[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
This bug was fixed in the package linux - 4.10.0-33.37 --- linux (4.10.0-33.37) zesty; urgency=low * linux: 4.10.0-33.37 -proposed tracker (LP: #1709303) * CVE-2017-1000112 - Revert "udp: consistently apply ufo or fragmentation" - udp: consistently apply ufo or fragmentation * CVE-2017-1000111 - Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE" - packet: fix tp_reserve race in packet_set_ring * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on (LP: #1673564) - irqchip/gic-v3: Add missing system register definitions - arm64: KVM: Do not use stack-protector to compile EL2 code - KVM: arm/arm64: vgic-v3: Use PREbits to infer the number of ICH_APxRn_EL2 registers - KVM: arm/arm64: vgic-v3: Fix nr_pre_bits bitfield extraction - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers - KVM: arm64: Make kvm_condition_valid32() accessible from EL2 - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2 - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler - KVM: arm64: vgic-v3: Add misc Group-0 handlers - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line - arm64: Add MIDR values for Cavium cn83XX SoCs - [Config] CONFIG_CAVIUM_ERRATUM_30115=y - arm64: Add workaround for Cavium Thunder erratum 30115 - KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler - KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler - KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler - KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler - KVM: arm64: Enable GICv3 common sysreg trapping via command-line - KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped - arm64: KVM: Make unexpected reads from WO registers inject an undef - KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access - KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access * ibmvscsis: Do not send aborted task response (LP: #1689365) - target: Fix unknown fabric callback queue-full errors - ibmvscsis: Do not send aborted task response - ibmvscsis: Clear left-over abort_cmd pointers - ibmvscsis: Fix the incorrect req_lim_delta * hisi_sas performance improvements (LP: #1708734) - scsi: hisi_sas: define hisi_sas_device.device_id as int - scsi: hisi_sas: optimise the usage of hisi_hba.lock - scsi: hisi_sas: relocate sata_done_v2_hw() - scsi: hisi_sas: optimise DMA slot memory * hisi_sas driver reports mistakes timed out task for internal abort (LP: #1708730) - scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort() * scsi: hisi_sas: add null check before indirect pointer dereference (LP: #1708714) - scsi: hisi_sas: add null check before indirect pointer dereference * [LTCTest][Opal][FW860.20] HMI recoverable errors failed to recover and system goes to dump state. (LP: #1684054) - powerpc/64: Fix HMI exception on LE with CONFIG_RELOCATABLE=y * Set CONFIG_SATA_HIGHBANK=y on armhf (LP: #1703430) - [Config] CONFIG_SATA_HIGHBANK=y * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495) - [Packaging] tests -- reduce rebuild test to one flavour * support Hip07/08 I2C controller (LP: #1708293) - ACPI / APD: Add clock frequency for Hisilicon Hip07/08 I2C controller - i2c: designware: Add ACPI HID for Hisilicon Hip07/08 I2C controller * Mute key LED does not work on HP ProBook 440 (LP: #1705586) - ALSA: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds - ALSA: hda - Add mute led support for HP ProBook 440 G4 * Hisilicon D05 onboard fibre NIC link indicator LEDs don't work (LP: #1704903) - net: hns: add acpi function of xge led control * zesty unable to handle kernel NULL pointer dereference (LP: #1680904) - drm/i915: Do not drop pagetables when empty * hns: use after free in hns_nic_net_xmit_hw (LP: #1704885) - net: hns: Fix a skb used after free bug * [ARM64] config EDAC_GHES=y depends on EDAC_MM_EDAC=y (LP: #1706141) - [Config] set EDAC_MM_EDAC=y for ARM64 * [Hyper-V] hv_netvsc: Exclude non-TCP port numbers from vRSS hashing (LP: #1690174) - hv_netvsc: Exclude non-TCP port numbers from vRSS hashing *
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
ubuntu@awrep4:~/mce-test/cases/function/hwpoison$ uname -a Linux awrep4 4.10.0-33-generic #37-Ubuntu SMP Fri Aug 11 10:55:04 UTC 2017 aarch64 aarch64 aarch64 GNU/Linux ubuntu@awrep4:~/mce-test/cases/function/hwpoison$ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Released Status in linux source package in Zesty: Fix Committed Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
ubuntu@awrep4:~/mce-test/cases/function/hwpoison$ sudo ./run_hugepage.sh *** Pay attention: This is the functional test for huge page support of HWPoison. *** Num of Executed Test Case: 42 Num of Failed Case: 14 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Released Status in linux source package in Zesty: Fix Committed Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
