This bug was fixed in the package linux - 4.10.0-38.42

---------------
linux (4.10.0-38.42) zesty; urgency=low

  * linux: 4.10.0-38.42 -proposed tracker (LP: #1722330)

  * Controller lockup detected on ProLiant DL380 Gen9 with P440 Controller
    (LP: #1720359)
    - scsi: hpsa: limit transfer length to 1MB

  * [Dell Docking IE][0bda:8153] Realtek USB Ethernet leads to system hang
    (LP: #1720977)
    - r8152: fix the list rx_done may be used without initialization

  * Touchpad not detected in Lenovo X1 Yoga / Yoga 720-15IKB (LP: #1700657)
    - mfd: intel-lpss: Add missing PCI ID for Intel Sunrise Point LPSS devices

  * Add installer support for Broadcom BCM573xx network drivers. (LP: #1720466)
    - d-i: Add bnxt_en to nic-modules.

  * CVE-2017-1000252
    - KVM: VMX: Do not BUG() on out-of-bounds guest IRQ

  * CVE-2017-10663
    - f2fs: sanity check checkpoint segno and blkoff

  * xfstest sanity checks on seek operations fails (LP: #1696049)
    - xfs: fix off-by-one on max nr_pages in xfs_find_get_desired_pgoff()

  * [P9, Power NV][ WSP][Ubuntu 16.04.03] : perf hw breakpoint command results
    in call traces and system goes for reboot. (LP: #1706033)
    - powerpc/64s: Handle data breakpoints in Radix mode

  * 5U84 - ses driver isn't binding right - cannot blink lights on 1 of the 2
    5u84 (LP: #1693369)
    - scsi: ses: do not add a device to an enclosure if enclosure_add_links()
      fails.

  * Vlun resize request could fail with cxlflash driver (LP: #1713575)
    - scsi: cxlflash: Fix vlun resize failure in the shrink path

  * More migrations with constant load (LP: #1713576)
    - sched/fair: Prefer sibiling only if local group is under-utilized

  * New PMU fixes for marked events. (LP: #1716491)
    - powerpc/perf: POWER9 PMU stops after idle workaround

  * CVE-2017-14340
    - xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present

  * [Zesty][Yakkety] rtl8192e bug fixes (LP: #1698470)
    - staging: rtl8192e: rtl92e_fill_tx_desc fix write to mapped out memory.
    - staging: rtl8192e: fix 2 byte alignment of register BSSIDR.
    - staging: rtl8192e: rtl92e_get_eeprom_size Fix read size of EPROM_CMD.
    - staging: rtl8192e: GetTs Fix invalid TID 7 warning.

  * Stranded with ENODEV after mdadm --readonly (LP: #1706243)
    - md: MD_CLOSING needs to be cleared after called md_set_readonly or
      do_md_stop

  * multipath -ll is not showing the disks which are actually multipath
    (LP: #1718397)
    - fs: aio: fix the increment of aio-nr and counting against aio-max-nr

  * ETPS/2 Elantech Touchpad inconsistently detected (Gigabyte P57W laptop)
    (LP: #1594214)
    - Input: i8042 - add Gigabyte P57 to the keyboard reset table

  * CVE-2017-10911
    - xen-blkback: don't leak stack data via response ring

  * CVE-2017-11176
    - mqueue: fix a use-after-free in sys_mq_notify()

  * implement 'complain mode' in seccomp for developer mode with snaps
    (LP: #1567597)
    - Revert "UBUNTU: SAUCE: seccomp: log actions even when audit is disabled"
    - seccomp: Provide matching filter for introspection
    - seccomp: Sysctl to display available actions
    - seccomp: Operation for checking if an action is available
    - seccomp: Sysctl to configure actions that are allowed to be logged
    - seccomp: Selftest for detection of filter flag support
    - seccomp: Action to log before allowing

  * implement errno action logging in seccomp for strict mode with snaps
    (LP: #1721676)
    - Revert "UBUNTU: SAUCE: seccomp: log actions even when audit is disabled"
    - seccomp: Provide matching filter for introspection
    - seccomp: Sysctl to display available actions
    - seccomp: Operation for checking if an action is available
    - seccomp: Sysctl to configure actions that are allowed to be logged
    - seccomp: Selftest for detection of filter flag support
    - seccomp: Filter flag to log all actions except SECCOMP_RET_ALLOW

