This bug was fixed in the package linux-oem-5.6 - 5.6.0-1048.52 --------------- linux-oem-5.6 (5.6.0-1048.52) focal; urgency=medium
* focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker (LP: #1913153) * Packaging resync (LP: #1786013) - update dkms package versions * udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test result (LP: #1908499) - selftests: fix the return value for UDP GRO test * CVE-2020-27815 - jfs: Fix array index bounds check in dbAdjTree * CVE-2020-25704 - perf/core: Fix a memory leak in perf_event_parse_addr_filter() * CVE-2020-25643 - hdlc_ppp: add range checks in ppp_cp_parse_cr() * CVE-2020-25641 - block: allow for_each_bvec to support zero len bvec * CVE-2020-25284 - rbd: require global CAP_SYS_ADMIN for mapping and unmapping * CVE-2020-25212 - nfs: Fix getxattr kernel panic and memory overflow * CVE-2020-28588 - lib/syscall: fix syscall registers retrieval on 32-bit platforms * CVE-2020-29371 - romfs: fix uninitialized memory leak in romfs_dev_read() * CVE-2020-29369 - mm/mmap.c: close race between munmap() and expand_upwards()/downwards() * CVE-2020-29368 - mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked() * CVE-2020-29660 - tty: Fix ->session locking * CVE-2020-29661 - tty: Fix ->pgrp locking in tiocspgrp() * CVE-2020-35508 - fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent * CVE-2020-24490 - Bluetooth: fix kernel oops in store_pending_adv_report * CVE-2020-14314 - ext4: fix potential negative array index in do_split() * CVE-2020-10135 - Bluetooth: Consolidate encryption handling in hci_encrypt_cfm - Bluetooth: Disconnect if E0 is used for Level 4 * CVE-2020-27152 - KVM: ioapic: break infinite recursion on lazy EOI * CVE-2020-28915 - fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h - Fonts: Support FONT_EXTRA_WORDS macros for built-in fonts * CVE-2020-15437 - serial: 8250: fix null-ptr-deref in serial8250_start_tx() * CVE-2020-15436 - block: Fix use-after-free in blkdev_get() * switch to an autogenerated nvidia series based core via dkms-versions (LP: #1912803) - [Config] dkms-versions -- add transitional/skip information for nvidia packages - [Packaging] nvidia -- use dkms-versions to define versions built - [Packaging] update-version-dkms -- maintain flags fields * S3 stress test fails with amdgpu errors (LP: #1909453) - drm/amdgpu: asd function needs to be unloaded in suspend phase - drm/amdgpu: add TMR destory function for psp -- Timo Aaltonen <timo.aalto...@canonical.com> Thu, 18 Feb 2021 13:11:14 +0200 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1908499 Title: udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test result Status in ubuntu-kernel-tests: In Progress Status in linux package in Ubuntu: Fix Released Status in linux-oem-5.10 package in Ubuntu: Invalid Status in linux-oem-5.6 package in Ubuntu: Invalid Status in linux source package in Focal: Fix Released Status in linux-oem-5.10 source package in Focal: Fix Released Status in linux-oem-5.6 source package in Focal: Fix Released Status in linux source package in Groovy: Fix Released Status in linux source package in Hirsute: Fix Released Bug description: [Impact] In udpgro.sh, the exit value is 0 even if there are some failed sub test cases: $ sudo ./udpgro.sh ipv4 no GRO BTF debug data section '.BTF' rejected: Invalid argument (22)! - Length: 568 Verifier analysis: magic: 0xeb9f version: 1 flags: 0x0 hdr_len: 24 type_off: 0 type_len: 256 str_off: 256 str_len: 288 btf_total_size: 568 [1] PTR (anon) type_id=2 [2] STRUCT xdp_md size=20 vlen=5 data type_id=3 bits_offset=0 data_end type_id=3 bits_offset=32 data_meta type_id=3 bits_offset=64 ingress_ifindex type_id=3 bits_offset=96 rx_queue_index type_id=3 bits_offset=128 [3] TYPEDEF __u32 type_id=4 [4] INT unsigned int size=4 bits_offset=0 nr_bits=32 encoding=(none) [5] FUNC_PROTO (anon) return=6 args=(1 ctx) [6] INT int size=4 bits_offset=0 nr_bits=32 encoding=SIGNED [7] FUNC xdp_dummy_prog type_id=5 [8] INT char size=1 bits_offset=0 nr_bits=8 encoding=SIGNED [9] ARRAY (anon) type_id=8 index_type_id=10 nr_elems=4 [10] INT __ARRAY_SIZE_TYPE__ size=4 bits_offset=0 nr_bits=32 encoding=(none) [11] VAR _license type_id=9 linkage=1 [12] DATASEC license size=0 vlen=1 size == 0 ./udpgso_bench_rx: poll: 0x0 expected 0x1 failed ./udpgso_bench_tx: write: Connection refused ... multiple GRO socks BTF debug data section '.BTF' rejected: Invalid argument (22)! - Length: 568 Verifier analysis: magic: 0xeb9f version: 1 flags: 0x0 hdr_len: 24 type_off: 0 type_len: 256 str_off: 256 str_len: 288 btf_total_size: 568 [1] PTR (anon) type_id=2 [2] STRUCT xdp_md size=20 vlen=5 data type_id=3 bits_offset=0 data_end type_id=3 bits_offset=32 data_meta type_id=3 bits_offset=64 ingress_ifindex type_id=3 bits_offset=96 rx_queue_index type_id=3 bits_offset=128 [3] TYPEDEF __u32 type_id=4 [4] INT unsigned int size=4 bits_offset=0 nr_bits=32 encoding=(none) [5] FUNC_PROTO (anon) return=6 args=(1 ctx) [6] INT int size=4 bits_offset=0 nr_bits=32 encoding=SIGNED [7] FUNC xdp_dummy_prog type_id=5 [8] INT char size=1 bits_offset=0 nr_bits=8 encoding=SIGNED [9] ARRAY (anon) type_id=8 index_type_id=10 nr_elems=4 [10] INT __ARRAY_SIZE_TYPE__ size=4 bits_offset=0 nr_bits=32 encoding=(none) [11] VAR _license type_id=9 linkage=1 [12] DATASEC license size=0 vlen=1 size == 0 ./udpgso_bench_rx: poll: 0x0 expected 0x1 ./udpgso_bench_rx: poll: 0x0 expected 0x1 failed $ echo $? 0 [Fix] * 3503ee6c0bec5f ("selftests: fix the return value for UDP GRO test") We have this test since Focal. This patch can be cherry-picked into all the affected kernels. [Test] Run this test with: sudo ./udpgro.sh And check its final return value with: echo $? If there is any failure, the return value should not be 0. [Where problems could occur] If this fix is incorrect it might affect the test execution, but it should be fine as this is just affecting the test tool. Also, with this patch, we are expecting to see this test case to fail until bug 1908501 got fixed. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1908499/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp