Thomas Lamprecht
22fa3dbdcc
drop patches applied upstream
...
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-28 14:02:26 +02:00
Thomas Lamprecht
9f7f3b58a9
update kernel source to Ubuntu-4.10.0-28.32
...
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-28 14:02:26 +02:00
Thomas Lamprecht
9722965770
Revert "remove outdated intel nic drivers"
...
This reverts commit 7beee5f3eb
.
While they repositories of those drivers state that the in kernel one
should be used, as they are newer, it seems they do not provide the
same functionallity. So revert to the out of tree drivers for now.
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-28 14:02:26 +02:00
Wolfgang Bumiller
0ee4a967cb
bump version to 4.10.17-17
2017-07-19 12:38:48 +02:00
Wolfgang Bumiller
58a18ce39d
buildsys: fix parallel builds
2017-07-19 12:38:48 +02:00
Thomas Lamprecht
4c390211d8
add CVE fixes
...
CVE-2017-1000364 (rather bugfix for the original CVE fix):
* mm/mmap.c: expand_downwards: don't require the gap if !vm_prev
* mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
CVE-2017-1000365: fs/exec.c: account for argv/envp pointers
CVE-2017-10810: drm/virtio: don't leak bo on drm_gem_object_init
failure
CVE-2017-7482: rxrpc: Fix several cases where a padded len isn't
checked in ticket decode
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-19 09:46:19 +02:00
Thomas Lamprecht
a7f181d4b0
bump version to 4.10.17-16, bump ABI to 4.10.17-1-pve
...
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-13 09:07:40 +02:00
Dietmar Maurer
7beee5f3eb
remove outdated intel nic drivers
2017-07-13 09:06:03 +02:00
Thomas Lamprecht
d513484f62
add CVE fixes
...
CVE-2014-9900: net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
CVE-2017-7346: drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()
CVE-2017-9605: drm/vmwgfx: Make sure backup_handle is always valid
CVE-2017-1000380:
* ALSA: timer: Fix race between read and ioctl
* ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-13 06:04:17 +02:00
Thomas Lamprecht
b836293238
update abi-previous after ABI bump
...
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-13 06:04:17 +02:00
Thomas Lamprecht
ea91ce10d6
drop patches applied upstream
...
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-13 06:04:17 +02:00
Thomas Lamprecht
638b9f828c
update kernel source to Ubuntu-4.10.0-26.30
...
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2017-07-13 06:04:17 +02:00
Fabian Grünbichler
dc2b2ba06c
bump version to 4.10.15-15
2017-06-23 08:58:04 +02:00
Fabian Grünbichler
b4b8080506
replace Stack-Clash fix with upstream version
...
sicne the Ubuntu / Suse one seems to have some segfaulting
issues.
2017-06-23 08:57:04 +02:00
Fabian Grünbichler
02ad7886ad
bump version to 4.10.15-14
2017-06-22 09:24:04 +02:00
Fabian Grünbichler
7c01aa8df7
add follow-up fix for CVE-2017-100364 fix
2017-06-22 09:23:11 +02:00
Fabian Grünbichler
3905cd6842
bump version to 4.10.15-13
2017-06-20 09:58:25 +02:00
Fabian Grünbichler
6aadf9f67f
update kernel source to Ubuntu-4.10.0-24.28
2017-06-20 09:56:29 +02:00
Fabian Grünbichler
97d6ca37ca
build: use git to get GITVERSION
2017-06-20 09:51:41 +02:00
Fabian Grünbichler
47d1503892
bump version to 4.10.15-12
2017-06-12 13:25:16 +02:00
Fabian Grünbichler
5aa54b7501
fix #1366 : pinctl fix for AMD Ryzen on Gigabyte MBs
2017-06-12 13:24:57 +02:00
Fabian Grünbichler
d8cc30e0cd
bump version to 4.10.15-11
2017-06-09 11:40:10 +02:00
Fabian Grünbichler
c1f358be22
add fix for CVE-2017-9074 fix
2017-06-09 11:39:33 +02:00
Fabian Grünbichler
c7f85f2701
update abi-previous after ABI bump
2017-06-08 16:36:33 +02:00
Fabian Grünbichler
05806a84a3
bump version to 4.10.15-10, bump ABI to 4.10.15-1-pve
2017-06-08 14:22:03 +02:00
Fabian Grünbichler
0f831b3cf2
add CVE fixes
...
