Activity log for bug #1999094

Date Who What changed Old value New value Message
2022-12-07 23:48:19 Luke Nowakowski-Krijger bug added bug
2022-12-07 23:50:41 Luke Nowakowski-Krijger bug task added ubuntu
2022-12-07 23:50:47 Luke Nowakowski-Krijger bug task deleted ubuntu
2022-12-07 23:50:57 Luke Nowakowski-Krijger bug task added linux (Ubuntu)
2022-12-07 23:51:06 Luke Nowakowski-Krijger nominated for series Ubuntu Kinetic
2022-12-07 23:51:06 Luke Nowakowski-Krijger bug task added linux (Ubuntu Kinetic)
2022-12-08 00:00:07 Ubuntu Kernel Bot linux (Ubuntu): status New Incomplete
2022-12-08 00:00:11 Ubuntu Kernel Bot linux (Ubuntu Kinetic): status New Incomplete
2022-12-08 00:03:32 Luke Nowakowski-Krijger linux (Ubuntu): status Incomplete Confirmed
2022-12-08 00:04:21 Luke Nowakowski-Krijger summary mm:vma05 fails with '[vdso] bug not patched' on kinetic/linux 5.19.0-27.28 mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux 5.19.0-27.28
2022-12-08 00:06:20 Luke Nowakowski-Krijger description This test fails on 5.19.0-27.28 in cycle 2022.11.14 on most if not all instances. Running tests....... vma05 1 TINFO: timeout per run is 0h 5m 0s vma05 1 TFAIL: [vdso] bug not patched vma05 2 TINFO: AppArmor enabled, this may affect test results vma05 2 TINFO: it can be disabled with TST_DISABLE_APPARMOR=1 (requires super/root) vma05 2 TINFO: loaded AppArmor profiles: none Looking at the contents of the triggered backtrace, on 5.19.0-26 the contents look like this: vma05 1 TPASS: [vsyscall] reported correctly vma05 1 TINFO: TRACE=Reading symbols from vma05_vdso... [New LWP 418325] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `vma05_vdso'. Program terminated with signal SIGSEGV, Segmentation fault. #0 __pthread_kill_implementation (no_tid=0, signo=11, threadid=<optimized out>) at ./nptl/pthread_kill.c:44 Thread 1 (Thread 0x7f3093c4e740 (LWP 418325)): #0 __pthread_kill_implementation (no_tid=0, signo=11, threadid=<optimized out>) at ./nptl/pthread_kill.c:44 #1 __pthread_kill_internal (signo=11, threadid=<optimized out>) at ./nptl/pthread_kill.c:78 #2 __GI___pthread_kill (threadid=<optimized out>, signo=signo@entry=11) at ./nptl/pthread_kill.c:89 #3 0x00007f3093a3bc46 in __GI_raise (sig=sig@entry=11) at ../sysdeps/posix/raise.c:26 #4 0x000055f54287a072 in main () at vma05_vdso.c:5 vma05 1 TPASS: [vdso] backtrace complete while on 5.19.0-27.28 it looks like this: vma05 1 TINFO: TRACE=Reading symbols from vma05_vdso... [New LWP 1501] Core was generated by `vma05_vdso'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f9b3c09226b in ?? () Thread 1 (LWP 1501): #0 0x00007f9b3c09226b in ?? () Backtrace stopped: Cannot access memory at address 0x7ffc216242b0 vma05 1 TFAIL: [vdso] bug not patched vma05 2 TINFO: AppArmor enabled, this may affect test results vma05 2 TINFO: it can be disabled with TST_DISABLE_APPARMOR=1 (requires super/root) vma05 2 TINFO: loaded AppArmor profiles: none Suggesting that this bug has somehow been reintroduced. Will look into this further. This test fails on 5.19.0-27.28 in cycle 2022.11.14 on most if not all instances. Running tests....... vma05 1 TINFO: timeout per run is 0h 5m 0s vma05 1 TFAIL: [vdso] bug not patched vma05 2 TINFO: AppArmor enabled, this may affect test results vma05 2 TINFO: it can be disabled with TST_DISABLE_APPARMOR=1 (requires super/root) vma05 2 TINFO: loaded AppArmor profiles: none -------------------------------------------------------------------- Looking at the contents of the triggered backtrace, on 5.19.0-26 the contents look like this: vma05 1 TPASS: [vsyscall] reported correctly vma05 1 TINFO: TRACE=Reading symbols from vma05_vdso... [New LWP 418325] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `vma05_vdso'. Program terminated with signal SIGSEGV, Segmentation fault. #0 __pthread_kill_implementation (no_tid=0, signo=11,     threadid=<optimized out>) at ./nptl/pthread_kill.c:44 Thread 1 (Thread 0x7f3093c4e740 (LWP 418325)): #0 __pthread_kill_implementation (no_tid=0, signo=11, threadid=<optimized out>) at ./nptl/pthread_kill.c:44 #1 __pthread_kill_internal (signo=11, threadid=<optimized out>) at ./nptl/pthread_kill.c:78 #2 __GI___pthread_kill (threadid=<optimized out>, signo=signo@entry=11) at ./nptl/pthread_kill.c:89 #3 0x00007f3093a3bc46 in __GI_raise (sig=sig@entry=11) at ../sysdeps/posix/raise.c:26 #4 0x000055f54287a072 in main () at vma05_vdso.c:5 vma05 1 TPASS: [vdso] backtrace complete -------------------------------------------------------------- while on 5.19.0-27.28 it looks like this: vma05 1 TINFO: TRACE=Reading symbols from vma05_vdso... [New LWP 1501] Core was generated by `vma05_vdso'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f9b3c09226b in ?? () Thread 1 (LWP 1501): #0 0x00007f9b3c09226b in ?? () Backtrace stopped: Cannot access memory at address 0x7ffc216242b0 vma05 1 TFAIL: [vdso] bug not patched vma05 2 TINFO: AppArmor enabled, this may affect test results vma05 2 TINFO: it can be disabled with TST_DISABLE_APPARMOR=1 (requires super/root) vma05 2 TINFO: loaded AppArmor profiles: none Suggesting that this bug has somehow been reintroduced. Will look into this further.
2022-12-08 03:59:27 Po-Hsu Lin tags 5.19 kinetic sru-20221114 ubuntu-ltp
2022-12-15 09:39:12 Stefan Bader linux (Ubuntu Kinetic): importance Undecided High
2022-12-15 09:39:18 Stefan Bader linux (Ubuntu Kinetic): status Incomplete Fix Committed
2022-12-15 09:39:28 Stefan Bader linux (Ubuntu): status Confirmed Invalid
2023-01-06 00:35:21 Launchpad Janitor linux (Ubuntu Kinetic): status Fix Committed Fix Released
2023-01-09 22:27:17 Ubuntu Kernel Bot tags 5.19 kinetic sru-20221114 ubuntu-ltp 5.19 kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-needed-kinetic
2023-01-12 16:42:31 Ubuntu Kernel Bot tags 5.19 kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-needed-kinetic 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-needed-kinetic
2023-01-16 05:45:18 Po-Hsu Lin tags 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-needed-kinetic 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-done-kinetic
2023-01-16 06:01:00 Po-Hsu Lin ubuntu-kernel-tests: status New Fix Released
2023-01-17 13:33:46 Ubuntu Kernel Bot tags 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-done-kinetic 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-needed-kinetic
2023-01-18 02:01:52 Po-Hsu Lin tags 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-needed-kinetic 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-done-kinetic
2023-01-31 23:27:23 Ubuntu Kernel Bot tags 5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-done-kinetic 5.19 kernel-spammed-jammy-linux-aws-5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-done-kinetic verification-needed-jammy
2023-01-31 23:28:02 Ubuntu Kernel Bot tags 5.19 kernel-spammed-jammy-linux-aws-5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-done-kinetic verification-needed-jammy 5.19 kernel-spammed-jammy-linux-aws-5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-ibm kinetic sru-20221114 ubuntu-ltp verification-done-kinetic verification-needed-jammy
2023-07-30 15:10:25 wangying bug added subscriber wangying