This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
Tested on Xenial, 4.4.0-23-generic #41-Ubuntu, stress-ng --remap 8 can
run without tripping the issue.
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Tested on Wily, 4.2.0-37-generic #43-Ubuntu, stress-ng --remap 8 can run
without tripping the issue.
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
This bug was fixed in the package linux - 4.4.0-23.41
---
linux (4.4.0-23.41) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1582431
* zfs: disable module checks for zfs when cross-compiling (LP: #1581127)
- [Packaging] disable zfs module checks wh
Patch re-sent, V2
https://lists.ubuntu.com/archives/kernel-team/2016-May/077458.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1558120
Title:
Kernel can be oopsed using remap_file_pages
To man
It appears that a subsequent fix for this from the aufs developer has
landed:
https://github.com/sfjro/aufs4-linux/commit/2d530d0b039ca2b1280598cf8b350d6c6552f7b8
I think we should drop my fix and pick up the official aufs fix instead.
I'll re-test with this and then re-submit the patch once I am
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: linux (Ubuntu)
Status: Fix Released => Fix Committed
** Changed in: linux (Ubuntu Wily)
Importance: Undecided => High
** Changed in: linux (Ubuntu Xenial)
Importance: Undecided => High
--
You rec
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: New => Fi
** Description changed:
- While faffing around with the deprecated system call remap_file_pages I
- was able to trigger an OOPs that can be reproduced every time.
+ [SRU][WILY][XENIAL]
+
+ [JUSTIFICATION]
+ Running stress-ng --remap 4 will trip an oops on the remap.
+
+ The bug is introduced by
Reverting dee5220cf56dd1b998c74514d0f023b55e4eb425 ("UBUNTU: SAUCE:
AUFS") allows me to run stress-ng --remap 8 w/o any crashes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1558120
Title:
Kernel c
Sanity checked above, seems like some debug in the mmap serializes the
do_mmap'ing call and is the reasons why I failed to hit the bug with the
above change. So ignore comment #45
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
Bizarre as it seems, disabling the kernel module tainting stops this
occurring.
static inline void add_taint_module(struct module *mod, unsigned flag,
enum lockdep_ok lockdep_ok)
{
- add_taint(flag, lockdep_ok);
- mod->taints |= (1U << flag);
+
The merge base e50f9acafe11781b0163d27172d33faf824caf7b is bad.
This means the bug has been fixed between
e50f9acafe11781b0163d27172d33faf824caf7b and
[d207274815a45631952c342a3b6959e79913195b].
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Colin Ian King (colin-king)
--
You re
apport information
** Changed in: linux (Ubuntu)
Importance: Undecided => High
** Tags added: apport-collected xenial
** Description changed:
While faffing around with the deprecated system call remap_file_pages I
was able to trigger an OOPs that can be reproduced every time.
uname
17 matches
Mail list logo