ubuntu@awrep4:~/mce-test/cases/function/hwpoison$ sudo ./run_soft.sh *** Pay attention: This test is soft mode of HWPoison functional test. *** Running tsoft (simple soft offline test) PASS: ./tsoft Running tsoftinj (soft offline test on various types of pages) anonymous anonymous private, diskbacked ./helpers.sh: line 28: 12471 Bus error (core dumped) ./tsoftinj FAIL: ./tsoftinj returned with failure. Running random_offline (random soft offline test for 60 seconds) ERROR: No soft offlining support in kernel PASS: ./random_offline -t 60 Unpoisoning. WARNING: hwpoison page counter is broken. HardwareCorrupted: 8 kB Num of Executed Test Case: 3Num of Failed Case: 1 ** Tags removed: verification-needed-zesty ** Tags added: verification-done-zesty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Released Status in linux source package in Zesty: Fix Committed Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- zesty' to 'verification-done-zesty'. If the problem still exists, change the tag 'verification-needed-zesty' to 'verification-failed-zesty'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-zesty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Released Status in linux source package in Zesty: Fix Committed Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
This bug was fixed in the package linux - 4.12.0-11.12 --- linux (4.12.0-11.12) artful; urgency=low * linux: 4.12.0-11.12 -proposed tracker (LP: #1709929) * CVE-2017-1000111 - packet: fix tp_reserve race in packet_set_ring * CVE-2017-1000112 - udp: consistently apply ufo or fragmentation * Please only recommend or suggest initramfs-tools | linux-initramfs-tool for kernels able to boot without initramfs (LP: #1700972) - Revert "UBUNTU: [Debian] Don't depend on initramfs-tools" - [Debian] Don't depend on initramfs-tools * Miscellaneous Ubuntu changes - SAUCE: (noup) Update spl to 0.6.5.11-ubuntu1, zfs to 0.6.5.11-1ubuntu3 - SAUCE: powerpc: Always initialize input array when calling epapr_hypercall() * Miscellaneous upstream changes - selftests: typo correction for memory-hotplug test - selftests: check hot-pluggagble memory for memory-hotplug test - selftests: check percentage range for memory-hotplug test - selftests: add missing test name in memory-hotplug test - selftests: fix memory-hotplug test -- Seth ForsheeThu, 10 Aug 2017 13:37:00 -0500 ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000111 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000112 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Released Status in linux source package in Zesty: Fix Committed Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
** Changed in: linux (Ubuntu Zesty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Committed Status in linux source package in Zesty: Fix Committed Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
** Changed in: linux (Ubuntu Zesty) Importance: Undecided => High ** Changed in: linux (Ubuntu Zesty) Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Committed Status in linux source package in Zesty: New Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
** Also affects: linux (Ubuntu Zesty) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Incomplete => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Fix Committed Status in linux source package in Zesty: New Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
Kernel available in PPA: https://launchpad.net/~centriq- team/+archive/ubuntu/lp1696852/ Boot tested on Power8: ubuntu@manjo-srutest:~$ uname -a Linux manjo-srutest 4.10.0-22-generic #24~lp1696852+mmcorruption.1-Ubuntu SMP Tue Jun 13 21:31:10 UTC ppc64le ppc64le ppc64le GNU/Linux Boot tested on AMD64: ubuntu@adib:~$ uname -a Linux adib 4.10.0-22-generic #24~lp1696852+mmcorruption.1-Ubuntu SMP Tue Jun 13 21:31:31 UTC x86_64 x86_64 x86_64 GNU/Linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1696852 Title: [SRU][Zesty] arm64: Add support for handling memory corruption Status in linux package in Ubuntu: Incomplete Bug description: [Impact] Enable memory corruption handling for arm64 [Test] run mce-test mce-test/cases/function/hwpoison [Fix] [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html [1] https://www.spinics.net/lists/arm-kernel/msg581657.html [1] https://lkml.org/lkml/2017/4/7/486 [2] https://lkml.org/lkml/2017/4/5/402 Jonathan (Zhixiong) Zhang (2): arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling arm64: kconfig: allow support for memory failure handling Punit Agrawal (2): arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries arm64: mm: Update perf accounting to handle poison faults arch/arm64/Kconfig | 1 + arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/mm/fault.c| 90 arch/arm64/mm/hugetlbpage.c | 29 + 4 files changed, 67 insertions(+), 55 deletions(-) [Regression Potential] Changes are confined to ARM64 architecture. Detailed test results are posted to this bug as comments. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption
Patches were applied to Zesty, along with the RAS patch series, and ran the mce-test hwpoison. ubuntu@ubuntu:~/testing/mce-test/cases/function/hwpoison$ uname -a Linux ubuntu 4.10.0-22-generic #24~lp1696852+mmcorruption.1 SMP Tue Jun 13 20:53:25 UTC 2017 aarch64 aarch64 aarch64 GNU/Linux Testing on QDF2400 SDP with mce-test: ubuntu@ubuntu:~/testing/mce-test/cases/function/hwpoison$ sudo ./run_hugepage.sh [sudo] password for ubuntu: hwpoison-inject module is loaded. *** Pay attention: This is the functional test for huge page support of HWPoison. *** - TestCase head early file fork_shared killed ./thugetlb -x -m 2 -o 512 -e -f 1 -F ../../../work/hugepage [ 403.325672] Memory failure: 0x171c200: Killing thugetlb:2912 due to hardware memory corruption [ 403.55] Memory failure: 0x171c200: Killing thugetlb:2913 due to hardware memory corruption [ 403.341939] Memory failure: 0x171c200: huge page still referenced by 1 users [ 403.348956] Memory failure: 0x171c200: recovery action for huge page: Failed ./run_hugepage.sh: line 61: 2912 Bus error (core dumped) ./thugetlb -x -m 2 -o 512 -e -f 1 -F ../../../work/hugepage thugetlb was killed. PASS - TestCase head early file fork_private_nocow killed ./thugetlb -x -m 2 -o 512 -e -f 2 -Fp ../../../work/hugepage [ 403.739988] Memory failure: 0x171de00: Killing thugetlb:2916 due to hardware memory corruption [ 403.747668] Memory failure: 0x171de00: Killing thugetlb:2917 due to hardware memory corruption [ 403.756254] Memory failure: 0x171de00: recovery action for huge page: Delayed ./run_hugepage.sh: line 61: 2916 Bus error (core dumped) ./thugetlb -x -m 2 -o 512 -e -f 2 -Fp ../../../work/hugepage thugetlb was killed. PASS - TestCase head early file fork_private_cow killed ./thugetlb -x -m 2 -o 512 -e -f 3 -Fpc ../../../work/hugepage [ 404.239395] Memory failure: 0x171dc00: Killing thugetlb:2920 due to hardware memory corruption [ 404.247074] Memory failure: 0x171dc00: recovery action for huge page: Delayed ./run_hugepage.sh: line 61: 2920 Bus error (core dumped) ./thugetlb -x -m 2 -o 512 -e -f 3 -Fpc ../../../work/hugepage thugetlb was killed. PASS - TestCase head early shm fork_shared killed ./thugetlb -x -m 2 -o 512 -e -S -F ../../../work/hugepage [ 404.625458] Memory failure: 0x171da00: Killing thugetlb:2923 due to hardware memory corruption [ 404.633134] Memory failure: 0x171da00: Killing thugetlb:2924 due to hardware memory corruption [ 404.641716] Memory failure: 0x171da00: huge page still referenced by 1 users [ 404.648741] Memory failure: 0x171da00: recovery action for huge page: Failed ./run_hugepage.sh: line 61: 2923 Bus error (core dumped) ./thugetlb -x -m 2 -o 512 -e -S -F ../../../work/hugepage thugetlb was killed. PASS - TestCase head early anonymous fork_shared killed ./thugetlb -x -m 2 -o 512 -e -A -F ../../../work/hugepage [ 405.021526] Memory failure: 0x171d600: Killing thugetlb:2927 due to hardware memory corruption [ 405.029206] Memory failure: 0x171d600: Killing thugetlb:2928 due to hardware memory corruption [ 405.037779] Memory failure: 0x171d600: huge page still referenced by 1 users [ 405.044817] Memory failure: 0x171d600: recovery action for huge page: Failed ./run_hugepage.sh: line 61: 2927 Bus error (core dumped) ./thugetlb -x -m 2 -o 512 -e -A -F ../../../work/hugepage thugetlb was killed. PASS - TestCase head early anonymous fork_private_nocow killed ./thugetlb -x -m 2 -o 512 -e -A -Fp ../../../work/hugepage [ 405.407449] Memory failure: 0x171d400: Killing thugetlb:2931 due to hardware memory corruption [ 405.415124] Memory failure: 0x171d400: Killing thugetlb:2932 due to hardware memory corruption [ 405.423703] Memory failure: 0x171d400: recovery action for huge page: Delayed ./run_hugepage.sh: line 61: 2931 Bus error (core dumped) ./thugetlb -x -m 2 -o 512 -e -A -Fp ../../../work/hugepage thugetlb was killed. PASS - TestCase head early anonymous fork_private_cow killed ./thugetlb -x -m 2 -o 512 -e -A -Fpc ../../../work/hugepage [ 405.906841] Memory failure: 0x171d200: Killing thugetlb:2935 due to hardware memory corruption [ 405.914525] Memory failure: 0x171d200: recovery action for huge page: Delayed ./run_hugepage.sh: line 61: 2935 Bus error (core dumped) ./thugetlb -x -m 2 -o 512 -e -A -Fpc ../../../work/hugepage thugetlb was killed. PASS - TestCase head late_touch file fork_shared killed ./thugetlb -x -m 2 -o 512 -f 8 -F ../../../work/hugepage [