  * Backport recent bbr bugfixes to 4.10 kernel (LP: #1708604)
    - tcp_bbr: cut pacing rate only if filled pipe
    - tcp_bbr: introduce bbr_bw_to_pacing_rate() helper
    - tcp_bbr: introduce bbr_init_pacing_rate_from_rtt() helper
    - tcp_bbr: remove sk_pacing_rate=0 transient during init
    - tcp_bbr: init pacing rate on first RTT sample

  * [SRU][Zesty] Fix lscpu segfault on ARM64 with SMBIOS v2.0 (LP: #1716483)
    - arm64: kernel: restrict /dev/mem read() calls to linear region

 -- Kleber Sacilotto de Souza <kleber.so...@canonical.com>  Tue, 10 Oct
2017 13:49:34 +0200

** Changed in: linux (Ubuntu Zesty)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000252

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-10663

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-10911

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-11176

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14340

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1706033

Title:
  [P9, Power NV][ WSP][Ubuntu 16.04.03] : perf hw breakpoint command
  results in call traces and system goes for reboot.

Status in The Ubuntu-power-systems project:
  Incomplete
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Zesty:
  Fix Released

Bug description:
  == Comment: #0 - Shriya R. Kulkarni <> - 2017-06-14 04:38:16 ==
  Problem Description :
  =============
   
  While running perftool - testsuite, the perf hw breakpoint fails and it 
result in call traces , hence system goes for reboot .

  Machine details :
  ==========
  System : P9 , WSP , Bare metal.
  OS : Ubuntu 16.04.03
  uname -a : Linux ltc-wspoon3 4.10.0-23-generic #25~16.04.1-Ubuntu SMP Fri Jun 
9 10:43:34 UTC 2017 ppc64le ppc64le ppc64le GNU/Linux

  Steps to reproduce:
  ============
  1. Install perf.
  2. git clone perftool-testsuite.
      https://github.com/rfmvh/perftool-testsuite
  3. Do make.
  4. Test fails at step : -- [ FAIL ] -- perf_stat :: test_hw_breakpoints :: 
kspace address execution mem:0xc00000000035c020:x (command exitcode + output 
regexp parsing
  and call trace is seen as system goes for reboot.

  Call traces :
  =======

  ubuntu@ltc-wspoon3:~$ [1602513.518414] Unable to handle kernel paging request 
for data at address 0xc00000000135d3b8
  [1602513.518553] Faulting instruction address: 0xc0000000002869bc
  [1602513.518694] Oops: Kernel access of bad area, sig: 11 [#1]
  [1602513.518782] SMP NR_CPUS=2048 
  [1602513.518784] NUMA 
  [1602513.518842] PowerNV
  [1602513.518922] Modules linked in: vmx_crypto ofpart ipmi_powernv 
cmdlinepart ipmi_devintf powernv_flash ipmi_msghandler ibmpowernv opal_prd mtd 
at24 nvmem_core uio_pdrv_genirq uio autofs4 ast i2c_algo_bit drm_kms_helper 
syscopyarea sysfillrect sysimgblt fb_sys_fops crc32c_vpmsum ttm drm tg3 ahci 
libahci
  [1602513.519399] CPU: 27 PID: 4069 Comm: sysctl Not tainted 4.10.0-22-generic 
#24
  [1602513.519524] task: c000203968c42c00 task.stack: c000203965710000
  [1602513.519624] NIP: c0000000002869bc LR: c0000000003f7348 CTR: 
c000000000286990
  [1602513.519747] REGS: c000203965713a40 TRAP: 0300   Not tainted  
(4.10.0-22-generic)
  [1602513.519876] MSR: 9000000000009033 <SF,HV,EE,ME,IR,DR,RI,LE>
  [1602513.519889]   CR: 22002448  XER: 00000000
  [1602513.520058] CFAR: c0000000003f7344 DAR: c00000000135d3b8 DSISR: 00400000 
SOFTE: 1 
  [1602513.520058] GPR00: c0000000003f7348 c000203965713cc0 c00000000145d100 
c00000000134af00 
  [1602513.520058] GPR04: 0000000000000000 000000004ee50300 c000203965713d20 
c000203965713e00 
  [1602513.520058] GPR08: 0000000000000000 c00000000135d100 0000000000000000 
c000000000b71020 
  [1602513.520058] GPR12: c000000000286990 c000000007b4f300 0000000000000000 
0000000000000000 
  [1602513.520058] GPR16: 0000000000000000 0000000000000000 0000000000000000 
0000000000000000 
  [1602513.520058] GPR20: 0000000000000000 0000000000000000 0000000000000000 
0000000000000001 
  [1602513.520058] GPR24: 00003fffc542f5a0 0000000000000400 c000203965713e00 
000000004ee50300 
  [1602513.520058] GPR28: c00000000134af00 0000000000000000 c000003fee038800 
0000000000000000 
  [1602513.521280] NIP [c0000000002869bc] dirty_ratio_handler+0x2c/0x90
  [1602513.521374] LR [c0000000003f7348] proc_sys_call_handler+0x138/0x1c0
  [1602513.521481] Call Trace:
  [1602513.521526] [c000203965713cc0] [c000203965713d00] 0xc000203965713d00 
(unreliable)
  [1602513.521655] [c000203965713d00] [c0000000003f7348] 
proc_sys_call_handler+0x138/0x1c0
  [1602513.521797] [c000203965713d70] [c0000000003436ec] __vfs_read+0x3c/0x70
  [1602513.521907] [c000203965713d90] [c00000000034516c] vfs_read+0xbc/0x1b0
  [1602513.522016] [c000203965713de0] [c000000000346dd8] SyS_read+0x68/0x110
  [1602513.522112] [c000203965713e30] [c00000000000b184] system_call+0x38/0xe0
  [1602513.522243] Instruction dump:
  [1602513.522303] 60420000 3c4c011d 38426770 7c0802a6 60000000 7c0802a6 
fbc1fff0 fbe1fff8 
  [1602513.522445] f8010010 f821ffc1 3d22fff0 7c9f2378 <ebc902ba> 4be66da9 
60000000 3d22fff0 
  [1602513.522564] ---[ end trace 17c76e13e641d3c6 ]---
  [1602513.522657] 

  It goes for reboot :

  After booting to Ubuntu , I see series of call traces.

  Ubuntu 16.04.2 LTS ltc-wspoon3 hvc0

  ltc-wspoon3 login: [ 3476.626263] Unable to handle kernel paging request for 
data at address 0xc0000000013ad438
  [ 3476.626422] Faulting instruction address: 0xc00000000029a140
  [ 3476.626537] Oops: Kernel access of bad area, sig: 11 [#1]
  [ 3476.626615] SMP NR_CPUS=2048 
  [ 3476.626616] NUMA 
  [ 3476.626673] PowerNV
  [ 3476.626746] Modules linked in: ipmi_powernv at24 ipmi_devintf nvmem_core 
ipmi_msghandler ofpart cmdlinepart powernv_flash mtd opal_prd vmx_crypto 
ibmpowernv uio_pdrv_genirq uio autofs4 ast i2c_algo_bit ttm crc32c_vpmsum 
drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops tg3 drm ahci 
libahci
  [ 3476.627220] CPU: 28 PID: 4529 Comm: sysctl Not tainted 4.10.0-23-generic 
#25~16.04.1-Ubuntu
  [ 3476.627339] task: c000203968ceec00 task.stack: c000203968d10000
  [ 3476.627428] NIP: c00000000029a140 LR: c0000000004133a8 CTR: 
c00000000029a110
  [ 3476.627554] REGS: c000203968d13a50 TRAP: 0300   Not tainted  
(4.10.0-23-generic)
  [ 3476.627675] MSR: 9000000000009033 <SF,HV,EE,ME,IR,DR,RI,LE>
  [ 3476.627689]   CR: 22002448  XER: 00000000
  [ 3476.627844] CFAR: c0000000004133a4 DAR: c0000000013ad438 DSISR: 00400000 
SOFTE: 1 
  [ 3476.627844] GPR00: c0000000004133a8 c000203968d13cd0 c0000000014ad100 
c00000000139af78 
  [ 3476.627844] GPR04: 0000000000000000 000000003b440300 c000203968d13d30 
c000203968d13e00 
  [ 3476.627844] GPR08: 0000000000000000 c0000000013ad100 0000000000000000 
c000000000bc10a8 
  [ 3476.627844] GPR12: c00000000029a110 c000000007b4fc00 0000000000000000 
0000000000000000 
  [ 3476.627844] GPR16: 0000000000000000 0000000000000000 0000000000000000 
0000000000000000 
  [ 3476.627844] GPR20: 0000000000000000 0000000000000000 0000000000000000 
0000000000000001 
  [ 3476.627844] GPR24: 00003fffd410aa70 0000000000000400 c000203968d13e00 
000000003b440300 
  [ 3476.627844] GPR28: c00000000139af78 0000000000000000 c000003fee038800 
0000000000000000 
  [ 3476.629067] NIP [c00000000029a140] dirty_ratio_handler+0x30/0x90
  [ 3476.629177] LR [c0000000004133a8] proc_sys_call_handler+0x138/0x170
  [ 3476.629283] Call Trace:
  [ 3476.629330] [c000203968d13cd0] [c000203968d13d10] 0xc000203968d13d10 
(unreliable)
  [ 3476.629462] [c000203968d13d10] [c0000000004133a8] 
proc_sys_call_handler+0x138/0x170
  [ 3476.629600] [c000203968d13d80] [c00000000035a4f0] __vfs_read+0x40/0x80
  [ 3476.629711] [c000203968d13da0] [c00000000035c0d8] vfs_read+0xb8/0x1a0
  [ 3476.629823] [c000203968d13de0] [c00000000035ddec] SyS_read+0x6c/0x110
  [ 3476.629938] [c000203968d13e30] [c00000000000b184] system_call+0x38/0xe0
  [ 3476.630050] Instruction dump:
  [ 3476.630110] 3c4c0121 38422ff0 7c0802a6 f8010010 60000000 7c0802a6 fbc1fff0 
fbe1fff8 
  [ 3476.630250] f8010010 f821ffc1 3d22fff0 7c9f2378 <ebc9033a> 4be5bbc5 
60000000 3d22fff0 
  [ 3476.630396] ---[ end trace 10b22aebb5b2bf8d ]---
  [ 3477.238492] 
  [ 3477.238534] Sending IPI to other CPUs
  [ 3477.239615] IPI complete
  [ 3477.240827] kexec: waiting for cpu 5 (physical 49) to ente

  
  Attaching call traces in logs.

  == Comment: #4 - Shriya R. Kulkarni <> - 2017-07-10 13:16:10 ==
  The issue is fixed with upstream kernel.

  Here is the testing done on upstream kernel .

  Testing :
  ======
  1. root@ltc-boston27:~/linux-next-next-20170710/tools/perf# cat 
/proc/kallsyms | grep -P vm_dirty_ratio
  c0000000014591e0 D vm_dirty_ratio

  ./perf stat -e mem:0xc0000000014591e0:rw -x';' -- sysctl vm.dirty_ratio > 
/dev/null
  3;;mem:0xc0000000014591e0:rw;1126624;100.00;;;;

  2. root@ltc-boston27:~/linux-next-next-20170710/tools/perf# cat 
/proc/kallsyms | grep pid_max
  c000000001413bfc D pid_max
  c000000001413c00 D pid_max_max
  c000000001413c04 D pid_max_min
  root@ltc-boston27:~/linux-next-next-20170710/tools/perf# ./perf record -a -e 
mem:0xc000000001413bfc -g
  ^C[ perf record: Woken up 1 times to write data ]
  [ perf record: Captured and wrote 0.161 MB perf.data (6 samples) ]

  root@ltc-boston27:~/linux-next-next-20170710/tools/perf# dmesg -c
  root@ltc-boston27:~/linux-next-next-20170710/tools/perf#

  == Comment: #6 - Shriya R. Kulkarni <> - 2017-07-21 01:59:26 ==

  This patch fixes the issue as follows ::
  Patch  :   
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=d89ba5353f301971dd7d2f9fdf25c4432728f38e

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1706033/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to