Activity log for bug #1869364

Date Who What changed Old value New value Message
2020-03-27 12:31:02 Seth Forshee bug added bug
2020-03-27 12:31:36 Seth Forshee summary glibc pwd/test-pwd test failures in autopkgtest glibc pwd/test-getpw test failures in autopkgtest
2020-04-17 20:43:08 Launchpad Janitor glibc (Ubuntu): status New Confirmed
2020-04-17 20:43:56 Balint Reczey tags rls-ff-incoming rls-ff-incoming update-excuse
2020-05-18 20:28:23 Brian Murray tags rls-ff-incoming update-excuse rls-ff-incoming rls-gg-incoming update-excuse
2020-05-18 20:28:38 Brian Murray glibc (Ubuntu): importance Undecided High
2020-05-21 15:16:05 Brian Murray glibc (Ubuntu): status Confirmed Fix Released
2020-05-21 16:02:57 Steve Langasek glibc (Ubuntu): status Fix Released Triaged
2020-05-21 16:05:56 Steve Langasek nominated for series Ubuntu Groovy
2020-05-21 16:05:56 Steve Langasek bug task added glibc (Ubuntu Groovy)
2020-05-21 16:07:26 Steve Langasek tags rls-ff-incoming rls-gg-incoming update-excuse update-excuse
2020-05-22 12:33:12 Francis Ginther tags update-excuse id-5ec6a6fd770fb949059e2e9a update-excuse
2020-06-02 08:53:18 Michael Hudson-Doyle bug added subscriber Michael Hudson-Doyle
2020-06-24 21:02:55 Michael Hudson-Doyle bug watch added https://sourceware.org/bugzilla/show_bug.cgi?id=23293
2020-06-29 01:43:52 Michael Hudson-Doyle glibc (Ubuntu Groovy): status Triaged In Progress
2020-06-29 12:54:27 Francis Ginther tags id-5ec6a6fd770fb949059e2e9a update-excuse id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a update-excuse
2020-06-30 23:44:16 Michael Hudson-Doyle attachment added glibc_2.31-0ubuntu10_2.31-0ubuntu11.patch https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1869364/+attachment/5388568/+files/glibc_2.31-0ubuntu10_2.31-0ubuntu11.patch
2020-07-01 00:32:45 Ubuntu Foundations Team Bug Bot tags id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a update-excuse id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a patch update-excuse
2020-07-17 12:57:47 Francis Ginther tags id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a patch update-excuse id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a id-5f117d345c4abc523e9b7b67 patch update-excuse
2020-07-26 14:21:44 Balint Reczey glibc (Ubuntu Groovy): assignee Balint Reczey (rbalint)
2020-08-03 17:54:04 Balint Reczey description I started seeing this in the testing for 5.4.0-20. Only happening on arm64/armhf. ---------- FAIL: pwd/tst-getpw original exit status 223 PASS: NULL buffer returns -1 and sets errno to EINVAL. PASS: Read a password line given a uid. FAIL: Did not find even one invalid uid. ---------- https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_165114_2fcf9@/log.gz https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/armhf/g/glibc/20200326_173356_3378d@/log.gz I've unsuccessfully tried to reproduce this on an arm64 host (by running this test case standalone, not the full test suite), so possibly there's something about the autopkgtest environment. This also happens with the 5.4.0-18 from focal-release, so it does not appear to be a regression in the kernel. https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_224201_5fd33@/log.gz [Impact] pwd/test-getpw test fails in autopkgtest Fixing this makes the arm64 autopkgtest usable again for the lifetime of the 20.04 LTS release. [Test Case] Observe autopkgetest tests passing, including pwd/test-getpw being marked as XFAIL. [Regression Potential] The fix is ignoring a test failure due to the problems explained in the bug comments. The fix does not affect run-time behaviour. [Original Bug Text] I started seeing this in the testing for 5.4.0-20. Only happening on arm64/armhf. ---------- FAIL: pwd/tst-getpw original exit status 223 PASS: NULL buffer returns -1 and sets errno to EINVAL. PASS: Read a password line given a uid. FAIL: Did not find even one invalid uid. ---------- https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_165114_2fcf9@/log.gz https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/armhf/g/glibc/20200326_173356_3378d@/log.gz I've unsuccessfully tried to reproduce this on an arm64 host (by running this test case standalone, not the full test suite), so possibly there's something about the autopkgtest environment. This also happens with the 5.4.0-18 from focal-release, so it does not appear to be a regression in the kernel. https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_224201_5fd33@/log.gz
2020-08-05 20:00:38 Balint Reczey description [Impact] pwd/test-getpw test fails in autopkgtest Fixing this makes the arm64 autopkgtest usable again for the lifetime of the 20.04 LTS release. [Test Case] Observe autopkgetest tests passing, including pwd/test-getpw being marked as XFAIL. [Regression Potential] The fix is ignoring a test failure due to the problems explained in the bug comments. The fix does not affect run-time behaviour. [Original Bug Text] I started seeing this in the testing for 5.4.0-20. Only happening on arm64/armhf. ---------- FAIL: pwd/tst-getpw original exit status 223 PASS: NULL buffer returns -1 and sets errno to EINVAL. PASS: Read a password line given a uid. FAIL: Did not find even one invalid uid. ---------- https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_165114_2fcf9@/log.gz https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/armhf/g/glibc/20200326_173356_3378d@/log.gz I've unsuccessfully tried to reproduce this on an arm64 host (by running this test case standalone, not the full test suite), so possibly there's something about the autopkgtest environment. This also happens with the 5.4.0-18 from focal-release, so it does not appear to be a regression in the kernel. https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_224201_5fd33@/log.gz [Impact] pwd/test-getpw test fails in autopkgtest Fixing this makes the arm64 and armhf autopkgtests usable again for the lifetime of the 20.04 LTS release. [Test Case] Observe autopkgetest tests passing, including pwd/test-getpw being marked as XFAIL. [Regression Potential] The fix is ignoring a test failure due to the problems explained in the bug comments. The fix does not affect run-time behaviour. [Original Bug Text] I started seeing this in the testing for 5.4.0-20. Only happening on arm64/armhf. ---------- FAIL: pwd/tst-getpw original exit status 223 PASS: NULL buffer returns -1 and sets errno to EINVAL. PASS: Read a password line given a uid. FAIL: Did not find even one invalid uid. ---------- https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_165114_2fcf9@/log.gz https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/armhf/g/glibc/20200326_173356_3378d@/log.gz I've unsuccessfully tried to reproduce this on an arm64 host (by running this test case standalone, not the full test suite), so possibly there's something about the autopkgtest environment. This also happens with the 5.4.0-18 from focal-release, so it does not appear to be a regression in the kernel. https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/arm64/g/glibc/20200326_224201_5fd33@/log.gz
2020-09-02 14:36:31 Robie Basak glibc (Ubuntu Focal): status New Fix Committed
2020-09-02 14:36:32 Robie Basak bug added subscriber Ubuntu Stable Release Updates Team
2020-09-02 14:36:33 Robie Basak bug added subscriber SRU Verification
2020-09-02 14:36:36 Robie Basak tags id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a id-5f117d345c4abc523e9b7b67 patch update-excuse id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a id-5f117d345c4abc523e9b7b67 patch update-excuse verification-needed verification-needed-focal
2020-09-02 17:12:22 Launchpad Janitor glibc (Ubuntu Groovy): status In Progress Fix Released
2020-09-08 12:16:21 Balint Reczey tags id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a id-5f117d345c4abc523e9b7b67 patch update-excuse verification-needed verification-needed-focal id-5ebae3f15f6fda125f376d66 id-5ec6a6fd770fb949059e2e9a id-5f117d345c4abc523e9b7b67 patch update-excuse verification-done verification-done-focal
2020-09-18 11:31:28 Balint Reczey branch linked lp:~rbalint/britney/hints-ubuntu-focal
2020-09-22 15:30:18 Launchpad Janitor glibc (Ubuntu Focal): status Fix Committed Fix Released
2020-09-22 15:30:40 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2020-10-27 13:27:10 Balint Reczey branch unlinked lp:~rbalint/britney/hints-ubuntu-focal