Public bug reported:

Steps to reproduce:

$ lxc launch ubuntu-daily:f reproducer
$ lxc shell reproducer
$ vgs

Expected behaviour:

  No output (the behaviour on an EC2 instance with no VGs).

Actual behaviour:

  Outputs "File descriptor 25 (anon_inode:[eventfd]) leaked on vgs
invocation. Parent PID 283: -bash"

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: lvm2 2.03.07-1ubuntu1
ProcVersionSignature: Ubuntu 5.0.0-1028.29~18.04.1-gcp 5.0.21
Uname: Linux 5.0.0-1028-gcp x86_64
NonfreeKernelModules: lkp_Ubuntu_5_0_0_1028_29_gcp_65 
lkp_Ubuntu_5_0_0_1028_29_gcp_64 nf_tables lkp_Ubuntu_5_0_0_1028_29_gcp_63 
ebtable_filter ebtables ufs msdos xfs binfmt_misc veth ip6t_MASQUERADE 
ip6table_nat nf_nat_ipv6 ipt_MASQUERADE xt_CHECKSUM xt_comment xt_tcpudp 
iptable_nat nf_nat_ipv4 nf_nat iptable_mangle bridge stp llc zfs zunicode zavl 
icp zcommon znvpair spl ip6table_filter ip6_tables iptable_filter bpfilter 
nls_iso8859_1 input_leds serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 
crypto_simd cryptd glue_helper virtio_net net_failover failover psmouse
ApportVersion: 2.20.11-0ubuntu24
Architecture: amd64
Date: Tue Apr  7 20:19:14 2020
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=<set>
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: lvm2
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: lvm2 (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug focal uec-images

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lvm2 in Ubuntu.
https://bugs.launchpad.net/bugs/1871487

Title:
  anon_inode:[eventfd] leaked on vgs invocation inside lxd container

Status in lvm2 package in Ubuntu:
  New

Bug description:
  Steps to reproduce:

  $ lxc launch ubuntu-daily:f reproducer
  $ lxc shell reproducer
  $ vgs

  Expected behaviour:

    No output (the behaviour on an EC2 instance with no VGs).

  Actual behaviour:

    Outputs "File descriptor 25 (anon_inode:[eventfd]) leaked on vgs
  invocation. Parent PID 283: -bash"

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: lvm2 2.03.07-1ubuntu1
  ProcVersionSignature: Ubuntu 5.0.0-1028.29~18.04.1-gcp 5.0.21
  Uname: Linux 5.0.0-1028-gcp x86_64
  NonfreeKernelModules: lkp_Ubuntu_5_0_0_1028_29_gcp_65 
lkp_Ubuntu_5_0_0_1028_29_gcp_64 nf_tables lkp_Ubuntu_5_0_0_1028_29_gcp_63 
ebtable_filter ebtables ufs msdos xfs binfmt_misc veth ip6t_MASQUERADE 
ip6table_nat nf_nat_ipv6 ipt_MASQUERADE xt_CHECKSUM xt_comment xt_tcpudp 
iptable_nat nf_nat_ipv4 nf_nat iptable_mangle bridge stp llc zfs zunicode zavl 
icp zcommon znvpair spl ip6table_filter ip6_tables iptable_filter bpfilter 
nls_iso8859_1 input_leds serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 
crypto_simd cryptd glue_helper virtio_net net_failover failover psmouse
  ApportVersion: 2.20.11-0ubuntu24
  Architecture: amd64
  Date: Tue Apr  7 20:19:14 2020
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=<set>
   LANG=C.UTF-8
   SHELL=/bin/bash
  SourcePackage: lvm2
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lvm2/+bug/1871487/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to