linux: 4.4.0-139.165 -proposed tracker

Bug #1799401 reported by Kleber Sacilotto de Souza
18
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Fix Released
Medium
Taihsiang Ho
Prepare-package
Fix Released
Medium
Kleber Sacilotto de Souza
Prepare-package-meta
Fix Released
Medium
Kleber Sacilotto de Souza
Prepare-package-signed
Fix Released
Medium
Kleber Sacilotto de Souza
Promote-to-proposed
Fix Released
Medium
Steve Langasek
Promote-to-security
Fix Released
Medium
Steve Langasek
Promote-to-updates
Fix Released
Medium
Steve Langasek
Regression-testing
Fix Released
Medium
Po-Hsu Lin
Security-signoff
Fix Released
Medium
Steve Beattie
Snap-certification-testing
Fix Released
Medium
Canonical Hardware Certification
Snap-release-to-beta
Fix Released
Medium
Canonical Kernel Team
Snap-release-to-candidate
Fix Released
Medium
Canonical Kernel Team
Snap-release-to-edge
Fix Released
Medium
Canonical Kernel Team
Snap-release-to-stable
Fix Released
Medium
Canonical Kernel Team
Upload-to-ppa
Invalid
Medium
Unassigned
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux (Ubuntu)
Invalid
Undecided
Unassigned
Xenial
Fix Released
Medium
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

backports: bug 1799403 (linux-aws), bug 1799404 (linux-lts-xenial)
derivatives: bug 1799405 (linux-aws), bug 1799407 (linux-euclid), bug 1799408 (linux-kvm), bug 1799409 (linux-raspi2), bug 1799410 (linux-snapdragon)
-- swm properties --
boot-testing-requested: true
bugs-spammed: true
phase: Released
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  promote-to-updates: snap-release-to-stable is neither "Fix Released" nor "Invalid"
    (Confirmed)

CVE References

tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: xenial
Changed in linux (Ubuntu Xenial):
status: New → Confirmed
Changed in linux (Ubuntu):
status: New → Invalid
Changed in linux (Ubuntu Xenial):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
tags: added: kernel-sru-cycle-2018.10.22-1
tags: added: kernel-sru-master-kernel
description: updated
summary: - linux: <version to be filled> -proposed tracker
+ linux: 4.4.0-139.165 -proposed tracker
Brad Figg (brad-figg)
description: updated
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Taihsiang Ho (taihsiangho) wrote :

Hardware Certification have begun testing this -proposed kernel.

Brad Figg (brad-figg)
description: updated
Revision history for this message
Taihsiang Ho (taihsiangho) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: http://people.canonical.com/~hwcert/sru-testing/xenial/4.4.0-139.165/xenial-proposed-published.html

tags: added: certification-testing-passed
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Paul Larson (pwlars) wrote :

on the snap testing, it fails test_095_kernel_symbols_missing from the kernel security tests because it is unable to read /proc/self/stack as a normal user. Can you confirm if this is expected?

======================================================================
FAIL: test_095_kernel_symbols_missing (test_kernel_security.KernelSecurityTest)
kernel addresses in kallsyms and modules are zeroed out
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/home/ubuntu/snap/checkbox-snappy/1418/.cache/plainbox/sessions/smoke-test-2018-10-30T13.32.02.session/CHECKBOX_DATA/test_kernel_security.py", line 1499, in test_095_kernel_symbols_missing
    self._check_pK_files(expected)
  File "/home/ubuntu/snap/checkbox-snappy/1418/.cache/plainbox/sessions/smoke-test-2018-10-30T13.32.02.session/CHECKBOX_DATA/test_kernel_security.py", line 1474, in _check_pK_files
    expected, retry=True)
  File "/home/ubuntu/snap/checkbox-snappy/1418/.cache/plainbox/sessions/smoke-test-2018-10-30T13.32.02.session/CHECKBOX_DATA/test_kernel_security.py", line 1378, in _read_twice
    self.assertEqual(rc, 0, regular)
AssertionError: 1 != 0 : cat: /proc/self/stack: Permission denied

Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Khaled El Mously (kmously) wrote :

@Paul Larson: This is expected. The commit "c714676a18f1 proc: restrict kernel stack dumps to root" (part of the update to upstream stable 4.4.160) changed the permissions of /proc/self/stack so that it requires either root or CAP_SYS_ADMIN

I think the test will need to be updated

Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

Verification tests completed with the following exceptions:
- bug 1775068: Xenial is not the original series used by the bug reporter.
- bug 1797314: fix verified with Bionic, reporter doesn't have a Xenial setup for verification.

Brad Figg (brad-figg)
description: updated
Revision history for this message
Po-Hsu Lin (cypressyew) wrote :
Download full text (6.8 KiB)

4.4.0-139.165 - lowlatency
Regression test CMPL, RTB.

Test case ubuntu_performance_fio_aws does not exist in the database, please check
45 / 52 tests were run, missing: ubuntu_bpf_jit, ubuntu_cts_kernel, ubuntu_cve_kernel, ubuntu_ecryptfs, ubuntu_ltp_syscalls, ubuntu_zfs_fstest, ubuntu_zfs_xfs_generic, xfstests
Issue to note in amd64:
  ubuntu_kvm_unit_tests - 18 failed on gummo
  ubuntu_performance_fio_aws - test for nvidia project, should be skipped
  ubuntu_qrt_kernel_security - test_095_kernel_symbols_missing_proc_self_stack (bug 1802069)

4.4.0-139.165 - generic
Regression test CMPL, RTB.

51 / 52 tests were run, missing: ubuntu_ramfs_stress
Issue to note in amd64:
  ubuntu_kernel_selftests - passed after re-run
  ubuntu_kvm_unit_tests - 32 faile on amaura, 25 failed on michael, 31 failed on pepe
  ubuntu_ltp_syscalls - bind03 failed (bug 1788351) execveat03 failed (bug 1786729) inotify07 failed with X/X-LTS/A kernel (bug 1774387) inotify08 failed with X/X-LTS/X-HWE/A kernel (bug 1775784) fanotify07/fanotify08 test timeouted (bug 1775165) fanotify09 timeouted (bug 1775153) mlock203 failed (bug 1793451)
  ubuntu_lxc - passed after re-run
  ubuntu_nbd_smoke_test - passed after re-run
  ubuntu_qrt_kernel_panic - missing keyctl package, passed after re-test
  ubuntu_qrt_kernel_security - test_095_kernel_symbols_missing_proc_self_stack (bug 1802069)
  xfstests - xfs generic/468 timed out

46 / 47 tests were run, missing: xfstests
Issue to note in arm64:
  hwclock - issue for HP m400 (bug 1716603)
  ubuntu_kvm_smoke_test - unable to create KVM with uvtool (bug 1749427)
  ubuntu_kvm_unit_tests - gicv2-ipi and gicv2-active on starmie pmu on ms10-34-mcdivittB0-kernel (bug 1751000)
  ubuntu_ltp_syscalls - bind03 failed (bug 1788351) execveat03 failed (bug 1786729) inotify07 failed with X/X-LTS/A kernel (bug 1774387) inotify08 failed with X/X-LTS/X-HWE/A kernel (bug 1775784) fanotify07/fanotify08 test timeouted (bug 1775165) fanotify09 timeouted (bug 1775153) mlock203 failed (bug 1793451)
  ubuntu_qrt_kernel_panic - missing keyctl package, passed after re-test
  ubuntu_qrt_kernel_security - test_095_kernel_symbols_missing_proc_self_stack (bug 1802069)

Issue to note in i386:
  ubuntu_kvm_unit_tests - unable to build on X/T i386 (bug 1798007)
  ubuntu_ltp_syscalls - bind03 failed (bug 1788351) execveat03 failed (bug 1786729) inotify07 failed with X/X-LTS/A kernel (bug 1774387) inotify08 failed with X/X-LTS/X-HWE/A kernel (bug 1775784) fanotify07/fanotify08 test timeouted (bug 1775165) fanotify09 timeouted (bug 1775153) mlock203 failed (bug 1793451)
  ubuntu_lxc - passed after re-run
  ubuntu_qrt_kernel_panic - missing keyctl package, passed after re-test
  ubuntu_qrt_kernel_security - test_095_kernel_symbols_missing_proc_self_stack (bug 1802069)
  xfstests - xfs generic/308 timed out, bug 1738152

Issue to note in ppc64le (P8):
  ubuntu_kvm_smoke_test - unable to create KVM with uvtool, bug 1755118
  ubuntu_ltp_syscalls - bind03 failed (bug 1788351) execveat03 failed (bug 1786729) fallocate05, fsetxattr01, fgetxattr01, fsync01, preadv03, preadv03_64, pwritev03, pwritev03_64, setxattr01 (bug 1785198) inotif...

Read more...

tags: added: regression-testing-passed
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Devices Certification Bot (ce-certification-qa) wrote :

Snap beta testing complete, no regressions found. Ready for promotion. Results here: https://trello.com/c/RY4srdrn/456-pc-kernel-440-139165-170

Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
tags: removed: block-proposed-xenial
tags: removed: block-proposed
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (21.0 KiB)

This bug was fixed in the package linux - 4.4.0-139.165

---------------
linux (4.4.0-139.165) xenial; urgency=medium

  * linux: 4.4.0-139.165 -proposed tracker (LP: #1799401)

  * Kernel panic after the ubuntu_nbd_smoke_test on Xenial kernel (LP: #1793464)
    - nbd: Remove signal usage
    - nbd: Timeouts are not user requested disconnects
    - nbd: Cleanup reset of nbd and bdev after a disconnect
    - nbd: don't shutdown sock with irq's disabled
    - nbd: fix race in ioctl

  * fscache: bad refcounting in fscache_op_complete leads to OOPS (LP: #1797314)
    - SAUCE: fscache: Fix race in decrementing refcount of op->npages

  * xenial: virtio-scsi: CPU soft lockup due to loop in
    virtscsi_target_destroy() (LP: #1798110)
    - SAUCE: (no-up) virtio-scsi: Decrement reqs counter before SCSI command
      requeue

  * Error reported when creating ZFS pool with "-t" option, despite successful
    pool creation (LP: #1769937)
    - SAUCE: (noup) Update zfs to 0.6.5.6-0ubuntu26

  * Xenial update: 4.4.160 upstream stable release (LP: #1798770)
    - crypto: skcipher - Fix -Wstringop-truncation warnings
    - tsl2550: fix lux1_input error in low light
    - vmci: type promotion bug in qp_host_get_user_memory()
    - x86/numa_emulation: Fix emulated-to-physical node mapping
    - staging: rts5208: fix missing error check on call to rtsx_write_register
    - uwb: hwa-rc: fix memory leak at probe
    - power: vexpress: fix corruption in notifier registration
    - Bluetooth: Add a new Realtek 8723DE ID 0bda:b009
    - USB: serial: kobil_sct: fix modem-status error handling
    - 6lowpan: iphc: reset mac_header after decompress to fix panic
    - md-cluster: clear another node's suspend_area after the copy is finished
    - media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt()
    - powerpc/kdump: Handle crashkernel memory reservation failure
    - media: fsl-viu: fix error handling in viu_of_probe()
    - x86/tsc: Add missing header to tsc_msr.c
    - x86/entry/64: Add two more instruction suffixes
    - scsi: target/iscsi: Make iscsit_ta_authentication() respect the output
      buffer size
    - scsi: klist: Make it safe to use klists in atomic context
    - scsi: ibmvscsi: Improve strings handling
    - usb: wusbcore: security: cast sizeof to int for comparison
    - powerpc/powernv/ioda2: Reduce upper limit for DMA window size
    - alarmtimer: Prevent overflow for relative nanosleep
    - s390/extmem: fix gcc 8 stringop-overflow warning
    - ALSA: snd-aoa: add of_node_put() in error path
    - media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power
    - media: soc_camera: ov772x: correct setting of banding filter
    - media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data
    - staging: android: ashmem: Fix mmap size validation
    - drivers/tty: add error handling for pcmcia_loop_config
    - media: tm6000: add error handling for dvb_register_adapter
    - ALSA: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge
    - ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock
    - rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication()
    - wlcore: Add missing PM call fo...

Changed in linux (Ubuntu Xenial):
status: Confirmed → Fix Released
Brad Figg (brad-figg)
description: updated
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : Package Released!

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
description: updated
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.