[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-12-27 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu)
   Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux package in Ubuntu:
  Fix Released
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux-gcp source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  Fix Released
Status in linux-gcp source package in Cosmic:
  Fix Released

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTION: See comment #2 ***]

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-gcp - 4.15.0-1030.32~16.04.1

---
linux-gcp (4.15.0-1030.32~16.04.1) xenial; urgency=medium

  * linux-gcp: 4.15.0-1030.32~16.04.1 -proposed tracker (LP: #1822807)

  [ Ubuntu: 4.15.0-1030.32 ]

  * linux-gcp: 4.15.0-1030.32 -proposed tracker (LP: #1822808)
  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
  * linux: 4.15.0-48.51 -proposed tracker (LP: #1822820)
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- [Packaging] resync retpoline extraction
  * 3b080b2564287be91605bfd1d5ee985696e61d3c in ubuntu_btrfs_kernel_fixes
triggers system hang on i386 (LP: #1812845)
- btrfs: raid56: properly unmap parity page in finish_parity_scrub()
  * [P9][LTCTest][Opal][FW910] cpupower monitor shows multiple stop Idle_Stats
(LP: #1719545)
- cpupower : Fix header name to read idle state name
  * [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropriate amount of vram for fw hand-over (v3)
- drm/amdgpu: Free VGA stolen memory as soon as possible.
  * [SRU][B/C/OEM]IOMMU: add kernel dma protection (LP: #1820153)
- ACPICA: AML parser: attempt to continue loading table after error
- ACPI / property: Allow multiple property compatible _DSD entries
- PCI / ACPI: Identify untrusted PCI devices
- iommu/vt-d: Force IOMMU on for platform opt in hint
- iommu/vt-d: Do not enable ATS for untrusted devices
- thunderbolt: Export IOMMU based DMA protection support to userspace
- iommu/vt-d: Disable ATS support on untrusted devices
  * Add basic support to NVLink2 passthrough (LP: #1819989)
- powerpc/powernv/npu: Do not try invalidating 32bit table when 64bit table 
is
  enabled
- powerpc/powernv: call OPAL_QUIESCE before OPAL_SIGNAL_SYSTEM_RESET
- powerpc/powernv: Export opal_check_token symbol
- powerpc/powernv: Make possible for user to force a full ipl cec reboot
- powerpc/powernv/idoa: Remove unnecessary pcidev from pci_dn
- powerpc/powernv: Move npu struct from pnv_phb to pci_controller
- powerpc/powernv/npu: Move OPAL calls away from context manipulation
- powerpc/pseries/iommu: Use memory@ nodes in max RAM address calculation
- powerpc/pseries/npu: Enable platform support
- powerpc/pseries: Remove IOMMU API support for non-LPAR systems
- powerpc/powernv/npu: Check mmio_atsd array bounds when populating
- powerpc/powernv/npu: Fault user page into the hypervisor's pagetable
  * Huawei Hi1822 NIC has poor performance (LP: #1820187)
- net-next: hinic: fix a problem in free_tx_poll()
- hinic: remove ndo_poll_controller
- net-next/hinic: add checksum offload and TSO support
- hinic: Fix l4_type parameter in hinic_task_set_tunnel_l4
- net-next/hinic:replace multiply and division operators
- net-next/hinic:add rx checksum offload for HiNIC
- net-next/hinic:fix a bug in set mac address
- net-next/hinic: fix a bug in rx data flow
- net: hinic: fix null pointer dereference on pointer hwdev
- hinic: optmize rx refill buffer mechanism
- net-next/hinic:add shutdown callback
- net-next/hinic: replace disable_irq_nosync/enable_irq
  * [CONFIG] please enable highdpi font FONT_TER16x32 (LP: #1819881)
- Fonts: New Terminus large console font
- [Config]: enable highdpi Terminus 16x32 font support
  * [19.04 FEAT] qeth: Enhanced link speed - kernel part (LP: #1814892)
- s390/qeth: report 25Gbit link speed
  * CVE-2017-5754
- x86/nmi: Fix NMI uaccess race against CR3 switching
- x86/mm: Fix documentation of module mapping range with 4-level paging
- x86/pti: Enable global pages for shared areas
- x86/pti: Never implicitly clear _PAGE_GLOBAL for kernel image
- x86/pti: Leave kernel text global for !PCID
- x86/pti: Fix boot problems from Global-bit setting
- x86/pti: Fix boot warning from Global-bit setting
- x86/pti: Reduce amount of kernel text allowed to be Global
- x86/pti: Disallow global kernel text with RANDSTRUCT
- x86/entry/32: Add explicit 'l' instruction suffix
- x86/asm-offsets: Move TSS_sp0 and TSS_sp1 to asm-offsets.c
- x86/entry/32: Rename TSS_sysenter_sp0 to TSS_entry2task_stack
- x86/entry/32: Load task stack from x86_tss.sp1 in SYSENTER handler
- x86/entry/32: Put ESPFIX code into a macro
- x86/entry/32: Unshare NMI return path
- x86/entry/32: Split off return-to-kernel path
- x86/entry/32: Enter the kernel via trampoline stack
- x86/entry/32: Leave the kernel via trampoline stack
- x86/entry/32: Introduce SAVE_ALL_NMI and RESTORE_ALL_NMI
- x86/entry/32: Handle Entry from Kernel-Mode on Entry-Stack
- x86/entry/32: Simplify debug entry point
- x86/entry/32: Add PTI cr3 switch to non-NMI entry/exit points
- x86/entry/32: Add PTI CR3 switches to NMI handler code
- x86/entry: Rename update_sp0 to update_task_stack
- 

