[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-08-19 Thread Po-Hsu Lin
** Changed in: ubuntu-kernel-tests
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  Fix Released
Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-kvm package in Ubuntu:
  Fix Released
Status in linux-aws source package in Cosmic:
  Fix Released
Status in linux-azure source package in Cosmic:
  Fix Released
Status in linux-kvm source package in Cosmic:
  Fix Released
Status in linux-aws source package in Disco:
  Fix Released
Status in linux-azure source package in Disco:
  Fix Released
Status in linux-kvm source package in Disco:
  Fix Released

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-07-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-kvm - 5.0.0-1011.12

---
linux-kvm (5.0.0-1011.12) disco; urgency=medium

  * linux-kvm: 5.0.0-1011.12 -proposed tracker (LP: #1834892)

  * q-r-t security test wants SCHED_STACK_END_CHECK to be enabled in KVM kernels
(LP: #1812159)
- [Config]: enable SCHED_STACK_END_CHECK

  * PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be set in C-KVM (LP: #1812624)
- [Config]: enable PAGE_POISONING, PAGE_POISONING_NO_SANITY,
  PAGE_POISONING_ZERO

  * test_410_config_lock_down_kernel in ubuntu_kernel_security test failed on
B/C/D KVM (LP: #1811981)
- [Config]: enable CONFIG_LOCK_DOWN_KERNEL

  [ Ubuntu: 5.0.0-21.22 ]

  * linux: 5.0.0-21.22 -proposed tracker (LP: #1834902)
  * Disco update: 5.0.15 upstream stable release (LP: #1834529)
- net: stmmac: Use bfsize1 in ndesc_init_rx_desc
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in 
hv_synic_cleanup()
- ubsan: Fix nasty -Wbuiltin-declaration-mismatch GCC-9 warnings
- staging: greybus: power_supply: fix prop-descriptor request size
- staging: wilc1000: Avoid GFP_KERNEL allocation from atomic context.
- staging: most: cdev: fix chrdev_region leak in mod_exit
- staging: most: sound: pass correct device when creating a sound card
- ASoC: tlv320aic3x: fix reset gpio reference counting
- ASoC: hdmi-codec: fix S/PDIF DAI
- ASoC: stm32: sai: fix iec958 controls indexation
- ASoC: stm32: sai: fix exposed capabilities in spdif mode
- ASoC: stm32: sai: fix race condition in irq handler
- ASoC:soc-pcm:fix a codec fixup issue in TDM case
- ASoC:hdac_hda:use correct format to setup hda codec
- ASoC:intel:skl:fix a simultaneous playback & capture issue on hda platform
- ASoC: dpcm: prevent snd_soc_dpcm use after free
- ASoC: nau8824: fix the issue of the widget with prefix name
- ASoC: nau8810: fix the issue of widget with prefixed name
- ASoC: samsung: odroid: Fix clock configuration for 44100 sample rate
- ASoC: rt5682: Check JD status when system resume
- ASoC: rt5682: fix jack type detection issue
- ASoC: rt5682: recording has no sound after booting
- ASoC: wm_adsp: Add locking to wm_adsp2_bus_error
- clk: meson-gxbb: round the vdec dividers to closest
- ASoC: stm32: dfsdm: manage multiple prepare
- ASoC: stm32: dfsdm: fix debugfs warnings on entry creation
- ASoC: cs4270: Set auto-increment bit for register writes
- ASoC: dapm: Fix NULL pointer dereference in snd_soc_dapm_free_kcontrol
- drm/omap: hdmi4_cec: Fix CEC clock handling for PM
- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state
- IB/hfi1: Eliminate opcode tests on mr deref
- IB/hfi1: Fix the allocation of RSM table
- MIPS: KGDB: fix kgdb support for SMP platforms.
- ASoC: tlv320aic32x4: Fix Common Pins
- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata()
- perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS
- perf/x86/intel: Initialize TFA MSR
- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr()
- iov_iter: Fix build error without CONFIG_CRYPTO
- xtensa: fix initialization of pt_regs::syscall in start_thread
- ASoC: rockchip: pdm: fix regmap_ops hang issue
- drm/amdkfd: Add picasso pci id
- drm/amdgpu: Adjust IB test timeout for XGMI configuration
- drm/amdgpu: amdgpu_device_recover_vram always failed if only one node in
  shadow_list
- drm/amd/display: fix cursor black issue
- ASoC: cs35l35: Disable regulators on driver removal
- objtool: Add rewind_stack_do_exit() to the noreturn list
- slab: fix a crash by reading /proc/slab_allocators
- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in
  sun8i_tcon_top_un/bind
- virtio_pci: fix a NULL pointer reference in vp_del_vqs
- RDMA/vmw_pvrdma: Fix memory leak on pvrdma_pci_remove
- RDMA/hns: Fix bug that caused srq creation to fail
- KEYS: trusted: fix -Wvarags warning
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler()
- drm/mediatek: fix possible object reference leak
- drm/mediatek: fix the rate and divder of hdmi phy for MT2701
- drm/mediatek: make implementation of recalc_rate() for MT2701 hdmi phy
- drm/mediatek: remove flag CLK_SET_RATE_PARENT for MT2701 hdmi phy
- drm/mediatek: using new factor for tvdpll for MT2701 hdmi phy
- drm/mediatek: no change parent rate in round_rate() for MT2701 hdmi phy
- ASoC: Intel: kbl: fix wrong number of channels
- ASoC: stm32: sai: fix master clock management
- ALSA: hda: Fix racy display power access
- virtio-blk: limit number of hw queues by nr_cpu_ids
- blk-mq: introduce blk_mq_complete_request_sync()
- nvme: cancel request synchronously
- nvme-fc: correct csn initialization and increments on error
- nvmet: fix discover log page when 

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-07-22 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-kvm - 5.0.0-1011.12

---
linux-kvm (5.0.0-1011.12) disco; urgency=medium

  * linux-kvm: 5.0.0-1011.12 -proposed tracker (LP: #1834892)

  * q-r-t security test wants SCHED_STACK_END_CHECK to be enabled in KVM kernels
(LP: #1812159)
- [Config]: enable SCHED_STACK_END_CHECK

  * PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be set in C-KVM (LP: #1812624)
- [Config]: enable PAGE_POISONING, PAGE_POISONING_NO_SANITY,
  PAGE_POISONING_ZERO

  * test_410_config_lock_down_kernel in ubuntu_kernel_security test failed on
B/C/D KVM (LP: #1811981)
- [Config]: enable CONFIG_LOCK_DOWN_KERNEL

  [ Ubuntu: 5.0.0-21.22 ]

  * linux: 5.0.0-21.22 -proposed tracker (LP: #1834902)
  * Disco update: 5.0.15 upstream stable release (LP: #1834529)
- net: stmmac: Use bfsize1 in ndesc_init_rx_desc
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in 
hv_synic_cleanup()
- ubsan: Fix nasty -Wbuiltin-declaration-mismatch GCC-9 warnings
- staging: greybus: power_supply: fix prop-descriptor request size
- staging: wilc1000: Avoid GFP_KERNEL allocation from atomic context.
- staging: most: cdev: fix chrdev_region leak in mod_exit
- staging: most: sound: pass correct device when creating a sound card
- ASoC: tlv320aic3x: fix reset gpio reference counting
- ASoC: hdmi-codec: fix S/PDIF DAI
- ASoC: stm32: sai: fix iec958 controls indexation
- ASoC: stm32: sai: fix exposed capabilities in spdif mode
- ASoC: stm32: sai: fix race condition in irq handler
- ASoC:soc-pcm:fix a codec fixup issue in TDM case
- ASoC:hdac_hda:use correct format to setup hda codec
- ASoC:intel:skl:fix a simultaneous playback & capture issue on hda platform
- ASoC: dpcm: prevent snd_soc_dpcm use after free
- ASoC: nau8824: fix the issue of the widget with prefix name
- ASoC: nau8810: fix the issue of widget with prefixed name
- ASoC: samsung: odroid: Fix clock configuration for 44100 sample rate
- ASoC: rt5682: Check JD status when system resume
- ASoC: rt5682: fix jack type detection issue
- ASoC: rt5682: recording has no sound after booting
- ASoC: wm_adsp: Add locking to wm_adsp2_bus_error
- clk: meson-gxbb: round the vdec dividers to closest
- ASoC: stm32: dfsdm: manage multiple prepare
- ASoC: stm32: dfsdm: fix debugfs warnings on entry creation
- ASoC: cs4270: Set auto-increment bit for register writes
- ASoC: dapm: Fix NULL pointer dereference in snd_soc_dapm_free_kcontrol
- drm/omap: hdmi4_cec: Fix CEC clock handling for PM
- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state
- IB/hfi1: Eliminate opcode tests on mr deref
- IB/hfi1: Fix the allocation of RSM table
- MIPS: KGDB: fix kgdb support for SMP platforms.
- ASoC: tlv320aic32x4: Fix Common Pins
- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata()
- perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS
- perf/x86/intel: Initialize TFA MSR
- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr()
- iov_iter: Fix build error without CONFIG_CRYPTO
- xtensa: fix initialization of pt_regs::syscall in start_thread
- ASoC: rockchip: pdm: fix regmap_ops hang issue
- drm/amdkfd: Add picasso pci id
- drm/amdgpu: Adjust IB test timeout for XGMI configuration
- drm/amdgpu: amdgpu_device_recover_vram always failed if only one node in
  shadow_list
- drm/amd/display: fix cursor black issue
- ASoC: cs35l35: Disable regulators on driver removal
- objtool: Add rewind_stack_do_exit() to the noreturn list
- slab: fix a crash by reading /proc/slab_allocators
- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in
  sun8i_tcon_top_un/bind
- virtio_pci: fix a NULL pointer reference in vp_del_vqs
- RDMA/vmw_pvrdma: Fix memory leak on pvrdma_pci_remove
- RDMA/hns: Fix bug that caused srq creation to fail
- KEYS: trusted: fix -Wvarags warning
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler()
- drm/mediatek: fix possible object reference leak
- drm/mediatek: fix the rate and divder of hdmi phy for MT2701
- drm/mediatek: make implementation of recalc_rate() for MT2701 hdmi phy
- drm/mediatek: remove flag CLK_SET_RATE_PARENT for MT2701 hdmi phy
- drm/mediatek: using new factor for tvdpll for MT2701 hdmi phy
- drm/mediatek: no change parent rate in round_rate() for MT2701 hdmi phy
- ASoC: Intel: kbl: fix wrong number of channels
- ASoC: stm32: sai: fix master clock management
- ALSA: hda: Fix racy display power access
- virtio-blk: limit number of hw queues by nr_cpu_ids
- blk-mq: introduce blk_mq_complete_request_sync()
- nvme: cancel request synchronously
- nvme-fc: correct csn initialization and increments on error
- nvmet: fix discover log page when 

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-07-16 Thread Steve Beattie
I can confirm that the PAGE_POISONING, PAGE_POISONING_NO_SANITY, and
PAGE_POISONING_ZERO config options are set in the linux-kvm
5.0.0-1011.12 kernel in disco proposed. Thanks!

** Tags added: verification-done-disco

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Fix Released
Status in linux-azure source package in Cosmic:
  Fix Released
Status in linux-kvm source package in Cosmic:
  Fix Released
Status in linux-aws source package in Disco:
  Fix Released
Status in linux-azure source package in Disco:
  Fix Released
Status in linux-kvm source package in Disco:
  Fix Committed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-06-27 Thread Khaled El Mously
** Changed in: linux-kvm (Ubuntu Disco)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Fix Released
Status in linux-azure source package in Cosmic:
  Fix Released
Status in linux-kvm source package in Cosmic:
  Fix Released
Status in linux-aws source package in Disco:
  Fix Released
Status in linux-azure source package in Disco:
  Fix Released
Status in linux-kvm source package in Disco:
  Fix Committed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-06-11 Thread Po-Hsu Lin
For D/linux-kvm https://lists.ubuntu.com/archives/kernel-
team/2019-June/101294.html

** Tags added: disco

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Fix Released
Status in linux-azure source package in Cosmic:
  Fix Released
Status in linux-kvm source package in Cosmic:
  Fix Released
Status in linux-aws source package in Disco:
  Fix Released
Status in linux-azure source package in Disco:
  Fix Released
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-04-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 5.0.0-1002.2

---
linux-azure (5.0.0-1002.2) disco; urgency=medium

  * linux-azure: 5.0.0-1002.2 -proposed tracker (LP: #1823220)

  * Set CONFIG_RANDOM_TRUST_CPU=y (LP: #1823754)
- [Config] CONFIG_RANDOM_TRUST_CPU=y

  * PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be set in C-KVM (LP: #1812624)
- [Config]: enable PAGE_POISONING, PAGE_POISONING_NO_SANITY,
  PAGE_POISONING_ZERO

  * Add CONFIG_NO_HZ_FULL=y to linux-azure kernels (LP: #1818138)
- [Config] linux-azure: CONFIG_NO_HZ_FULL=y

  * Miscellaneous Ubuntu changes
- [Config] update configs after rebase to 5.0.0-10.11
- Revert "UBUNTU: [Config] azure: CONFIG_HOTPLUG_CPU=n"

  [ Ubuntu: 5.0.0-10.11 ]

  * linux: 5.0.0-10.11 -proposed tracker (LP: #1823936)
  * Apparmor enforcement failure in lxc selftests (LP: #1823379)
- SAUCE: apparmor: Restore Y/N in /sys for apparmor's "enabled"
  * systemd cause kernel trace "BUG: unable to handle kernel paging request at
6db23a14" on Cosmic i386 (LP: #1813244)
- openvswitch: fix flow actions reallocation

  [ Ubuntu: 5.0.0-9.10 ]

  * linux: 5.0.0-9.10 -proposed tracker (LP: #1823228)
  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
- [Packaging] update helper scripts
- [Packaging] resync retpoline extraction
  * Huawei Hi1822 NIC has poor performance (LP: #1820187)
- net-next/hinic: replace disable_irq_nosync/enable_irq
  * Add uid shifting overlay filesystem (shiftfs) (LP: #1823186)
- shiftfs: uid/gid shifting bind mount
- shiftfs: rework and extend
- shiftfs: support some btrfs ioctls
- [Config] enable shiftfs
  * Cannot boot or install - have to use nomodeset (LP: #1821820)
- Revert "drm/i915/fbdev: Actually configure untiled displays"
  * Disco update: v5.0.6 upstream stable release (LP: #1823060)
- netfilter: nf_tables: fix set double-free in abort path
- dccp: do not use ipv6 header for ipv4 flow
- genetlink: Fix a memory leak on error path
- gtp: change NET_UDP_TUNNEL dependency to select
- ipv6: make ip6_create_rt_rcu return ip6_null_entry instead of NULL
- mac8390: Fix mmio access size probe
- mISDN: hfcpci: Test both vendor & device ID for Digium HFC4S
- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6
- net: datagram: fix unbounded loop in __skb_try_recv_datagram()
- net/packet: Set __GFP_NOWARN upon allocation in alloc_pg_vec
- net: phy: meson-gxl: fix interrupt support
- net: rose: fix a possible stack overflow
- net: stmmac: fix memory corruption with large MTUs
- net-sysfs: call dev_hold if kobject_init_and_add success
- net: usb: aqc111: Extend HWID table by QNAP device
- packets: Always register packet sk in the same order
- rhashtable: Still do rehash when we get EEXIST
- sctp: get sctphdr by offset in sctp_compute_cksum
- sctp: use memdup_user instead of vmemdup_user
- tcp: do not use ipv6 header for ipv4 flow
- tipc: allow service ranges to be connect()'ed on RDM/DGRAM
- tipc: change to check tipc_own_id to return in tipc_net_stop
- tipc: fix cancellation of topology subscriptions
- tun: properly test for IFF_UP
- vrf: prevent adding upper devices
- vxlan: Don't call gro_cells_destroy() before device is unregistered
- thunderx: enable page recycling for non-XDP case
- thunderx: eliminate extra calls to put_page() for pages held for recycling
- net: dsa: mv88e6xxx: fix few issues in mv88e6390x_port_set_cmode
- net: mii: Fix PAUSE cap advertisement from linkmode_adv_to_lcl_adv_t()
  helper
- net: phy: don't clear BMCR in genphy_soft_reset
- r8169: fix cable re-plugging issue
- ila: Fix rhashtable walker list corruption
- tun: add a missing rcu_read_unlock() in error path
- powerpc/fsl: Fix the flush of branch predictor.
- Btrfs: fix incorrect file size after shrinking truncate and fsync
- btrfs: remove WARN_ON in log_dir_items
- btrfs: don't report readahead errors and don't update statistics
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks
- btrfs: Avoid possible qgroup_rsv_size overflow in
  btrfs_calculate_inode_block_rsv_size
- Btrfs: fix assertion failure on fsync with NO_HOLES enabled
- locks: wake any locks blocked on request before deadlock check
- tracing: initialize variable in create_dyn_event()
- ARM: imx6q: cpuidle: fix bug that CPU might not wake up at expected time
- powerpc: bpf: Fix generation of load/store DW instructions
- vfio: ccw: only free cp on final interrupt
- NFS: Fix nfs4_lock_state refcounting in nfs4_alloc_{lock,unlock}data()
- NFS: fix mount/umount race in nlmclnt.
- NFSv4.1 don't free interrupted slot on open
- net: dsa: qca8k: remove leftover phy accessors
- ALSA: rawmidi: Fix potential Spectre v1 vulnerability
- ALSA: seq: 

