[Kernel-packages] [Bug 1699627] Re: XDP eBPF programs fail to verify on Zesty ppc64el

2017-08-20 Thread Daniel Axtens
** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1699627

Title:
  XDP eBPF programs fail to verify on Zesty ppc64el

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Zesty:
  Fix Released

Bug description:
  SRU Justification

  [Impact]
  Some XDP examples such as https://github.com/netoptimizer/prototype-kernel 
fail on ppc64el at the eBPF verification stage.

  [Fix]
  This is because CONFIG_HAS_EFFICIENT_UNALIGNED_ACCESS is not set on ppc64el. 
It is not set because the kernel is being compiled for CPU_POWER7 instead of 
CPU_POWER8, and we don't have efficient unaligned access on POWER7.

  Swap to building for POWER8.

  As a bonus, this should make everything a little bit faster.

  [Regression Potential]

   - IBM never released any officially supported Power7 LE systems - LE
  was only ever supported on Power8. Therefore this should not break any
  systems.

   - Regression potential is also limited to one arch.

   - Artful-next already has this fix and nothing bad has happened
  there.

  [Test]
  Create a P8 VM with a virtio network card and 2 vcpus.

  The VM needs to have some network features turned off, and enough
  queues. The following virsh snippet in the  section should
  suffice:

 
   
   
 

  Then:
  - apt install clang llvm
  - get the prototype-kernel repo
  - go to the kernel/samples/bpf directory
  - make
  - sudo mount -t bpf bpf /sys/fs/bpf/
  - sudo ./xdp_ddos01_blacklist --dev enp0s1

  Observe that without this patch, we get a long debug splat ending
  with:

  32: (61) r1 = *(u32 *)(r8 +12)
  misaligned packet access off 0+18+12 size 4
  load_bpf_file: Permission denied

  With this patch we don't get that error and the program is
  successfully verifies and loads. (It still doesn't run - there is
  other breakage I'm chasing down - but it definitely gets further.)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699627/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1699627] Re: XDP eBPF programs fail to verify on Zesty ppc64el

2017-07-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.10.0-28.32

---
linux (4.10.0-28.32) zesty; urgency=low

  * linux: 4.10.0-28.32 -proposed tracker (LP: #1701013)

  * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
- Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device

  * aacraid driver may return uninitialized stack data to userspace
(LP: #1700077)
- SAUCE: scsi: aacraid: Don't copy uninitialized stack memory to userspace

  * CVE-2017-9605
- drm/vmwgfx: Make sure backup_handle is always valid

  * CVE-2017-1000380
- ALSA: timer: Fix race between read and ioctl
- ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT

  * XDP eBPF programs fail to verify on Zesty ppc64el (LP: #1699627)
- [Config] ppc64el: build for Power8 not Power7

  * AACRAID for power9 platform (LP: #1689980)
- scripts/spelling.txt: add "therfore" pattern and fix typo instances
- scsi: aacraid: fix PCI error recovery path
- scsi: aacraid: pci_alloc_consistent() failures on ARM64
- scsi: aacraid: Remove __GFP_DMA for raw srb memory
- scsi: aacraid: Fix DMAR issues with iommu=pt
- scsi: aacraid: Added 32 and 64 queue depth for arc natives
- scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks
- scsi: aacraid: Remove reset support from check_health
- scsi: aacraid: Change wait time for fib completion
- scsi: aacraid: Log count info of scsi cmds before reset
- scsi: aacraid: Print ctrl status before eh reset
- scsi: aacraid: Using single reset mask for IOP reset
- scsi: aacraid: Rework IOP reset
- scsi: aacraid: Add periodic checks to see IOP reset status
- scsi: aacraid: Rework SOFT reset code
- scsi: aacraid: Rework aac_src_restart
- scsi: aacraid: Use correct function to get ctrl health
- scsi: aacraid: Make sure ioctl returns on controller reset
- scsi: aacraid: Enable ctrl reset for both hba and arc
- scsi: aacraid: Add reset debugging statements
- scsi: aacraid: Remove reference to Series-9
- scsi: aacraid: Update driver version to 50834

  * arm64 kernel crashdump support (LP: #1694859)
- memblock: add memblock_clear_nomap()
- memblock: add memblock_cap_memory_range()
- arm64: limit memory regions based on DT property, usable-memory-range
- arm64: kdump: reserve memory for crash dump kernel
- arm64: mm: add set_memory_valid()
- arm64: mm: use phys_addr_t instead of unsigned long in __map_memblock
- arm64: kdump: protect crash dump kernel memory
- arm64: hibernate: preserve kdump image around hibernation
- arm64: kdump: implement machine_crash_shutdown()
- arm64: kdump: add VMCOREINFO's for user-space tools
- [Config] CONFIG_CRASH_DUMP=y on arm64
- arm64: kdump: provide /proc/vmcore file
- Documentation: kdump: describe arm64 port
- Documentation: dt: chosen properties for arm64 kdump
- efi/libstub/arm*: Set default address and size cells values for an empty 
dtb

  * hibmc driver does not include "pci:" prefix in bus ID (LP: #1698700)
- SAUCE: drm: hibmc: Use set_busid function from drm core

  * Processes in "D" state due to zap_pid_ns_processes kernel call with Ubuntu +
Docker (LP: #1698264)
- pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes

  * Bugfixes for  hns network driver (LP: #1696031)
- hns_enet: use cpumask_var_t for on-stack mask
- net: hns: fix uninitialized data use
- net: hns: avoid gcc-7.0.1 warning for uninitialized data
- net: hns: Add ACPI support to check SFP present
- net: hns: Fix the implementation of irq affinity function
- net: hns: Modify GMAC init TX threshold value
- net: hns: Optimize the code for GMAC pad and crc Config
- net: hns: Remove redundant memset during buffer release
- net: hns: bug fix of ethtool show the speed
- net: hns: Optimize hns_nic_common_poll for better performance
- net: hns: Fix to adjust buf_size of ring according to mtu
- net: hns: Replace netif_tx_lock to ring spin lock
- net: hns: Correct HNS RSS key set function
- net: hns: Remove the redundant adding and deleting mac function
- net: hns: Remove redundant mac_get_id()
- net: hns: Remove redundant mac table operations
- net: hns: Clean redundant code from hns_mdio.c file
- net: hns: Optimise the code in hns_mdio_wait_ready()
- net: hns: Simplify the exception sequence in hns_ppe_init()
- net: hns: Adjust the SBM module buffer threshold
- net: hns: Avoid Hip06 chip TX packet line bug
- net: hns: Some checkpatch.pl script & warning fixes
- net: hns: support deferred probe when can not obtain irq
- net: hns: support deferred probe when no mdio
- net: hns: fix ethtool_get_strings overflow in hns driver

  * CVE-2017-7346
- drm/vmwgfx: limit the number of mip levels in 
vmw_gb_surface_define_ioctl()

  * [SRU][Zesty] qcom_emac is unable to get ip address with at803x 

[Kernel-packages] [Bug 1699627] Re: XDP eBPF programs fail to verify on Zesty ppc64el

2017-07-14 Thread Daniel Axtens
Also verified by an IBMer on a real P8.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1699627

Title:
  XDP eBPF programs fail to verify on Zesty ppc64el

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]
  Some XDP examples such as https://github.com/netoptimizer/prototype-kernel 
fail on ppc64el at the eBPF verification stage.

  [Fix]
  This is because CONFIG_HAS_EFFICIENT_UNALIGNED_ACCESS is not set on ppc64el. 
It is not set because the kernel is being compiled for CPU_POWER7 instead of 
CPU_POWER8, and we don't have efficient unaligned access on POWER7.

  Swap to building for POWER8.

  As a bonus, this should make everything a little bit faster.

  [Regression Potential]

   - IBM never released any officially supported Power7 LE systems - LE
  was only ever supported on Power8. Therefore this should not break any
  systems.

   - Regression potential is also limited to one arch.

   - Artful-next already has this fix and nothing bad has happened
  there.

  [Test]
  Create a P8 VM with a virtio network card and 2 vcpus.

  The VM needs to have some network features turned off, and enough
  queues. The following virsh snippet in the  section should
  suffice:

 
   
   
 

  Then:
  - apt install clang llvm
  - get the prototype-kernel repo
  - go to the kernel/samples/bpf directory
  - make
  - sudo mount -t bpf bpf /sys/fs/bpf/
  - sudo ./xdp_ddos01_blacklist --dev enp0s1

  Observe that without this patch, we get a long debug splat ending
  with:

  32: (61) r1 = *(u32 *)(r8 +12)
  misaligned packet access off 0+18+12 size 4
  load_bpf_file: Permission denied

  With this patch we don't get that error and the program is
  successfully verifies and loads. (It still doesn't run - there is
  other breakage I'm chasing down - but it definitely gets further.)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699627/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1699627] Re: XDP eBPF programs fail to verify on Zesty ppc64el

2017-07-04 Thread Daniel Axtens
Verified in my qemu tcg guest.

** Tags added: verification-done-zesty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1699627

Title:
  XDP eBPF programs fail to verify on Zesty ppc64el

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]
  Some XDP examples such as https://github.com/netoptimizer/prototype-kernel 
fail on ppc64el at the eBPF verification stage.

