[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-08-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.10.0-33.37

---
linux (4.10.0-33.37) zesty; urgency=low

  * linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)

  * CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentation

  * CVE-2017-1000111
- Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE"
- packet: fix tp_reserve race in packet_set_ring

  * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
(LP: #1673564)
- irqchip/gic-v3: Add missing system register definitions
- arm64: KVM: Do not use stack-protector to compile EL2 code
- KVM: arm/arm64: vgic-v3: Use PREbits to infer the number of ICH_APxRn_EL2
  registers
- KVM: arm/arm64: vgic-v3: Fix nr_pre_bits bitfield extraction
- arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
- KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
- KVM: arm64: Make kvm_condition_valid32() accessible from EL2
- KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
- KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
- KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
- KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
- KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
- KVM: arm64: vgic-v3: Add misc Group-0 handlers
- KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
- KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
- arm64: Add MIDR values for Cavium cn83XX SoCs
- [Config] CONFIG_CAVIUM_ERRATUM_30115=y
- arm64: Add workaround for Cavium Thunder erratum 30115
- KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
- KVM: arm64: Enable GICv3 common sysreg trapping via command-line
- KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
- arm64: KVM: Make unexpected reads from WO registers inject an undef
- KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
- KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access

  * ibmvscsis: Do not send aborted task response (LP: #1689365)
- target: Fix unknown fabric callback queue-full errors
- ibmvscsis: Do not send aborted task response
- ibmvscsis: Clear left-over abort_cmd pointers
- ibmvscsis: Fix the incorrect req_lim_delta

  * hisi_sas performance improvements (LP: #1708734)
- scsi: hisi_sas: define hisi_sas_device.device_id as int
- scsi: hisi_sas: optimise the usage of hisi_hba.lock
- scsi: hisi_sas: relocate sata_done_v2_hw()
- scsi: hisi_sas: optimise DMA slot memory

  * hisi_sas driver reports mistakes timed out task for internal abort
(LP: #1708730)
- scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort()

  * scsi: hisi_sas: add null check before indirect pointer dereference
(LP: #1708714)
- scsi: hisi_sas: add null check before indirect pointer dereference

  * [LTCTest][Opal][FW860.20] HMI recoverable errors failed to recover and
system goes to dump state. (LP: #1684054)
- powerpc/64: Fix HMI exception on LE with CONFIG_RELOCATABLE=y

  * Set CONFIG_SATA_HIGHBANK=y on armhf (LP: #1703430)
- [Config] CONFIG_SATA_HIGHBANK=y

  * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495)
- [Packaging] tests -- reduce rebuild test to one flavour

  * support Hip07/08 I2C controller (LP: #1708293)
- ACPI / APD: Add clock frequency for Hisilicon Hip07/08 I2C controller
- i2c: designware: Add ACPI HID for Hisilicon Hip07/08 I2C controller

  * Mute key LED does not work on HP ProBook 440 (LP: #1705586)
- ALSA: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds
- ALSA: hda - Add mute led support for HP ProBook 440 G4

  * Hisilicon D05 onboard fibre NIC link indicator LEDs don't work
(LP: #1704903)
- net: hns: add acpi function of xge led control

  * zesty unable to handle kernel NULL pointer dereference (LP: #1680904)
- drm/i915: Do not drop pagetables when empty

  * hns: use after free in hns_nic_net_xmit_hw (LP: #1704885)
- net: hns: Fix a skb used after free bug

  * [ARM64] config EDAC_GHES=y depends on EDAC_MM_EDAC=y (LP: #1706141)
- [Config] set EDAC_MM_EDAC=y for ARM64

  * [Hyper-V] hv_netvsc: Exclude non-TCP port numbers from vRSS hashing
(LP: #1690174)
- hv_netvsc: Exclude non-TCP port numbers from vRSS hashing

  * 

[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-08-22 Thread Manoj Iyer
ubuntu@awrep4:~/mce-test/cases/function/hwpoison$ uname -a 
Linux awrep4 4.10.0-33-generic #37-Ubuntu SMP Fri Aug 11 10:55:04 UTC 2017 
aarch64 aarch64 aarch64 GNU/Linux
ubuntu@awrep4:~/mce-test/cases/function/hwpoison$

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-08-22 Thread Manoj Iyer
ubuntu@awrep4:~/mce-test/cases/function/hwpoison$ sudo ./run_hugepage.sh

***
Pay attention:

This is the functional test for huge page support of HWPoison.
***

Num of Executed Test Case: 42   Num of Failed Case: 14

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-08-22 Thread Manoj Iyer
ubuntu@awrep4:~/mce-test/cases/function/hwpoison$ sudo ./run_soft.sh

***
Pay attention:

This test is soft mode of HWPoison functional test.
***



Running tsoft (simple soft offline test)
PASS: ./tsoft

Running tsoftinj (soft offline test on various types of pages)
anonymous
anonymous
private, diskbacked
./helpers.sh: line 28: 12471 Bus error   (core dumped) ./tsoftinj
FAIL: ./tsoftinj returned with failure.

Running random_offline (random soft offline test for 60 seconds)
ERROR: No soft offlining support in kernel
PASS: ./random_offline -t 60
Unpoisoning.
WARNING: hwpoison page counter is broken.
HardwareCorrupted: 8 kB

Num of Executed Test Case: 3Num of Failed Case: 1


** Tags removed: verification-needed-zesty
** Tags added: verification-done-zesty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-08-16 Thread Kleber Sacilotto de Souza
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
zesty' to 'verification-done-zesty'. If the problem still exists, change
the tag 'verification-needed-zesty' to 'verification-failed-zesty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-zesty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-08-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.12.0-11.12

---
linux (4.12.0-11.12) artful; urgency=low

  * linux: 4.12.0-11.12 -proposed tracker (LP: #1709929)

  * CVE-2017-1000111
- packet: fix tp_reserve race in packet_set_ring

  * CVE-2017-1000112
- udp: consistently apply ufo or fragmentation

  * Please only recommend or suggest initramfs-tools | linux-initramfs-tool for
kernels able to boot without initramfs (LP: #1700972)
- Revert "UBUNTU: [Debian] Don't depend on initramfs-tools"
- [Debian] Don't depend on initramfs-tools

  * Miscellaneous Ubuntu changes
- SAUCE: (noup) Update spl to 0.6.5.11-ubuntu1, zfs to 0.6.5.11-1ubuntu3
- SAUCE: powerpc: Always initialize input array when calling 
epapr_hypercall()

  * Miscellaneous upstream changes
- selftests: typo correction for memory-hotplug test
- selftests: check hot-pluggagble memory for memory-hotplug test
- selftests: check percentage range for memory-hotplug test
- selftests: add missing test name in memory-hotplug test
- selftests: fix memory-hotplug test

 -- Seth Forshee   Thu, 10 Aug 2017 13:37:00
-0500

** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000111

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000112

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-08-03 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Zesty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-07-25 Thread Manoj Iyer
** Changed in: linux (Ubuntu Zesty)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Zesty)
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Zesty:
  New

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-07-20 Thread Seth Forshee
** Also affects: linux (Ubuntu Zesty)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Incomplete => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Zesty:
  New

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-06-14 Thread Manoj Iyer
Kernel available in PPA: https://launchpad.net/~centriq-
team/+archive/ubuntu/lp1696852/

Boot tested on Power8:
ubuntu@manjo-srutest:~$ uname -a 
Linux manjo-srutest 4.10.0-22-generic #24~lp1696852+mmcorruption.1-Ubuntu SMP 
Tue Jun 13 21:31:10 UTC  ppc64le ppc64le ppc64le GNU/Linux

Boot tested on AMD64:
ubuntu@adib:~$ uname -a 
Linux adib 4.10.0-22-generic #24~lp1696852+mmcorruption.1-Ubuntu SMP Tue Jun 13 
21:31:31 UTC  x86_64 x86_64 x86_64 GNU/Linux

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
  entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig   |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c| 90 

   arch/arm64/mm/hugetlbpage.c  | 29 +
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696852] Re: [SRU][Zesty] arm64: Add support for handling memory corruption

2017-06-13 Thread Manoj Iyer
Patches were applied to Zesty, along with the RAS patch series, and ran
the mce-test hwpoison.

ubuntu@ubuntu:~/testing/mce-test/cases/function/hwpoison$ uname -a 
Linux ubuntu 4.10.0-22-generic #24~lp1696852+mmcorruption.1 SMP Tue Jun 13 
20:53:25 UTC 2017 aarch64 aarch64 aarch64 GNU/Linux


Testing on QDF2400 SDP with mce-test:

ubuntu@ubuntu:~/testing/mce-test/cases/function/hwpoison$ sudo 
./run_hugepage.sh 
[sudo] password for ubuntu: 
hwpoison-inject module is loaded.

***
Pay attention:

This is the functional test for huge page support of HWPoison.
***


-
TestCase head early file fork_shared killed
./thugetlb -x -m 2 -o 512 -e -f 1 -F ../../../work/hugepage
[  403.325672] Memory failure: 0x171c200: Killing thugetlb:2912 due to hardware 
memory corruption
[  403.55] Memory failure: 0x171c200: Killing thugetlb:2913 due to hardware 
memory corruption
[  403.341939] Memory failure: 0x171c200: huge page still referenced by 1 users
[  403.348956] Memory failure: 0x171c200: recovery action for huge page: Failed
./run_hugepage.sh: line 61:  2912 Bus error   (core dumped) 
./thugetlb -x -m 2 -o 512 -e -f 1 -F ../../../work/hugepage
thugetlb was killed.
PASS
-
TestCase head early file fork_private_nocow killed
./thugetlb -x -m 2 -o 512 -e -f 2 -Fp ../../../work/hugepage
[  403.739988] Memory failure: 0x171de00: Killing thugetlb:2916 due to hardware 
memory corruption
[  403.747668] Memory failure: 0x171de00: Killing thugetlb:2917 due to hardware 
memory corruption
[  403.756254] Memory failure: 0x171de00: recovery action for huge page: Delayed
./run_hugepage.sh: line 61:  2916 Bus error   (core dumped) 
./thugetlb -x -m 2 -o 512 -e -f 2 -Fp ../../../work/hugepage
thugetlb was killed.
PASS
-
TestCase head early file fork_private_cow killed
./thugetlb -x -m 2 -o 512 -e -f 3 -Fpc ../../../work/hugepage
[  404.239395] Memory failure: 0x171dc00: Killing thugetlb:2920 due to hardware 
memory corruption
[  404.247074] Memory failure: 0x171dc00: recovery action for huge page: Delayed
./run_hugepage.sh: line 61:  2920 Bus error   (core dumped) 
./thugetlb -x -m 2 -o 512 -e -f 3 -Fpc ../../../work/hugepage
thugetlb was killed.
PASS
-
TestCase head early shm fork_shared killed
./thugetlb -x -m 2 -o 512 -e -S -F ../../../work/hugepage
[  404.625458] Memory failure: 0x171da00: Killing thugetlb:2923 due to hardware 
memory corruption
[  404.633134] Memory failure: 0x171da00: Killing thugetlb:2924 due to hardware 
memory corruption
[  404.641716] Memory failure: 0x171da00: huge page still referenced by 1 users
[  404.648741] Memory failure: 0x171da00: recovery action for huge page: Failed
./run_hugepage.sh: line 61:  2923 Bus error   (core dumped) 
./thugetlb -x -m 2 -o 512 -e -S -F ../../../work/hugepage
thugetlb was killed.
PASS
-
TestCase head early anonymous fork_shared killed
./thugetlb -x -m 2 -o 512 -e -A -F ../../../work/hugepage
[  405.021526] Memory failure: 0x171d600: Killing thugetlb:2927 due to hardware 
memory corruption
[  405.029206] Memory failure: 0x171d600: Killing thugetlb:2928 due to hardware 
memory corruption
[  405.037779] Memory failure: 0x171d600: huge page still referenced by 1 users
[  405.044817] Memory failure: 0x171d600: recovery action for huge page: Failed
./run_hugepage.sh: line 61:  2927 Bus error   (core dumped) 
./thugetlb -x -m 2 -o 512 -e -A -F ../../../work/hugepage
thugetlb was killed.
PASS
-
TestCase head early anonymous fork_private_nocow killed
./thugetlb -x -m 2 -o 512 -e -A -Fp ../../../work/hugepage
[  405.407449] Memory failure: 0x171d400: Killing thugetlb:2931 due to hardware 
memory corruption
[  405.415124] Memory failure: 0x171d400: Killing thugetlb:2932 due to hardware 
memory corruption
[  405.423703] Memory failure: 0x171d400: recovery action for huge page: Delayed
./run_hugepage.sh: line 61:  2931 Bus error   (core dumped) 
./thugetlb -x -m 2 -o 512 -e -A -Fp ../../../work/hugepage
thugetlb was killed.
PASS
-
TestCase head early anonymous fork_private_cow killed
./thugetlb -x -m 2 -o 512 -e -A -Fpc ../../../work/hugepage
[  405.906841] Memory failure: 0x171d200: Killing thugetlb:2935 due to hardware 
memory corruption
[  405.914525] Memory failure: 0x171d200: recovery action for huge page: Delayed
./run_hugepage.sh: line 61:  2935 Bus error   (core dumped) 
./thugetlb -x -m 2 -o 512 -e -A -Fpc ../../../work/hugepage
thugetlb was killed.
PASS
-
TestCase head late_touch file fork_shared killed
./thugetlb -x -m 2 -o 512 -f 8 -F ../../../work/hugepage
[