[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-gcp - 4.15.0-1030.32

---
linux-gcp (4.15.0-1030.32) bionic; urgency=medium

  * linux-gcp: 4.15.0-1030.32 -proposed tracker (LP: #1822808)

  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log

  [ Ubuntu: 4.15.0-48.51 ]

  * linux: 4.15.0-48.51 -proposed tracker (LP: #1822820)
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- [Packaging] resync retpoline extraction
  * 3b080b2564287be91605bfd1d5ee985696e61d3c in ubuntu_btrfs_kernel_fixes
triggers system hang on i386 (LP: #1812845)
- btrfs: raid56: properly unmap parity page in finish_parity_scrub()
  * [P9][LTCTest][Opal][FW910] cpupower monitor shows multiple stop Idle_Stats
(LP: #1719545)
- cpupower : Fix header name to read idle state name
  * [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropriate amount of vram for fw hand-over (v3)
- drm/amdgpu: Free VGA stolen memory as soon as possible.
  * [SRU][B/C/OEM]IOMMU: add kernel dma protection (LP: #1820153)
- ACPICA: AML parser: attempt to continue loading table after error
- ACPI / property: Allow multiple property compatible _DSD entries
- PCI / ACPI: Identify untrusted PCI devices
- iommu/vt-d: Force IOMMU on for platform opt in hint
- iommu/vt-d: Do not enable ATS for untrusted devices
- thunderbolt: Export IOMMU based DMA protection support to userspace
- iommu/vt-d: Disable ATS support on untrusted devices
  * Add basic support to NVLink2 passthrough (LP: #1819989)
- powerpc/powernv/npu: Do not try invalidating 32bit table when 64bit table 
is
  enabled
- powerpc/powernv: call OPAL_QUIESCE before OPAL_SIGNAL_SYSTEM_RESET
- powerpc/powernv: Export opal_check_token symbol
- powerpc/powernv: Make possible for user to force a full ipl cec reboot
- powerpc/powernv/idoa: Remove unnecessary pcidev from pci_dn
- powerpc/powernv: Move npu struct from pnv_phb to pci_controller
- powerpc/powernv/npu: Move OPAL calls away from context manipulation
- powerpc/pseries/iommu: Use memory@ nodes in max RAM address calculation
- powerpc/pseries/npu: Enable platform support
- powerpc/pseries: Remove IOMMU API support for non-LPAR systems
- powerpc/powernv/npu: Check mmio_atsd array bounds when populating
- powerpc/powernv/npu: Fault user page into the hypervisor's pagetable
  * Huawei Hi1822 NIC has poor performance (LP: #1820187)
- net-next: hinic: fix a problem in free_tx_poll()
- hinic: remove ndo_poll_controller
- net-next/hinic: add checksum offload and TSO support
- hinic: Fix l4_type parameter in hinic_task_set_tunnel_l4
- net-next/hinic:replace multiply and division operators
- net-next/hinic:add rx checksum offload for HiNIC
- net-next/hinic:fix a bug in set mac address
- net-next/hinic: fix a bug in rx data flow
- net: hinic: fix null pointer dereference on pointer hwdev
- hinic: optmize rx refill buffer mechanism
- net-next/hinic:add shutdown callback
- net-next/hinic: replace disable_irq_nosync/enable_irq
  * [CONFIG] please enable highdpi font FONT_TER16x32 (LP: #1819881)
- Fonts: New Terminus large console font
- [Config]: enable highdpi Terminus 16x32 font support
  * [19.04 FEAT] qeth: Enhanced link speed - kernel part (LP: #1814892)
- s390/qeth: report 25Gbit link speed
  * CVE-2017-5754
- x86/nmi: Fix NMI uaccess race against CR3 switching
- x86/mm: Fix documentation of module mapping range with 4-level paging
- x86/pti: Enable global pages for shared areas
- x86/pti: Never implicitly clear _PAGE_GLOBAL for kernel image
- x86/pti: Leave kernel text global for !PCID
- x86/pti: Fix boot problems from Global-bit setting
- x86/pti: Fix boot warning from Global-bit setting
- x86/pti: Reduce amount of kernel text allowed to be Global
- x86/pti: Disallow global kernel text with RANDSTRUCT
- x86/entry/32: Add explicit 'l' instruction suffix
- x86/asm-offsets: Move TSS_sp0 and TSS_sp1 to asm-offsets.c
- x86/entry/32: Rename TSS_sysenter_sp0 to TSS_entry2task_stack
- x86/entry/32: Load task stack from x86_tss.sp1 in SYSENTER handler
- x86/entry/32: Put ESPFIX code into a macro
- x86/entry/32: Unshare NMI return path
- x86/entry/32: Split off return-to-kernel path
- x86/entry/32: Enter the kernel via trampoline stack
- x86/entry/32: Leave the kernel via trampoline stack
- x86/entry/32: Introduce SAVE_ALL_NMI and RESTORE_ALL_NMI
- x86/entry/32: Handle Entry from Kernel-Mode on Entry-Stack
- x86/entry/32: Simplify debug entry point
- x86/entry/32: Add PTI cr3 switch to non-NMI entry/exit points
- x86/entry/32: Add PTI CR3 switches to NMI handler code
- x86/entry: Rename update_sp0 to update_task_stack
- x86/pgtable: Rename pti_set_user_pgd() to pti_set_user_pgtbl()
- x86/pgtable/pae: Unshare 