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-04-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-kvm - 4.18.0-1009.9

---
linux-kvm (4.18.0-1009.9) cosmic; urgency=medium

  * linux-kvm: 4.18.0-1009.9 -proposed tracker (LP: #1819621)

  * CONFIG_SECURITY_SELINUX_DISABLE should be disabled on KVM kernel
(LP: #1812153)
- [Config]: disable CONFIG_SECURITY_SELINUX_DISABLE
- [Config]: disable CONFIG_SECURITY_WRITABLE_HOOKS

  * PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be set in C-KVM (LP: #1812624)
- [Config]: enable PAGE_POISONING, PAGE_POISONING_NO_SANITY,
  PAGE_POISONING_ZERO

  [ Ubuntu: 4.18.0-17.18 ]

  * linux: 4.18.0-17.18 -proposed tracker (LP: #1819624)
  * Packaging resync (LP: #1786013)
- [Packaging] resync getabis
- [Packaging] update helper scripts
  * C++ demangling support missing from perf (LP: #1396654)
- [Packaging] fix a mistype
  * arm-smmu-v3 arm-smmu-v3.3.auto: CMD_SYNC timeout (LP: #1818162)
- iommu/arm-smmu-v3: Fix unexpected CMD_SYNC timeout
  * Crash in nvme_irq_check() when using threaded interrupts (LP: #1818747)
- nvme-pci: fix out of bounds access in nvme_cqe_pending
  * CVE-2019-9003
- ipmi: fix use-after-free of user->release_barrier.rda
  * CVE-2019-9162
- netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
  * CVE-2019-9213
- mm: enforce min addr even if capable() in expand_downwards()
  * CVE-2019-3460
- Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt
  * tun/tap: unable to manage carrier state from userland (LP: #1806392)
- tun: implement carrier change
  * CVE-2019-8980
- exec: Fix mem leak in kernel_read_file
  * [Packaging] Allow overlay of config annotations (LP: #1752072)
- [Packaging] config-check: Add an include directive
  * amdgpu with mst WARNING on blanking (LP: #1814308)
- drm/amd/display: Fix MST dp_blank REG_WAIT timeout
  * CVE-2019-7308
- bpf: move {prev_,}insn_idx into verifier env
- bpf: move tmp variable into ax register in interpreter
- bpf: enable access to ax register also from verifier rewrite
- bpf: restrict map value pointer arithmetic for unprivileged
- bpf: restrict stack pointer arithmetic for unprivileged
- bpf: restrict unknown scalars of mixed signed bounds for unprivileged
- bpf: fix check_map_access smin_value test when pointer contains offset
- bpf: prevent out of bounds speculation on pointer arithmetic
- bpf: fix sanitation of alu op with pointer / scalar type from different
  paths
- bpf: add various test cases to test_verifier
- bpf: add various test cases to selftests
  * CVE-2017-5753
- bpf: fix inner map masking to prevent oob under speculation
  * Use memblock quirk instead of delayed allocation for GICv3 LPI tables
(LP: #1816425)
- efi/arm: Revert "Defer persistent reservations until after paging_init()"
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve
  table
  * efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted (LP: #1814982)
- efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
  * Update ENA driver to version 2.0.3K (LP: #1816806)
- net: ena: update driver version from 2.0.2 to 2.0.3
- net: ena: fix race between link up and device initalization
- net: ena: fix crash during failed resume from hibernation
  * Silent "Unknown key" message when pressing keyboard backlight hotkey
(LP: #1817063)
- platform/x86: dell-wmi: Ignore new keyboard backlight change event
  * CVE-2018-19824
- ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in 
card.c
  * CVE-2019-3459
- Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer
  * CONFIG_TEST_BPF is disabled (LP: #1813955)
- [Config]: Reenable TEST_BPF
  * installer does not support iSCSI iBFT (LP: #1817321)
- d-i: add iscsi_ibft to scsi-modules
  * CVE-2019-7222
- KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)
  * CVE-2019-7221
- KVM: nVMX: unconditionally cancel preemption timer in free_nested
  (CVE-2019-7221)
  * CVE-2019-6974
- kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
  * hns3 nic speed may not match optical port speed (LP: #1817969)
- net: hns3: Config NIC port speed same as that of optical module
  * [Hyper-V] srcu: Lock srcu_data structure in srcu_gp_start() (LP: #1802021)
- srcu: Lock srcu_data structure in srcu_gp_start()
  * libsas disks can have non-unique by-path names (LP: #1817784)
- scsi: libsas: Fix rphy phy_identifier for PHYs with end devices attached
  * Bluetooth not working (Intel CyclonePeak) (LP: #1817518)
- Bluetooth: btusb: Add support for Intel bluetooth device 8087:0029
  * CVE-2019-8912
- net: crypto set sk to NULL when af_alg_release.
- net: socket: set sock->sk to NULL after calling proto_ops::release()
  * 4.18.0 thinkpad_acpi : thresholds for BAT1 not writable (LP: #1812099)
  

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-04-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.18.0-1014.14

---
linux-azure (4.18.0-1014.14) cosmic; urgency=medium

  * linux-azure: 4.18.0-1014.14 -proposed tracker (LP: #1819618)

  * PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be set in C-KVM (LP: #1812624)
- [Config]: enable PAGE_POISONING, PAGE_POISONING_NO_SANITY,
  PAGE_POISONING_ZERO

  * Add CONFIG_NO_HZ_FULL=y to linux-azure kernels (LP: #1818138)
- [Config] linux-azure: CONFIG_NO_HZ_FULL=y

  [ Ubuntu: 4.18.0-17.18 ]

  * linux: 4.18.0-17.18 -proposed tracker (LP: #1819624)
  * Packaging resync (LP: #1786013)
- [Packaging] resync getabis
- [Packaging] update helper scripts
  * C++ demangling support missing from perf (LP: #1396654)
- [Packaging] fix a mistype
  * arm-smmu-v3 arm-smmu-v3.3.auto: CMD_SYNC timeout (LP: #1818162)
- iommu/arm-smmu-v3: Fix unexpected CMD_SYNC timeout
  * Crash in nvme_irq_check() when using threaded interrupts (LP: #1818747)
- nvme-pci: fix out of bounds access in nvme_cqe_pending
  * CVE-2019-9003
- ipmi: fix use-after-free of user->release_barrier.rda
  * CVE-2019-9162
- netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
  * CVE-2019-9213
- mm: enforce min addr even if capable() in expand_downwards()
  * CVE-2019-3460
- Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt
  * tun/tap: unable to manage carrier state from userland (LP: #1806392)
- tun: implement carrier change
  * CVE-2019-8980
- exec: Fix mem leak in kernel_read_file
  * [Packaging] Allow overlay of config annotations (LP: #1752072)
- [Packaging] config-check: Add an include directive
  * amdgpu with mst WARNING on blanking (LP: #1814308)
- drm/amd/display: Fix MST dp_blank REG_WAIT timeout
  * CVE-2019-7308
- bpf: move {prev_,}insn_idx into verifier env
- bpf: move tmp variable into ax register in interpreter
- bpf: enable access to ax register also from verifier rewrite
- bpf: restrict map value pointer arithmetic for unprivileged
- bpf: restrict stack pointer arithmetic for unprivileged
- bpf: restrict unknown scalars of mixed signed bounds for unprivileged
- bpf: fix check_map_access smin_value test when pointer contains offset
- bpf: prevent out of bounds speculation on pointer arithmetic
- bpf: fix sanitation of alu op with pointer / scalar type from different
  paths
- bpf: add various test cases to test_verifier
- bpf: add various test cases to selftests
  * CVE-2017-5753
- bpf: fix inner map masking to prevent oob under speculation
  * Use memblock quirk instead of delayed allocation for GICv3 LPI tables
(LP: #1816425)
- efi/arm: Revert "Defer persistent reservations until after paging_init()"
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve
  table
  * efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted (LP: #1814982)
- efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted
  * Update ENA driver to version 2.0.3K (LP: #1816806)
- net: ena: update driver version from 2.0.2 to 2.0.3
- net: ena: fix race between link up and device initalization
- net: ena: fix crash during failed resume from hibernation
  * Silent "Unknown key" message when pressing keyboard backlight hotkey
(LP: #1817063)
- platform/x86: dell-wmi: Ignore new keyboard backlight change event
  * CVE-2018-19824
- ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in 
card.c
  * CVE-2019-3459
- Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer
  * CONFIG_TEST_BPF is disabled (LP: #1813955)
- [Config]: Reenable TEST_BPF
  * installer does not support iSCSI iBFT (LP: #1817321)
- d-i: add iscsi_ibft to scsi-modules
  * CVE-2019-7222
- KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)
  * CVE-2019-7221
- KVM: nVMX: unconditionally cancel preemption timer in free_nested
  (CVE-2019-7221)
  * CVE-2019-6974
- kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
  * hns3 nic speed may not match optical port speed (LP: #1817969)
- net: hns3: Config NIC port speed same as that of optical module
  * [Hyper-V] srcu: Lock srcu_data structure in srcu_gp_start() (LP: #1802021)
- srcu: Lock srcu_data structure in srcu_gp_start()
  * libsas disks can have non-unique by-path names (LP: #1817784)
- scsi: libsas: Fix rphy phy_identifier for PHYs with end devices attached
  * Bluetooth not working (Intel CyclonePeak) (LP: #1817518)
- Bluetooth: btusb: Add support for Intel bluetooth device 8087:0029
  * CVE-2019-8912
- net: crypto set sk to NULL when af_alg_release.
- net: socket: set sock->sk to NULL after calling proto_ops::release()
  * 4.18.0 thinkpad_acpi : thresholds for BAT1 not writable (LP: #1812099)
- platform/x86: thinkpad_acpi: Fix multi-battery bug
  * [ALSA] [PATCH] 

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-03-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-aws - 4.18.0-1011.13

---
linux-aws (4.18.0-1011.13) cosmic; urgency=medium

  * linux-aws: 4.18.0-1011.13 -proposed tracker (LP: #1814757)

  * PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be set in C-KVM (LP: #1812624)
- [Config]: enable PAGE_POISONING, PAGE_POISONING_NO_SANITY,
  PAGE_POISONING_ZERO

  * Update ENA driver to version 2.0.3K (LP: #1816806)
- net: ena: fix crash during failed resume from hibernation
- net: ena: fix race between link up and device initalization
- net: ena: update driver version from 2.0.2 to 2.0.3

  * xen hibernation support for linux-aws (bionic+) (LP: #1804533)
- SAUCE [aws] x86/xen: Introduce new function to map HYPERVISOR_shared_info 
on
  Resume
- SAUCE [aws] x86/xen: add system core suspend and resume callbacks
- SAUCE [aws] xen-netfront: add callbacks for PM suspend and hibernation
  support
- SAUCE [aws] xen-time-introduce-xen_-save-restore-_steal_clock
- SAUCE [aws] x86/xen: save and restore steal clock
- SAUCE [aws] xen/events: add xen_shutdown_pirqs helper function
- SAUCE [aws] x86/xen: close event channels for PIRQs in system core suspend
  callback
- SAUCE [aws] PM / hibernate: update the resume offset on
  SNAPSHOT_SET_SWAP_AREA

  * Packaging resync (LP: #1786013)
- [Packaging] resync getabis
- [Packaging] update helper scripts

linux-aws (4.18.0-1010.12) cosmic; urgency=medium

  * linux-aws: 4.18.0-1010.12 -proposed tracker (LP: #1814757)

  * bluetooth controller not detected with 4.15 kernel (LP: #1810797)
- [Config] Disable BT_QCOMSMD_HACK for AWS

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts

  [ Ubuntu: 4.18.0-16.17 ]

  * linux: 4.18.0-16.17 -proposed tracker (LP: #1814749)
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
  * CVE-2018-16880
- vhost: fix OOB in get_rx_bufs()
  * RTL8822BE WiFi Disabled in Kernel 4.18.0-12 (LP: #1806472)
- SAUCE: staging: rtlwifi: allow RTLWIFI_DEBUG_ST to be disabled
- [Config] CONFIG_RTLWIFI_DEBUG_ST=n
- SAUCE: Add r8822be to signature inclusion list
  * kernel oops in bcache module (LP: #1793901)
- SAUCE: bcache: never writeback a discard operation
  * CVE-2018-18397
- userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails
- userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem
- userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas
- userfaultfd: shmem: add i_size checks
- userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
  * Ignore "incomplete report" from Elan touchpanels (LP: #1813733)
- HID: i2c-hid: Ignore input report if there's no data present on Elan
  touchpanels
  * Vsock connect fails with ENODEV for large CID (LP: #1813934)
- vhost/vsock: fix vhost vsock cid hashing inconsistent
  * Fix non-working pinctrl-intel (LP: #1811777)
- pinctrl: intel: Do pin translation in other GPIO operations as well
  * ip6_gre: fix tunnel list corruption for x-netns (LP: #1812875)
- ip6_gre: fix tunnel list corruption for x-netns
  * Backported commit breaks audio (fixed upstream) (LP: #1811566)
- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook
  Clapper
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook
  Gnawty
  * kvm_stat : missing python dependency (LP: #1798776)
- tools/kvm_stat: switch to python3
  * [SRU] Fix Xorg crash with nomodeset when BIOS enable 64-bit fb addr
(LP: #1812797)
- vgaarb: Add support for 64-bit frame buffer address
- vgaarb: Keep adding VGA device in queue
  * Fix non-working QCA Rome Bluetooth after S3 (LP: #1812812)
- USB: Add new USB LPM helpers
- USB: Consolidate LPM checks to avoid enabling LPM twice
  * [SRU] IO's are issued with incorrect Scatter Gather Buffer (LP: #1795453)
- scsi: megaraid_sas: Use 63-bit DMA addressing
  * x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a
(LP: #1813532)
- x86/mm: Do not warn about PCI BIOS W+X mappings
  * CVE-2019-6133
- fork: record start_time late
  * Fix not working Goodix touchpad (LP: #1811929)
- HID: i2c-hid: Disable runtime PM on Goodix touchpad
  * bluetooth controller not detected with 4.15 kernel (LP: #1810797)
- SAUCE: btqcomsmd: introduce BT_QCOMSMD_HACK
- [Config] arm64: snapdragon: BT_QCOMSMD_HACK=y
  * X1 Extreme: only one of the two SSDs is loaded (LP: #1811755)
- nvme-core: rework a NQN copying operation
- nvme: pad fake subsys NQN vid and ssvid with zeros
- nvme: introduce NVME_QUIRK_IGNORE_DEV_SUBNQN
  * Crash on "ip link add foo type ipip" (LP: #1811803)
- SAUCE: fan: Fix NULL pointer dereference

linux-aws (4.18.0-1009.11) cosmic; 