  [Fix]
  This is because CONFIG_HAS_EFFICIENT_UNALIGNED_ACCESS is not set on ppc64el. 
It is not set because the kernel is being compiled for CPU_POWER7 instead of 
CPU_POWER8, and we don't have efficient unaligned access on POWER7.

  Swap to building for POWER8.

  As a bonus, this should make everything a little bit faster.

  [Regression Potential]

   - IBM never released any officially supported Power7 LE systems - LE
  was only ever supported on Power8. Therefore this should not break any
  systems.

   - Regression potential is also limited to one arch.

   - Artful-next already has this fix and nothing bad has happened
  there.

  [Test]
  Create a P8 VM with a virtio network card and 2 vcpus.

  The VM needs to have some network features turned off, and enough
  queues. The following virsh snippet in the  section should
  suffice:

 
   
   
 

  Then:
  - apt install clang llvm
  - get the prototype-kernel repo
  - go to the kernel/samples/bpf directory
  - make
  - sudo mount -t bpf bpf /sys/fs/bpf/
  - sudo ./xdp_ddos01_blacklist --dev enp0s1

  Observe that without this patch, we get a long debug splat ending
  with:

  32: (61) r1 = *(u32 *)(r8 +12)
  misaligned packet access off 0+18+12 size 4
  load_bpf_file: Permission denied

  With this patch we don't get that error and the program is
  successfully verifies and loads. (It still doesn't run - there is
  other breakage I'm chasing down - but it definitely gets further.)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699627/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1699627] Re: XDP eBPF programs fail to verify on Zesty ppc64el

2017-06-29 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Zesty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1699627

Title:
  XDP eBPF programs fail to verify on Zesty ppc64el

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]
  Some XDP examples such as https://github.com/netoptimizer/prototype-kernel 
fail on ppc64el at the eBPF verification stage.

  [Fix]
  This is because CONFIG_HAS_EFFICIENT_UNALIGNED_ACCESS is not set on ppc64el. 
It is not set because the kernel is being compiled for CPU_POWER7 instead of 
CPU_POWER8, and we don't have efficient unaligned access on POWER7.

  Swap to building for POWER8.

  As a bonus, this should make everything a little bit faster.

  [Regression Potential]

   - IBM never released any officially supported Power7 LE systems - LE
  was only ever supported on Power8. Therefore this should not break any
  systems.

   - Regression potential is also limited to one arch.

   - Artful-next already has this fix and nothing bad has happened
  there.

  [Test]
  Create a P8 VM with a virtio network card and 2 vcpus.

  The VM needs to have some network features turned off, and enough
  queues. The following virsh snippet in the  section should
  suffice:

 
   
   
 

  Then:
  - apt install clang llvm
  - get the prototype-kernel repo
  - go to the kernel/samples/bpf directory
  - make
  - sudo mount -t bpf bpf /sys/fs/bpf/
  - sudo ./xdp_ddos01_blacklist --dev enp0s1

  Observe that without this patch, we get a long debug splat ending
  with:

  32: (61) r1 = *(u32 *)(r8 +12)
  misaligned packet access off 0+18+12 size 4
  load_bpf_file: Permission denied

  With this patch we don't get that error and the program is
  successfully verifies and loads. (It still doesn't run - there is
  other breakage I'm chasing down - but it definitely gets further.)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699627/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1699627] Re: XDP eBPF programs fail to verify on Zesty ppc64el

2017-06-29 Thread Stefan Bader
** Also affects: linux (Ubuntu Zesty)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1699627

Title:
  XDP eBPF programs fail to verify on Zesty ppc64el

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Zesty:
  New

Bug description:
  SRU Justification

  [Impact]
  Some XDP examples such as https://github.com/netoptimizer/prototype-kernel 
fail on ppc64el at the eBPF verification stage.

  [Fix]
  This is because CONFIG_HAS_EFFICIENT_UNALIGNED_ACCESS is not set on ppc64el. 
It is not set because the kernel is being compiled for CPU_POWER7 instead of 
CPU_POWER8, and we don't have efficient unaligned access on POWER7.

  Swap to building for POWER8.

  As a bonus, this should make everything a little bit faster.

  [Regression Potential]

   - IBM never released any officially supported Power7 LE systems - LE
  was only ever supported on Power8. Therefore this should not break any
  systems.

   - Regression potential is also limited to one arch.

   - Artful-next already has this fix and nothing bad has happened
  there.

  [Test]
  Create a P8 VM with a virtio network card and 2 vcpus.

  The VM needs to have some network features turned off, and enough
  queues. The following virsh snippet in the  section should
  suffice:

 
   
   
 

  Then:
  - apt install clang llvm
  - get the prototype-kernel repo
  - go to the kernel/samples/bpf directory
  - make
  - sudo mount -t bpf bpf /sys/fs/bpf/
  - sudo ./xdp_ddos01_blacklist --dev enp0s1

  Observe that without this patch, we get a long debug splat ending
  with:

  32: (61) r1 = *(u32 *)(r8 +12)
  misaligned packet access off 0+18+12 size 4
  load_bpf_file: Permission denied

  With this patch we don't get that error and the program is
  successfully verifies and loads. (It still doesn't run - there is
  other breakage I'm chasing down - but it definitely gets further.)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699627/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1699627] Re: XDP eBPF programs fail to verify on Zesty ppc64el

2017-06-21 Thread Daniel Axtens
** Description changed:

  SRU Justification
  
  [Impact]
  Some XDP examples such as https://github.com/netoptimizer/prototype-kernel 
fail on ppc64el at the eBPF verification stage.
  
  [Fix]
  This is because CONFIG_HAS_EFFICIENT_UNALIGNED_ACCESS is not set on ppc64el. 
It is not set because the kernel is being compiled for CPU_POWER7 instead of 
CPU_POWER8, and we don't have efficient unaligned access on POWER7.
  
  Swap to building for POWER8.
  
  As a bonus, this should make everything a little bit faster.
  
  [Regression Potential]
  
-  - IBM never released any officially supported Power7 LE systems - LE
+  - IBM never released any officially supported Power7 LE systems - LE
  was only ever supported on Power8. Therefore this should not break any
  systems.
  
-  - Regression potential is also limited to one arch.
+  - Regression potential is also limited to one arch.
  
-  - Artful-next already has this fix and nothing bad has happened there.
+  - Artful-next already has this fix and nothing bad has happened there.
  
  [Test]
- On a P8 VM with a virtio network card and 2 vcpus:
+ Create a P8 VM with a virtio network card and 2 vcpus.
+ 
+ The VM needs to have some network features turned off, and enough
+ queues. The following virsh snippet in the  section should
+ suffice:
+ 
+
+  
+  
+
+ 
+ Then:
+ - apt install clang llvm
  - get the prototype-kernel repo
- - go to the kernel/samples/bpf directory-
+ - go to the kernel/samples/bpf directory
  - make
  - sudo mount -t bpf bpf /sys/fs/bpf/
  - sudo ./xdp_ddos01_blacklist --dev enp0s1
  
  Observe that without this patch, we get a long debug splat ending with:
  
  32: (61) r1 = *(u32 *)(r8 +12)
  misaligned packet access off 0+18+12 size 4
  load_bpf_file: Permission denied
  
  With this patch we don't get that error and the program is successfully
  verifies and loads. (It still doesn't run - there is other breakage I'm
  chasing down - but it definitely gets further.)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1699627

Title:
  XDP eBPF programs fail to verify on Zesty ppc64el

Status in linux package in Ubuntu:
  In Progress

Bug description:
  SRU Justification

  [Impact]
  Some XDP examples such as https://github.com/netoptimizer/prototype-kernel 
fail on ppc64el at the eBPF verification stage.

  [Fix]
  This is because CONFIG_HAS_EFFICIENT_UNALIGNED_ACCESS is not set on ppc64el. 
It is not set because the kernel is being compiled for CPU_POWER7 instead of 
CPU_POWER8, and we don't have efficient unaligned access on POWER7.

  Swap to building for POWER8.

  As a bonus, this should make everything a little bit faster.

  [Regression Potential]

   - IBM never released any officially supported Power7 LE systems - LE
  was only ever supported on Power8. Therefore this should not break any
  systems.

   - Regression potential is also limited to one arch.

   - Artful-next already has this fix and nothing bad has happened
  there.

  [Test]
  Create a P8 VM with a virtio network card and 2 vcpus.

  The VM needs to have some network features turned off, and enough
  queues. The following virsh snippet in the  section should
  suffice:

 
   
   
 

  Then:
  - apt install clang llvm
  - get the prototype-kernel repo
  - go to the kernel/samples/bpf directory
  - make
  - sudo mount -t bpf bpf /sys/fs/bpf/
  - sudo ./xdp_ddos01_blacklist --dev enp0s1

  Observe that without this patch, we get a long debug splat ending
  with:

  32: (61) r1 = *(u32 *)(r8 +12)
  misaligned packet access off 0+18+12 size 4
  load_bpf_file: Permission denied

  With this patch we don't get that error and the program is
  successfully verifies and loads. (It still doesn't run - there is
  other breakage I'm chasing down - but it definitely gets further.)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699627/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp