[Kernel-packages] [Bug 1767857] Re: Kernel 4.4.0-122 Breaks qemu-system-x86

2018-05-29 Thread Juerg Haefliger
I'm not able to reproduce this on a physical host. Works just fine for all the 32-bit kernels that I tested. When you say 'black screen', do you not get anything at all? Not even some BIOS flickering in the beginning? What do you get when you run the following: $ qemu-system-i386 -cdrom xubuntu-18

[Kernel-packages] [Bug 1789215] Re: i40e NIC not recognized

2018-09-17 Thread Juerg Haefliger
Boot tested on relevant HW. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1789215 Title: i40e NIC no

[Kernel-packages] [Bug 1779848] Re: Cleanup Meltdown/Spectre implementation

2018-09-17 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: Expired => Incomplete ** Changed in: linux (Ubuntu) Status: Incomplete => In Progress ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) ** Description changed: + == SRU Justification == + Ubunt

[Kernel-packages] [Bug 1766577] Re: 4.15.0-15 mdadm: CREATE group disk not found

2018-04-26 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1765232 *** https://bugs.launchpad.net/bugs/1765232 Marking this as a duplicate of #1765232. ** This bug has been marked a duplicate of bug 1765232 Kernel 4.15.0-15 breaks Dell PowerEdge 12th Gen servers -- You received this bug notification because you

[Kernel-packages] [Bug 1766577] Re: 4.15.0-15 mdadm: CREATE group disk not found

2018-04-26 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1765232 *** https://bugs.launchpad.net/bugs/1765232 4.15.0-19 works OK, 4.15.0-18 is broken. The problems was introduced in -14 with the following 2 commits: * 9403a13fd07e blk-mq: simplify queue mapping & schedule with each possisble CPU * f0aff9ccc834

[Kernel-packages] [Bug 1767971] [NEW] No such man page: kernel_lockdown.7

2018-04-30 Thread Juerg Haefliger
Public bug reported: When booting in secure boot mode, the Bionic kernel emits the following message: [ 52.035055] Lockdown: Loading of unsigned modules is restricted; see man kernel_lockdown.7 But there is no such man page. ** Affects: linux (Ubuntu) Importance: Undecided Statu

[Kernel-packages] [Bug 1768429] [NEW] Xenial update to 4.4.129 stable release

2018-05-01 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1768429] Re: Xenial update to 4.4.129 stable release

2018-05-01 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from

[Kernel-packages] [Bug 1768429] Re: Xenial update to 4.4.129 stable release

2018-05-01 Thread Juerg Haefliger
Skipped the following commit (commit to be reverted is not applied): * Revert "perf tests: Decompress kernel module before objdump" -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1768429

[Kernel-packages] [Bug 1768474] [NEW] Xenial update to 4.4.130 stable release

2018-05-02 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1768474] Re: Xenial update to 4.4.130 stable release

2018-05-02 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from

[Kernel-packages] [Bug 1768474] Re: Xenial update to 4.4.130 stable release

2018-05-03 Thread Juerg Haefliger
Skipped the following patch (already applied): * KVM: s390: wire up bpb feature -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1768474 Title: Xenial update to 4.4.130 stable release

[Kernel-packages] [Bug 1768825] [NEW] Xenial update to 4.4.131 stable release

2018-05-03 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Kernel-packages] [Bug 1768825] Re: Xenial update to 4.4.131 stable release

2018-05-03 Thread Juerg Haefliger
Skipped the following commits: * ALSA: hda: Hardening for potential Spectre v1 * ALSA: seq: oss: Hardening for potential Spectre v1 * ALSA: control: Hardening for potential Spectre v1 * ALSA: rme9652: Hardening for potential Spectre v1 * ALSA: hdspm: Hardening for potential Spectre v

[Kernel-packages] [Bug 1744173] Re: artful: rfi-flush: Switch to new linear fallback flush

2018-05-07 Thread Juerg Haefliger
Hi Breno, Sorry for the late reply. Regarding Xenial, we updated the kernel to a later upstream stable version since you posted the patches. 4.4.0-123.147 from -proposed should be in sync with 4.4.128 now and your patches don't apply cleanly any longer. When updating to 4.4.117 we reverted a bunch

[Kernel-packages] [Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-08 Thread Juerg Haefliger
** Summary changed: - artful: rfi-flush: Switch to new linear fallback flush + rfi-flush: Switch to new linear fallback flush -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1744173 Title:

[Kernel-packages] [Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-08 Thread Juerg Haefliger
** Description changed: + [Impact] Change flush from congruence-first with dependencies to linear with no dependencies, which increases flush performance by 8x on P8, and 3x on P9 (as measured with null syscall loop, which will have the flush area in the L2). The flush also becomes si

[Kernel-packages] [Bug 1779848] [NEW] Cleanup Meltdown/Spectre implementation

2018-07-03 Thread Juerg Haefliger
Public bug reported: Ubuntu kernels contain Meltdown and Spectre mitigations that are largely based on embargoed patches but what eventually landed in upstream is different in some places. We should cleanup the different kernels to bring them closer in line with upstream. ** Affects: linux (Ubunt

[Kernel-packages] [Bug 1780062] [NEW] Cloud-init causes potentially huge boot delays with 4.15 kernels

2018-07-04 Thread Juerg Haefliger
Public bug reported: Newer 4.15 kernels contain the following fix for CVE-2018-1108: 43838a23a05fb ("random: fix crng_ready() test") This causes cloud-init to stall for a potentially long time during boot (waiting for entropy I presume). Google reported boot delays of 75 minutes. I've tracked

[Kernel-packages] [Bug 1780062] Re: Cloud-init causes potentially huge boot delays with 4.15 kernels

2018-07-04 Thread Juerg Haefliger
mvo: fwiw jinja2 imports random and that reads 2500 chars from /dev/urandom on import -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1780062 Title: Cloud-init causes potentially huge boo

[Kernel-packages] [Bug 1780062] Re: Cloud-init causes potentially huge boot delays with 4.15 kernels

2018-07-04 Thread Juerg Haefliger
** Also affects: cloud-init (Ubuntu) Importance: Undecided Status: New ** Changed in: cloud-init (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.n

[Kernel-packages] [Bug 1767857] Re: Kernel 4.4.0-122 Breaks qemu-system-x86

2018-08-15 Thread Juerg Haefliger
Chances are slim that this will fix itself automagically. And as long as we're not able to reproduce this, it's going to be difficult. I'll try to take another look in a couple of days once the current kernel respin frenzy is over. -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1811850] Re: linux-ibm-gt: 4.15.0-1015.17 -proposed tracker

2019-01-25 Thread Juerg Haefliger
** Description changed: - This bug is for tracking the upload package. This - bug will contain status and testing results related to that upload. + This bug is for tracking the 4.15.0-1015.17 upload package. This bug + will contain status and testing results related to that upload. For an ex

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2019-01-25 Thread Juerg Haefliger
Jose, I'm confused. I never provided a kernel with the patches from comment #8 yet you did some testing and need a follow-on patch? What kernel did you test? Also, this ticket is closed as "won't fix" so you should not add new requests to it. And since the patches are for the ibm-gt kernel (which

[Kernel-packages] [Bug 1813532] [NEW] x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-01-28 Thread Juerg Haefliger
Public bug reported: Booting an i386 Bionic kernel in a VM leads to: [1.074702] Freeing unused kernel memory: 1092K [1.084027] Write protecting the kernel text: 8836k [1.085115] Write protecting the kernel read-only data: 3480k [1.086361] NX-protecting the kernel data: 7548k [

[Kernel-packages] [Bug 1813532] Re: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-01-28 Thread Juerg Haefliger
** Description changed: - Booting an i386 Bionic kernel in a VM leads to: + == SRU Justification == + + Booting an i386 Bionic kernel in a VM with a 64-bit CPU leads to: [1.074702] Freeing unused kernel memory: 1092K [1.084027] Write protecting the kernel text: 8836k [1.08511

[Kernel-packages] [Bug 1814054] [NEW] BUG: unable to handle kernel paging request at ee835a95

2019-01-31 Thread Juerg Haefliger
Public bug reported: Booting Bionic i386 in a VM and running the following commands repeatedly: ovs-vsctl add-br test ovs-vsctl del-br test eventually leads to: [ 44.476751] IP: kmem_cache_alloc_trace+0x91/0x1d0 [ 44.477299] *pdpt = 1ae13001 *pde = [ 44.477956]

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-01-31 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1814054 Title: BUG: unable to handle kernel pag

[Kernel-packages] [Bug 1814647] Re: linux: 4.4.0-143.169 -proposed tracker

2019-02-05 Thread Juerg Haefliger
eam) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-

[Kernel-packages] [Bug 1815061] [NEW] linux-ibm-gt: 4.15.0-1016.18 -proposed tracker

2019-02-07 Thread Juerg Haefliger
(canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Juerg Haefliger (juergh) Status: In Progress ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Juerg Haefliger (juergh

[Kernel-packages] [Bug 1811850] Re: linux-ibm-gt: 4.15.0-1015.17 -proposed tracker

2019-02-07 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1815061 *** https://bugs.launchpad.net/bugs/1815061 ** This bug has been marked a duplicate of bug 1815061 linux-ibm-gt: -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in

[Kernel-packages] [Bug 1813532] Re: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-02-18 Thread Juerg Haefliger
** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic ** Tags removed: verification-needed-cosmic ** Tags added: verification-done-cosmic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https

[Kernel-packages] [Bug 1813532] Re: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-02-18 Thread Juerg Haefliger
Successfully tested both kernels. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1813532 Title: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a Status in linux package

[Kernel-packages] [Bug 1812086] Re: kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296!

2019-02-18 Thread Juerg Haefliger
Tested successfully. ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1812086 Title: kernel BUG at /bui

[Kernel-packages] [Bug 1811803] Re: Crash on "ip link add foo type ipip"

2019-02-18 Thread Juerg Haefliger
Successfully tested Xenial, Bionic and Cosmic kernels. ** Tags removed: verification-needed-bionic verification-needed-cosmic verification-needed-xenial ** Tags added: verification-done-bionic verification-done-cosmic verification-done-xenial -- You received this bug notification because you a

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixup and missing commits

2019-02-18 Thread Juerg Haefliger
Verified that all commits are applied. ** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811646 Title:

[Kernel-packages] [Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-09-28 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1788817 Title: BUG: soft lockup - CPU#0 stuck for 23s!

[Kernel-packages] [Bug 1795675] [NEW] kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930!

2018-10-02 Thread Juerg Haefliger
Public bug reported: Running a set of autotests on Trusty with kernel 3.13.0-160-generic results in the following reproducible crash: [10870.247844] kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930! [10870.255080] invalid opcode: [#1] SMP [10870.259339] Modules linked in:

[Kernel-packages] [Bug 1795675] Re: kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930!

2018-10-05 Thread Juerg Haefliger
Turns out that it is the cpu hotplug kernel selftest that crashes the kernel. Simply run: $ bash tools/testing/selftests/cpu-hotplug/on-off-test.sh from the Trusty 3.13 tree and the machine will fall over a couple of minutes later. -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1795675] Re: kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930!

2018-10-05 Thread Juerg Haefliger
Works fine in a VM. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1795675 Title: kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930! Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1802777] Re: linux: 3.2.0-138.184 -proposed tracker

2018-11-14 Thread Juerg Haefliger
eam) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-lbm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lbm Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Bionic) Status: New => Fix Released ** Changed in: linux (Ubuntu) Status: Incomplete => Fix Released ** Changed in: linux (Ubuntu) Status: Fix Released => Won't Fix ** Changed in: linux (Ubuntu Bionic) Status: Fix Released => Won't Fix --

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-14 Thread Juerg Haefliger
The kernel patches were delivered via a custom kernel. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1800649 Title: Add support for NVIDIA GPU passthrough Status in linux package in Ub

[Kernel-packages] [Bug 1802772] Re: linux-lts-trusty: 3.13.0-163.213~precise1 -proposed tracker

2018-11-14 Thread Juerg Haefliger
nel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli

[Kernel-packages] [Bug 1802772] Re: linux-lts-trusty: 3.13.0-163.213~precise1 -proposed tracker

2018-11-15 Thread Juerg Haefliger
** Changed in: kernel-sru-workflow/prepare-package Status: Fix Released => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Released => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Status: Fix Released => In Progress --

[Kernel-packages] [Bug 1800649] Re: Add support to NVIDIA GPU passthrough

2018-11-02 Thread Juerg Haefliger
https://lists.ubuntu.com/archives/kernel-team/2018-October/096352.html ** Project changed: qemu-kvm => linux ** Project changed: linux => linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launch

[Kernel-packages] [Bug 1779848] Re: Cleanup Meltdown/Spectre implementation

2018-11-05 Thread Juerg Haefliger
Ran the Trusty -proposed kernel through some basic tests, looks good. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launc

[Kernel-packages] [Bug 1801893] [NEW] Xenial update: 4.4.161 upstream stable release

2018-11-06 Thread Juerg Haefliger
Juerg Haefliger (juergh) Status: New ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) ** Description changed: + SRU Justification - SRU Justification +   

[Kernel-packages] [Bug 1801893] Re: Xenial update: 4.4.161 upstream stable release

2018-11-06 Thread Juerg Haefliger
Skipped the following patches (already applied): * powerpc/fadump: Return error when fadump registration fails -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1801893 Title: Xenial update

[Kernel-packages] [Bug 1801900] [NEW] Xenial update: 4.4.162 upstream stable release

2018-11-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1801900] Re: Xenial update: 4.4.162 upstream stable release

2018-11-06 Thread Juerg Haefliger
Skipped the following patches (already applied): * Drivers: hv: utils: Invoke the poll function after handshake * Drivers: hv: util: Pass the channel information during the init call * Drivers: hv: kvp: fix IP Failover -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1786894] Re: test_265_config_retpoline in kernel_security_test failed on 3.13 Precise

2018-11-07 Thread Juerg Haefliger
I talked to the security team. There is no reason to check for CONFIG_RETPOLINE != 'y' in Precise. CONFIG_RETPOLINE should always be set to 'y', even if the toolchain doesn't support it. There are minimal mitigations that we get even without toolchain support but for that we need CONFIG_RETPOLINE e

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-07 Thread Juerg Haefliger
** Summary changed: - Add support to NVIDIA GPU passthrough + Add support for NVIDIA GPU passthrough -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1800649 Title: Add support for NVIDIA

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-11-10 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-11-12 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-13 Thread Juerg Haefliger
** Also affects: qemu (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1800649 Title: Add support for NVIDIA GPU passthrough Status in

[Kernel-packages] [Bug 1816716] [NEW] kernel net tls selftest fails on 5.0

2019-02-20 Thread Juerg Haefliger
Public bug reported: Running the kernel net tls selftests on 5.0 produces: # tools/testing/selftests/net/tls [==] Running 28 tests from 2 test cases. [ RUN ] tls.sendfile [ OK ] tls.sendfile [ RUN ] tls.send_then_sendfile [ OK ] tls.send_then_sendfile [ RUN ] tl

[Kernel-packages] [Bug 1816716] Re: kernel net tls selftest fails on 5.0

2019-02-20 Thread Juerg Haefliger
tls.recv_peek_large_buf_mult_recs is a new test that never passed (for upstream). It tests a functionality (mult-record PEEk) that hasn't been (properly) implemented yet. https://lkml.org/lkml/2018/9/18/847 ** Changed in: linux (Ubuntu Disco) Status: New => Confirmed -- You received this

[Kernel-packages] [Bug 1818237] [NEW] Xenial update: 4.4.171 upstream stable release

2019-03-01 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-03-04 Thread Juerg Haefliger
After doing some bisection I found the following commit to introduce the problem: 120645513f55a4ac5543120d9e79925d30a0156f is the first bad commit commit 120645513f55a4ac5543120d9e79925d30a0156f Author: Jarno Rajahalme Date: Fri Apr 21 16:48:06 2017 -0700 openvswitch: Add eventmask support

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-03-04 Thread Juerg Haefliger
125.361728] CR2: 0074 [ 125.362329] ---[ end trace ce5d2e276f1f9782 ]--- ** Also affects: linux (Ubuntu Disco) Importance: Undecided Assignee: Juerg Haefliger (juergh) Status: Incomplete ** Also affects: linux (Ubuntu Cosmic) Importance: Undecided Status: New -- You r

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-03-05 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1736390 *** https://bugs.launchpad.net/bugs/1736390 ** This bug has been marked a duplicate of bug 1736390 openvswitch: kernel oops destroying interfaces on i386 -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1818797] [NEW] Xenial update: 4.4.172 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1818797] Re: Xenial update: 4.4.172 upstream stable release

2019-03-06 Thread Juerg Haefliger
List of already applied patches: * xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818797 Title: Xenial

[Kernel-packages] [Bug 1818797] Re: Xenial update: 4.4.172 upstream stable release

2019-03-06 Thread Juerg Haefliger
Skipped the following patches (modifications already applied via SAUCE patches): * proc: Remove empty line in /proc/self/status -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818797 Tit

[Kernel-packages] [Bug 1818803] [NEW] Xenial update: 4.4.173 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1818806] [NEW] Xenial update: 4.4.174 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1818813] [NEW] Xenial update: 4.4.175 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1818813] Re: Xenial update: 4.4.175 upstream stable release

2019-03-06 Thread Juerg Haefliger
List of already applied patches: * KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222) * KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221) * igb: Fix an issue that PME is not enabled during runtime suspend -- You received this bug noti

[Kernel-packages] [Bug 1818815] [NEW] Xenial update: 4.4.176 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1818815] Re: Xenial update: 4.4.176 upstream stable release

2019-03-06 Thread Juerg Haefliger
List of already applied patches: * kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818815 Title: Xenial update: 4.

[Kernel-packages] [Bug 1818815] Re: Xenial update: 4.4.176 upstream stable release

2019-03-06 Thread Juerg Haefliger
Skipped the following patches (modifications already applied previously): * KVM: VMX: Fix x2apic check in vmx_msr_bitmap_mode() -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818815 Tit

[Kernel-packages] [Bug 1736390] Re: openvswitch: kernel oops destroying interfaces on i386

2019-03-11 Thread Juerg Haefliger
https://lore.kernel.org/lkml/20190305104010.6342e9b9@gollum/ ** Also affects: linux (Ubuntu Disco) Importance: High Status: In Progress ** Also affects: openvswitch (Ubuntu Disco) Importance: Undecided Status: Invalid -- You received this bug notification because you are a m

[Kernel-packages] [Bug 1736390] Re: openvswitch: kernel oops destroying interfaces on i386

2019-03-11 Thread Juerg Haefliger
** Description changed: + == SRU Justification == + + Commit 120645513f55 ("openvswitch: Add eventmask support to CT action.") + introduced a regression on i386. Simply running the following commands + in a loop will trigger a crash rather quickly: + + ovs-vsctl add-br test + ovs-vsctl del-br te

[Kernel-packages] [Bug 1816716] Re: kernel net tls selftest fails on 5.0

2019-03-11 Thread Juerg Haefliger
The commit that added the test has been reverted. ** Changed in: linux (Ubuntu Disco) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1816716 Titl

[Kernel-packages] [Bug 1804149] Re: Kernel panic, Oops: 0004 ilc:3 [#1] SMP, iscsi_q_20 iscsi_xmitworker [libiscsi]

2019-03-13 Thread Juerg Haefliger
Can you please give this test kernel a try: https://kernel.ubuntu.com/~juergh/lp1804149/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1804149 Title: Kernel panic,Oops: 0004 ilc:3 [#1]

[Kernel-packages] [Bug 1779848] Re: Cleanup Meltdown/Spectre implementation

2019-03-13 Thread Juerg Haefliger
Xenial's implementation has been update via updates to newer 4.4 upstream stable versions. ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are

[Kernel-packages] [Bug 1810806] [NEW] Bionic update: 4.4.163 upstream stable release

2019-01-07 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1810807] [NEW] Xenial update: 4.4.163 upstream stable release

2019-01-07 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from

[Kernel-packages] [Bug 1810807] Re: Xenial update: 4.4.163 upstream stable release

2019-01-08 Thread Juerg Haefliger
List of previously applied patches: * gro: Allow tunnel stacking in the case of FOU/GUE * tpm: fix: return rc when devm_add_action() fails * ixgbe: Correct X550EM_x revision check * ixgbe: fix RSS limit for X550 * ixgbevf: Fix handling of NAPI budget when multiple queues are enabled per

[Kernel-packages] [Bug 1810947] [NEW] Xenial update: 4.4.164 upstream stable release

2019-01-08 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from

[Kernel-packages] [Bug 1810947] Re: Xenial update: 4.4.164 upstream stable release

2019-01-08 Thread Juerg Haefliger
List of previously applied patches: * cdrom: fix improper type cast, which can leat to information leak. * mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * mount: Retest MNT_LOCKED in do_umount * HID: hiddev: fix potential Spectre v1 -- You received this bug notification beca

[Kernel-packages] [Bug 1810947] Re: Xenial update: 4.4.164 upstream stable release

2019-01-08 Thread Juerg Haefliger
Correction, the following patch has not been applied previously: * HID: hiddev: fix potential Spectre v1 There is an older commit with the same subject but different content, hence the confusion. -- You received this bug notification because you are a member of Kernel Packages, which is subscr

[Kernel-packages] [Bug 1810958] [NEW] Xenial update: 4.4.165 upstream stable release

2019-01-08 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1810958] Re: Xenial update: 4.4.165 upstream stable release

2019-01-08 Thread Juerg Haefliger
Skipped the following commit: * Revert "Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV" The commit that is reverted was never added to Xenial 4.4. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs

[Kernel-packages] [Bug 1810967] [NEW] Xenial update: 4.4.166 upstream stable release

2019-01-08 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1811077] [NEW] Xenial update: 4.4.167 upstream stable release

2019-01-09 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1811077] Re: Xenial update: 4.4.167 upstream stable release

2019-01-09 Thread Juerg Haefliger
Already applied patches: * mm: mlock: avoid increase mm->locked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811077 Title: Xenial

[Kernel-packages] [Bug 1811080] [NEW] Xenial update: 4.4.168 upstream stable release

2019-01-09 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1811080] Re: Xenial update: 4.4.168 upstream stable release

2019-01-09 Thread Juerg Haefliger
List of already applied patches: * posix-timers: Sanitize overrun handling * KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES * x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec * x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} * x86: Introduce __uaccess_b

[Kernel-packages] [Bug 1811252] [NEW] Xenial update: 4.4.169 upstream stable release

2019-01-10 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1764956] Re: Guests using IBRS incur a large performance penalty

2019-01-14 Thread Juerg Haefliger
The update to stable 4.4.169 will fix the majority of the issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1764956 Title: Guests using IBRS incur a large performance penalty Status

[Kernel-packages] [Bug 1811647] [NEW] Xenial update: 4.4.170 upstream stable release

2019-01-14 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from

[Kernel-packages] [Bug 1811646] [NEW] x86/kvm: Backport fixup commits

2019-01-14 Thread Juerg Haefliger
Public bug reported: == SRU Justification == The update to stable 4.4.169 contains a couple of x86/kvm related commits that have later fixup commits in upstream. == Fix == Cherry-pick or backport the relevant commits. == Regression Potential == Low. The relevant commits have been in upstream

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixup commits

2019-01-14 Thread Juerg Haefliger
** Description changed: == SRU Justification == - The update to stable 4.4.169 contains a couple of x86/kvm related + The update to stable 4.4.168 contains a couple of x86/kvm related commits that have later fixup commits in upstream. == Fix == Cherry-pick or backport the relevant

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixup commits

2019-01-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811646 Title: x86/kvm: Backport fixup comm

[Kernel-packages] [Bug 1811647] Re: Xenial update: 4.4.170 upstream stable release

2019-01-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811647 Title: Xenial update: 4.4.170 upstr

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixups and bugfixes

2019-01-14 Thread Juerg Haefliger
** Summary changed: - x86/kvm: Backport fixup commits + x86/kvm: Backport fixups and bugfixes ** Summary changed: - x86/kvm: Backport fixups and bugfixes + x86/kvm: Backport fixup and missing commits ** Description changed: == SRU Justification == The update to stable 4.4.168 contai

[Kernel-packages] [Bug 1811080] Re: Xenial update: 4.4.168 upstream stable release

2019-01-14 Thread Juerg Haefliger
The following already present commits are incomplete and need fixing: * KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD * x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec -- You received this bug notification because you are a member of Kernel Packages, which is subscribed

[Kernel-packages] [Bug 1811080] Re: Xenial update: 4.4.168 upstream stable release

2019-01-14 Thread Juerg Haefliger
The modifications from the following patches are already present (from previous SAUCE/embargoed patches): * x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest * x86/bugs, KVM: Support the combination of guest and host IBRS -- You received this bug notification because you are a member of Kern

<    1   2   3   4   5   6   7   8   9   10   >