di_gid members") Alternatively, just making sure values

[Bug 1950644] Re: ubuntu_ltp / finit_module02 fails on v4.15 and other kernels

2021-11-11 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1950644 Title: ubuntu_ltp / finit_module02 fails on v4.15 and other kernels

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-11 Thread Thadeu Lima de Souza Cascardo
This will require a backport for older kernels as xfs_ialloc was renamed to xfs_init_new_inode. I am working on it. Cascardo. ** Changed in: linux (Ubuntu Hirsute) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Focal) Assig

[Bug 1950239] Re: creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS

2021-11-09 Thread Thadeu Lima de Souza Cascardo
From the LTP creat09 test comment: * This fix is incomplete if file is on xfs filesystem. * * Fixed in: * * commit 01ea173e103edd5ec41acec65b9261b87e123fc2 * Author: Christoph Hellwig * Date: Fri Jan 22 16:48:18 2021 -0800 * * xfs: fix up non-directory creation in SGID directories

[Bug 1748103] Re: apic test in kvm-unit-test failed with timeout

2021-11-04 Thread Thadeu Lima de Souza Cascardo
I see a very similar issue from comment #36 on 3.13.0-187 and 3.13.0-188. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1748103 Title: apic test in kvm-unit-test failed with timeout To manage

[Bug 1824289] Re: ioapic in ubuntu_kvm_unit_tests failed on Trusty

2021-11-04 Thread Thadeu Lima de Souza Cascardo
Also fails on 3.13.0-187 and 3.13.0-188. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1824289 Title: ioapic in ubuntu_kvm_unit_tests failed on Trusty To manage notifications about this bug go to:

[Bug 1821906] Re: debug in ubuntu_kvm_unit_test failed on 3.13 / 4.4 (FAIL: single step emulated instructions)

2021-11-04 Thread Thadeu Lima de Souza Cascardo
Fails on 3.13.0-187 and 3.13.0-188. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1821906 Title: debug in ubuntu_kvm_unit_test failed on 3.13 / 4.4 (FAIL: single step emulated instructions) To

[Bug 1932966] Re: kvm_unit_tests: emulator test fails on 4.4 / 4.15 kernel, timeout

2021-11-04 Thread Thadeu Lima de Souza Cascardo
I found this failing on 3.13.0-187 and 3.13.0-188 as well, though after doing movdqu (write). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1932966 Title: kvm_unit_tests: emulator test fails on 4.4

[Bug 1821905] Re: umip in ubuntu_kvm_unit_test failed on T-3.13 / T-4.4

2021-11-04 Thread Thadeu Lima de Souza Cascardo
Found on trusty/linux 3.13.0-187 and 3.13.0-188. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1821905 Title: umip in ubuntu_kvm_unit_test failed on T-3.13 / T-4.4 To manage notifications about

[Bug 1949516] [NEW] require CAP_NET_ADMIN to attach N_HCI ldisc

2021-11-02 Thread Thadeu Lima de Souza Cascardo
: Thadeu Lima de Souza Cascardo (cascardo) Status: In Progress ** Affects: linux (Ubuntu Bionic) Importance: Low Assignee: Thadeu Lima de Souza Cascardo (cascardo) Status: In Progress ** Affects: linux (Ubuntu Focal) Importance: Low Assignee: Thadeu Lima de Souza

[Bug 1788578] Re: Some test in ubuntu_bpf test_verifier failed on i386 Bionic kernel

2021-10-29 Thread Thadeu Lima de Souza Cascardo
** Description changed: [Impact] Narrow loads for bpf_perf_event_data is not possible on 32-bit arches. [Test case] Run the bpf test_verifier. [Potential regression] - Loading sample_period of bpf_perf_event_data may fail. + Loading sample_period of bpf_perf_event_data may fail.

