Since the whole of seccomp_filter patches was reverted, this is now
fixed in 3.2.0-12.20.
** Changed in: linux (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
Thank you for taking the time to file a bug report on this issue.
However, given the number of bugs that the Kernel Team receives during
any development cycle it is impossible for us to review them all.
Therefore, we occasionally resort to using automated bots to request
further testing. This is s
Actually this also was present in a -7 kernel (though a modified one to
not crash on boot). I got the feeling this has been present all the way
back to when we enabled/added the seccomp filter patches. Since there
also has been a request to look at a version of those that has been
completely rewrit
Confirmed here, though it is the seccomp tests in test-kernel-
security.py.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/921816
Title:
BUG: unable to handle kernel NULL pointer dereference at 0
Hm, very quick look only. Seems doing something with the seccomp filters
is causing the problem in both cases. I some way good, it seems to
happen on Intel and AMD CPUs which at least would rule out specific virt
implementations. Will try to reproduce locally.
--
You received this bug notificatio
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/921816
Title:
BUG: unable to handle kernel NULL pointer dereference at 0030
To
Thank you for taking the time to file a bug report on this issue.
However, given the number of bugs that the Kernel Team receives during
any development cycle it is impossible for us to review them all.
Therefore, we occasionally resort to using automated bots to request
further testing. This is s
Also fails on KVM AMD64:
[ 1817.380767] seccomp_tests[29708]: system call 3 (sys_close) blocked at
0x7fb2553bf419
[ 1817.381986] seccomp_tests[29712]: system call 60 (sys_exit) blocked at
0x7fb2553bf419
[ 1817.382307] general protection fault: [#1] SMP
[ 1817.382616] CPU 0
[ 1817.382806]
This is new. I had not tested since -8, and I did not see it there. I am
now trying to replicate under KVM, and later on under bare-metal.
And... the missing files are due to bug 904489 :-)
** Tags added: qa-manual-testing
--
You received this bug notification because you are a member of Ubuntu
Hi Carlos,
Do you know if this oops just start happening with an update to Precise,
or has it been happening with earlier Precise kernels?
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Tags added: kernel-
Bug is reproducible.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/921816
Title:
BUG: unable to handle kernel NULL pointer dereference at 0030
To manage notifications about this bug go to:
http
** Description changed:
- While running kernel-root-ops on EC2 m1.small, Precise.
+ While running kernel-root-ops on EC2 m1.small, Precise:
- ProblemType: Bug
- DistroRelease: Ubuntu 12.04
+ [18009152.620765] BUG: unable to handle kernel NULL pointer dereference at
0030
+ [18009152.620787]
12 matches
Mail list logo