log_check / tainted_check failed in ubuntu_boot because of warnings found on G-riscv
Bug #1923417 reported by
Po-Hsu Lin
This bug report is a duplicate of:
Bug #1905728: log_check / tainted_check failed in ubuntu_boot because of warnings (Found insecure W+X mapping at address) found on F/G/H-riscv.
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ubuntu-kernel-tests |
New
|
Undecided
|
Unassigned |
Bug Description
Found on Groovy RISCV 5.8.0-21-generic
kernel_tainted test failed with:
ERROR: kernel tainted flag != 0: 512
This is because of the warning messages in dmesg:
Scanning for pattern "kernel: \[ *\d+\.\d+\] WARNING:.*"
Pattern found. Matching lines as follows:
kernel: [ 14.848036] WARNING: CPU: 3 PID: 1 at arch/riscv/
kernel: [ 14.625316] WARNING: CPU: 1 PID: 1 at arch/riscv/
kernel: [ 16.949300] WARNING: CPU: 0 PID: 1 at arch/riscv/
kernel: [ 13.263889] WARNING: CPU: 6 PID: 1 at arch/riscv/