[Bug 1934414] Re: test_bpf.sh from ubuntu_kernel_selftests.net from linux ADT test failure with linux/4.15.0-149.153 i386 (Segmentation fault)

2021-10-29 Thread Thadeu Lima de Souza Cascardo
Backporting everything necessary would be up to many potential regressions. That would include support for BPF calls and the change to make unknown opcode handling more robust. The former would be commit cc8b0b92a1699bc32f7fec71daa2bfc90de43a4d "bpf: introduce function calls (function

[Bug 1945707] Re: BCM57800 SRIOV bug causes interfaces to disappear

2021-10-29 Thread Thadeu Lima de Souza Cascardo
Hey, Andre. As we talked, this is applied to 5.4 kernels as well, 5.4.0-90 should have it. Can you test that it fixes the problem? Thanks. Cascardo. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1788578] Re: Some test in ubuntu_bpf test_verifier failed on i386 Bionic kernel

2021-10-29 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Description changed: + [Impact] + Narrow loads for bpf_perf_event_data is not possible on 32-bit

[Bug 1948351] Re: ppc64 BPF JIT mod by 1 will not return 0

2021-10-22 Thread Thadeu Lima de Souza Cascardo
** Description changed: + [Impact] + When doing MOD by 1 with a immediate/constant divisor on PPC, the JIT will produce code that returns the dividend, just like a division, instead of 0. + + Both eBPF and cBPF will fail as well when doing such operations. + + [Test case] + $ cat bpf-mod1.c +

[Bug 1948351] Re: ppc64 BPF JIT mod by 1 will not return 0

2021-10-22 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Hirsute) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1948351 Title: ppc64 BPF JIT mod by 1 will not return 0 To manage

[Bug 1948351] Re: ppc64 BPF JIT mod by 1 will not return 0

2021-10-22 Thread Thadeu Lima de Souza Cascardo
** Summary changed: - linux ADT test_bpf failure with linux/5.4.0-90.101 + ppc64 BPF JIT mod by 1 will not return 0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1948351 Title: ppc64 BPF JIT mod

[Bug 1948351] Re: linux ADT test_bpf failure with linux/5.4.0-90.101

2021-10-22 Thread Thadeu Lima de Souza Cascardo
d in: linux (Ubuntu Bionic) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Focal) Importance: Undecided => Medium ** Changed in:

[Bug 1947161] [NEW] ACL updates on OCFS2 are not revalidated

2021-10-14 Thread Thadeu Lima de Souza Cascardo
ression] ACL changes on OCFS2 may stop working properly. ** Affects: linux (Ubuntu) Importance: Medium Assignee: Thadeu Lima de Souza Cascardo (cascardo) Status: In Progress ** Affects: linux (Ubuntu Bionic) Importance: Medium Assignee: Thadeu Lima de Souz

[Bug 1945707] Re: BCM57800 SRIOV bug causes interfaces to disappear

2021-09-30 Thread Thadeu Lima de Souza Cascardo
[Impact] bnx2x driver won't add all devices ports/interfaces. [Test case] Boot system with bnx2x device and verify all ports/interfaces have been added. [Potential regression] bnx2x devices won't be properly probed. Devices won't be added or SR-IOV won't be correctly supported. -- You

[Bug 1945707] Re: BCM57800 SRIOV bug causes interfaces to disappear

2021-09-30 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu) Status: Incomplete => In Progress ** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) -- You received this bug notification be

[Bug 1945707] Re: BCM57800 SRIOV bug causes interfaces to disappear

2021-09-30 Thread Thadeu Lima de Souza Cascardo
In Progress ** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu

[Bug 1945707] Re: BCM57800 SRIOV bug causes interfaces to disappear

2021-09-30 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945707 Title: BCM57800 SRIOV bug causes interfaces to disappear To

[Bug 1945707] Re: BCM57800 SRIOV bug causes interfaces to disappear

2021-09-30 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hirsute) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1785207] Re: openat03 in ubuntu_ltp_syscall failed with Trusty

2021-09-24 Thread Thadeu Lima de Souza Cascardo
From glibc: int __libc_openat (int fd, const char *file, int oflag, ...) { mode_t mode = 0; if (__OPEN_NEEDS_MODE (oflag)) { va_list arg; va_start (arg, oflag); mode = va_arg (arg, mode_t); va_end (arg); } return SYSCALL_CANCEL (openat, fd, file, oflag,

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-23 Thread Thadeu Lima de Souza Cascardo
Sent request upstream: https://lore.kernel.org/linuxppc-dev/YUpIqytZqpohq4EM@mussarela/T/#u I will ping some folks for some help there. Cascardo. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1943960] Re: s390x BPF JIT vulnerabilities

2021-09-21 Thread Thadeu Lima de Souza Cascardo
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1943960 Title: s390x BPF JIT vulnerabilities To manage notifications about this

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-16 Thread Thadeu Lima de Souza Cascardo
About this latest comment. So, CPU #0 has crashed at pc = c00813566eb8, its ctr and r12 match, same as usual, it was called by __bpf_prog_run_save_cb as the BPF JITed program. Dumping the program from CPU #0 perspective, it has traps at that address. It turns out the JIT fills up a whole page

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-16 Thread Thadeu Lima de Souza Cascardo
9f:mon> di c00813566000 1000 c00813566000 7fe8 trap ... c00813566eb8 6000 nop ... c00813566ec0 7c0802a6 mflrr0 c00813566ec4 f8010010 std r0,16(r1) c00813566ec8 f821ffa1 stdur1,-96(r1) c00813566ecc 3d80c000 lis

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-15 Thread Thadeu Lima de Souza Cascardo
*** This bug is a duplicate of bug 1909286 *** https://bugs.launchpad.net/bugs/1909286 I tested that when reuseport_bpf_cpu did not consider the last CPU, the one that has been hotplugged, it didn't crash. It didn't set affinity to that CPU, didn't even allocate socket for it. Then, I

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-15 Thread Thadeu Lima de Souza Cascardo
*** This bug is a duplicate of bug 1909286 *** https://bugs.launchpad.net/bugs/1909286 Krzysztof mentioned that this has been found on 5.14 as well. Using a system he lent me (huggins), I also tested with the commit that changed the call to use CTR and it failed as well. But it always failed

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-15 Thread Thadeu Lima de Souza Cascardo
Test kernel at: https://kernel.ubuntu.com/~cascardo/lp1927076_1.tar -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1927076 Title: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-15 Thread Thadeu Lima de Souza Cascardo
I was looking at latest changes since 5.11 to powerpc64 BPF JIT and found the following commit: commit 20ccb004bad659c186f9091015a956da220d615d Author: Naveen N. Rao Date: Wed Jun 9 14:30:24 2021 +0530 powerpc/bpf: Use bctrl for making function calls blrl corrupts the link stack.

[Bug 1927076] Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

2021-09-10 Thread Thadeu Lima de Souza Cascardo
Hi, Patricia. Can you clarify if you always need to run the hotplug test before reuseport_bpf_cpu in order to reproduce? I wonder what is the state that the hotplug test leaves the system in? How is it being run? The makefile runs it with the -a option, which in the systems I have available would

[Bug 1923114] Re: ubuntu_kernel_selftests: ./cpu-on-off-test.sh: line 94: echo: write error: Device or resource busy

2021-09-10 Thread Thadeu Lima de Souza Cascardo
While looking for some improvements on cpu-on-off-test.sh, I investigated the path that is taken on azure. One good tool to debug these failures is the cpuhp tracing. echo 1 > /sys/kernel/debug/tracing/events/cpuhp/enable echo 1 > /sys/kernel/debug/tracing/tracing_on cat

[Bug 1942784] Re: makedumpfile not properly working on focal with 5.11 kernel

2021-09-06 Thread Thadeu Lima de Souza Cascardo
Hey, @joalif. Has this been tested with focal 5.4 kernel too? Thanks. Cascardo. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1942784 Title: makedumpfile not properly working on focal with 5.11

[Bug 1940107] Re: libvirtd fails to create VM

2021-09-02 Thread Thadeu Lima de Souza Cascardo
Also working on hirsute:focal-linux on the system where it was found: ubuntu@riccioli:~$ uname -r ; virsh list 5.11.0-34-generic Id Name State 1bionic running And also on an oracle bare-metal instance with hirsute:linux-oracle 5.11.0-1017-oracle. -- You

[Bug 1940134] Re: fails to launch linux L2 guests on AMD

2021-09-02 Thread Thadeu Lima de Souza Cascardo
Working fine also with 5.11 kernel on riccioli with 5.11.0-34-generic on hirsute. And also on a bare-metal Oracle instance with 5.11.0-1017-oracle on hirsute. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1940134] Re: fails to launch linux L2 guests on AMD

2021-09-02 Thread Thadeu Lima de Souza Cascardo
Sent SIGTERM to all processes Sent SIGKILL to all processes Requesting system poweroff [ 24.054392] reboot: Power down ubuntu@bionic:~$ sudo poweroff Connection to 192.168.122.239 closed by remote host. Connection to 192.168.122.239 closed. ubuntu@riccioli:~$ cat

[Bug 1940107] Re: libvirtd fails to create VM

2021-09-02 Thread Thadeu Lima de Souza Cascardo
Also works fine with focal:linux-oracle-5.11 5.11.0-1017-oracle. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940107 Title: libvirtd fails to create VM To manage notifications about this bug go

[Bug 1940134] Re: fails to launch linux L2 guests on AMD

2021-09-02 Thread Thadeu Lima de Souza Cascardo
Same with bionic:linux-oracle-5.4 5.4.0-1054-oracle. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940134 Title: fails to launch linux L2 guests on AMD To manage notifications about this bug go

[Bug 1940134] Re: fails to launch linux L2 guests on AMD

2021-09-02 Thread Thadeu Lima de Souza Cascardo
Requesting system poweroff [ 12.137724] reboot: Power down ubuntu@bionic:~$ sudo poweroff Connection to 192.168.122.239 closed by remote host. Connection to 192.168.122.239 closed. ubuntu@riccioli:~$ uname -r 4.15.0-156-generic ubuntu@riccioli:~$ ** Tags added: verification-done-bionic --

[Bug 1940134] Re: fails to launch linux L2 guests on AMD

2021-08-16 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Hirsute) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940134 Title: fails to launch linux L2 guests on AMD To manage notifications

[Bug 1940134] [NEW] fails to launch linux L2 guests on AMD

2021-08-16 Thread Thadeu Lima de Souza Cascardo
. ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux-hwe-5.8 (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Bionic) Importance: High Assignee: Thadeu Lima de Souza Cascardo (cascardo) Status

[Bug 1940134] Re: fails to launch linux L2 guests on AMD

2021-08-16 Thread Thadeu Lima de Souza Cascardo
Ubuntu Focal) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux

[Bug 1940107] Re: libvirtd fails to create VM

2021-08-16 Thread Thadeu Lima de Souza Cascardo
** Summary changed: - libvirtd failes to create VM + libvirtd fails to create VM -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940107 Title: libvirtd fails to create VM To manage notifications

[Bug 1940107] Re: libvirtd failes to create VM

2021-08-16 Thread Thadeu Lima de Souza Cascardo
We have identified that upstream commit 00b89fe0197f0c55a045775c11553c0cdb7082fe ("sched: Make the idle task quack like a per-CPU kthread") causes this, and its revert fixes the problem. @smb identified commit a8ea6fc9b089156d9230bfeef964dd9be101a4a9 ("sched: Stop PF_NO_SETAFFINITY from being

[Bug 1940107] [NEW] libvirtd failes to create VM

2021-08-16 Thread Thadeu Lima de Souza Cascardo
linux (Ubuntu Hirsute) Importance: Undecided => High ** Changed in: linux (Ubuntu Hirsute) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.l

  1   2   3   4   5   6   7   8   9   10   >