[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants

2022-01-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.15.0-166.174

---
linux (4.15.0-166.174) bionic; urgency=medium

  * bionic/linux: 4.15.0-166.174 -proposed tracker (LP: #1953667)

  * Ubuntu version macros overflow with high ABI numbers (LP: #1953522)
- SAUCE: Revert "stable: clamp SUBLEVEL in 4.14"

  * test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and
variants (LP: #1953287)
- SAUCE: Revert "bpf: add also cbpf long jump test cases with heavy 
expansion"

  * test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and
variants (LP: #1953287) // CVE-2018-25020
- bpf: fix truncated jump targets on heavy expansions

linux (4.15.0-165.173) bionic; urgency=medium

  * bionic/linux: 4.15.0-165.173 -proposed tracker (LP: #1952780)

  * Support builtin revoked certificates (LP: #1932029)
- certs: Add EFI_CERT_X509_GUID support for dbx entries
- certs: Move load_system_certificate_list to a common function
- integrity: Move import of MokListRT certs to a separate routine
- integrity: Load certs from the EFI MOK config table
- certs: Add ability to preload revocation certs
- certs: add 'x509_revocation_list' to gitignore
- SAUCE: Dump stack when X.509 certificates cannot be loaded
- [Packaging] build canonical-revoked-certs.pem from branch/arch certs
- [Packaging] Revoke 2012 UEFI signing certificate as built-in
- [Config] Configure CONFIG_SYSTEM_REVOCATION_KEYS with revoked keys

  * Support importing mokx keys into revocation list from the mok table
(LP: #1928679)
- efi: Support for MOK variable config table
- efi: mokvar-table: fix some issues in new code
- efi: mokvar: add missing include of asm/early_ioremap.h
- efi/mokvar: Reserve the table only if it is in boot services data
- SAUCE: integrity: Load mokx certs from the EFI MOK config table
- SAUCE: integrity: add informational messages when revoking certs

  * CVE-2021-4002
- arm64: tlb: Provide forward declaration of tlb_flush() before including
  tlb.h
- mm: mmu_notifier fix for tlb_end_vma
- hugetlbfs: flush TLBs correctly after huge_pmd_unshare

linux (4.15.0-164.172) bionic; urgency=medium

  * bionic/linux: 4.15.0-164.172 -proposed tracker (LP: #1952348)

  * Packaging resync (LP: #1786013)
- [Packaging] resync update-dkms-versions helper
- debian/dkms-versions -- update from kernel-versions (main/2021.11.29)

  * Bionic update: upstream stable patchset 2021-11-23 (LP: #1951997)
- btrfs: always wait on ordered extents at fsync time
- ARM: dts: at91: sama5d2_som1_ek: disable ISC node by default
- xtensa: xtfpga: use CONFIG_USE_OF instead of CONFIG_OF
- xtensa: xtfpga: Try software restart before simulating CPU reset
- NFSD: Keep existing listeners on portlist error
- netfilter: ipvs: make global sysctl readonly in non-init netns
- NIOS2: irqflags: rename a redefined register name
- can: rcar_can: fix suspend/resume
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state
  notification
- can: peak_pci: peak_pci_remove(): fix UAF
- ocfs2: fix data corruption after conversion from inline format
- ocfs2: mount fails with buffer overflow in strlen
- elfcore: correct reference to CONFIG_UML
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset
- ASoC: DAPM: Fix missing kctl change notifications
- nfc: nci: fix the UAF of rf_conn_info object
- isdn: cpai: check ctr->cnr to avoid array index out of bound
- netfilter: Kconfig: use 'default y' instead of 'm' for bool config option
- btrfs: deal with errors when checking if a dir entry exists during log
  replay
- net: stmmac: add support for dwmac 3.40a
- ARM: dts: spear3xx: Fix gmac node
- isdn: mISDN: Fix sleeping function called from invalid context
- platform/x86: intel_scu_ipc: Update timeout value in comment
- ALSA: hda: avoid write to STATESTS if controller is in reset
- tracing: Have all levels of checks prevent recursion
- ARM: 9122/1: select HAVE_FUTEX_CMPXCHG
- dma-debug: fix sg checks in debug_dma_map_sg()
- ASoC: wm8960: Fix clock configuration on slave mode
- lan78xx: select CRC32
- net: hns3: add limit ets dwrr bandwidth cannot be 0
- net: hns3: disable sriov before unload hclge layer
- ALSA: hda/realtek: Add quirk for Clevo PC50HS
- mm, slub: fix mismatch between reconstructed freelist depth and cnt
- gcc-plugins/structleak: add makefile var for disabling structleak

  * creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from ubuntu_ltp/cve
failed with XFS (LP: #1950239)
- xfs: ensure that the inode uid/gid match values match the icdinode ones
- xfs: merge the projid fields in struct xfs_icdinode
- xfs: remove the icdinode di_uid/di_gid members
- xfs: fix up non-directory creation in SGID directories

  * ubuntu_ltp / finit_module02 fails on v4.15 and 

[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants

2021-12-09 Thread Po-Hsu Lin
Passed on Bionic 4.15.0-166.174 
[  890.386448] test_bpf: Summary: 342 PASSED, 0 FAILED, [333/333 JIT'ed]
16457   16:29:03 INFO | GOOD
ubuntu_kernel_selftests.net:test_bpf.sh

Thanks

** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953287

Title:
  test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15
  and variants

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1953287/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants

2021-12-09 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux/4.15.0-166.174 kernel
in -proposed solves the problem. Please test the kernel and update this
bug with the results. If the problem is solved, change the tag
'verification-needed-bionic' to 'verification-done-bionic'. If the
problem still exists, change the tag 'verification-needed-bionic' to
'verification-failed-bionic'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953287

Title:
  test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15
  and variants

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1953287/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants

2021-12-08 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953287

Title:
  test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15
  and variants

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1953287/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953287] Re: test_bpf.sh test in net of ubuntu_kernel_selftests failed on B-4.15 and variants

2021-12-08 Thread Thadeu Lima de Souza Cascardo
This is the CVE reported for this issue:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25020

The fix is this upstream commit, which I have backported to bionic, and
will submit after running one extra test.

https://github.com/torvalds/linux/commit/050fad7c4534c13c8eb1d9c2ba66012e014773cb

Thanks.
Cascardo.

** Information type changed from Private to Public Security

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-25020

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => High

** Description changed:

+ [Impact]
+ A CBPF program jumping over a large number of instructions may lead to kernel 
code execution.
+ The test might fail with EINVAL or EOPNOTSUPP, which must be accounted for on 
different kernel versions.
+ 
+ [Test case]
+ Load test_bpf module.
+ 
+ [Potential regression]
+ Some CBPF and EBPF programs might not load.
+ 
+ 
+ 
+ 
+ 
+ 
  Issue found on 4.15.0-1107-ibm-gt with node onibi.
  
