Activity log for bug #1359670

Date Who What changed Old value New value Message
2014-08-21 10:35:59 Jack Leigh bug added bug
2014-08-21 10:44:15 Andy Whitcroft nominated for series Ubuntu Trusty
2014-08-21 10:44:15 Andy Whitcroft bug task added linux (Ubuntu Trusty)
2014-08-21 10:44:15 Andy Whitcroft nominated for series Ubuntu Utopic
2014-08-21 10:44:15 Andy Whitcroft bug task added linux (Ubuntu Utopic)
2014-08-21 10:44:28 Andy Whitcroft linux (Ubuntu Utopic): status New Fix Released
2014-08-21 10:44:34 Andy Whitcroft linux (Ubuntu Trusty): status New In Progress
2014-08-21 10:44:37 Andy Whitcroft linux (Ubuntu Trusty): importance Undecided Medium
2014-08-21 10:44:40 Andy Whitcroft linux (Ubuntu Trusty): assignee Andy Whitcroft (apw)
2014-08-21 10:44:43 Andy Whitcroft linux (Ubuntu Utopic): importance Undecided Medium
2014-08-21 10:44:45 Andy Whitcroft linux (Ubuntu Utopic): assignee Andy Whitcroft (apw)
2014-08-21 12:27:34 Andy Whitcroft description The issue is explained in detail at http://lwn.net/Articles/588799/ I am trying to load a backported drm module using dkms. It is not signed so is listed as tainted and trace points are disabled. As explained in the above article this is because the TAINT_FORCED MODULE flag is incorrectly set for unsigned modules. The final patch to fix this and add a TAINT_UNSIGNED_MODULE that does not disable trace points can be found at http://lwn.net/Articles/588803/ (fixed in 3.15) Please consider shipping this patch. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-34-generic 3.13.0-34.60 ProcVersionSignature: Ubuntu 3.13.0-34.60-generic 3.13.11.4 Uname: Linux 3.13.0-34-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/controlC0: badger 2013 F.... pulseaudio CurrentDesktop: Unity Date: Thu Aug 21 11:28:15 2014 HibernationDevice: RESUME=UUID=21f8f6b4-495d-4bc6-8dec-1f78435d4b95 InstallationDate: Installed on 2014-06-30 (51 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) MachineType: LENOVO 0301CTO ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-34-generic root=UUID=d56caf05-a203-436f-8497-b8a37294fe8a ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-34-generic N/A linux-backports-modules-3.13.0-34-generic N/A linux-firmware 1.127.5 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 10/14/2010 dmi.bios.vendor: LENOVO dmi.bios.version: 80ET42WW (1.19 ) dmi.board.name: 0301CTO dmi.board.vendor: LENOVO dmi.board.version: Not Available dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvr80ET42WW(1.19):bd10/14/2010:svnLENOVO:pn0301CTO:pvrThinkPadEdge:rvnLENOVO:rn0301CTO:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 0301CTO dmi.product.version: ThinkPad Edge dmi.sys.vendor: LENOVO [Impact] Developers are unable to unable to use kernel tracing functions on kernel modules they have themselves compiled. This makes Ubuntu a poor platform for module developement and debugging. [Test Case] Build an OOT or modified version of a module, insert it and notice that tracing becomes disabled. Apply updated kernel and confirm the same does not occur. [Regression Potential] This only changes the taint infrastructure to introduce a single new flag. Should be very low risk. === The issue is explained in detail at http://lwn.net/Articles/588799/ I am trying to load a backported drm module using dkms. It is not signed so is listed as tainted and trace points are disabled. As explained in the above article this is because the TAINT_FORCED MODULE flag is incorrectly set for unsigned modules. The final patch to fix this and add a TAINT_UNSIGNED_MODULE that does not disable trace points can be found at http://lwn.net/Articles/588803/ (fixed in 3.15) Please consider shipping this patch. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-34-generic 3.13.0-34.60 ProcVersionSignature: Ubuntu 3.13.0-34.60-generic 3.13.11.4 Uname: Linux 3.13.0-34-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.3 Architecture: amd64 AudioDevicesInUse:  USER PID ACCESS COMMAND  /dev/snd/controlC0: badger 2013 F.... pulseaudio CurrentDesktop: Unity Date: Thu Aug 21 11:28:15 2014 HibernationDevice: RESUME=UUID=21f8f6b4-495d-4bc6-8dec-1f78435d4b95 InstallationDate: Installed on 2014-06-30 (51 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) MachineType: LENOVO 0301CTO ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-34-generic root=UUID=d56caf05-a203-436f-8497-b8a37294fe8a ro quiet splash vt.handoff=7 RelatedPackageVersions:  linux-restricted-modules-3.13.0-34-generic N/A  linux-backports-modules-3.13.0-34-generic N/A  linux-firmware 1.127.5 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 10/14/2010 dmi.bios.vendor: LENOVO dmi.bios.version: 80ET42WW (1.19 ) dmi.board.name: 0301CTO dmi.board.vendor: LENOVO dmi.board.version: Not Available dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvr80ET42WW(1.19):bd10/14/2010:svnLENOVO:pn0301CTO:pvrThinkPadEdge:rvnLENOVO:rn0301CTO:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 0301CTO dmi.product.version: ThinkPad Edge dmi.sys.vendor: LENOVO
2014-08-21 18:37:25 Andy Whitcroft linux (Ubuntu Trusty): status In Progress Fix Committed
2014-09-04 18:32:53 Launchpad Janitor branch linked lp:ubuntu/trusty-proposed/linux-keystone
2014-09-05 15:09:26 Launchpad Janitor branch linked lp:ubuntu/precise-proposed/linux-lts-trusty
2014-09-08 20:28:59 Brad Figg tags amd64 apport-bug third-party-packages trusty amd64 apport-bug third-party-packages trusty verification-needed-trusty
2014-09-22 22:45:50 Launchpad Janitor linux (Ubuntu Trusty): status Fix Committed Fix Released
2014-09-22 22:45:50 Launchpad Janitor cve linked 2014-3601
2014-09-22 22:45:50 Launchpad Janitor cve linked 2014-5077
2014-09-22 22:45:50 Launchpad Janitor cve linked 2014-5472
2014-09-22 23:43:49 Launchpad Janitor branch linked lp:ubuntu/precise-security/linux-lts-trusty
2014-10-01 19:24:09 Brad Figg tags amd64 apport-bug third-party-packages trusty verification-needed-trusty amd64 apport-bug third-party-packages trusty verification-done-trusty