[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-04-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.15.0-48.51

---
linux (4.15.0-48.51) bionic; urgency=medium

  * linux: 4.15.0-48.51 -proposed tracker (LP: #1822820)

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- [Packaging] resync retpoline extraction

  * 3b080b2564287be91605bfd1d5ee985696e61d3c in ubuntu_btrfs_kernel_fixes
triggers system hang on i386 (LP: #1812845)
- btrfs: raid56: properly unmap parity page in finish_parity_scrub()

  * [P9][LTCTest][Opal][FW910] cpupower monitor shows multiple stop Idle_Stats
(LP: #1719545)
- cpupower : Fix header name to read idle state name

  * [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropriate amount of vram for fw hand-over (v3)
- drm/amdgpu: Free VGA stolen memory as soon as possible.

  * [SRU][B/C/OEM]IOMMU: add kernel dma protection (LP: #1820153)
- ACPICA: AML parser: attempt to continue loading table after error
- ACPI / property: Allow multiple property compatible _DSD entries
- PCI / ACPI: Identify untrusted PCI devices
- iommu/vt-d: Force IOMMU on for platform opt in hint
- iommu/vt-d: Do not enable ATS for untrusted devices
- thunderbolt: Export IOMMU based DMA protection support to userspace
- iommu/vt-d: Disable ATS support on untrusted devices

