[Kernel-packages] [Bug 1860089] Re: Create the kdump initrd with MODULES=most

2020-01-17 Thread Juerg Haefliger
Forget the previous patch. It contains BUSYBOX changes as well which I believe we don't need (doesn't make sense). ** Summary changed: - Create the kdump initrd with MODULES=most and BUSYBOX=y + Create the kdump initrd with MODULES=most ** Description changed: There are use cases where most

[Kernel-packages] [Bug 1860118] [NEW] kdump-tools fails to delete invalid initrd

2020-01-17 Thread Juerg Haefliger
Public bug reported: If kdump-tools fails to create an initrd, the temp initrd is not deleted: kdump-tools: Generating /var/lib/kdump/initrd.img-4.15.0-74-generic update-initramfs: failed for with 1. $ ls -l /var/lib/kdump total 4 drwxr-xr-x 5 root root 4096 Jan 17 12:14 initramfs-tools -rw-r--r

[Kernel-packages] [Bug 1860089] Re: Create the kdump initrd with MODULES=most

2020-01-17 Thread Juerg Haefliger
** Patch added: "0001-Add-a-config-variable-to-control-which-modules-to-in.patch" https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1860089/+attachment/5321130/+files/0001-Add-a-config-variable-to-control-which-modules-to-in.patch -- You received this bug notification because you a

[Kernel-packages] [Bug 1860118] Re: kdump-tools fails to delete invalid initrd

2020-01-17 Thread Juerg Haefliger
** Patch added: "0001-Delete-temporary-initrd-on-failure.patch" https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1860118/+attachment/5321129/+files/0001-Delete-temporary-initrd-on-failure.patch -- You received this bug notification because you are a member of Kernel Packages, which

[Kernel-packages] [Bug 1860343] [NEW] Update linux-raspi2 from 5.3 to 5.4

2020-01-20 Thread Juerg Haefliger
Public bug reported: The main Focal kernel in now based on 5.4, so update linux-raspi2 accordingly. ** Affects: linux-raspi2 (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux-raspi2 (Ubuntu Focal) Importance: Undecided Status: Confirmed ** Also affec

[Kernel-packages] [Bug 1860343] Re: Create new linux-raspi2-5.4 package

2020-01-20 Thread Juerg Haefliger
** Summary changed: - Update linux-raspi2 from 5.3 to 5.4 + Create new linux-raspi2-5.4 package ** Description changed: - The main Focal kernel in now based on 5.4, so update linux-raspi2 - accordingly. + The main Focal kernel in now based on 5.4, so create a corresponding + linux-raspi2-5.4 pac

[Kernel-packages] [Bug 1832573] Re: linux-azure: 4.15.0-1048.52~14.04.1 -proposed tracker

2019-06-21 Thread Juerg Haefliger
eam (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) *

[Kernel-packages] [Bug 1832565] Re: linux-ibm-gt: 4.15.0-1024.26 -proposed tracker

2019-06-21 Thread Juerg Haefliger
cal-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) --

[Kernel-packages] [Bug 1833977] Re: linux-ibm-gt: 4.15.0-1025.27 -proposed tracker

2019-06-25 Thread Juerg Haefliger
cal-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) --

[Kernel-packages] [Bug 1833977] Re: linux-ibm-gt: 4.15.0-1025.27 -proposed tracker

2019-06-26 Thread Juerg Haefliger
** Tags added: kernel-unblock-ppa -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1833977 Title: linux-ibm-gt: 4.15.0-1025.27 -proposed tracker Status in Kernel SRU Workflow: In Progre

[Kernel-packages] [Bug 1834528] Re: linux-ibm-gt: 4.15.0-1026.28 -proposed tracker

2019-06-27 Thread Juerg Haefliger
cal-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) --

[Kernel-packages] [Bug 1834635] [NEW] x86/speculation: SPEC_CTRL MSR not properly set/restored on VMENTER/VMEXIT

2019-06-28 Thread Juerg Haefliger
Private bug reported: Placeholder. Need to change Precise arch/x86/kernel/kvm/* from: if (ibrs_enabled && (svm->spec_ctrl != SPEC_CTRL_IBRS)) wrmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl); if (ibrs_enabled) { rdmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl); if (svm->spec_ctrl != SPEC_CTRL_IB

[Kernel-packages] [Bug 1834528] Re: linux-ibm-gt: 4.15.0-1026.28 -proposed tracker

2019-07-01 Thread Juerg Haefliger
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Invalid ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => Invalid -- You received this bug notification

[Kernel-packages] [Bug 1834528] Re: linux-ibm-gt: 4.15.0-1026.28 -proposed tracker

2019-07-01 Thread Juerg Haefliger
** Changed in: kernel-sru-workflow/security-signoff Status: Fix Released => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1834528 Title: linux-ibm-gt: 4.15.0-1026.28 -pro

[Kernel-packages] [Bug 1834941] Re: linux-ibm-gt: 4.15.0-1027.29 -proposed tracker

2019-07-04 Thread Juerg Haefliger
cal-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) --

[Kernel-packages] [Bug 1834941] Re: linux-ibm-gt: 4.15.0-1027.29 -proposed tracker

2019-07-04 Thread Juerg Haefliger
** Changed in: kernel-sru-workflow/automated-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Invalid -- You received this bug notification becau

[Kernel-packages] [Bug 1835190] Re: linux: 3.13.0-172.223 -proposed tracker

2019-07-04 Thread Juerg Haefliger
eam) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-

[Kernel-packages] [Bug 1833977] Re: linux-ibm-gt: 4.15.0-1025.27 -proposed tracker

2019-07-04 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1834941 *** https://bugs.launchpad.net/bugs/1834941 ** This bug is no longer a duplicate of bug 1834528 linux-ibm-gt: 4.15.0-1026.28 -proposed tracker ** This bug has been marked a duplicate of bug 1834941 linux-ibm-gt: 4.15.0-1027.29 -proposed tracker

[Kernel-packages] [Bug 1834528] Re: linux-ibm-gt: 4.15.0-1026.28 -proposed tracker

2019-07-04 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1834941 *** https://bugs.launchpad.net/bugs/1834941 ** This bug has been marked a duplicate of bug 1834941 linux-ibm-gt: 4.15.0-1027.29 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscrib

[Kernel-packages] [Bug 1832565] Re: linux-ibm-gt: 4.15.0-1024.26 -proposed tracker

2019-07-04 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1834941 *** https://bugs.launchpad.net/bugs/1834941 ** This bug is no longer a duplicate of bug 1834528 linux-ibm-gt: 4.15.0-1026.28 -proposed tracker ** This bug has been marked a duplicate of bug 1834941 linux-ibm-gt: 4.15.0-1027.29 -proposed tracker

[Kernel-packages] [Bug 1835270] Re: linux: 3.2.0-142.189 -proposed tracker

2019-07-05 Thread Juerg Haefliger
eam) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-lbm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lbm Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-

[Kernel-packages] [Bug 1835189] Re: linux-lts-trusty: 3.13.0-172.223~12.04.1 -proposed tracker

2019-07-06 Thread Juerg Haefliger
nel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli

[Kernel-packages] [Bug 1842812] Re: bionic/linux-ibm-gt: 4.15.0-1036.38 -proposed tracker

2019-09-09 Thread Juerg Haefliger
nel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli

[Kernel-packages] [Bug 1842812] Re: bionic/linux-ibm-gt: 4.15.0-1036.38 -proposed tracker

2019-09-09 Thread Juerg Haefliger
** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1842812 Title: bionic/linux-ibm-gt: 4.15.0-1036.38 -pro

[Kernel-packages] [Bug 1843118] Re: bionic/linux-gcp: 4.15.0-1042.45 -proposed tracker

2019-09-09 Thread Juerg Haefliger
eam (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) *

[Kernel-packages] [Bug 1842606] Re: trusty/linux-aws: 4.4.0-1053.57 -proposed tracker

2019-09-12 Thread Juerg Haefliger
eam (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juer

[Kernel-packages] [Bug 1842838] Re: bionic/linux-gcp: 5.0.0-1016.16~18.04.1 -proposed tracker

2019-09-13 Thread Juerg Haefliger
nel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli

[Kernel-packages] [Bug 1215411] Re: libcpupower.so is not installed from linux-tools

2019-09-14 Thread Juerg Haefliger
@apolitech please do not hijack this bug for a completely unrelated problem. If you believe yours is legit kernel issue then raise a new ticket at https://bugs.launchpad.net/ubuntu/+source/linux/+filebug. -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1215411] Re: libcpupower.so is not installed from linux-tools

2019-09-14 Thread Juerg Haefliger
I've built a test kernel that provides a new package linux-tools- dev-. This is probably not what you ultimately want but would that help in any way? To install it: $ sudo add-apt-repository ppa:juergh/kernel $ sudo apt install linux-tools-dev-5.0.0-29 $ dpkg -L linux-tools-dev-5.0.0-29 /. /usr

[Kernel-packages] [Bug 1215411] Re: libcpupower.so is not installed from linux-tools

2019-09-17 Thread Juerg Haefliger
I understand, I just don't see how we can achieve this. You can have multiple linux-tools packages installed and you'll get different versions of libcpupower. We don't guarantee ABI stability so your running app needs to be linked to the version of the running kernel or it might no longer work. I

[Kernel-packages] [Bug 1822235] Re: All 29 tests in kvm-unit-test failed (timeouted) on i386

2019-09-17 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Disco) Assignee: (unassigned) => Juerg Haefliger (juergh) ** Changed in: linux (Ubuntu Cosmic) Assignee: (unassigned) => Juerg Haefliger (juergh) ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Juerg Haefliger (juergh) ** C

[Kernel-packages] [Bug 1844386] Re: bionic/linux-ibm-gt: 4.15.0-1038.40 -proposed tracker

2019-09-18 Thread Juerg Haefliger
nel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli

[Kernel-packages] [Bug 1844386] Re: bionic/linux-ibm-gt: 4.15.0-1038.40 -proposed tracker

2019-09-18 Thread Juerg Haefliger
** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1844386 Title: bionic/linux-ibm-gt: 4.15.0-1038.40 -pro

[Kernel-packages] [Bug 1844414] Re: trusty/linux-aws: 4.4.0-1055.59 -proposed tracker

2019-09-18 Thread Juerg Haefliger
eam (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juer

[Kernel-packages] [Bug 1822235] Re: All 29 tests in kvm-unit-test failed (timeouted) on i386

2019-09-19 Thread Juerg Haefliger
** No longer affects: linux (Ubuntu Cosmic) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1822235 Title: All 29 tests in kvm-unit-test failed (timeouted) on i386 Status in ubuntu-kerne

[Kernel-packages] [Bug 1756866] Re: Xenial update to 4.4.118 stable release

2018-04-03 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1756866 Title: Xenial update to 4.4.118 stable release Status in linux package

[Kernel-packages] [Bug 1756866] Re: Xenial update to 4.4.118 stable release

2018-04-09 Thread Juerg Haefliger
Skipping the following patches (already applied): * KVM: VMX: Make indirect call speculation safe * KVM: x86: Make indirect calls in emulator speculation safe * Drivers: hv: vmbus: fix build warning -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1756866] Re: Xenial update to 4.4.118 stable release

2018-04-09 Thread Juerg Haefliger
Skipping the following patches: * x86/kvm: Update spectre-v1 mitigation * x86/spectre: Report get_user mitigation for spectre_v1 * nl80211: Sanitize array index in parse_txq_params * vfs, fdtable: Prevent bounds-check bypass via speculative execution * x86/syscall: Sanitize syscall t

[Kernel-packages] [Bug 1762453] [NEW] Xenial update to 4.4.119 stable release

2018-04-09 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1762453] Re: Xenial update to 4.4.119 stable release

2018-04-10 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from

[Kernel-packages] [Bug 1764316] [NEW] Xenial update to 4.4.120 stable release

2018-04-16 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1764367] [NEW] Xenial update to 4.4.121 stable release

2018-04-16 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1764367] Re: Xenial update to 4.4.121 stable release

2018-04-16 Thread Juerg Haefliger
Skipped the following patch: * nospec: Allow index argument to have const-qualified type This patch modifies code from upstream's Spectre v1 implementation which we haven't pulled in yet (skipped in the update to 4.4.118: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1756866/comments/2)

[Kernel-packages] [Bug 1764367] Re: Xenial update to 4.4.121 stable release

2018-04-16 Thread Juerg Haefliger
Skipped the following patch: * mpls, nospec: Sanitize array index in mpls_label_ok() It references array_index_nospec() which comes from upstream's Spectre v1 implementation. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubu

[Kernel-packages] [Bug 1764367] Re: Xenial update to 4.4.121 stable release

2018-04-16 Thread Juerg Haefliger
Skipped the following patch: * x86/syscall: Sanitize syscall table de-references under speculation fix Which fixes a Spectre v1 commit from upstream 4.4.118 which we haven't applied (yet). -- You received this bug notification because you are a member of Kernel Packages, which is subscribed t

[Kernel-packages] [Bug 1764627] [NEW] Xenial update to 4.4.122 stable release

2018-04-16 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1764627] Re: Xenial update to 4.4.122 stable release

2018-04-16 Thread Juerg Haefliger
Skipped the following patches because they were applied already: * netfilter: x_tables: pack percpu counter allocations * netfilter: x_tables: pass xt_counters struct to counter allocator * netfilter: x_tables: pass xt_counters struct instead of packet counter * ARM: omap2: hide omap3_s

[Kernel-packages] [Bug 1764666] [NEW] Xenial update to 4.4.123 stable release

2018-04-17 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1764666] Re: Xenial update to 4.4.123 stable release

2018-04-17 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from

[Kernel-packages] [Bug 1764666] Re: Xenial update to 4.4.123 stable release

2018-04-17 Thread Juerg Haefliger
Skipped the following patches because they're applied already: * bpf: fix incorrect sign extension in check_alu_op() * scsi: ses: don't get power status of SES device slot on probe -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linu

[Kernel-packages] [Bug 1764762] [NEW] Xenial update to 4.4.124 stable release

2018-04-17 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1764762] Re: Xenial update to 4.4.124 stable release

2018-04-18 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from

[Kernel-packages] [Bug 1764762] Re: Xenial update to 4.4.124 stable release

2018-04-18 Thread Juerg Haefliger
Reverted the following SAUCE patch to be replaced by its upstream equivalent: * UBUNTU: SAUCE: (no-up) iio: st_pressure: st_accel: Initialise sensor platform data properly Skipped the following patches since they're already applied: * CIFS: Enable encryption during session setup phase *

[Kernel-packages] [Bug 1764973] [NEW] Xenial update to 4.4.125 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1764973] Re: Xenial update to 4.4.125 stable release

2018-04-18 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from

[Kernel-packages] [Bug 1764999] [NEW] Xenial update to 4.4.126 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1765007] [NEW] Xenial update to 4.4.127 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1765010] [NEW] Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1765007] Re: Xenial update to 4.4.127 stable release

2018-04-18 Thread Juerg Haefliger
Skipped the following commits because they modify upstream's Spectre v1 code which we haven't pulled in (yet) with the 4.4.118 stable update: * nospec: Kill array_index_nospec_mask_check() * nospec: Move array_index_nospec() parameter checking into separate macro -- You received this bug

[Kernel-packages] [Bug 1765010] Re: Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Invalid ** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch i

[Kernel-packages] [Bug 1765010] Re: Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
Skipped the following commits because they're already applied: * scsi: libiscsi: Allow sd_shutdown on bad transport * blk-mq: NVMe 512B/4K+T10 DIF/DIX format returns I/O error on dd with split op -- You received this bug notification because you are a member of Kernel Packages, which is su

[Kernel-packages] [Bug 1765010] Re: Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
Skipped the following commit since it introduces a build failure as shown below: * perf tests: Decompress kernel module before objdump CC tests/llvm-src-base.o CC tests/llvm-src-kbuild.o LD util/libperf-in.o tests/code-reading.c: In function 'read_object_code': tests/cod

[Kernel-packages] [Bug 1777063] [NEW] Xenial update to 4.4.137 stable release

2018-06-14 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1777063] Re: Xenial update to 4.4.137 stable release

2018-06-15 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Incomplete ** Changed in: linux (Ubuntu) Status: Incomplete => Invalid ** Description changed: + SRU Justification - SRU Justification + Impact: +    The upstream process for stable tree updates is quite similar +    i

[Kernel-packages] [Bug 1777389] [NEW] Xenial update to 4.4.138 stable release

2018-06-17 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1777389] Re: Xenial update to 4.4.138 stable release

2018-06-18 Thread Juerg Haefliger
Skipped the following already-applied patches: * Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (applied as: UBUNTU: SAUCE: Input: elan_i2c - add ELAN0612 to the ACPI table) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to li

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-06-21 Thread Juerg Haefliger
** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1774181 Title: Update to upstream's implementation of S

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-22 Thread Juerg Haefliger
** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled p

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-06-28 Thread Juerg Haefliger
For Trusty 3.13, add the following patches: * UBUNTU: SAUCE: filter: Use barrier_nospec() instead of osb() * UBUNTU: SAUCE: Rename osb() to barrier_nospec() * UBUNTU: SAUCE: Replace osb() calls with array_index_nospec() * nospec: Kill array_index_nospec_mask_check() * nospec: Move array_i

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-08-22 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled p

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-08-22 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1774181 Title: Update to upstream's implementation of S

[Kernel-packages] [Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
Per git bisect, the fix for this should be: commit 6c971c09f38704513c426ba6515f22fb3d6c87d5 Author: Y.C. Chen Date: Thu Jan 26 09:45:40 2017 +0800 drm/ast: Fixed system hanged if disable P2A The original ast driver will access some BMC configuration through P2A bridge that ca

[Kernel-packages] [Bug 1788817] [NEW] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
Public bug reported: Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box results in stuck CPU warnings: [ 33.551942] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119] [ 33.558560] Modules linked in: hid_generic ast(+) crct10dif_pclmul syscopyarea crc32_pclmul sys

[Kernel-packages] [Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
ate) + and received testing there. + + == Test Case == + + Booted a patched kernel on HW to verify it comes up without stuck CPU + warnings. ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Ke

[Kernel-packages] [Bug 1789215] [NEW] i40e NIC not recognized

2018-08-27 Thread Juerg Haefliger
Public bug reported: == SRU Justification == Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box with a i40e NIC results in no network. The 3.13 i40e driver doesn't support the following HW: 3d:00.0 Ethernet controller: Intel Corporation Device 37d2 (rev 02) Subsystem

[Kernel-packages] [Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-30 Thread Juerg Haefliger
Thanks for the clarification, @brenohl. I decided to drop the two and adjust the patch that collided. See https://lists.ubuntu.com/archives /kernel-team/2018-May/092834.html. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1774173] [NEW] Xenial update to 4.4.132 stable release

2018-05-30 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1774181] [NEW] Add array_index_nospec

2018-05-30 Thread Juerg Haefliger
Public bug reported: Xenial is currently lacking full support of upstream's Spectre v1 mitigation. As a first step to get there, add the array_index_nospec macro and all the (simple) patches that make use of it. ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Juerg Haef

[Kernel-packages] [Bug 1765007] Re: Xenial update to 4.4.127 stable release

2018-06-04 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Incomplete ** Changed in: linux (Ubuntu) Status: Incomplete => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1765007 Ti

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-06-04 Thread Juerg Haefliger
** Summary changed: - Add array_index_nospec + Update to upstream's implementation of Spectre v1 mitigation -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1774181 Title: Update to upstr

[Kernel-packages] [Bug 1775137] [NEW] Prevent speculation on user controlled pointer

2018-06-05 Thread Juerg Haefliger
Public bug reported: Upstream's Spectre v1 mitigation prevents speculation on a user controlled pointer. This part of the Spectre v1 patchset was never backported to 4.4 (for unknown reasons) so Xenial is lacking it as well. All the other stable upstream kernels include it, so add it to Xenial. Sp

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-06-05 Thread Juerg Haefliger
** Description changed: Xenial is currently lacking full support of upstream's Spectre v1 - mitigation. As a first step to get there, add the array_index_nospec - macro and all the (simple) patches that make use of it. + mitigation. Add the missing patches and merge them with Ubuntu's current +

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-06 Thread Juerg Haefliger
** Description changed: - Upstream's Spectre v1 mitigation prevents speculation on a user - controlled pointer. This part of the Spectre v1 patchset was never - backported to 4.4 (for unknown reasons) so Xenial is lacking it as well. - All the other stable upstream kernels include it, so add it to

[Kernel-packages] [Bug 1772575] Re: Kernel 4.4 NBD size overflow with image size exceeding 1TB

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1772575 Title: Kernel 4.4 NBD size overflow with image siz

[Kernel-packages] [Bug 1771301] Re: Setting ipv6.disable=1 prevents both IPv4 and IPv6 socket opening for VXLAN tunnels

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1771301 Title: Setting ipv6.disable=1 prevents both IPv4 a

[Kernel-packages] [Bug 1771826] Re: Creation of IMA file hashes fails when appraisal is enabled

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1771826 Title: Creation of IMA file hashes fails when appr

[Kernel-packages] [Bug 1773905] Re: Support UVC1.5 Camera for Xenial

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1773905 Title: Support UVC1.5 Camera for Xenial Status in l

[Kernel-packages] [Bug 1772775] Re: 4.4.0-127.153 generates many "sit: non-ECT" messages

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1772775 Title: 4.4.0-127.153 generates many "sit: non-ECT"

[Kernel-packages] [Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1744173 Title: rfi-flush: Switch to new linear fallback fl

[Kernel-packages] [Bug 1772671] Re: Kernel produces empty lines in /proc/PID/status

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1772671 Title: Kernel produces empty lines in /proc/PID/st

[Kernel-packages] [Bug 1774173] Re: Xenial update to 4.4.132 stable release

2018-06-07 Thread Juerg Haefliger
Skipped the following patches (already applied): * KVM: s390: Enable all facility bits that are known good for passthrough -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1774173 Title:

[Kernel-packages] [Bug 1775771] [NEW] Xenial update to 4.4.134 stable release

2018-06-07 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1775771] Re: Xenial update to 4.4.134 stable release

2018-06-08 Thread Juerg Haefliger
List of previously applied patches: * mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl() * bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y * virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS -- You received this bug notification becau

[Kernel-packages] [Bug 1775771] Re: Xenial update to 4.4.134 stable release

2018-06-08 Thread Juerg Haefliger
** Description changed: - SRU Justification Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from

[Kernel-packages] [Bug 1776158] [NEW] Xenial update to 4.4.135 stable release

2018-06-11 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from a mainline/stable L

[Kernel-packages] [Bug 1776177] [NEW] Xenial update to 4.4.136 stable release

2018-06-11 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from a mainline/stable L

[Kernel-packages] [Bug 1776177] Re: Xenial update to 4.4.136 stable release

2018-06-11 Thread Juerg Haefliger
List of previously applied patches: * Revert "ima: limit file hash setting by user to fix and log modes" -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1776177 Title: Xenial update to

[Kernel-packages] [Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-24 Thread Juerg Haefliger
** Description changed: [Impact] - Change flush from congruence-first with dependencies to linear with - no dependencies, which increases flush performance by 8x on P8, and - 3x on P9 (as measured with null syscall loop, which will have the - flush area in the L2). + Change flush method from "co

[Kernel-packages] [Bug 1767857] Re: Kernel 4.4.0-122 Breaks qemu-system-x86

2018-05-28 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1767857 Title: Kernel 4.4.0-122 Breaks qemu-sys

[Kernel-packages] [Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-29 Thread Juerg Haefliger
For the latest xenial patchset: What's the purpose of patches 0001 & 0004?? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1744173 Title: rfi-flush: Switch to new linear fallback flush

<    1   2   3   4   5   6   7   8   9   10   >