CVE-2017-8890: dccp/tcp: do not inherit mc_list from parent
CVE-2017-9074: ipv6: Prevent overrun when parsing v6 header options
CVE-2017-9075: sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
CVE-2017-9076/CVE-2017-9077: ipv6/dccp: do not inherit ipv6_mc_list from parent
CVE-2017-9242: ipv6: fix out of bound writes in __ip6_append_data()
2017-06-08 14:22:03 +02:00
Fabian Grünbichler
674abe87c8
drop patches applied upstream
2017-06-07 10:35:40 +02:00
Fabian Grünbichler
f18d724f8c
update sources to 4.10.0-22.24
2017-06-07 10:34:59 +02:00
Fabian Grünbichler
fd5c21692a
bump version to 4.10.11-9
2017-05-22 10:00:43 +02:00
Fabian Grünbichler
88582bb094
add fix for DoS via nftables
2017-05-22 09:59:35 +02:00
Fabian Grünbichler
0f0062b520
update abi-previous after ABI bump
2017-05-18 12:26:17 +02:00
Fabian Grünbichler
c73cc23929
bump version to 4.10.11-8, bump ABI to 4.10.11-1-pve
2017-05-18 11:22:00 +02:00
Fabian Grünbichler
1e165a112f
drop patches applied upstream
2017-05-18 11:22:00 +02:00
Fabian Grünbichler
2680024601
update kernel source to Ubuntu-4.10.0-21.23
2017-05-18 08:55:03 +02:00
Thomas Lamprecht
6490543bf7
add mapping from DEB_BUILD_ARCH to kernel arch subdirectory
...
and fix the rest of the architecture-hardcoded paths
2017-05-11 08:50:39 +02:00
Thomas Lamprecht
fe27fe0e8e
allow also grub-efi-arm64 as an grub dependency
2017-05-11 08:50:39 +02:00
Thomas Lamprecht
37d1225d09
build-sys: replace fixed architecture use where possible
2017-05-11 08:50:39 +02:00
Fabian Grünbichler
aa785972db
bump version to 4.10.8-7
2017-05-05 09:19:50 +02:00
Fabian Grünbichler
2b834b083d
add proposed fix for LP#1674838
...
Patches and rationale by Seth Forshee[1]:
My testing shows that the "POWER9: Additional power9
patches" patches are responsible, two of them in particular:
- mm: introduce page_vma_mapped_walk()
- mm, ksm: convert write_protect_page() to use page_vma_mapped_walk()
These patches don't appear to be included for any
functionality they provide, but rather to make "mm/ksm:
handle protnone saved writes when making page write protect"
a clean cherry pick instead of a backport. But the backport
isn't that difficult, so as far as I can tell we can do away
with the other two patches.
1: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1674838/comments/108
2017-05-05 09:12:20 +02:00
Fabian Grünbichler
7f0f6370be
update fix for CVE-2017-7979 to final version
...
cherry-picked from Ubuntu Zesty's master-next
2017-05-05 09:06:44 +02:00
Fabian Grünbichler
95cebd4144
build: export SOURCE_DATE_EPOCH
...
SOURCE_DATE_EPOCH is used to set various timestamps in build
products, and was introduced as part of the reproducible
builds efforts.
this is a great help for future build system restructuring,
as the "diffoscope"-diff of the produced .debs is now small
enough to catch unintended changes.
2017-05-04 15:40:21 +02:00
Fabian Grünbichler
a6c22e7b57
build: re-add kernel build symlink check
...
but in a way which works for regular users, not only root
2017-05-04 09:14:55 +02:00
Fabian Grünbichler
5f99d7c8cb
build: remove unused parts of Makefile
2017-05-04 09:14:46 +02:00
Fabian Grünbichler
973ac1a4ef
fix #1343 : add MTU patches for intel drivers
...
ported from upstream / in-tree commits
91c527a55664ddf4bee26673a35f91748dae4142
and
45693bcb00cbd379c373ab22ccd9a9d4755cc7ed
2017-05-03 14:05:03 +02:00
Fabian Grünbichler
6b1201e51a
bump version to 4.10.8-6, bump ABI to 4.10.8-1-pve
2017-04-13 11:24:26 +02:00
Fabian Grünbichler
29e62dc0a2
fix #1351 : kernel bug when adding network rate limit
...
Ubuntu bug link:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1682368
original cover letter for the patches proposed upstream:
Commit 1045ba77a ("net sched actions: Add support for user cookies")
added code to net/sched/act_api.c's tcf_action_init_1 using the `tb`
nlattr array unconditionally, while it was otherwise used as well as
initialized only when `name == NULL`:
if (name == NULL) {
err = nla_parse_nested(tb, TCA_ACT_MAX, nla, NULL);
In the other case `nla` is instead passed over to ->init to be parsed
there (using a different set of TCA_ enum values, iow. TCA_ACT_COOKIE
then "clashes" with some other value). This lead to the following three
example commands resulting in errors (sometimes followed by more traces
and hangups some time later (although the hangups happened seconds or
sometimes minutes later, sometimes not at all - results differed between
different kernel versions (linux git-master vs ubuntu's mainline 4.11
rc6 vs. pve 4.10.5 (based off ubuntu's zesty kernel where the commit is
cherry-picked)...))):
# ip link add ve0 type veth peer name ve0b
# tc qdisc add dev ve0 handle ffff: ingress
# tc filter add dev ve0 parent ffff: prio 50 basic police rate 1000bps burst 1000b drop
The 3rd command would sometimes succeed, sometimes error with:
RTNETLINK answers: Invalid argument
We have an error talking to the kernel
and sometimes error with:
RTNETLINK answers: Cannot allocate memory
We have an error talking to the kernel
In the latter case I assume `cklen` became negative, which passes the
TC_COOKIE_MAX_SIZE check since it is signed but becomes unsigned later
in kmemdup() (see the crash dump below)
When the `tc filter add` command fails a backtrace shows up in dmesg,
added below.
I'm not sure why the TC_ACT_COOKIE code was added to tcf_action_init_1
where it is now. It makes me think that it's supposed to be available
universally, but the `name == NULL` check for how nla is used or passed
to ->init() shows that the there are various different TC_ACT_* enums in
use at this point, hence the 'RFC' part of the patches, I'm not that
familiar with the code yet.
Backtrace when running `tc filter add`:
Apr 12 11:31:38 testmachine kernel: ------------[ cut here ]------------
Apr 12 11:31:38 testmachine kernel: WARNING: CPU: 7 PID: 16596 at mm/page_alloc.c:3541 __alloc_pages_slowpath+0x9fe/0xba0
Apr 12 11:31:38 testmachine kernel: Modules linked in: act_police cls_basic sch_ingress veth nfsv3 nfs_acl nfs lockd grace ip6t_REJECT nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables xt_mac ipt_REJECT nf_reject_ipv4 xt_physdev xt_comment nf_conntrack_ipv4 nf_defrag_ipv4 xt_tcpudp xt_mark xt_set xt_addrtype xt_multiport xt_conntrack nf_conntrack ip_set_hash_net ip_set arc4 md4 nls_utf8 cifs ccm fscache ipta
Apr 12 11:31:38 testmachine kernel: snd_hda_codec_realtek snd_hda_codec_generic aesni_intel aes_x86_64 crypto_simd drm_kms_helper glue_helper cryptd drm snd_hda_intel intel_cstate snd_hda_codec i2c_algo_bit fb_sys_fops snd_hda_core joydev syscopyarea snd_hwdep sysfillrect input_leds sysimgblt intel_rapl_perf snd_pcm snd_timer snd pcspkr soundcore mei_me lpc_ich mei shpchp tpm_infineon mac_hid wmi acpi_pad video vhost_net vhost macv