  * Add basic support to NVLink2 passthrough (LP: #1819989)
- powerpc/powernv/npu: Do not try invalidating 32bit table when 64bit table 
is
  enabled
- powerpc/powernv: call OPAL_QUIESCE before OPAL_SIGNAL_SYSTEM_RESET
- powerpc/powernv: Export opal_check_token symbol
- powerpc/powernv: Make possible for user to force a full ipl cec reboot
- powerpc/powernv/idoa: Remove unnecessary pcidev from pci_dn
- powerpc/powernv: Move npu struct from pnv_phb to pci_controller
- powerpc/powernv/npu: Move OPAL calls away from context manipulation
- powerpc/pseries/iommu: Use memory@ nodes in max RAM address calculation
- powerpc/pseries/npu: Enable platform support
- powerpc/pseries: Remove IOMMU API support for non-LPAR systems
- powerpc/powernv/npu: Check mmio_atsd array bounds when populating
- powerpc/powernv/npu: Fault user page into the hypervisor's pagetable

  * Huawei Hi1822 NIC has poor performance (LP: #1820187)
- net-next: hinic: fix a problem in free_tx_poll()
- hinic: remove ndo_poll_controller
- net-next/hinic: add checksum offload and TSO support
- hinic: Fix l4_type parameter in hinic_task_set_tunnel_l4
- net-next/hinic:replace multiply and division operators
- net-next/hinic:add rx checksum offload for HiNIC
- net-next/hinic:fix a bug in set mac address
- net-next/hinic: fix a bug in rx data flow
- net: hinic: fix null pointer dereference on pointer hwdev
- hinic: optmize rx refill buffer mechanism
- net-next/hinic:add shutdown callback
- net-next/hinic: replace disable_irq_nosync/enable_irq

  * [CONFIG] please enable highdpi font FONT_TER16x32 (LP: #1819881)
- Fonts: New Terminus large console font
- [Config]: enable highdpi Terminus 16x32 font support

  * [19.04 FEAT] qeth: Enhanced link speed - kernel part (LP: #1814892)
- s390/qeth: report 25Gbit link speed

  * CVE-2017-5754
- x86/nmi: Fix NMI uaccess race against CR3 switching
- x86/mm: Fix documentation of module mapping range with 4-level paging
- x86/pti: Enable global pages for shared areas
- x86/pti: Never implicitly clear _PAGE_GLOBAL for kernel image
- x86/pti: Leave kernel text global for !PCID
- x86/pti: Fix boot problems from Global-bit setting
- x86/pti: Fix boot warning from Global-bit setting
- x86/pti: Reduce amount of kernel text allowed to be Global
- x86/pti: Disallow global kernel text with RANDSTRUCT
- x86/entry/32: Add explicit 'l' instruction suffix
- x86/asm-offsets: Move TSS_sp0 and TSS_sp1 to asm-offsets.c
- x86/entry/32: Rename TSS_sysenter_sp0 to TSS_entry2task_stack
- x86/entry/32: Load task stack from x86_tss.sp1 in SYSENTER handler
- x86/entry/32: Put ESPFIX code into a macro
- x86/entry/32: Unshare NMI return path
- x86/entry/32: Split off return-to-kernel path
- x86/entry/32: Enter the kernel via trampoline stack
- x86/entry/32: Leave the kernel via trampoline stack
- x86/entry/32: Introduce SAVE_ALL_NMI and RESTORE_ALL_NMI
- x86/entry/32: Handle Entry from Kernel-Mode on Entry-Stack
- x86/entry/32: Simplify debug entry point
- x86/entry/32: Add PTI cr3 switch to non-NMI entry/exit points
- x86/entry/32: Add PTI CR3 switches to NMI handler code
- x86/entry: Rename update_sp0 to update_task_stack
- x86/pgtable: Rename pti_set_user_pgd() to pti_set_user_pgtbl()
- x86/pgtable/pae: Unshare kernel PMDs when PTI is enabled
- x86/pgtable/32: Allocate 8k page-tables when PTI is enabled
- x86/pgtable: Move pgdp kernel/user conversion functions to pgtable.h

[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-04-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-gcp - 4.18.0-1009.10

---
linux-gcp (4.18.0-1009.10) cosmic; urgency=medium

  * linux-gcp: 4.18.0-1009.10 -proposed tracker (LP: #1822793)

  [ Ubuntu: 4.18.0-18.19 ]

  * linux: 4.18.0-18.19 -proposed tracker (LP: #1822796)
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- [Packaging] resync retpoline extraction
  * 3b080b2564287be91605bfd1d5ee985696e61d3c in ubuntu_btrfs_kernel_fixes
triggers system hang on i386 (LP: #1812845)
- btrfs: raid56: properly unmap parity page in finish_parity_scrub()
  * [SRU][B/C/OEM]IOMMU: add kernel dma protection (LP: #1820153)
- ACPI / property: Allow multiple property compatible _DSD entries
- PCI / ACPI: Identify untrusted PCI devices
- iommu/vt-d: Force IOMMU on for platform opt in hint
- iommu/vt-d: Do not enable ATS for untrusted devices
- thunderbolt: Export IOMMU based DMA protection support to userspace
- iommu/vt-d: Disable ATS support on untrusted devices
  * Huawei Hi1822 NIC has poor performance (LP: #1820187)
- net-next: hinic: fix a problem in free_tx_poll()
- hinic: remove ndo_poll_controller
- net-next/hinic: add checksum offload and TSO support
- hinic: Fix l4_type parameter in hinic_task_set_tunnel_l4
- net-next/hinic:replace multiply and division operators
- net-next/hinic:add rx checksum offload for HiNIC
- net-next/hinic:fix a bug in set mac address
- net-next/hinic: fix a bug in rx data flow
- net: hinic: fix null pointer dereference on pointer hwdev
- hinic: optmize rx refill buffer mechanism
- net-next/hinic:add shutdown callback
- net-next/hinic: replace disable_irq_nosync/enable_irq
  * [CONFIG] please enable highdpi font FONT_TER16x32 (LP: #1819881)
- Fonts: New Terminus large console font
- [Config]: enable highdpi Terminus 16x32 font support
  * [19.04 FEAT] qeth: Enhanced link speed - kernel part (LP: #1814892)
- s390/qeth: report 25Gbit link speed
  * Avoid potential memory corruption on HiSilicon SoCs (LP: #1819546)
- iommu/arm-smmu-v3: Avoid memory corruption from Hisilicon MSI payloads
  * CVE-2017-5715
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak
- x86/speculation: Propagate information about RSB filling mitigation to 
sysfs
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC
  variant
- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
- x86/retpoline: Remove minimal retpoline support
- x86/speculation: Update the TIF_SSBD comment
- x86/speculation: Clean up spectre_v2_parse_cmdline()
- x86/speculation: Remove unnecessary ret variable in cpu_show_common()
- x86/speculation: Move STIPB/IBPB string conditionals out of
  cpu_show_common()
- x86/speculation: Disable STIBP when enhanced IBRS is in use
- x86/speculation: Rename SSBD update functions
- x86/speculation: Reorganize speculation control MSRs update
- sched/smt: Make sched_smt_present track topology
- x86/Kconfig: Select SCHED_SMT if SMP enabled
- sched/smt: Expose sched_smt_present static key
- x86/speculation: Rework SMT state change
- x86/l1tf: Show actual SMT state
- x86/speculation: Reorder the spec_v2 code
- x86/speculation: Mark string arrays const correctly
- x86/speculataion: Mark command line parser data __initdata
- x86/speculation: Unify conditional spectre v2 print functions
- x86/speculation: Add command line control for indirect branch speculation
- x86/speculation: Prepare for per task indirect branch speculation control
- x86/process: Consolidate and simplify switch_to_xtra() code
- x86/speculation: Avoid __switch_to_xtra() calls
- x86/speculation: Prepare for conditional IBPB in switch_mm()
- ptrace: Remove unused ptrace_may_access_sched() and MODE_IBRS
- x86/speculation: Split out TIF update
- x86/speculation: Prevent stale SPEC_CTRL msr content
- x86/speculation: Prepare arch_smt_update() for PRCTL mode
- x86/speculation: Add prctl() control for indirect branch speculation
- x86/speculation: Enable prctl mode for spectre_v2_user
- x86/speculation: Add seccomp Spectre v2 user space protection mode
- x86/speculation: Provide IBPB always command line options
- kvm: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb
- x86/speculation: Change misspelled STIPB to STIBP
- x86/speculation: Add support for STIBP always-on preferred mode
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE
  * [Ubuntu] vfio-ap: add subsystem to matrix device to avoid libudev failures
(LP: #1818854)
- s390: vfio_ap: link the vfio_ap devices to the vfio_ap bus subsystem
  * Kernel regularly logs: Bluetooth: hci0: last event is not cmd complete
(0x0f) (LP: #1748565)
- Bluetooth: Fix unnecessary error message for HCI request completion
  * 

