Activity log for bug #1770244

Date Who What changed Old value New value Message
2018-05-09 19:04:21 dann frazier bug added bug
2018-05-09 19:04:30 dann frazier nominated for series Ubuntu Bionic
2018-05-09 19:04:30 dann frazier bug task added linux (Ubuntu Bionic)
2018-05-09 19:30:18 Ubuntu Kernel Bot linux (Ubuntu): status New Incomplete
2018-05-09 19:30:22 Ubuntu Kernel Bot linux (Ubuntu Bionic): status New Incomplete
2018-05-09 21:27:40 dann frazier linux (Ubuntu Bionic): assignee dann frazier (dannf)
2018-05-09 21:27:42 dann frazier linux (Ubuntu): assignee dann frazier (dannf)
2018-05-09 21:28:07 dann frazier description [Impact] TBD [Test Case] TBD [Fix] TBD [Regression Risk] TBD [Impact] TBD [Test Case] TBD [Fix] c6d8c8ef1d0d94fdae9f5d72982963db89f9cdad efi: Move ARM CPER code to new file 301f55b1a9177132d2b9ce8a90bf0ae4b37bb850 efi: Parse ARM error information value [Regression Risk] TBD
2018-05-09 21:28:13 dann frazier linux (Ubuntu): status Incomplete Confirmed
2018-05-09 21:28:15 dann frazier linux (Ubuntu Bionic): status Incomplete Confirmed
2018-05-23 20:21:29 dann frazier description [Impact] TBD [Test Case] TBD [Fix] c6d8c8ef1d0d94fdae9f5d72982963db89f9cdad efi: Move ARM CPER code to new file 301f55b1a9177132d2b9ce8a90bf0ae4b37bb850 efi: Parse ARM error information value [Regression Risk] TBD [Impact] When an ARM-specific platform error (CPER) comes occurs, the kernel will emit an error with an opaque hex error type. The user would then need to consult the UEFI specification to decode it. It would be better to actually do the decoding for the user directly. [Test Case] On a server that supports EINJ, generate a fake CE (thanks to Tyler Baicar for this example): modprobe einj echo 0x12345000 > /sys/kernel/debug/apei/einj/param1 echo $((-1 << 12)) > /sys/kernel/debug/apei/einj/param2 echo 5 > /sys/kernel/debug/apei/einj/param3 echo 0x3 > /sys/kernel/debug/apei/einj/flags echo 0x1 > /sys/kernel/debug/apei/einj/error_type echo 1 > /sys/kernel/debug/apei/einj/error_inject In the output, look for a decoded message. Without this fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 But with the fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094317] {2}[Hardware Error]: transaction type: Generic [ 388.094322] {2}[Hardware Error]: operation type: Generic read (type of instruction or data request cannot be determined) [ 388.094326] {2}[Hardware Error]: cache level: 3 [ 388.094330] {2}[Hardware Error]: processor context not corrupted [ 388.094333] {2}[Hardware Error]: the error has been corrected [ 388.094337] {2}[Hardware Error]: PC is imprecise [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 [Fix] These upstream fixes add ARM decoding support: c6d8c8ef1d0d94fdae9f5d72982963db89f9cdad efi: Move ARM CPER code to new file 301f55b1a9177132d2b9ce8a90bf0ae4b37bb850 efi: Parse ARM error information value [Regression Risk]
2018-05-23 23:52:13 dann frazier linux (Ubuntu): status Confirmed In Progress
2018-05-23 23:52:15 dann frazier linux (Ubuntu Bionic): status Confirmed In Progress
2018-05-23 23:54:00 dann frazier description [Impact] When an ARM-specific platform error (CPER) comes occurs, the kernel will emit an error with an opaque hex error type. The user would then need to consult the UEFI specification to decode it. It would be better to actually do the decoding for the user directly. [Test Case] On a server that supports EINJ, generate a fake CE (thanks to Tyler Baicar for this example): modprobe einj echo 0x12345000 > /sys/kernel/debug/apei/einj/param1 echo $((-1 << 12)) > /sys/kernel/debug/apei/einj/param2 echo 5 > /sys/kernel/debug/apei/einj/param3 echo 0x3 > /sys/kernel/debug/apei/einj/flags echo 0x1 > /sys/kernel/debug/apei/einj/error_type echo 1 > /sys/kernel/debug/apei/einj/error_inject In the output, look for a decoded message. Without this fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 But with the fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094317] {2}[Hardware Error]: transaction type: Generic [ 388.094322] {2}[Hardware Error]: operation type: Generic read (type of instruction or data request cannot be determined) [ 388.094326] {2}[Hardware Error]: cache level: 3 [ 388.094330] {2}[Hardware Error]: processor context not corrupted [ 388.094333] {2}[Hardware Error]: the error has been corrected [ 388.094337] {2}[Hardware Error]: PC is imprecise [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 [Fix] These upstream fixes add ARM decoding support: c6d8c8ef1d0d94fdae9f5d72982963db89f9cdad efi: Move ARM CPER code to new file 301f55b1a9177132d2b9ce8a90bf0ae4b37bb850 efi: Parse ARM error information value [Regression Risk] [Impact] When an ARM-specific platform error (CPER) comes occurs, the kernel will emit an error with an opaque hex error type. The user would then need to consult the UEFI specification to decode it. It is far easier for the kernel to do the decoding itself, and just tell the user what the problem is. [Test Case] On a server that supports EINJ, generate a fake CE (thanks to Tyler Baicar for this example): modprobe einj echo 0x12345000 > /sys/kernel/debug/apei/einj/param1 echo $((-1 << 12)) > /sys/kernel/debug/apei/einj/param2 echo 5 > /sys/kernel/debug/apei/einj/param3 echo 0x3 > /sys/kernel/debug/apei/einj/flags echo 0x1 > /sys/kernel/debug/apei/einj/error_type echo 1 > /sys/kernel/debug/apei/einj/error_inject In the output, look for a decoded message. Without this fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 But with the fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094317] {2}[Hardware Error]: transaction type: Generic [ 388.094322] {2}[Hardware Error]: operation type: Generic read (type of instruction or data request cannot be determined) [ 388.094326] {2}[Hardware Error]: cache level: 3 [ 388.094330] {2}[Hardware Error]: processor context not corrupted [ 388.094333] {2}[Hardware Error]: the error has been corrected [ 388.094337] {2}[Hardware Error]: PC is imprecise [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 [Fix] These upstream fixes add ARM decoding support: c6d8c8ef1d0d94fdae9f5d72982963db89f9cdad efi: Move ARM CPER code to new file 301f55b1a9177132d2b9ce8a90bf0ae4b37bb850 efi: Parse ARM error information value [Regression Risk]
2018-05-24 00:00:13 dann frazier description [Impact] When an ARM-specific platform error (CPER) comes occurs, the kernel will emit an error with an opaque hex error type. The user would then need to consult the UEFI specification to decode it. It is far easier for the kernel to do the decoding itself, and just tell the user what the problem is. [Test Case] On a server that supports EINJ, generate a fake CE (thanks to Tyler Baicar for this example): modprobe einj echo 0x12345000 > /sys/kernel/debug/apei/einj/param1 echo $((-1 << 12)) > /sys/kernel/debug/apei/einj/param2 echo 5 > /sys/kernel/debug/apei/einj/param3 echo 0x3 > /sys/kernel/debug/apei/einj/flags echo 0x1 > /sys/kernel/debug/apei/einj/error_type echo 1 > /sys/kernel/debug/apei/einj/error_inject In the output, look for a decoded message. Without this fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 But with the fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094317] {2}[Hardware Error]: transaction type: Generic [ 388.094322] {2}[Hardware Error]: operation type: Generic read (type of instruction or data request cannot be determined) [ 388.094326] {2}[Hardware Error]: cache level: 3 [ 388.094330] {2}[Hardware Error]: processor context not corrupted [ 388.094333] {2}[Hardware Error]: the error has been corrected [ 388.094337] {2}[Hardware Error]: PC is imprecise [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 [Fix] These upstream fixes add ARM decoding support: c6d8c8ef1d0d94fdae9f5d72982963db89f9cdad efi: Move ARM CPER code to new file 301f55b1a9177132d2b9ce8a90bf0ae4b37bb850 efi: Parse ARM error information value [Regression Risk] [Impact] When an ARM-specific platform error (CPER) comes occurs, the kernel will emit an error with an opaque hex error type. The user would then need to consult the UEFI specification to decode it. It is far easier for the kernel to do the decoding itself, and just tell the user what the problem is. [Test Case] On a server that supports EINJ, generate a fake CE (thanks to Tyler Baicar for this example): modprobe einj echo 0x12345000 > /sys/kernel/debug/apei/einj/param1 echo $((-1 << 12)) > /sys/kernel/debug/apei/einj/param2 echo 5 > /sys/kernel/debug/apei/einj/param3 echo 0x3 > /sys/kernel/debug/apei/einj/flags echo 0x1 > /sys/kernel/debug/apei/einj/error_type echo 1 > /sys/kernel/debug/apei/einj/error_inject In the output, look for a decoded message. Without this fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 But with the fix, you'll see: [ 388.094304] {2}[Hardware Error]: error_info: 0x0000000004c6007f [ 388.094317] {2}[Hardware Error]: transaction type: Generic [ 388.094322] {2}[Hardware Error]: operation type: Generic read (type of instruction or data request cannot be determined) [ 388.094326] {2}[Hardware Error]: cache level: 3 [ 388.094330] {2}[Hardware Error]: processor context not corrupted [ 388.094333] {2}[Hardware Error]: the error has been corrected [ 388.094337] {2}[Hardware Error]: PC is imprecise [ 388.094341] {2}[Hardware Error]: physical fault address: 0x0000000012345000 [Fix] These upstream fixes add ARM decoding support: c6d8c8ef1d0d94fdae9f5d72982963db89f9cdad efi: Move ARM CPER code to new file 301f55b1a9177132d2b9ce8a90bf0ae4b37bb850 efi: Parse ARM error information value [Regression Risk] The code changed is specific to ARM, and has been tested there. There's a small change to arch-independent code, but it just involves renaming an array and adding the obviously correct const attribute.
2018-06-07 22:50:46 Khaled El Mously linux (Ubuntu Bionic): status In Progress Fix Committed
2018-06-14 11:02:25 Brad Figg tags verification-needed-bionic
2018-06-14 22:33:14 dann frazier tags verification-needed-bionic verification-done-bionic
2018-07-02 08:27:55 Launchpad Janitor linux (Ubuntu Bionic): status Fix Committed Fix Released
2018-07-02 08:27:55 Launchpad Janitor cve linked 2018-11508
2018-07-02 08:27:55 Launchpad Janitor cve linked 2018-7755
2018-07-26 05:13:52 Launchpad Janitor linux (Ubuntu): status In Progress Fix Released