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-03-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-aws - 4.18.0-1011.13

---
linux-aws (4.18.0-1011.13) cosmic; urgency=medium

  * linux-aws: 4.18.0-1011.13 -proposed tracker (LP: #1814757)

  * PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be set in C-KVM (LP: #1812624)
- [Config]: enable PAGE_POISONING, PAGE_POISONING_NO_SANITY,
  PAGE_POISONING_ZERO

  * Update ENA driver to version 2.0.3K (LP: #1816806)
- net: ena: fix crash during failed resume from hibernation
- net: ena: fix race between link up and device initalization
- net: ena: update driver version from 2.0.2 to 2.0.3

  * xen hibernation support for linux-aws (bionic+) (LP: #1804533)
- SAUCE [aws] x86/xen: Introduce new function to map HYPERVISOR_shared_info 
on
  Resume
- SAUCE [aws] x86/xen: add system core suspend and resume callbacks
- SAUCE [aws] xen-netfront: add callbacks for PM suspend and hibernation
  support
- SAUCE [aws] xen-time-introduce-xen_-save-restore-_steal_clock
- SAUCE [aws] x86/xen: save and restore steal clock
- SAUCE [aws] xen/events: add xen_shutdown_pirqs helper function
- SAUCE [aws] x86/xen: close event channels for PIRQs in system core suspend
  callback
- SAUCE [aws] PM / hibernate: update the resume offset on
  SNAPSHOT_SET_SWAP_AREA

  * Packaging resync (LP: #1786013)
- [Packaging] resync getabis
- [Packaging] update helper scripts

linux-aws (4.18.0-1010.12) cosmic; urgency=medium

  * linux-aws: 4.18.0-1010.12 -proposed tracker (LP: #1814757)

  * bluetooth controller not detected with 4.15 kernel (LP: #1810797)
- [Config] Disable BT_QCOMSMD_HACK for AWS

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts

  [ Ubuntu: 4.18.0-16.17 ]

  * linux: 4.18.0-16.17 -proposed tracker (LP: #1814749)
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
  * CVE-2018-16880
- vhost: fix OOB in get_rx_bufs()
  * RTL8822BE WiFi Disabled in Kernel 4.18.0-12 (LP: #1806472)
- SAUCE: staging: rtlwifi: allow RTLWIFI_DEBUG_ST to be disabled
- [Config] CONFIG_RTLWIFI_DEBUG_ST=n
- SAUCE: Add r8822be to signature inclusion list
  * kernel oops in bcache module (LP: #1793901)
- SAUCE: bcache: never writeback a discard operation
  * CVE-2018-18397
- userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails
- userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem
- userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas
- userfaultfd: shmem: add i_size checks
- userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
  * Ignore "incomplete report" from Elan touchpanels (LP: #1813733)
- HID: i2c-hid: Ignore input report if there's no data present on Elan
  touchpanels
  * Vsock connect fails with ENODEV for large CID (LP: #1813934)
- vhost/vsock: fix vhost vsock cid hashing inconsistent
  * Fix non-working pinctrl-intel (LP: #1811777)
- pinctrl: intel: Do pin translation in other GPIO operations as well
  * ip6_gre: fix tunnel list corruption for x-netns (LP: #1812875)
- ip6_gre: fix tunnel list corruption for x-netns
  * Backported commit breaks audio (fixed upstream) (LP: #1811566)
- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook
  Clapper
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook
  Gnawty
  * kvm_stat : missing python dependency (LP: #1798776)
- tools/kvm_stat: switch to python3
  * [SRU] Fix Xorg crash with nomodeset when BIOS enable 64-bit fb addr
(LP: #1812797)
- vgaarb: Add support for 64-bit frame buffer address
- vgaarb: Keep adding VGA device in queue
  * Fix non-working QCA Rome Bluetooth after S3 (LP: #1812812)
- USB: Add new USB LPM helpers
- USB: Consolidate LPM checks to avoid enabling LPM twice
  * [SRU] IO's are issued with incorrect Scatter Gather Buffer (LP: #1795453)
- scsi: megaraid_sas: Use 63-bit DMA addressing
  * x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a
(LP: #1813532)
- x86/mm: Do not warn about PCI BIOS W+X mappings
  * CVE-2019-6133
- fork: record start_time late
  * Fix not working Goodix touchpad (LP: #1811929)
- HID: i2c-hid: Disable runtime PM on Goodix touchpad
  * bluetooth controller not detected with 4.15 kernel (LP: #1810797)
- SAUCE: btqcomsmd: introduce BT_QCOMSMD_HACK
- [Config] arm64: snapdragon: BT_QCOMSMD_HACK=y
  * X1 Extreme: only one of the two SSDs is loaded (LP: #1811755)
- nvme-core: rework a NQN copying operation
- nvme: pad fake subsys NQN vid and ssvid with zeros
- nvme: introduce NVME_QUIRK_IGNORE_DEV_SUBNQN
  * Crash on "ip link add foo type ipip" (LP: #1811803)
- SAUCE: fan: Fix NULL pointer dereference

linux-aws (4.18.0-1009.11) cosmic; 

