[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
$ uname -a Linux myvm 4.8.0-54-generic #57-Ubuntu SMP Wed May 24 10:21:41 UTC 2017 aarch64 aarch64 aarch64 GNU/Linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1662554 Title: [Yakkety SRU] Enable KEXEC support in ARM64 kernel Status in linux package in Ubuntu: Fix Released Status in linux source package in Yakkety: Fix Released Bug description: [Impact] * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. * Our partners/customers have requested this feature. [Test Case] * Install a version of kexec-tools that supports ARM64 * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" * You should see the message: kexec_load failed: Function not implemented [Regression Potential] * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. [Other Info] * Please note that kexec-tools currently is not built for ARM64 * I have an SRU to enable that https://bugs.launchpad.net/bugs/1659618 * I am working with dannf to get kexec-tools to support ARM64 in yakkety. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662554/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
$ cat /etc/issue Ubuntu 16.10 \n \l $ sudo file /boot/vmlinuz-4.10.0-22-generic /boot/vmlinuz-4.10.0-22-generic: gzip compressed data, max compression, from Unix $ sudo kexec -d -l /boot/vmlinuz-4.10.0-22-generic --initrd=/boot/initrd.img-4.10.0-22-generic --reuse-cmdline arch_process_options:141: command_line: root=LABEL=cloudimg-rootfs ro quiet splash vt.handoff=7 arch_process_options:143: initrd: /boot/initrd.img-4.10.0-22-generic arch_process_options:144: dtb: (null) Try gzip decompression. kernel: 0xaeb49010 kernel_size: 0x12bc200 get_memory_ranges_iomem_cb: 4000 - 5855 : System RAM get_memory_ranges_iomem_cb: 585c - 585ebfff : System RAM get_memory_ranges_iomem_cb: 5875 - 5bc1 : System RAM get_memory_ranges_iomem_cb: 5c00 - 5fff : System RAM elf_arm64_probe: Not an ELF executable. image_arm64_load: kernel_segment: 4000 image_arm64_load: text_offset:0008 image_arm64_load: image_size: 013cf000 image_arm64_load: phys_offset:4000 image_arm64_load: vp_offset: image_arm64_load: PE format: yes read_1st_dtb: found /sys/firmware/fdt initrd: base 4144f000, size 1af840fh (28279823) dtb_set_initrd: start 1095036928, end 1123316751, size 28279823 (27617 KiB) dtb:base 42f48000, size 1c49h (7241) sym: sha256_starts info: 12 other: 00 shndx: 1 value: e80 size: 58 sym: sha256_starts value: 42f4ae80 addr: 42f4a014 machine_apply_elf_rel: CALL26 580006539400->580006539400039b sym: sha256_update info: 12 other: 00 shndx: 1 value: 2df0 size: c sym: sha256_update value: 42f4cdf0 addr: 42f4a030 machine_apply_elf_rel: CALL26 eb16027f9400->eb16027f94000b70 sym: sha256_finish info: 12 other: 00 shndx: 1 value: 2e00 size: 1bc sym: sha256_finish value: 42f4ce00 addr: 42f4a048 machine_apply_elf_rel: CALL26 aa1603e19400->aa1603e194000b6e sym: memcmp info: 12 other: 00 shndx: 1 value: 604 size: 34 sym: memcmp value: 42f4a604 addr: 42f4a058 machine_apply_elf_rel: CALL26 340003a09400->340003a09400016b sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a068 machine_apply_elf_rel: CALL26 580004209400->580004209400012f sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a070 machine_apply_elf_rel: CALL26 580004369400->580004369400012d sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a084 machine_apply_elf_rel: CALL26 f100827f9400->f100827f94000128 sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a0a0 machine_apply_elf_rel: CALL26 580003209400->5800032094000121 sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a0a8 machine_apply_elf_rel: CALL26 38736a819400->38736a819400011f sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a0b8 machine_apply_elf_rel: CALL26 f100827f9400->f100827f9400011b sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a0c8 machine_apply_elf_rel: CALL26 528000209400->5280002094000117 sym: .data info: 03 other: 00 shndx: 4 value: 0 size: 0 sym: .data value: 42f4d038 addr: 42f4a0e0 machine_apply_elf_rel: ABS64 ->42f4d038 sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 sym: .rodata.str1.1 value: 42f4cfc8 addr: 42f4a0e8 machine_apply_elf_rel: ABS64 ->42f4cfc8 sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 sym: .rodata.str1.1 value: 42f4cfe8 addr: 42f4a0f0 machine_apply_elf_rel: ABS64 ->42f4cfe8 sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 sym: .rodata.str1.1 value: 42f4cff8 addr: 42f4a0f8 machine_apply_elf_rel: ABS64 ->42f4cff8 sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 sym: .rodata.str1.1 value: 42f4cffe addr: 42f4a100 machine_apply_elf_rel: ABS64 ->42f4cffe sym: .rodata.str1.1 info: 03 other: 00 shndx: 3 value: 0 size: 0 sym: .rodata.str1.1 value: 42f4d000 addr: 42f4a108 machine_apply_elf_rel: ABS64 ->42f4d000 sym: printf info: 12 other: 00 shndx: 1 value: 524 size: 80 sym: printf value: 42f4a524 addr: 42f4a11c machine_apply_elf_rel: CALL26 94009400->940094000102 sym: setup_arch info: 12 other: 00 shndx: 1 value: e78 size: 4 sym: setup_arch value: 42f4ae78 addr: 42f4a120 machine_apply_elf_rel: CALL26 94009400->940094000356 sym: verify_sha256_digest info: 12 other: 00 shndx: 1 value: 0 size: e0 sym: verify_sha256_digest value: 42f4a000 addr: 42f4a124 machine_apply_elf_rel: CALL26 34409400->344097b7 sym: post_verification_setup_arch info: 12 other: 00 shndx: 1 value: e74
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
$ dpkg -l | grep kexec-toolsii kexec-tools 1:2.0.10-2ubuntu1.2 arm64tools to support fast kexec reboots ** Tags removed: verification-needed-yakkety ** Tags added: verification-done-yakkety -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1662554 Title: [Yakkety SRU] Enable KEXEC support in ARM64 kernel Status in linux package in Ubuntu: Fix Released Status in linux source package in Yakkety: Fix Released Bug description: [Impact] * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. * Our partners/customers have requested this feature. [Test Case] * Install a version of kexec-tools that supports ARM64 * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" * You should see the message: kexec_load failed: Function not implemented [Regression Potential] * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. [Other Info] * Please note that kexec-tools currently is not built for ARM64 * I have an SRU to enable that https://bugs.launchpad.net/bugs/1659618 * I am working with dannf to get kexec-tools to support ARM64 in yakkety. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662554/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
This bug was fixed in the package linux - 4.8.0-40.43 --- linux (4.8.0-40.43) yakkety; urgency=low * linux: 4.8.0-40.43 -proposed tracker (LP: #1667066) [ Andy Whitcroft ] * NFS client : permission denied when trying to access subshare, since kernel 4.4.0-31 (LP: #1649292) - fs: Better permission checking for submounts * shaking screen (LP: #1651981) - drm/radeon: drop verde dpm quirks * [0bda:0328] Card reader failed after S3 (LP: #1664809) - usb: hub: Wait for connection to be reestablished after port reset * linux-lts-xenial 4.4.0-63.84~14.04.2 ADT test failure with linux-lts-xenial 4.4.0-63.84~14.04.2 (LP: #1664912) - SAUCE: apparmor: fix link auditing failure due to, uninitialized var * In Ubuntu 17.04 : after reboot getting message in console like Unable to open file: /etc/keys/x509_ima.der (-2) (LP: #1656908) - SAUCE: ima: Downgrade error to warning * 16.04.2: Extra patches for POWER9 (LP: #1664564) - powerpc/mm: Fix no execute fault handling on pre-POWER5 - powerpc/mm: Fix spurrious segfaults on radix with autonuma * ibmvscsis: Add SGL LIMIT (LP: #1662551) - ibmvscsis: Add SGL limit * [Hyper-V] Bug fixes for storvsc (tagged queuing, error conditions) (LP: #1663687) - scsi: storvsc: Enable tracking of queue depth - scsi: storvsc: Remove the restriction on max segment size - scsi: storvsc: Enable multi-queue support - scsi: storvsc: use tagged SRB requests if supported by the device - scsi: storvsc: properly handle SRB_ERROR when sense message is present - scsi: storvsc: properly set residual data length on errors * Ubuntu16.10-KVM:Big configuration with multiple guests running SRIOV VFs caused KVM host hung and all KVM guests down. (LP: #1651248) - KVM: PPC: Book 3S: XICS cleanup: remove XICS_RM_REJECT - KVM: PPC: Book 3S: XICS: correct the real mode ICP rejecting counter - KVM: PPC: Book 3S: XICS: Fix potential issue with duplicate IRQ resends - KVM: PPC: Book 3S: XICS: Implement ICS P/Q states - KVM: PPC: Book 3S: XICS: Don't lock twice when checking for resend * ISST-LTE:pNV: ppc64_cpu command is hung w HDs, SSDs and NVMe (LP: #1662666) - blk-mq: Avoid memory reclaim when remapping queues - blk-mq: Fix failed allocation path when mapping queues - blk-mq: Always schedule hctx->next_cpu * systemd-udevd hung in blk_mq_freeze_queue_wait testing unpartitioned NVMe drive (LP: #1662673) - percpu-refcount: fix reference leak during percpu-atomic transition * [Yakkety SRU] Enable KEXEC support in ARM64 kernel (LP: #1662554) - [Config] Enable KEXEC support in ARM64. * [Hyper-V] Fix ring buffer handling to avoid host throttling (LP: #1661430) - Drivers: hv: vmbus: On write cleanup the logic to interrupt the host - Drivers: hv: vmbus: On the read path cleanup the logic to interrupt the host - Drivers: hv: vmbus: finally fix hv_need_to_signal_on_read() * brd module compiled as built-in (LP: #1593293) - CONFIG_BLK_DEV_RAM=m * regession tests failing after stackprofile test is run (LP: #1661030) - SAUCE: fix regression with domain change in complain mode * Permission denied and inconsistent behavior in complain mode with 'ip netns list' command (LP: #1648903) - SAUCE: fix regression with domain change in complain mode * flock not mediated by 'k' (LP: #1658219) - SAUCE: apparmor: flock mediation is not being enforced on cache check * unexpected errno=13 and disconnected path when trying to open /proc/1/ns/mnt from a unshared mount namespace (LP: #1656121) - SAUCE: apparmor: null profiles should inherit parent control flags * apparmor refcount leak of profile namespace when removing profiles (LP: #1660849) - SAUCE: apparmor: fix ns ref count link when removing profiles from policy * tor in lxd: apparmor="DENIED" operation="change_onexec" namespace="root//CONTAINERNAME_" profile="unconfined" name="system_tor" (LP: #1648143) - SAUCE: apparmor: Fix no_new_privs blocking change_onexec when using stacked namespaces * apparmor_parser hangs indefinitely when called by multiple threads (LP: #1645037) - SAUCE: apparmor: fix lock ordering for mkdir * apparmor leaking securityfs pin count (LP: #1660846) - SAUCE: apparmor: fix leak on securityfs pin count * apparmor reference count leak when securityfs_setup_d_inode\ () fails (LP: #1660845) - SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode() fails * apparmor not checking error if security_pin_fs() fails (LP: #1660842) - SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails * apparmor oops in bind_mnt when dev_path lookup fails (LP: #1660840) - SAUCE: apparmor: fix oops in bind_mnt when dev_path lookup fails * apparmor auditing denied access of special apparmor .null fi\ le (LP: #1660836) - SAUCE: apparmor:
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- yakkety' to 'verification-done-yakkety'. If the problem still exists, change the tag 'verification-needed-yakkety' to 'verification-failed- yakkety'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-yakkety -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1662554 Title: [Yakkety SRU] Enable KEXEC support in ARM64 kernel Status in linux package in Ubuntu: Fix Released Status in linux source package in Yakkety: Fix Committed Bug description: [Impact] * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. * Our partners/customers have requested this feature. [Test Case] * Install a version of kexec-tools that supports ARM64 * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" * You should see the message: kexec_load failed: Function not implemented [Regression Potential] * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. [Other Info] * Please note that kexec-tools currently is not built for ARM64 * I have an SRU to enable that https://bugs.launchpad.net/bugs/1659618 * I am working with dannf to get kexec-tools to support ARM64 in yakkety. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662554/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
** Changed in: linux (Ubuntu Yakkety) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1662554 Title: [Yakkety SRU] Enable KEXEC support in ARM64 kernel Status in linux package in Ubuntu: Fix Released Status in linux source package in Yakkety: Fix Committed Bug description: [Impact] * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. * Our partners/customers have requested this feature. [Test Case] * Install a version of kexec-tools that supports ARM64 * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" * You should see the message: kexec_load failed: Function not implemented [Regression Potential] * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. [Other Info] * Please note that kexec-tools currently is not built for ARM64 * I have an SRU to enable that https://bugs.launchpad.net/bugs/1659618 * I am working with dannf to get kexec-tools to support ARM64 in yakkety. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662554/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
https://lists.ubuntu.com/archives/kernel-team/2017-February/082373.html ** Also affects: linux (Ubuntu Yakkety) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Yakkety) Status: New => In Progress ** Changed in: linux (Ubuntu Yakkety) Assignee: (unassigned) => Tim Gardner (timg-tpi) ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1662554 Title: [Yakkety SRU] Enable KEXEC support in ARM64 kernel Status in linux package in Ubuntu: Fix Released Status in linux source package in Yakkety: In Progress Bug description: [Impact] * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. * Our partners/customers have requested this feature. [Test Case] * Install a version of kexec-tools that supports ARM64 * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" * You should see the message: kexec_load failed: Function not implemented [Regression Potential] * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. [Other Info] * Please note that kexec-tools currently is not built for ARM64 * I have an SRU to enable that https://bugs.launchpad.net/bugs/1659618 * I am working with dannf to get kexec-tools to support ARM64 in yakkety. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662554/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
** Description changed: [Impact] - * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. - * Our partners/customers have requested this feature. + * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. + * Our partners/customers have requested this feature. [Test Case] - * Install a version of kexec-tools that supports ARM64 - * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" - * You should see the message: kexec_load failed: Function not implemented + * Install a version of kexec-tools that supports ARM64 + * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" + * You should see the message: kexec_load failed: Function not implemented [Regression Potential] - * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. - + * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. + [Other Info] - * Please note that kexec-tools currently is not built for ARM64 - * I have an SRU to enable that bugs.launchpad.net/bugs/1659618 - * I am working with dannf to get kexec-tools to support ARM64 in yakkety. + * Please note that kexec-tools currently is not built for ARM64 + * I have an SRU to enable that https://bugs.launchpad.net/bugs/1659618 + * I am working with dannf to get kexec-tools to support ARM64 in yakkety. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1662554 Title: [Yakkety SRU] Enable KEXEC support in ARM64 kernel Status in linux package in Ubuntu: In Progress Bug description: [Impact] * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. * Our partners/customers have requested this feature. [Test Case] * Install a version of kexec-tools that supports ARM64 * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" * You should see the message: kexec_load failed: Function not implemented [Regression Potential] * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. [Other Info] * Please note that kexec-tools currently is not built for ARM64 * I have an SRU to enable that https://bugs.launchpad.net/bugs/1659618 * I am working with dannf to get kexec-tools to support ARM64 in yakkety. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662554/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1662554] Re: [Yakkety SRU] Enable KEXEC support in ARM64 kernel
** Summary changed: - [Yakkety] Enable KEXEC support in ARM64 kernel + [Yakkety SRU] Enable KEXEC support in ARM64 kernel -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1662554 Title: [Yakkety SRU] Enable KEXEC support in ARM64 kernel Status in linux package in Ubuntu: In Progress Bug description: [Impact] * If the kernel is not built with CONFIG_KEXEC support, kexec-tools will not be able to live boot a new kernel over the running one. * Our partners/customers have requested this feature. [Test Case] * Install a version of kexec-tools that supports ARM64 * Run the command: sudo kexec -l /boot/ --initrd=/boot/ --append=" * You should see the message: kexec_load failed: Function not implemented [Regression Potential] * The proposed config changes are limited to ARM64 architecture, overall risk of regression is low. [Other Info] * Please note that kexec-tools currently is not built for ARM64 * I have an SRU to enable that bugs.launchpad.net/bugs/1659618 * I am working with dannf to get kexec-tools to support ARM64 in yakkety. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1662554/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp