Activity log for bug #1815129

Date Who What changed Old value New value Message
2019-02-07 20:23:04 Heitor Alves de Siqueira bug added bug
2019-02-07 20:27:41 Heitor Alves de Siqueira nominated for series Ubuntu Trusty
2019-02-07 20:28:18 Eric Desrochers bug task added apt (Ubuntu Trusty)
2019-02-07 20:32:30 Eric Desrochers apt (Ubuntu Trusty): status New In Progress
2019-02-07 20:32:32 Eric Desrochers apt (Ubuntu Trusty): importance Undecided Medium
2019-02-07 20:32:44 Eric Desrochers apt (Ubuntu Trusty): assignee Heitor R. Alves de Siqueira (halves)
2019-02-07 20:32:49 Eric Desrochers apt (Ubuntu): status New Fix Released
2019-02-07 20:33:32 Eric Desrochers bug added subscriber STS Sponsors
2019-02-07 20:33:43 Eric Desrochers tags sts
2019-02-07 21:31:43 Eric Desrochers apt (Ubuntu Trusty): assignee Heitor R. Alves de Siqueira (halves)
2019-02-07 21:31:54 Eric Desrochers apt (Ubuntu Trusty): assignee Julian Andres Klode (juliank)
2019-02-08 13:54:00 Eric Desrochers bug watch added https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803417
2019-02-08 13:54:00 Eric Desrochers bug task added apt (Debian)
2019-02-08 15:20:25 Heitor Alves de Siqueira description [Impact] apt crashes (core dump) during cache creation [Description] When executing apt-cache several times on a memory constrained system, apt-cache can sometimes crash with a core dump file. This is related to mmap() failing allocations during cache generation, according to an upstream bug report (803417). There is an upstream patch for this bug (6789e01e do not segfault in cache generation on mmap failure) and it's included in the apt package for other series (see below), so we only need to backport it to Trusty. Upstream commit: https://salsa.debian.org/apt-team/apt/commit/6789e01e9370b3b7f65d52138c5657eaa712b4d1 $ git describe --contains 6789e01e9370 1.1_exp16~5 $ rmadison apt apt | 1.0.1ubuntu2 | trusty | source, amd64, arm64, armhf, i386, powerpc, ppc64el apt | 1.0.1ubuntu2.19 | trusty-security | source, amd64, arm64, armhf, i386, powerpc, ppc64el apt | 1.0.1ubuntu2.19 | trusty-updates | source, amd64, arm64, armhf, i386, powerpc, ppc64el apt | 1.2.10ubuntu1 | xenial | source, amd64, arm64, armhf, i386, powerpc, ppc64el, s390x apt | 1.6.1 | bionic | source, amd64, arm64, armhf, i386, ppc64el, s390x apt | 1.7.0 | cosmic | source, amd64, arm64, armhf, i386, ppc64el, s390x apt | 1.8.0~rc2 | disco | source, amd64, arm64, armhf, i386, ppc64el, s390x [Test Case] Unfortunately, this issue is not easy to reproduce. It seems to trigger randomly when "apt-cache policy" is called on a system under memory pressure, triggering the failure path in the mmap() allocations. [Regression Potential] The regression potential for this should be low, as it's a change in the failure path for memory allocations. This shouldn't be triggered during normal usage, and we'll thoroughly test the patched package with autopkgtests and perform scripted runs in memory-constrained systems with stress-ng. We also have a confirmation from an impacted user that the upstream patch fixes their issue without further problems. [Impact] apt crashes (core dump) during cache creation [Description] When executing apt-cache several times on a memory constrained system, apt-cache can sometimes crash with a core dump file. This is related to mmap() failing allocations during cache generation, according to an upstream bug report (803417). There is an upstream patch for this bug (6789e01e do not segfault in cache generation on mmap failure) and it's included in the apt package for other series (see below), so we only need to backport it to Trusty. Upstream commit: https://salsa.debian.org/apt-team/apt/commit/6789e01e9370b3b7f65d52138c5657eaa712b4d1 $ git describe --contains 6789e01e9370 1.1_exp16~5 $ rmadison apt  apt | 1.0.1ubuntu2 | trusty | source, ...  apt | 1.0.1ubuntu2.19 | trusty-security | source, ...  apt | 1.0.1ubuntu2.19 | trusty-updates | source, ...  apt | 1.2.10ubuntu1 | xenial | source, ...  apt | 1.6.1 | bionic | source, ...  apt | 1.7.0 | cosmic | source, ...  apt | 1.8.0~rc2 | disco | source, ... [Test Case] 1) Deploy a Trusty (14.04 LTS) vm w/ 128M 2) Fetch latest stress-ng src code 2.1) git clone git://kernel.ubuntu.com/cking/stress-ng 2.2) cd stress-ng 2.3) make clean 2.4) make 3) Stress the mmap() with stress-ng 3.1) ./stress-ng --brk 2 --mmap 5 --vm 1 --mmap-bytes 90% 4) Disable swap (if any) 4.1) swapoff -a 5) for i in `seq 1 10000`;do apt-cache policy vsftpd;done ... vsftpd: Installed: (none) Candidate: 3.0.2-1ubuntu2.14.04.1 Version table: 3.0.2-1ubuntu2.14.04.1 0 500 http://us.archive.ubuntu.com/ubuntu/ trusty-updates/main amd64 Packages 3.0.2-1ubuntu2 0 500 http://us.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages Segmentation fault (core dumped) Segmentation fault (core dumped) Segmentation fault (core dumped) Segmentation fault (core dumped) Segmentation fault (core dumped) Segmentation fault (core dumped) ... [Regression Potential] The regression potential for this should be low, as it's a change in the failure path for memory allocations. This shouldn't be triggered during normal usage, and we'll thoroughly test the patched package with autopkgtests and perform scripted runs in memory-constrained systems with stress-ng. We also have a confirmation from an impacted user that the upstream patch fixes their issue without further problems.
2019-02-08 15:34:13 Bug Watch Updater apt (Debian): status Unknown Fix Released
2019-02-12 10:32:37 Łukasz Zemczak apt (Ubuntu Trusty): status In Progress Fix Committed
2019-02-12 10:32:38 Łukasz Zemczak bug added subscriber Ubuntu Stable Release Updates Team
2019-02-12 10:32:43 Łukasz Zemczak bug added subscriber SRU Verification
2019-02-12 10:32:46 Łukasz Zemczak tags sts sts verification-needed verification-needed-trusty
2019-02-13 11:43:45 Heitor Alves de Siqueira tags sts verification-needed verification-needed-trusty sts verification-done-trusty
2019-02-13 11:46:28 Heitor Alves de Siqueira tags sts verification-done-trusty sts verification-done-trusty verification-needed
2019-02-13 13:03:07 Eric Desrochers removed subscriber STS Sponsors
2019-02-13 13:03:12 Eric Desrochers bug added subscriber Eric Desrochers
2019-02-13 13:27:56 Julian Andres Klode tags sts verification-done-trusty verification-needed sts verification-done verification-done-trusty
2019-02-25 11:44:00 Launchpad Janitor apt (Ubuntu Trusty): status Fix Committed Fix Released
2019-02-25 11:44:10 Łukasz Zemczak removed subscriber Ubuntu Stable Release Updates Team