[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-04-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.18.0-18.19

---
linux (4.18.0-18.19) cosmic; urgency=medium

  * linux: 4.18.0-18.19 -proposed tracker (LP: #1822796)

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- [Packaging] resync retpoline extraction

  * 3b080b2564287be91605bfd1d5ee985696e61d3c in ubuntu_btrfs_kernel_fixes
triggers system hang on i386 (LP: #1812845)
- btrfs: raid56: properly unmap parity page in finish_parity_scrub()

  * [SRU][B/C/OEM]IOMMU: add kernel dma protection (LP: #1820153)
- ACPI / property: Allow multiple property compatible _DSD entries
- PCI / ACPI: Identify untrusted PCI devices
- iommu/vt-d: Force IOMMU on for platform opt in hint
- iommu/vt-d: Do not enable ATS for untrusted devices
- thunderbolt: Export IOMMU based DMA protection support to userspace
- iommu/vt-d: Disable ATS support on untrusted devices

  * Huawei Hi1822 NIC has poor performance (LP: #1820187)
- net-next: hinic: fix a problem in free_tx_poll()
- hinic: remove ndo_poll_controller
- net-next/hinic: add checksum offload and TSO support
- hinic: Fix l4_type parameter in hinic_task_set_tunnel_l4
- net-next/hinic:replace multiply and division operators
- net-next/hinic:add rx checksum offload for HiNIC
- net-next/hinic:fix a bug in set mac address
- net-next/hinic: fix a bug in rx data flow
- net: hinic: fix null pointer dereference on pointer hwdev
- hinic: optmize rx refill buffer mechanism
- net-next/hinic:add shutdown callback
- net-next/hinic: replace disable_irq_nosync/enable_irq

  * [CONFIG] please enable highdpi font FONT_TER16x32 (LP: #1819881)
- Fonts: New Terminus large console font
- [Config]: enable highdpi Terminus 16x32 font support

  * [19.04 FEAT] qeth: Enhanced link speed - kernel part (LP: #1814892)
- s390/qeth: report 25Gbit link speed

  * Avoid potential memory corruption on HiSilicon SoCs (LP: #1819546)
- iommu/arm-smmu-v3: Avoid memory corruption from Hisilicon MSI payloads

  * CVE-2017-5715
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak
- x86/speculation: Propagate information about RSB filling mitigation to 
sysfs
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC
  variant
- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
- x86/retpoline: Remove minimal retpoline support
- x86/speculation: Update the TIF_SSBD comment
- x86/speculation: Clean up spectre_v2_parse_cmdline()
- x86/speculation: Remove unnecessary ret variable in cpu_show_common()
- x86/speculation: Move STIPB/IBPB string conditionals out of
  cpu_show_common()
- x86/speculation: Disable STIBP when enhanced IBRS is in use
- x86/speculation: Rename SSBD update functions
- x86/speculation: Reorganize speculation control MSRs update
- sched/smt: Make sched_smt_present track topology
- x86/Kconfig: Select SCHED_SMT if SMP enabled
- sched/smt: Expose sched_smt_present static key
- x86/speculation: Rework SMT state change
- x86/l1tf: Show actual SMT state
- x86/speculation: Reorder the spec_v2 code
- x86/speculation: Mark string arrays const correctly
- x86/speculataion: Mark command line parser data __initdata
- x86/speculation: Unify conditional spectre v2 print functions
- x86/speculation: Add command line control for indirect branch speculation
- x86/speculation: Prepare for per task indirect branch speculation control
- x86/process: Consolidate and simplify switch_to_xtra() code
- x86/speculation: Avoid __switch_to_xtra() calls
- x86/speculation: Prepare for conditional IBPB in switch_mm()
- ptrace: Remove unused ptrace_may_access_sched() and MODE_IBRS
- x86/speculation: Split out TIF update
- x86/speculation: Prevent stale SPEC_CTRL msr content
- x86/speculation: Prepare arch_smt_update() for PRCTL mode
- x86/speculation: Add prctl() control for indirect branch speculation
- x86/speculation: Enable prctl mode for spectre_v2_user
- x86/speculation: Add seccomp Spectre v2 user space protection mode
- x86/speculation: Provide IBPB always command line options
- kvm: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb
- x86/speculation: Change misspelled STIPB to STIBP
- x86/speculation: Add support for STIBP always-on preferred mode
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE

  * [Ubuntu] vfio-ap: add subsystem to matrix device to avoid libudev failures
(LP: #1818854)
- s390: vfio_ap: link the vfio_ap devices to the vfio_ap bus subsystem

  * Kernel regularly logs: Bluetooth: hci0: last event is not cmd complete
(0x0f) (LP: #1748565)
- Bluetooth: Fix unnecessary error message for HCI request completion

  * HiSilicon HNS ethernet broken in 4.15.0-45 (LP: #1818294)
- net: hns: Fix WARNING when hns 

[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-04-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
cosmic' to 'verification-done-cosmic'. If the problem still exists,
change the tag 'verification-needed-cosmic' to 'verification-failed-
cosmic'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-cosmic

** Tags added: verification-needed-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux package in Ubuntu:
  Incomplete
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in linux-gcp source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Fix Committed
Status in linux-gcp source package in Cosmic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTION: See comment #2 ***]

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-04-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
bionic' to 'verification-done-bionic'. If the problem still exists,
change the tag 'verification-needed-bionic' to 'verification-failed-
bionic'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux package in Ubuntu:
  Incomplete
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in linux-gcp source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Fix Committed
Status in linux-gcp source package in Cosmic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTION: See comment #2 ***]

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-03-27 Thread Khaled El Mously
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Cosmic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux package in Ubuntu:
  Incomplete
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in linux-gcp source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Fix Committed
Status in linux-gcp source package in Cosmic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTION: See comment #2 ***]

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-03-18 Thread Kamal Mostafa
Note: The Disco 5.0 kernel already carries the required patches, via
mainline.

** Also affects: linux (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Cosmic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Cosmic)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Cosmic)
 Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Changed in: linux-gcp (Ubuntu Cosmic)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Cosmic)
 Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Changed in: linux-gcp (Ubuntu Cosmic)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux package in Ubuntu:
  Incomplete
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  In Progress
Status in linux-gcp source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  In Progress
Status in linux-gcp source package in Cosmic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTION: See comment #2 ***]

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-03-18 Thread Kamal Mostafa
We have confirmed that the patchwork.kernel.org patch originally
requested was not the right one.

This set of four patches from mainline (applied to bionic) supplies the
needed functionality, and a test backport to bionic has been confirmed
to work as expected:

bdaeedc1bea9 scsi: tcmu: add module wide block/reset_netlink support
9de3a1ef032a scsi: tcmu: simplify nl interface
3228691ffec1 scsi: tcmu: track nl commands
0297e962907d scsi: tcmu: delete unused __wait


** Description changed:

  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu user
  space code crashes while handling a netlink message from the kernel, the
  kernel module will be stuck waiting for the response. This situation can
  only be resolved with a server reboot.
  
  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.
  
  [Fix]
- The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel
+ The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTED: See comment #2 ***]
  
  There were a number of mainline upstream commits to apply as part of the
  backport
  
  [Test]
  unavailable
  
  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

** Description changed:

  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu user
  space code crashes while handling a netlink message from the kernel, the
  kernel module will be stuck waiting for the response. This situation can
  only be resolved with a server reboot.
  
  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.
  
  [Fix]
- The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTED: See comment #2 ***]
+ The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTION: See comment #2 ***]
  
  There were a number of mainline upstream commits to apply as part of the
  backport
  
  [Test]
  unavailable
  
  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux package in Ubuntu:
  Incomplete
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  In Progress
Status in linux-gcp source package in Bionic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel [** 
CORRECTION: See comment #2 ***]

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-03-18 Thread Kamal Mostafa
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux package in Ubuntu:
  New
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  In Progress
Status in linux-gcp source package in Bionic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-03-12 Thread Kamal Mostafa
There may be some confusion between the requested patch versus the
expected functionality:   The requested patch
(https://patchwork.kernel.org/patch/10319623/) adds only a new
**configfs** entry called "reset_netlink" but the returned test results
(below) suggest that the tester was expecting a new **module parameter**
called "reset_netlink".  I also note that the discussion thread attached
to the patchwork patch does mention the idea of doing it as a module
parameter, but that idea is apparently rejected in favor of the configfs
scheme implemented by the patch.  Is it possible that the tester was
originally working with an old version of the patch?

Also, the tester mentions expecting "block_netlink and reset_netlink"
module params, but neither the patchwork patch nor mainline contains any
reference to "block_netlink" at all.

My test kernel, with the reset_netlink patchwork patch (and many tcmu 
prerequisites from mainline) is available here:
  git source: 
https://git.launchpad.net/~kamalmostafa/ubuntu/+source/linux/+git/bionic/log/?h=tcmu-patch
  binary pkgs: https://kernel.ubuntu.com/~kamal/.tmp.4hthjg7s/


TEST RESULTS (via terrykrudd):
--
Unfortunately the build you gave us does not seem to include the kernel
patch to reset and unblock the tcmu netlink socket.

|dhana@gke-dhana-cluster-default-pool-596c314f-xn9f:~$ uname -a Linux
gke-dhana-cluster-default-pool-596c314f-xn9f 4.15.0-1028-gcp #29+tcmu0
SMP Fri Mar 8 20:33:39 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
dhana@gke-dhana-cluster-default-pool-596c314f-xn9f:~$ dpkg -l | grep
1028 ii linux-image-unsigned-4.15.0-1028-gcp 4.15.0-1028.29+tcmu0 amd64
Linux kernel image for version 4.15.0 on 64 bit x86 SMP ii
linux-modules-4.15.0-1028-gcp 4.15.0-1028.29+tcmu0 amd64 Linux kernel
extra modules for version 4.15.0 on 64 bit x86 SMP iU
linux-modules-extra-4.15.0-1028-gcp 4.15.0-1028.29+tcmu0 amd64 Linux
kernel extra modules for version 4.15.0 on 64 bit x86 SMP |

With the patch the /sys/module/target_core_user/parameters/ should
include block_netlink and reset_netlink entries such as:

|[root@demo06 crash]# ls -al /sys/module/target_core_user/parameters/
total 0 drwxr-xr-x 2 root root 0 Mar 11 16:47 . drwxr-xr-x 6 root root 0
Mar 8 11:37 .. -rw-r--r-- 1 root root 4096 Mar 8 14:31 block_netlink
-rw-r--r-- 1 root root 4096 Mar 11 16:47 global_max_data_area_mb
--w--- 1 root root 4096 Mar 8 14:31 reset_netlink |

But on the GKE instance with the patched kernel and modules we see:

|dhana@gke-dhana-cluster-default-pool-596c314f-xn9f:~$ ls -al
/sys/module/target_core_user/parameters/ total 0 drwxr-xr-x 2 root root
0 Mar 11 23:32 . drwxr-xr-x 6 root root 0 Mar 11 23:32 .. -rw-r--r-- 1
root root 4096 Mar 11 23:32 global_max_data_area_mb |

As you see the block_netlink and reset_netlink entries are not present.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux-gcp source package in Bionic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-03-12 Thread Stefan Bader
** Changed in: linux-gcp (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Bionic)
   Importance: Undecided => High

** Changed in: linux-gcp (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux-gcp source package in Bionic:
  In Progress

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819504] Re: tcmu user space crash results in kernel module hang.

2019-03-11 Thread Terry Rudd
** Changed in: linux-gcp (Ubuntu)
 Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Changed in: linux-gcp (Ubuntu Bionic)
 Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1819504

Title:
  tcmu user space crash results in kernel module hang.

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Bionic:
  New

Bug description:
  With the 4.15.0 kernel version used in bionic GCP/GKE, if the tcmu
  user space code crashes while handling a netlink message from the
  kernel, the kernel module will be stuck waiting for the response. This
  situation can only be resolved with a server reboot.

  === SRU Justification ===
  [Impact]
  With this particular user-space crash in the current Ubuntu image it results 
in a hang hobbles the entire physical server.

  [Fix]
  The request is for Canonical to backport the patch 
https://patchwork.kernel.org/patch/10319623/ to the bionic 4.15.0 kernel

  There were a number of mainline upstream commits to apply as part of
  the backport

  [Test]
  unavailable

  [Regression Potential]
  Low. it's all mainline commits, and affects only that driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1819504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp