[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants
Fix released and no other hints is using this bug. Closing this. ** Changed in: ubuntu-kernel-tests Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953287 Title: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1953287/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants
This bug was fixed in the package linux - 4.15.0-166.174 --- linux (4.15.0-166.174) bionic; urgency=medium * bionic/linux: 4.15.0-166.174 -proposed tracker (LP: #1953667) * Ubuntu version macros overflow with high ABI numbers (LP: #1953522) - SAUCE: Revert "stable: clamp SUBLEVEL in 4.14" * test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants (LP: #1953287) - SAUCE: Revert "bpf: add also cbpf long jump test cases with heavy expansion" * test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants (LP: #1953287) // CVE-2018-25020 - bpf: fix truncated jump targets on heavy expansions linux (4.15.0-165.173) bionic; urgency=medium * bionic/linux: 4.15.0-165.173 -proposed tracker (LP: #1952780) * Support builtin revoked certificates (LP: #1932029) - certs: Add EFI_CERT_X509_GUID support for dbx entries - certs: Move load_system_certificate_list to a common function - integrity: Move import of MokListRT certs to a separate routine - integrity: Load certs from the EFI MOK config table - certs: Add ability to preload revocation certs - certs: add 'x509_revocation_list' to gitignore - SAUCE: Dump stack when X.509 certificates cannot be loaded - [Packaging] build canonical-revoked-certs.pem from branch/arch certs - [Packaging] Revoke 2012 UEFI signing certificate as built-in - [Config] Configure CONFIG_SYSTEM_REVOCATION_KEYS with revoked keys * Support importing mokx keys into revocation list from the mok table (LP: #1928679) - efi: Support for MOK variable config table - efi: mokvar-table: fix some issues in new code - efi: mokvar: add missing include of asm/early_ioremap.h - efi/mokvar: Reserve the table only if it is in boot services data - SAUCE: integrity: Load mokx certs from the EFI MOK config table - SAUCE: integrity: add informational messages when revoking certs * CVE-2021-4002 - arm64: tlb: Provide forward declaration of tlb_flush() before including tlb.h - mm: mmu_notifier fix for tlb_end_vma - hugetlbfs: flush TLBs correctly after huge_pmd_unshare linux (4.15.0-164.172) bionic; urgency=medium * bionic/linux: 4.15.0-164.172 -proposed tracker (LP: #1952348) * Packaging resync (LP: #1786013) - [Packaging] resync update-dkms-versions helper - debian/dkms-versions -- update from kernel-versions (main/2021.11.29) * Bionic update: upstream stable patchset 2021-11-23 (LP: #1951997) - btrfs: always wait on ordered extents at fsync time - ARM: dts: at91: sama5d2_som1_ek: disable ISC node by default - xtensa: xtfpga: use CONFIG_USE_OF instead of CONFIG_OF - xtensa: xtfpga: Try software restart before simulating CPU reset - NFSD: Keep existing listeners on portlist error - netfilter: ipvs: make global sysctl readonly in non-init netns - NIOS2: irqflags: rename a redefined register name - can: rcar_can: fix suspend/resume - can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification - can: peak_pci: peak_pci_remove(): fix UAF - ocfs2: fix data corruption after conversion from inline format - ocfs2: mount fails with buffer overflow in strlen - elfcore: correct reference to CONFIG_UML - ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset - ASoC: DAPM: Fix missing kctl change notifications - nfc: nci: fix the UAF of rf_conn_info object - isdn: cpai: check ctr->cnr to avoid array index out of bound - netfilter: Kconfig: use 'default y' instead of 'm' for bool config option - btrfs: deal with errors when checking if a dir entry exists during log replay - net: stmmac: add support for dwmac 3.40a - ARM: dts: spear3xx: Fix gmac node - isdn: mISDN: Fix sleeping function called from invalid context - platform/x86: intel_scu_ipc: Update timeout value in comment - ALSA: hda: avoid write to STATESTS if controller is in reset - tracing: Have all levels of checks prevent recursion - ARM: 9122/1: select HAVE_FUTEX_CMPXCHG - dma-debug: fix sg checks in debug_dma_map_sg() - ASoC: wm8960: Fix clock configuration on slave mode - lan78xx: select CRC32 - net: hns3: add limit ets dwrr bandwidth cannot be 0 - net: hns3: disable sriov before unload hclge layer - ALSA: hda/realtek: Add quirk for Clevo PC50HS - mm, slub: fix mismatch between reconstructed freelist depth and cnt - gcc-plugins/structleak: add makefile var for disabling structleak * creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve failed with XFS (LP: #1950239) - xfs: ensure that the inode uid/gid match values match the icdinode ones - xfs: merge the projid fields in struct xfs_icdinode - xfs: remove the icdinode di_uid/di_gid members - xfs: fix up non-directory creation in SGID directories * ubuntu_ltp / finit_module02 fails on v4.15 and oth
[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants
Passed on Bionic 4.15.0-166.174 [ 890.386448] test_bpf: Summary: 342 PASSED, 0 FAILED, [333/333 JIT'ed] 16457 16:29:03 INFO | GOOD ubuntu_kernel_selftests.net:test_bpf.sh Thanks ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953287 Title: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1953287/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants
This bug is awaiting verification that the linux/4.15.0-166.174 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-bionic' to 'verification-done-bionic'. If the problem still exists, change the tag 'verification-needed-bionic' to 'verification-failed-bionic'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953287 Title: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1953287/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants
** Changed in: linux (Ubuntu Bionic) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953287 Title: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1953287/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants
This is the CVE reported for this issue: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25020 The fix is this upstream commit, which I have backported to bionic, and will submit after running one extra test. https://github.com/torvalds/linux/commit/050fad7c4534c13c8eb1d9c2ba66012e014773cb Thanks. Cascardo. ** Information type changed from Private to Public Security ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-25020 ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: New => Invalid ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo) ** Changed in: linux (Ubuntu Bionic) Importance: Undecided => High ** Description changed: + [Impact] + A CBPF program jumping over a large number of instructions may lead to kernel code execution. + The test might fail with EINVAL or EOPNOTSUPP, which must be accounted for on different kernel versions. + + [Test case] + Load test_bpf module. + + [Potential regression] + Some CBPF and EBPF programs might not load. + + + + + + Issue found on 4.15.0-1107-ibm-gt with node onibi. This test failed without any obvious error from the test output, the summary shows there is one failure but all 344 test cases were marked as PASS: [ 1851.020315] test_bpf: #0 TAX jited:1 46 44 43 PASS [ 1851.021767] test_bpf: #1 TXA jited:1 43 46 43 PASS [ 1851.024004] test_bpf: #2 ADD_SUB_MUL_K jited:1 45 PASS [ 1851.024886] test_bpf: #3 DIV_MOD_KX jited:1 70 PASS [ 1851.026103] test_bpf: #4 AND_OR_LSH_K jited:1 39 43 PASS [ 1851.027394] test_bpf: #5 LD_IMM_0 jited:1 42 PASS [ 1851.028027] test_bpf: #6 LD_IND jited:1 85 85 85 PASS [ 1851.030687] test_bpf: #7 LD_ABS jited:1 87 85 85 PASS [ 1851.033343] test_bpf: #8 LD_ABS_LL jited:1 90 70 PASS [ 1851.035030] test_bpf: #9 LD_IND_LL jited:1 61 58 58 PASS [ 1851.036890] test_bpf: #10 LD_ABS_NET jited:1 86 70 PASS [ 1851.038590] test_bpf: #11 LD_IND_NET jited:1 77 56 56 PASS [ 1851.040573] test_bpf: #12 LD_PKTTYPE jited:1 43 43 PASS [ 1851.041582] test_bpf: #13 LD_MARK jited:1 41 42 PASS [ 1851.042494] test_bpf: #14 LD_RXHASH jited:1 42 44 PASS [ 1851.043436] test_bpf: #15 LD_QUEUE jited:1 43 43 PASS [ 1851.044379] test_bpf: #16 LD_PROTOCOL jited:1 50 50 PASS [ 1851.045457] test_bpf: #17 LD_VLAN_TAG jited:1 41 41 PASS [ 1851.046363] test_bpf: #18 LD_VLAN_TAG_PRESENT jited:1 39 41 PASS [ 1851.047238] test_bpf: #19 LD_IFINDEX jited:1 44 44 PASS [ 1851.048199] test_bpf: #20 LD_HATYPE jited:1 44 44 PASS [ 1851.049157] test_bpf: #21 LD_CPU jited:1 51 50 PASS [ 1851.050250] test_bpf: #22 LD_NLATTR jited:1 43 68 PASS [ 1851.051465] test_bpf: #23 LD_NLATTR_NEST jited:1 85 233 PASS [ 1851.054890] test_bpf: #24 LD_PAYLOAD_OFF jited:1 527 745 PASS [ 1851.067698] test_bpf: #25 LD_ANC_XOR jited:1 42 42 PASS [ 1851.069510] test_bpf: #26 SPILL_FILL jited:1 45 45 48 PASS [ 1851.071372] test_bpf: #27 JEQ jited:1 85 46 47 PASS [ 1851.073284] test_bpf: #28 JGT jited:1 85 46 49 PASS [ 1851.075260] test_bpf: #29 JGE (jt 0), test 1 jited:1 86 47 47 PASS [ 1851.077151] test_bpf: #30 JGE (jt 0), test 2 jited:1 48 45 44 PASS [ 1851.078613] test_bpf: #31 JGE jited:1 48 46 47 PASS [ 1851.080128] test_bpf: #32 JSET jited:1 45 44 54 PASS [ 1851.081667] test_bpf: #33 tcpdump port 22 jited:1 83 106 72 PASS [ 1851.084383] test_bpf: #34 tcpdump complex jited:1 83 102 93 PASS [ 1851.087279] test_bpf: #35 RET_A jited:1 41 41 PASS [ 1851.088195] test_bpf: #36 INT: ADD trivial jited:1 43 PASS [ 1851.088700] test_bpf: #37 INT: MUL_X jited:1 41 PASS [ 1851.089186] test_bpf: #38 INT: MUL_X2 jited:1 40 PASS [ 1851.089665] test_bpf: #39 INT: MUL32_X jited:1 42 PASS [ 1851.090170] test_bpf: #40 INT: ADD 64-bit jited:1 90 PASS [ 1851.091228] test_bpf: #41 INT: ADD 32-bit jited:1 91 PASS [ 1851.092232] test_bpf: #42 INT: SUB jited:1 88 PASS [ 1851.093260] test_bpf: #43 INT: XOR jited:1 56 PASS [ 1851.093920] test_bpf: #44 INT: MUL jited:1 194 PASS [ 1851.095947] test_bpf: #45 MOV REG64 jited:1 43 PASS [ 1851.096513] test_bpf: #46 MOV REG32 jited:1 45 PASS [ 1851.097471] test_bpf: #47 LD IMM64 jited:1 44 PASS [ 1851.098000] test_bpf: #48 INT: ALU MIX jited:1 73 PASS [ 1851.098807] test_bpf: #49 INT: shifts by register jited:1 53 PASS [ 1851.099421] test_bpf: #50 INT: DIV + ABS jited:1 92 54 PASS [ 1851.100960] test_bpf: #51 INT: DIV by -1 jited:1 85 50 PASS [ 1851.102431] test_bpf: #52 check: missing ret PASS [ 1851.102650] test_bpf: #53 check: div_k_0 PASS [ 1851.102660] test_bpf: #54 check: unknown insn PASS [ 1851.102674] test_bpf: #55 check: out of range spill/fill PASS [ 1851.102685] test_bpf: #56 JUMPS + HOLES