Apr 12 11:31:38 testmachine kernel: CPU: 7 PID: 16596 Comm: tc Tainted: P O 4.10.5-1-pve #1
Apr 12 11:31:38 testmachine kernel: Hardware name: ASUS All Series/Z97-A, BIOS 2801 11/11/2015
Apr 12 11:31:38 testmachine kernel: Call Trace:
Apr 12 11:31:38 testmachine kernel: dump_stack+0x63/0x81
Apr 12 11:31:38 testmachine kernel: __warn+0xcb/0xf0
Apr 12 11:31:38 testmachine kernel: warn_slowpath_null+0x1d/0x20
Apr 12 11:31:38 testmachine kernel: __alloc_pages_slowpath+0x9fe/0xba0
Apr 12 11:31:38 testmachine kernel: ? get_page_from_freelist+0x46a/0xb20
Apr 12 11:31:38 testmachine kernel: ? schedule+0x36/0x80
Apr 12 11:31:38 testmachine kernel: ? schedule_timeout+0x22a/0x3f0
Apr 12 11:31:38 testmachine kernel: __alloc_pages_nodemask+0x209/0x260
Apr 12 11:31:38 testmachine kernel: alloc_pages_current+0x95/0x140
Apr 12 11:31:38 testmachine kernel: kmalloc_order+0x18/0x40
Apr 12 11:31:38 testmachine kernel: kmalloc_order_trace+0x24/0xa0
Apr 12 11:31:38 testmachine kernel: __kmalloc_track_caller+0x1e5/0x200
Apr 12 11:31:38 testmachine kernel: kmemdup+0x20/0x50
Apr 12 11:31:38 testmachine kernel: nla_memdup_cookie+0x55/0x90
Apr 12 11:31:38 testmachine kernel: tcf_action_init_1+0xcc/0x230
Apr 12 11:31:38 testmachine kernel: tcf_exts_validate+0x52/0x110
Apr 12 11:31:38 testmachine kernel: basic_change+0x194/0x4d2 [cls_basic]
Apr 12 11:31:38 testmachine kernel: tc_ctl_tfilter+0x54d/0x9a0
Apr 12 11:31:38 testmachine kernel: rtnetlink_rcv_msg+0xe6/0x210
Apr 12 11:31:38 testmachine kernel: ? __kmalloc_node_track_caller+0x1f0/0x2a0
Apr 12 11:31:38 testmachine kernel: ? __alloc_skb+0x87/0x1e0
Apr 12 11:31:38 testmachine kernel: ? rtnl_newlink+0x860/0x860
Apr 12 11:31:38 testmachine kernel: netlink_rcv_skb+0xa4/0xc0
Apr 12 11:31:38 testmachine kernel: rtnetlink_rcv+0x28/0x30
Apr 12 11:31:38 testmachine kernel: netlink_unicast+0x18c/0x220
Apr 12 11:31:38 testmachine kernel: netlink_sendmsg+0x2f7/0x3b0
Apr 12 11:31:38 testmachine kernel: ? aa_sock_msg_perm+0x61/0x150
Apr 12 11:31:38 testmachine kernel: sock_sendmsg+0x38/0x50
Apr 12 11:31:38 testmachine kernel: ___sys_sendmsg+0x2c2/0x2d0
Apr 12 11:31:38 testmachine kernel: ? schedule+0x36/0x80
Apr 12 11:31:38 testmachine kernel: ? ptrace_stop+0x20a/0x2a0
Apr 12 11:31:38 testmachine kernel: ? ptrace_do_notify+0x98/0xc0
Apr 12 11:31:38 testmachine kernel: __sys_sendmsg+0x54/0x90
Apr 12 11:31:38 testmachine kernel: SyS_sendmsg+0x12/0x20
Apr 12 11:31:38 testmachine kernel: do_syscall_64+0x5b/0xc0
Apr 12 11:31:38 testmachine kernel: entry_SYSCALL64_slow_path+0x25/0x25
Apr 12 11:31:38 testmachine kernel: RIP: 0033:0x7f0aef7d0a77
Apr 12 11:31:38 testmachine kernel: RSP: 002b:00007ffe88627568 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
Apr 12 11:31:38 testmachine kernel: RAX: ffffffffffffffda RBX: 0000000058edf3fc RCX: 00007f0aef7d0a77
Apr 12 11:31:38 testmachine kernel: RDX: 0000000000000000 RSI: 00007ffe886275b0 RDI: 0000000000000003
Apr 12 11:31:38 testmachine kernel: RBP: 00007ffe886275b0 R08: 0000000000000001 R09: 0000000000000050
Apr 12 11:31:38 testmachine kernel: R10: 00000000000005e9 R11: 0000000000000246 R12: 00007ffe886275f0
Apr 12 11:31:38 testmachine kernel: R13: 00005619ea31ee00 R14: 00007ffe8862f690 R15: 0000000000000000
Apr 12 11:31:38 testmachine kernel: ---[ end trace be009b606808485e ]---
Which would later on be followed by different kinds of hangups,
sometimes with more seemingly unrelated crash dumps such as:
Apr 12 11:38:50 testmachine kernel: general protection fault: 0000 [#1 ] SMP
Apr 12 11:38:50 testmachine kernel: Modules linked in: act_police cls_basic sch_ingress veth nfsv3 nfs_acl nfs lockd grace ip6t_REJECT nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables xt_mac ipt_REJECT nf_reject_ipv4 xt_physdev xt_comment nf_conntrack_ipv4 nf_defrag_ipv4 xt_tcpudp xt_mark xt_set xt_addrtype xt_multiport xt_conntrack nf_conntrack ip_set_hash_net ip_set arc4 md4 nls_utf8 cifs ccm fscache ipta
Apr 12 11:38:50 testmachine kernel: snd_hda_codec_realtek snd_hda_codec_generic aesni_intel aes_x86_64 crypto_simd drm_kms_helper glue_helper cryptd drm snd_hda_intel intel_cstate snd_hda_codec i2c_algo_bit fb_sys_fops snd_hda_core joydev syscopyarea snd_hwdep sysfillrect input_leds sysimgblt intel_rapl_perf snd_pcm snd_timer snd pcspkr soundcore mei_me lpc_ich mei shpchp tpm_infineon mac_hid wmi acpi_pad video vhost_net vhost macv
Apr 12 11:38:50 testmachine kernel: CPU: 7 PID: 4829 Comm: chromium Tainted: P W O 4.10.5-1-pve #1
Apr 12 11:38:50 testmachine kernel: Hardware name: ASUS All Series/Z97-A, BIOS 2801 11/11/2015
Apr 12 11:38:50 testmachine kernel: task: ffff93679b132d00 task.stack: ffffa479a0e00000
Apr 12 11:38:50 testmachine kernel: RIP: 0010:kmem_cache_alloc_trace+0x7b/0x190
Apr 12 11:38:50 testmachine kernel: RSP: 0018:ffffa479a0e03ad0 EFLAGS: 00010202
Apr 12 11:38:50 testmachine kernel: RAX: 0000000000000000 RBX: 00000000014000c0 RCX: 0000000000005291
Apr 12 11:38:50 testmachine kernel: RDX: 0000000000005290 RSI: 00000000014000c0 RDI: 000000000001c5c0
Apr 12 11:38:50 testmachine kernel: RBP: ffffa479a0e03b00 R08: ffff9367bfbdc5c0 R09: ffff936724698580
Apr 12 11:38:50 testmachine kernel: R10: 0017ffffc0040038 R11: 0000000000000007 R12: 00000000014000c0
Apr 12 11:38:50 testmachine kernel: R13: ffff93679f003b80 R14: ffffffffc0b9090f R15: ffff93679f003b80
Apr 12 11:38:50 testmachine kernel: FS: 00007f5a069c4040(0000) GS:ffff9367bfbc0000(0000) knlGS:0000000000000000
Apr 12 11:38:50 testmachine kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Apr 12 11:38:50 testmachine kernel: CR2: 00007f5a068de000 CR3: 00000007ccb8b000 CR4: 00000000001426e0
Apr 12 11:38:50 testmachine kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Apr 12 11:38:50 testmachine kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Apr 12 11:38:50 testmachine kernel: Call Trace:
Apr 12 11:38:50 testmachine kernel: i915_gem_object_get_pages_internal+0x6f/0x250 [i915]
Apr 12 11:38:50 testmachine kernel: ? kmem_cache_alloc+0x185/0x1a0
Apr 12 11:38:50 testmachine kernel: ____i915_gem_object_get_pages+0x20/0x60 [i915]
Apr 12 11:38:50 testmachine kernel: __i915_gem_object_get_pages+0x52/0x60 [i915]
Apr 12 11:38:50 testmachine kernel: i915_gem_batch_pool_get+0x11d/0x180 [i915]
Apr 12 11:38:50 testmachine kernel: i915_gem_do_execbuffer.isra.38+0x1027/0x1790 [i915]
Apr 12 11:38:50 testmachine kernel: ? shmem_getpage_gfp+0xf9/0xc20
Apr 12 11:38:50 testmachine kernel: i915_gem_execbuffer2+0xc5/0x240 [i915]
Apr 12 11:38:50 testmachine kernel: drm_ioctl+0x21b/0x4c0 [drm]
Apr 12 11:38:50 testmachine kernel: ? i915_gem_execbuffer+0x310/0x310 [i915]
Apr 12 11:38:50 testmachine kernel: ? __seccomp_filter+0x67/0x250
Apr 12 11:38:50 testmachine kernel: do_vfs_ioctl+0xa3/0x610
Apr 12 11:38:50 testmachine kernel: ? __secure_computing+0x3f/0xd0
Apr 12 11:38:50 testmachine kernel: ? syscall_trace_enter+0xcd/0x2e0
Apr 12 11:38:50 testmachine kernel: SyS_ioctl+0x79/0x90
Apr 12 11:38:50 testmachine kernel: do_syscall_64+0x5b/0xc0
Apr 12 11:38:50 testmachine kernel: entry_SYSCALL64_slow_path+0x25/0x25
Apr 12 11:38:50 testmachine kernel: RIP: 0033:0x7f59fba67ca7
Apr 12 11:38:50 testmachine kernel: RSP: 002b:00007ffd39778868 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
Apr 12 11:38:50 testmachine kernel: RAX: ffffffffffffffda RBX: 000024e398f52800 RCX: 00007f59fba67ca7
Apr 12 11:38:50 testmachine kernel: RDX: 00007ffd397788b0 RSI: 0000000040406469 RDI: 00000000000000a4
Apr 12 11:38:50 testmachine kernel: RBP: 00007ffd397788b0 R08: 0000000000000000 R09: 0000000000000000
Apr 12 11:38:50 testmachine kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000000040406469
Apr 12 11:38:50 testmachine kernel: R13: 00000000000000a4 R14: 000024e399dd82c0 R15: 0000000000000070
Apr 12 11:38:50 testmachine kernel: Code: 08 65 4c 03 05 e7 de 9e 68 49 83 78 10 00 4d 8b 10 0f 84 e0 00 00 00 4d 85 d2 0f 84 d7 00 00 00 49 63 47 20 49 8b 3f 48 8d 4a 01 <49> 8b 1c 02 4c 89 d0 65 48 0f c7 0f 0f 94 c0 84 c0 74 bb 49 63
Apr 12 11:38:50 testmachine kernel: RIP: kmem_cache_alloc_trace+0x7b/0x190 RSP: ffffa479a0e03ad0
Apr 12 11:38:50 testmachine kernel: general protection fault: 0000 [#2 ] SMP
Apr 12 11:38:50 testmachine kernel: general protection fault: 0000 [#3 ] SMP
or:
Apr 12 09:19:35 testmachine kernel: BUG: unable to handle kernel NULL pointer dereference at 000000000000019c
Apr 12 09:19:35 testmachine kernel: IP: __free_pages+0x5/0x30
Apr 12 09:19:35 testmachine kernel: PGD 0
Apr 12 09:19:35 testmachine kernel:
Apr 12 09:19:35 testmachine kernel: Oops: 0002 [#1 ] SMP
Apr 12 09:19:35 testmachine kernel: Modules linked in: act_police cls_basic sch_ingress veth nfsv3 nfs_acl nfs lockd grace ip6t_REJECT nf_reject_ipv6 nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables xt_mac ipt_REJECT nf_reject_ipv4 xt_physdev xt_comment nf_conntrack_ipv4 nf_defrag_ipv4 xt_tcpudp xt_mark xt_set xt_addrtype xt_multiport xt_conntrack nf_conntrack ip_set_hash_net ip_set arc4 md4 nls_utf8 cifs ccm fscache ipta
Apr 12 09:19:35 testmachine kernel: aes_x86_64 crypto_simd glue_helper cryptd intel_cstate snd_hda_codec_realtek snd_hda_codec_generic i915 intel_rapl_perf snd_hda_intel drm_kms_helper input_leds joydev snd_hda_codec drm snd_hda_core snd_hwdep i2c_algo_bit fb_sys_fops snd_pcm syscopyarea snd_timer sysfillrect sysimgblt snd soundcore mei_me shpchp lpc_ich mei pcspkr tpm_infineon wmi video mac_hid acpi_pad vhost_net vhost macvtap mac
Apr 12 09:19:35 testmachine kernel: CPU: 2 PID: 69 Comm: kworker/2:1 Tainted: P W O 4.10.5-1-pve #1
Apr 12 09:19:35 testmachine kernel: Hardware name: ASUS All Series/Z97-A, BIOS 2801 11/11/2015
Apr 12 09:19:35 testmachine kernel: Workqueue: events __i915_gem_free_work [i915]
Apr 12 09:19:35 testmachine kernel: task: ffff88885b134380 task.stack: ffffa7e243410000
Apr 12 09:19:35 testmachine kernel: RIP: 0010:__free_pages+0x5/0x30
Apr 12 09:19:35 testmachine kernel: RSP: 0018:ffffa7e243413d18 EFLAGS: 00010206
Apr 12 09:19:35 testmachine kernel: RAX: 00000000000ffff8 RBX: ffff888762473460 RCX: ffff888762473470
Apr 12 09:19:35 testmachine kernel: RDX: ffff888762473460 RSI: 0000000000000014 RDI: 0000000000000180
Apr 12 09:19:35 testmachine kernel: RBP: ffffa7e243413d38 R08: 0000000000000000 R09: 0000000000000000
Apr 12 09:19:35 testmachine kernel: R10: ffff8887dd8c1080 R11: 0000000000000000 R12: ffff8887624738f0
Apr 12 09:19:35 testmachine kernel: R13: 00000000ffffffff R14: ffff8887dd8c0440 R15: 0000000000000000
Apr 12 09:19:35 testmachine kernel: FS: 0000000000000000(0000) GS:ffff88887fa80000(0000) knlGS:0000000000000000
Apr 12 09:19:35 testmachine kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Apr 12 09:19:35 testmachine kernel: CR2: 000000000000019c CR3: 0000000476e09000 CR4: 00000000001426e0
Apr 12 09:19:35 testmachine kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Apr 12 09:19:35 testmachine kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Apr 12 09:19:35 testmachine kernel: Call Trace:
Apr 12 09:19:35 testmachine kernel: ? internal_free_pages+0x40/0x80 [i915]
Apr 12 09:19:35 testmachine kernel: i915_gem_object_put_pages_internal+0x1f/0x30 [i915]
Apr 12 09:19:35 testmachine kernel: __i915_gem_object_put_pages.part.62+0x11d/0x180 [i915]
Apr 12 09:19:35 testmachine kernel: ? dma_fence_context_alloc+0x20/0x20
Apr 12 09:19:35 testmachine kernel: __i915_gem_free_objects+0x161/0x330 [i915]
Apr 12 09:19:35 testmachine kernel: __i915_gem_free_work+0x33/0x50 [i915]
Apr 12 09:19:35 testmachine kernel: process_one_work+0x1fc/0x4b0
Apr 12 09:19:35 testmachine kernel: worker_thread+0x4b/0x500
Apr 12 09:19:35 testmachine kernel: kthread+0x101/0x140
Apr 12 09:19:35 testmachine kernel: ? process_one_work+0x4b0/0x4b0
Apr 12 09:19:35 testmachine kernel: ? kthread_create_on_node+0x60/0x60
Apr 12 09:19:35 testmachine kernel: ret_from_fork+0x2c/0x40
Apr 12 09:19:35 testmachine kernel: Code: ff 41 b8 05 00 00 00 31 c9 4c 89 ea 4c 89 fe e8 a2 e0 ff ff e9 1e ff ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 <f0> ff 4f 1c 75 0e 55 85 f6 48 89 e5 74 08 e8 48 e4 ff ff 5d f3
Apr 12 09:19:35 testmachine kernel: RIP: __free_pages+0x5/0x30 RSP: ffffa7e243413d18
Apr 12 09:19:35 testmachine kernel: CR2: 000000000000019c
Apr 12 09:19:35 testmachine kernel: ---[ end trace 89cb022ec57f7bd1 ]---
Wolfgang Bumiller (2):
net sched actions: fix access to uninitialized data
net sched actions: decrement module refcount earlier
net/sched/act_api.c | 19 ++++++++++---------
1 file changed, 10 insertions(+), 9 deletions(-)
2017-04-13 11:23:43 +02:00
Fabian Grünbichler
414354736d
build: allow building as regular user
...
removing and recreating this folder is not necessary, and
prevents us from building with fakeroot instead of as root
2017-04-12 10:37:37 +02:00
Fabian Grünbichler
5b628387dd
update kernel source to Ubuntu-4.10.0-19.21
2017-04-12 10:36:44 +02:00
Fabian Grünbichler
37d1dcf34b
bump version to 4.10.5-5
2017-03-29 15:14:12 +02:00
Fabian Grünbichler
e0f4973c76
correctly set default scheduler to deadline
2017-03-29 15:12:55 +02:00