CONFIG_ANDROID_BINDER_IPC=m is missing in the custom rolling kernels
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Undecided
|
Unassigned | |||
Bionic |
Undecided
|
Unassigned | |||
Disco |
Undecided
|
Unassigned | |||
Eoan |
Undecided
|
Unassigned | |||
linux-azure (Ubuntu) |
Undecided
|
Marcelo Cerri | |||
Bionic |
Undecided
|
Unassigned | |||
Disco |
Undecided
|
Unassigned | |||
Eoan |
Undecided
|
Unassigned | |||
linux-gcp (Ubuntu) |
High
|
Khaled El Mously | |||
Bionic |
Undecided
|
Unassigned | |||
Disco |
Undecided
|
Unassigned | |||
Eoan |
Undecided
|
Unassigned |
Bug Description
The rolling GCP kernel for bionic is missing CONFIG_
As we require CONFIG_
All relevant changes from Christian Brauner to enable binder in the Ubuntu kernel are present in the GCP kernel (see https:/
See https:/
Changed in linux (Ubuntu): | |
importance: | Undecided → High |
status: | New → Confirmed |
assignee: | nobody → Khaled El Mously (kmously) |
summary: |
- CONFIG_ANDROID_BINDER_IPC=m is missing in the GCP rolling kernel for - bionic + CONFIG_ANDROID_BINDER_IPC=m is missing in the custom rolling kernels |
Changed in linux-azure (Ubuntu): | |
assignee: | nobody → Marcelo Cerri (mhcerri) |
Changed in linux-gcp (Ubuntu): | |
assignee: | nobody → Khaled El Mously (kmously) |
importance: | Undecided → High |
status: | New → Confirmed |
Changed in linux-azure (Ubuntu): | |
status: | New → Incomplete |
no longer affects: | linux (Ubuntu) |
no longer affects: | linux (Ubuntu Bionic) |
no longer affects: | linux (Ubuntu Disco) |
no longer affects: | linux (Ubuntu Eoan) |
no longer affects: | linux-azure (Ubuntu Bionic) |
no longer affects: | linux-azure (Ubuntu Disco) |
no longer affects: | linux-azure (Ubuntu Eoan) |
no longer affects: | linux-gcp (Ubuntu Bionic) |
no longer affects: | linux-gcp (Ubuntu Disco) |
no longer affects: | linux-gcp (Ubuntu Eoan) |
Changed in linux (Ubuntu): | |
status: | New → Incomplete |
Changed in linux (Ubuntu Bionic): | |
status: | New → Incomplete |
Changed in linux (Ubuntu Disco): | |
status: | New → Incomplete |
Changed in linux (Ubuntu Eoan): | |
status: | New → Incomplete |
Launchpad Janitor (janitor) wrote : | #2 |
This bug was fixed in the package linux-gcp - 5.0.0-1025.26
---------------
linux-gcp (5.0.0-1025.26) disco; urgency=medium
* CVE-2019-11135
- [Config] gcp: Disable TSX by default when possible
[ Ubuntu: 5.0.0-35.38 ]
* [REGRESSION] md/raid0: cannot assemble multi-zone RAID0 with default_layout
setting (LP: #1849682)
- SAUCE: Fix revert "md/raid0: avoid RAID0 data corruption due to layout
confusion."
* refcount underflow and type confusion in shiftfs (LP: #1850867) // CVE-2019-15793
- SAUCE: shiftfs: Correct id translation for lower fs operations
- SAUCE: shiftfs: prevent type confusion
- SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
* CVE-2018-12207
- kvm: Convert kvm_lock to a mutex
- kvm: x86: Do not release the page inside mmu_set_spte()
- KVM: x86: make FNAME(fetch) and __direct_map more similar
- KVM: x86: remove now unneeded hugepage gfn adjustment
- KVM: x86: change kvm_mmu_
- KVM: x86: add tracepoints around __direct_map and FNAME(fetch)
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry
- SAUCE: KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is
active
- SAUCE: x86: Add ITLB_MULTIHIT bug infrastructure
- SAUCE: kvm: mmu: ITLB_MULTIHIT mitigation
- SAUCE: kvm: Add helper function for creating VM worker threads
- SAUCE: kvm: x86: mmu: Recovery of shattered NX large pages
- SAUCE: cpu/speculation: Uninline and export CPU mitigations helpers
- SAUCE: kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT
* CVE-2019-11135
- KVM: x86: use Intel speculation bugs and features as derived in generic x86
code
- x86/msr: Add the IA32_TSX_CTRL MSR
- x86/cpu: Add a helper function x86_read_
- x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default
- x86/speculation
- x86/speculation
- kvm/x86: Export MDS_NO=0 to guests when TSX is enabled
- x86/tsx: Add "auto" option to the tsx= cmdline parameter
- x86/speculation
- x86/tsx: Add config options to set tsx=on|off|auto
- SAUCE: x86/speculation
- [Config] Disable TSX by default when possible
* CVE-2019-0154
- SAUCE: drm/i915: Lower RM timeout to avoid DSI hard hangs
- SAUCE: drm/i915/gen8+: Add RC6 CTX corruption WA
* CVE-2019-0155
- SAUCE: drm/i915: Rename gen7 cmdparser tables
- SAUCE: drm/i915: Disable Secure Batches for gen6+
- SAUCE: drm/i915: Remove Master tables from cmdparser
- SAUCE: drm/i915: Add support for mandatory cmdparsing
- SAUCE: drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
- SAUCE: drm/i915: Allow parsing of unsized batches
- SAUCE: drm/i915: Add gen9 BCS cmdparsing
- SAUCE: drm/i915/cmdparser: Use explicit goto for error paths
- SAUCE: drm/i915/cmdparser: Add support for backward jumps
- SAUCE: drm/i915/cmdparser: Ignore Length operands during command matching
[ Ubuntu: 5.0.0-34.36 ]
* disco/linux:...
Changed in linux-gcp (Ubuntu Disco): | |
status: | New → Fix Released |
Launchpad Janitor (janitor) wrote : | #3 |
This bug was fixed in the package linux-gcp - 5.0.0-1025.
---------------
linux-gcp (5.0.0-
[ Ubuntu: 5.0.0-1025.26 ]
* CVE-2019-11135
- [Config] gcp: Disable TSX by default when possible
* [REGRESSION] md/raid0: cannot assemble multi-zone RAID0 with default_layout
setting (LP: #1849682)
- SAUCE: Fix revert "md/raid0: avoid RAID0 data corruption due to layout
confusion."
* refcount underflow and type confusion in shiftfs (LP: #1850867) // CVE-2019-15793
- SAUCE: shiftfs: Correct id translation for lower fs operations
- SAUCE: shiftfs: prevent type confusion
- SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
* CVE-2018-12207
- kvm: Convert kvm_lock to a mutex
- kvm: x86: Do not release the page inside mmu_set_spte()
- KVM: x86: make FNAME(fetch) and __direct_map more similar
- KVM: x86: remove now unneeded hugepage gfn adjustment
- KVM: x86: change kvm_mmu_
- KVM: x86: add tracepoints around __direct_map and FNAME(fetch)
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry
- SAUCE: KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is
active
- SAUCE: x86: Add ITLB_MULTIHIT bug infrastructure
- SAUCE: kvm: mmu: ITLB_MULTIHIT mitigation
- SAUCE: kvm: Add helper function for creating VM worker threads
- SAUCE: kvm: x86: mmu: Recovery of shattered NX large pages
- SAUCE: cpu/speculation: Uninline and export CPU mitigations helpers
- SAUCE: kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT
* CVE-2019-11135
- KVM: x86: use Intel speculation bugs and features as derived in generic x86
code
- x86/msr: Add the IA32_TSX_CTRL MSR
- x86/cpu: Add a helper function x86_read_
- x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default
- x86/speculation
- x86/speculation
- kvm/x86: Export MDS_NO=0 to guests when TSX is enabled
- x86/tsx: Add "auto" option to the tsx= cmdline parameter
- x86/speculation
- x86/tsx: Add config options to set tsx=on|off|auto
- SAUCE: x86/speculation
- [Config] Disable TSX by default when possible
* CVE-2019-0154
- SAUCE: drm/i915: Lower RM timeout to avoid DSI hard hangs
- SAUCE: drm/i915/gen8+: Add RC6 CTX corruption WA
* CVE-2019-0155
- SAUCE: drm/i915: Rename gen7 cmdparser tables
- SAUCE: drm/i915: Disable Secure Batches for gen6+
- SAUCE: drm/i915: Remove Master tables from cmdparser
- SAUCE: drm/i915: Add support for mandatory cmdparsing
- SAUCE: drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
- SAUCE: drm/i915: Allow parsing of unsized batches
- SAUCE: drm/i915: Add gen9 BCS cmdparsing
- SAUCE: drm/i915/cmdparser: Use explicit goto for error paths
- SAUCE: drm/i915/cmdparser: Add support for backward jumps
- SAUCE: drm/i915/cmdparser: Ignore Length operands during command matching
* disco/linux: <version ...
Changed in linux-gcp (Ubuntu Bionic): | |
status: | New → Fix Released |
Simon Fels (morphis) wrote : | #4 |
Just checked on my bionic GCE instance today that the binder driver is now there:
ubuntu@
/lib/modules/
Thanks!
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1849493
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.