issue was reproduced once again, now on 4.4.0-197 kernel
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1876856
Title:
xenial: soft lockup in check_unsafe_exec()
Status in linux package
issue was reproduced once again on 4.4.0-184 kernel
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1876856
Title:
xenial: soft lockup in check_unsafe_exec()
Status in linux package in U
Unfortunately I'm unable to verify your changes here.
Our QA cannot quickly update the failed tests to use custom kernel inside VM.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1876856
T
Public bug reported:
I would like to ask to backport following patch into ubuntu kernels:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=933db73351d359f74b14f4af095808260aff11f9
This bug silently corrupts memory in kmalloc-192 objects.
we observed several such case
submitted https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1876856
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1672819
Title:
exec'ing a setuid binary from a threaded program some
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
** Changed in: linux (Ubuntu)
Status: Invalid => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1876856
Public bug reported:
Endless cycle was detected few times during ubuntu 16.04 testing insied openvz
VMs
dmesg output and crash dump ivestigation shows that foolowing ubuntu
16.04.patch is guilty
commit d6572202d986a84feda4cf7e6ce0bebaa18cb8fe
Author: Colin Ian King
Date: Fri May 12 15:51:56 2
Guys,
your commit d6572202d986 ("UBUNTU:SAUCE: exec: ensure file system accounting in
check_unsafe_exec is correct") looks wrong for me,
it leads to endless cycle in check_unsafe_exec().
fs/exec.c:: check_unsafe_exec()
...
recheck:
fs_recheck = false;
t = p;
n_fs = 1;
8 matches
Mail list logo