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-03-03 Thread Khaled El Mously
** Changed in: linux-azure (Ubuntu Cosmic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Fix Committed
Status in linux-azure source package in Cosmic:
  Fix Committed
Status in linux-kvm source package in Cosmic:
  Fix Committed
Status in linux-aws source package in Disco:
  In Progress
Status in linux-azure source package in Disco:
  In Progress
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-03-01 Thread Stefan Bader
** Changed in: linux-aws (Ubuntu Cosmic)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Cosmic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Fix Committed
Status in linux-azure source package in Cosmic:
  In Progress
Status in linux-kvm source package in Cosmic:
  Fix Committed
Status in linux-aws source package in Disco:
  In Progress
Status in linux-azure source package in Disco:
  In Progress
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-03-01 Thread Stefan Bader
** Changed in: linux-kvm (Ubuntu Cosmic)
   Importance: Undecided => Medium

** Changed in: linux-kvm (Ubuntu Cosmic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  In Progress
Status in linux-azure source package in Cosmic:
  In Progress
Status in linux-kvm source package in Cosmic:
  Fix Committed
Status in linux-aws source package in Disco:
  In Progress
Status in linux-azure source package in Disco:
  In Progress
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-02-21 Thread Po-Hsu Lin
It looks like azure disco is affected too, change the status
accordingly.

** Changed in: linux-azure (Ubuntu Cosmic)
   Status: Confirmed => In Progress

** Changed in: linux-azure (Ubuntu Cosmic)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

** Changed in: linux-azure (Ubuntu Disco)
   Status: Invalid => In Progress

** Changed in: linux-azure (Ubuntu Disco)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  In Progress
Status in linux-azure source package in Cosmic:
  In Progress
Status in linux-kvm source package in Cosmic:
  In Progress
Status in linux-aws source package in Disco:
  In Progress
Status in linux-azure source package in Disco:
  In Progress
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-02-21 Thread Po-Hsu Lin
** Changed in: ubuntu-kernel-tests
   Status: New => In Progress

** Changed in: ubuntu-kernel-tests
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-azure package in Ubuntu:
  Invalid
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  In Progress
Status in linux-azure source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  In Progress
Status in linux-aws source package in Disco:
  In Progress
Status in linux-azure source package in Disco:
  Invalid
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-02-21 Thread Po-Hsu Lin
** Changed in: linux-aws (Ubuntu Cosmic)
   Status: Confirmed => In Progress

** Changed in: linux-aws (Ubuntu Cosmic)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

** Changed in: linux-aws (Ubuntu Disco)
   Status: Confirmed => In Progress

** Changed in: linux-aws (Ubuntu Disco)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-azure package in Ubuntu:
  Invalid
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  In Progress
Status in linux-azure source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  In Progress
Status in linux-aws source package in Disco:
  In Progress
Status in linux-azure source package in Disco:
  Invalid
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-02-21 Thread Po-Hsu Lin
** Also affects: linux-aws (Ubuntu Disco)
   Importance: Undecided
   Status: Confirmed

** Also affects: linux-azure (Ubuntu Disco)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-kvm (Ubuntu Disco)
   Importance: Undecided
 Assignee: Po-Hsu Lin (cypressyew)
   Status: In Progress

** Changed in: linux-kvm (Ubuntu Cosmic)
   Status: Confirmed => In Progress

** Changed in: linux-kvm (Ubuntu Cosmic)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-azure package in Ubuntu:
  Invalid
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-azure source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  In Progress
Status in linux-aws source package in Disco:
  Confirmed
Status in linux-azure source package in Disco:
  Invalid
Status in linux-kvm source package in Disco:
  In Progress

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-02-19 Thread Po-Hsu Lin
OK will do.
Thanks for the input.

** Changed in: linux-kvm (Ubuntu)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

** Changed in: linux-kvm (Ubuntu)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-azure package in Ubuntu:
  Invalid
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-azure source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-02-19 Thread Kleber Sacilotto de Souza
** Also affects: linux-azure (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-azure (Ubuntu Cosmic)
   Status: New => Confirmed

** Changed in: linux-azure (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-azure package in Ubuntu:
  Invalid
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-azure source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Kamal Mostafa
I'm not aware of any reason that the PAGE_POISONING configs should
differ from master for any derivative kernels.  Po-Hsu, if you want to
submit config patches for those affected, that would be great.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-aws (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-aws (Ubuntu Cosmic)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Kleber Sacilotto de Souza
** Also affects: linux-aws (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-kvm (Ubuntu Cosmic)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-kvm (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Kleber Sacilotto de Souza
This also affects cosmic/linux-aws:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-cosmic/cosmic/amd64/l/linux-aws/20190115_155144_26f2e@/log.gz

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-aws package in Ubuntu:
  Confirmed
Status in linux-kvm package in Ubuntu:
  Confirmed
Status in linux-aws source package in Cosmic:
  Confirmed
Status in linux-kvm source package in Cosmic:
  Confirmed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-31 Thread Kleber Sacilotto de Souza
** Also affects: linux-kvm (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-kvm package in Ubuntu:
  New
Status in linux-kvm source package in Cosmic:
  New

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-01-21 Thread Po-Hsu Lin
** Also affects: ubuntu-kernel-tests
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  New
Status in linux-kvm package in Ubuntu:
  New

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp