This bug was fixed in the package linux-oem-5.6 - 5.6.0-1048.52

---------------
linux-oem-5.6 (5.6.0-1048.52) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker (LP: #1913153)

  * Packaging resync (LP: #1786013)
    - update dkms package versions

  * udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test
    result (LP: #1908499)
    - selftests: fix the return value for UDP GRO test

  * CVE-2020-27815
    - jfs: Fix array index bounds check in dbAdjTree

  * CVE-2020-25704
    - perf/core: Fix a memory leak in perf_event_parse_addr_filter()

  * CVE-2020-25643
    - hdlc_ppp: add range checks in ppp_cp_parse_cr()

  * CVE-2020-25641
    - block: allow for_each_bvec to support zero len bvec

  * CVE-2020-25284
    - rbd: require global CAP_SYS_ADMIN for mapping and unmapping

  * CVE-2020-25212
    - nfs: Fix getxattr kernel panic and memory overflow

  * CVE-2020-28588
    - lib/syscall: fix syscall registers retrieval on 32-bit platforms

  * CVE-2020-29371
    - romfs: fix uninitialized memory leak in romfs_dev_read()

  * CVE-2020-29369
    - mm/mmap.c: close race between munmap() and expand_upwards()/downwards()

  * CVE-2020-29368
    - mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()

  * CVE-2020-29660
    - tty: Fix ->session locking

  * CVE-2020-29661
    - tty: Fix ->pgrp locking in tiocspgrp()

  * CVE-2020-35508
    - fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent

  * CVE-2020-24490
    - Bluetooth: fix kernel oops in store_pending_adv_report

  * CVE-2020-14314
    - ext4: fix potential negative array index in do_split()

  * CVE-2020-10135
    - Bluetooth: Consolidate encryption handling in hci_encrypt_cfm
    - Bluetooth: Disconnect if E0 is used for Level 4

  * CVE-2020-27152
    - KVM: ioapic: break infinite recursion on lazy EOI

  * CVE-2020-28915
    - fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h
    - Fonts: Support FONT_EXTRA_WORDS macros for built-in fonts

  * CVE-2020-15437
    - serial: 8250: fix null-ptr-deref in serial8250_start_tx()

  * CVE-2020-15436
    - block: Fix use-after-free in blkdev_get()

  * switch to an autogenerated nvidia series based core via dkms-versions
    (LP: #1912803)
    - [Config] dkms-versions -- add transitional/skip information for nvidia
      packages
    - [Packaging] nvidia -- use dkms-versions to define versions built
    - [Packaging] update-version-dkms -- maintain flags fields

  * S3 stress test fails with amdgpu errors (LP: #1909453)
    - drm/amdgpu: asd function needs to be unloaded in suspend phase
    - drm/amdgpu: add TMR destory function for psp

 -- Timo Aaltonen <timo.aalto...@canonical.com>  Thu, 18 Feb 2021
13:11:14 +0200

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1908499

Title:
  udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting
  sub-test result

Status in ubuntu-kernel-tests:
  In Progress
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released
Status in linux-oem-5.10 source package in Focal:
  Fix Released
Status in linux-oem-5.6 source package in Focal:
  Fix Released
Status in linux source package in Groovy:
  Fix Released
Status in linux source package in Hirsute:
  Fix Released

Bug description:
  [Impact]
  In udpgro.sh, the exit value is 0 even if there are some failed sub
  test cases:

  $ sudo ./udpgro.sh
  ipv4
   no GRO
  BTF debug data section '.BTF' rejected: Invalid argument (22)!
   - Length: 568
  Verifier analysis:

  magic: 0xeb9f
  version: 1
  flags: 0x0
  hdr_len: 24
  type_off: 0
  type_len: 256
  str_off: 256
  str_len: 288
  btf_total_size: 568
  [1] PTR (anon) type_id=2
  [2] STRUCT xdp_md size=20 vlen=5
   data type_id=3 bits_offset=0
   data_end type_id=3 bits_offset=32
   data_meta type_id=3 bits_offset=64
   ingress_ifindex type_id=3 bits_offset=96
   rx_queue_index type_id=3 bits_offset=128
  [3] TYPEDEF __u32 type_id=4
  [4] INT unsigned int size=4 bits_offset=0 nr_bits=32 encoding=(none)
  [5] FUNC_PROTO (anon) return=6 args=(1 ctx)
  [6] INT int size=4 bits_offset=0 nr_bits=32 encoding=SIGNED
  [7] FUNC xdp_dummy_prog type_id=5
  [8] INT char size=1 bits_offset=0 nr_bits=8 encoding=SIGNED
  [9] ARRAY (anon) type_id=8 index_type_id=10 nr_elems=4
  [10] INT __ARRAY_SIZE_TYPE__ size=4 bits_offset=0 nr_bits=32 encoding=(none)
  [11] VAR _license type_id=9 linkage=1
  [12] DATASEC license size=0 vlen=1 size == 0

  ./udpgso_bench_rx: poll: 0x0 expected 0x1

  failed
  ./udpgso_bench_tx: write: Connection refused

  ...

   multiple GRO socks
  BTF debug data section '.BTF' rejected: Invalid argument (22)!
   - Length: 568
  Verifier analysis:

  magic: 0xeb9f
  version: 1
  flags: 0x0
  hdr_len: 24
  type_off: 0
  type_len: 256
  str_off: 256
  str_len: 288
  btf_total_size: 568
  [1] PTR (anon) type_id=2
  [2] STRUCT xdp_md size=20 vlen=5
   data type_id=3 bits_offset=0
   data_end type_id=3 bits_offset=32
   data_meta type_id=3 bits_offset=64
   ingress_ifindex type_id=3 bits_offset=96
   rx_queue_index type_id=3 bits_offset=128
  [3] TYPEDEF __u32 type_id=4
  [4] INT unsigned int size=4 bits_offset=0 nr_bits=32 encoding=(none)
  [5] FUNC_PROTO (anon) return=6 args=(1 ctx)
  [6] INT int size=4 bits_offset=0 nr_bits=32 encoding=SIGNED
  [7] FUNC xdp_dummy_prog type_id=5
  [8] INT char size=1 bits_offset=0 nr_bits=8 encoding=SIGNED
  [9] ARRAY (anon) type_id=8 index_type_id=10 nr_elems=4
  [10] INT __ARRAY_SIZE_TYPE__ size=4 bits_offset=0 nr_bits=32 encoding=(none)
  [11] VAR _license type_id=9 linkage=1
  [12] DATASEC license size=0 vlen=1 size == 0

  ./udpgso_bench_rx: poll: 0x0 expected 0x1

  ./udpgso_bench_rx: poll: 0x0 expected 0x1

  failed
  $ echo $?
  0

  [Fix]
  * 3503ee6c0bec5f ("selftests: fix the return value for UDP GRO test")

  We have this test since Focal.
  This patch can be cherry-picked into all the affected kernels.

  [Test]
  Run this test with:
    sudo ./udpgro.sh

  And check its final return value with:
    echo $?

  If there is any failure, the return value should not be 0.

  [Where problems could occur]
  If this fix is incorrect it might affect the test execution, but it
  should be fine as this is just affecting the test tool. Also, with
  this patch, we are expecting to see this test case to fail until
  bug 1908501 got fixed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1908499/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to