** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to kexec-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1916076

Title:
  Support kernel 4.15 in Trusty kexec-tools

Status in kexec-tools package in Ubuntu:
  In Progress
Status in kexec-tools source package in Trusty:
  In Progress

Bug description:
  [Impact]
  * In Trusty/Azure we have a kernel 4.15 package - this kernel has a bunch of 
improvements compared to Trusty HWE, including KASLR. That reflects a lot in 
the memory topology/mapping, which affects the kexec procedure.

  - In order to support kexec operation for kdump in Trusty/Azure running 
kernel 4.15, the following patches are needed, and hereby backported:
  0d526445 ("x86, kaslr: add alternative way to locate kernel text mapping 
area")
  9f62cbdd ("kexec/arch/i386: Add support for KASLR memory randomization")
  dbb99d93 ("kexec-tools/x86: get_kernel_vaddr_and_size off-by-one fix")
  ed15ba1b ("build_mem_phdrs(): check if p_paddr is invalid")
  fab91841 ("Handle additional e820 memmap type strings")

  - All the above patches are included in kexec-tools from Xenial, so
  they are exercised by Xenial's users for the last years.

  [Test Case]
  * To test and exhibit the issue, just execute both "kexec -l" (regular load) 
and "kexec -p" (kdump kernel load) operations in an Azure instance running 
Trusty with the latest trusty-updates version of the package (2.0.6-0ubuntu2.3) 
- it will fail.

  * Using the patches hereby backported, both operations succeed and
  kdump kernel is initialized when an artificial panic is triggered
  using "echo c > /proc/sysrq"

  [Where problems could occur]
  * As previously mentioned, all the patches are present in Xenial and 
subsequent versions of kexec-tools; since all of them are not invasive and 
kexec-tools is backward compatible, the potential for regressions is pretty low.

  * That said, if we face problems due to the patches proposed here, the
  issues would show-up during kdump/regular kexec load operations.

  * Worth to mention that in kernel 4.4, the following message is
  observed when loading a kdump kernel after the patches: "Cannot get
  kernel page_offset_base symbol address". This is expected, since kexec
  will try new methods to get memory information (which will succeed in
  more recent kernels), but will fallback to the old methods in old
  kernels, showing this message.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kexec-tools/+bug/1916076/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to