  This test failed without any obvious error from the test output, the summary 
shows there is one failure but all 344 test cases were marked as PASS:
  [ 1851.020315] test_bpf: #0 TAX jited:1 46 44 43 PASS
  [ 1851.021767] test_bpf: #1 TXA jited:1 43 46 43 PASS
  [ 1851.024004] test_bpf: #2 ADD_SUB_MUL_K jited:1 45 PASS
  [ 1851.024886] test_bpf: #3 DIV_MOD_KX jited:1 70 PASS
  [ 1851.026103] test_bpf: #4 AND_OR_LSH_K jited:1 39 43 PASS
  [ 1851.027394] test_bpf: #5 LD_IMM_0 jited:1 42 PASS
  [ 1851.028027] test_bpf: #6 LD_IND jited:1 85 85 85 PASS
  [ 1851.030687] test_bpf: #7 LD_ABS jited:1 87 85 85 PASS
  [ 1851.033343] test_bpf: #8 LD_ABS_LL jited:1 90 70 PASS
  [ 1851.035030] test_bpf: #9 LD_IND_LL jited:1 61 58 58 PASS
  [ 1851.036890] test_bpf: #10 LD_ABS_NET jited:1 86 70 PASS
  [ 1851.038590] test_bpf: #11 LD_IND_NET jited:1 77 56 56 PASS
  [ 1851.040573] test_bpf: #12 LD_PKTTYPE jited:1 43 43 PASS
  [ 1851.041582] test_bpf: #13 LD_MARK jited:1 41 42 PASS
  [ 1851.042494] test_bpf: #14 LD_RXHASH jited:1 42 44 PASS
  [ 1851.043436] test_bpf: #15 LD_QUEUE jited:1 43 43 PASS
  [ 1851.044379] test_bpf: #16 LD_PROTOCOL jited:1 50 50 PASS
  [ 1851.045457] test_bpf: #17 LD_VLAN_TAG jited:1 41 41 PASS
  [ 1851.046363] test_bpf: #18 LD_VLAN_TAG_PRESENT jited:1 39 41 PASS
  [ 1851.047238] test_bpf: #19 LD_IFINDEX jited:1 44 44 PASS
  [ 1851.048199] test_bpf: #20 LD_HATYPE jited:1 44 44 PASS
  [ 1851.049157] test_bpf: #21 LD_CPU jited:1 51 50 PASS
  [ 1851.050250] test_bpf: #22 LD_NLATTR jited:1 43 68 PASS
  [ 1851.051465] test_bpf: #23 LD_NLATTR_NEST jited:1 85 233 PASS
  [ 1851.054890] test_bpf: #24 LD_PAYLOAD_OFF jited:1 527 745 PASS
  [ 1851.067698] test_bpf: #25 LD_ANC_XOR jited:1 42 42 PASS
  [ 1851.069510] test_bpf: #26 SPILL_FILL jited:1 45 45 48 PASS
  [ 1851.071372] test_bpf: #27 JEQ jited:1 85 46 47 PASS
  [ 1851.073284] test_bpf: #28 JGT jited:1 85 46 49 PASS
  [ 1851.075260] test_bpf: #29 JGE (jt 0), test 1 jited:1 86 47 47 PASS
  [ 1851.077151] test_bpf: #30 JGE (jt 0), test 2 jited:1 48 45 44 PASS
  [ 1851.078613] test_bpf: #31 JGE jited:1 48 46 47 PASS
  [ 1851.080128] test_bpf: #32 JSET jited:1 45 44 54 PASS
  [ 1851.081667] test_bpf: #33 tcpdump port 22 jited:1 83 106 72 PASS
  [ 1851.084383] test_bpf: #34 tcpdump complex jited:1 83 102 93 PASS
  [ 1851.087279] test_bpf: #35 RET_A jited:1 41 41 PASS
  [ 1851.088195] test_bpf: #36 INT: ADD trivial jited:1 43 PASS
  [ 1851.088700] test_bpf: #37 INT: MUL_X jited:1 41 PASS
  [ 1851.089186] test_bpf: #38 INT: MUL_X2 jited:1 40 PASS
  [ 1851.089665] test_bpf: #39 INT: MUL32_X jited:1 42 PASS
  [ 1851.090170] test_bpf: #40 INT: ADD 64-bit jited:1 90 PASS
  [ 1851.091228] test_bpf: #41 INT: ADD 32-bit jited:1 91 PASS
  [ 1851.092232] test_bpf: #42 INT: SUB jited:1 88 PASS
  [ 1851.093260] test_bpf: #43 INT: XOR jited:1 56 PASS
  [ 1851.093920] test_bpf: #44 INT: MUL jited:1 194 PASS
  [ 1851.095947] test_bpf: #45 MOV REG64 jited:1 43 PASS
  [ 1851.096513] test_bpf: #46 MOV REG32 jited:1 45 PASS
  [ 1851.097471] test_bpf: #47 LD IMM64 jited:1 44 PASS
  [ 1851.098000] test_bpf: #48 INT: ALU MIX jited:1 73 PASS
  [ 1851.098807] test_bpf: #49 INT: shifts by register jited:1 53 PASS
  [ 1851.099421] test_bpf: #50 INT: DIV + ABS jited:1 92 54 PASS
  [ 1851.100960] test_bpf: #51 INT: DIV by -1 jited:1 85 50 PASS
  [ 1851.102431] test_bpf: #52 check: missing ret PASS
  [ 1851.102650] test_bpf: #53 check: div_k_0 PASS
  [ 1851.102660] test_bpf: #54 check: unknown insn PASS
  [ 1851.102674] test_bpf: #55 check: out of range spill/fill PASS
  [ 1851.102685] test_bpf: #56 JUMPS +