Public bug reported:
There was several problems reported upstream:
1/ 56c5ee1a5823: xfrm interface: fix memory leak on creation
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=56c5ee1a5823
2/ xfrm interface: avoid corruption on changelink
http://patchwork.ozlabs.org/patc
Public bug reported:
After backport of linux upstream commit 9ed988cd5915 ("packet: validate
variable length ll headers") (https://kernel.ubuntu.com/git/ubuntu
/ubuntu-bionic.git/commit/?id=c6026847a0a1) the following upstream patch
is missing :
https://git.kernel.org/pub/scm/linux/kernel/git/tor
** Description changed:
+ [SRU Justification]
+
+ == Impact ==
+
+ IPv6 packets may be dropped during the neighbor resolution when a
+ userspace program uses IPv6 raw sockets. The commit that introduces
+ this bug has not been identified, but it's here at least from Xenial (4.4).
+ This was fixe
** Tags removed: verification-needed-bionic verification-needed-cosmic
** Tags added: verification-done-bionic verification-done-cosmic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/180639
Public bug reported:
The upstream commit 2f3ab6221e4c ("tuntap: correctly set SOCKWQ_ASYNC_NOSPACE")
is missing.
Without this patch, userspace apps that use tuntap may be blocked.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2f3ab6221e4c
** Affects: linux (Ubun
This bug is still there, valid packets may be dropped with variable
length protocols like IP tunnels for example. Any actions expected on my
side?
** Changed in: linux (Ubuntu)
Status: Expired => New
--
You received this bug notification because you are a member of Kernel
Packages, which
root@ubuntu1604:~# dpkg --list | grep iproute2
ii iproute2 4.3.0-1ubuntu3.16.04.4
amd64networking and traffic control tools
root@ubuntu1604:~# apt-get install iproute2/xenial-proposed
Reading package lists... Done
Building dependency tree
Public bug reported:
The following linux upstream patches are missing to support vrrp with
frr:
- b58996795dc4 ("net: dev: add generic protodown handler")
- 2e8b4ba64676 ("macvlan: add ndo_change_proto_down support")
- 8f1af75df3a7 ("vxlan: add ndo_change_proto_down support")
https://git.kernel.
** Changed in: linux (Ubuntu)
Status: Expired => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1830756
Title:
tuntap: correctly set SOCKWQ_ASYNC_NOSPACE
Status in linux pack
** Changed in: linux (Ubuntu)
Status: Expired => New
** Description changed:
After backport of linux upstream commit 9ed988cd5915 ("packet: validate
variable length ll headers") (https://kernel.ubuntu.com/git/ubuntu
/ubuntu-bionic.git/commit/?id=c6026847a0a1) the following upstream p
Public bug reported:
[Impact]
When a netns is removed, it may corrupt x-netns xfrm interfaces that
have their link part in this netns. It will later trigger an oops when
those interfaces are removed.
This problem has been fixed in the upstream commit c95c5f58b35e ("xfrm
interface: fix oops when
** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1860969
Title:
ipsec interfaces: fix sending with bpf_redir
Tests are ok here.
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1834465
Title:
ipv6: fix neighbour
root@dut-vm:~# ip netns add foo
root@dut-vm:~# ip netns add bar
root@dut-vm:~# ip -n foo netns set bar 0
root@dut-vm:~# ip -n foo link add xfrmi0 link-netnsid 0 type xfrm dev lo if_id
23
root@dut-vm:~# ip -n bar link ls xfrmi0
Device "xfrmi0" does not exist.
root@dut-vm:~# ip -n foo link ls xfrmi0
Public bug reported:
[SRU Justification]
[Impact]
Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an
AF_PACKET socket are dropped (no carrier).
This has been fixed in v5.5 by the following upstream commits
- 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()")
- f04
** Description changed:
[SRU Justification]
[Impact]
Packets encapsulated into a vxlan tunnel with openvswitch don't have the
same udp source port for the first packet and the following ones of the
same TCP flow in a DOCKER scenario usecase.
In fact, when using the kernel dat
** Description changed:
[SRU Justification]
[Impact]
Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an
AF_PACKET socket are dropped (no carrier).
This has been fixed in v5.5 by the following upstream commits
- - 95224166a903 ("vti[6]: fix packet tx through bp
Public bug reported:
The following upstream patch is missing:
- 993e4c929a07 netns: fix NLM_F_ECHO mechanism for RTM_NEWNSID
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=993e4c929a07
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
** Description changed:
- The following upstream patch is missing:
+ [SRU Justification]
- - 993e4c929a07 netns: fix NLM_F_ECHO mechanism for RTM_NEWNSID
+ [Impact]
+
+ The netlink flag NLM_F_ECHO has no effect with the rtnetlink command
+ RTM_NEWNSID. This has been fixed in v5.4 by the upstre
Can I do something to help?
** Changed in: linux (Ubuntu)
Status: Expired => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1825985
Title:
macvlan: add ndo_change_proto_down
Public bug reported:
With an IPv6 raw socket, packets may be dropped during the neighbour
resolution. It is fixed upstream by these patches:
9b1c1ef13b35 ipv6: constify rt6_nexthop()
2c6b55f45d53 ipv6: fix neighbour resolution with raw socket
https://git.kernel.org/pub/scm/linux/kernel/git/davem
Tests are ok for us.
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1834465
Title:
ipv6: fix neighbour
Here are the official commits from Linus tree:
56c5ee1a5823 ("xfrm interface: fix memory leak on creation")
e9e7e85d75f3 ("xfrm interface: avoid corruption on changelink")
e0aaa332e6a9 ("xfrm interface: ifname may be wrong in logs")
c5d1030f2300 ("xfrm interface: fix list corruption for x-netns")
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1830756
Title:
tuntap: correctly set SOCKWQ_ASYNC_NOSPA
Public bug reported:
Was disabled by the following patch (linux 3.10):
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=69b34fb996b2
netfilter: xt_LOG: add net namespace support for xt_LOG
And fixed in linux 4.11:
https://git.kernel.org/pub/scm/linux/kernel/git/torval
Public bug reported:
The following upstream patch (v4.7) is missing in xenial:
450744051d20 ("vfio/pci: Hide broken INTx support from user")
http://scm/kernels/linux-upstream/commit/?id=450744051d20
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this
Public bug reported:
The following upstream patches are missing (v4.16):
6621dd29eb9b ("dev: advertise the new nsid when the netns iface changes")
c36ac8e23073 ("dev: always advertise the new nsid when the netns iface changes")
38e01b30563a ("dev: advertise the new ifindex when the netns iface ch
Hi Joseph,
we also expect to have those commits in xenial.
The test fails with the patched kernel, only IFLA_NEW_NETNSID seems
there.
With the head of the iproute2 (patches to display those attributes have
been merged this week-end):
root@ubuntu1604:~# ./iproute2/ip/ip monitor link&
[1] 859
roo
The test fails because the attribute IFLA_CARRIER_UP_COUNT and
IFLA_CARRIER_DOWN_COUNT are not declared in this kernel. In this kernel,
IFLA_NEW_IFINDEX has the numeric value of IFLA_CARRIER_UP_COUNT in an upstream
kernel (if I patch iproute2 to use IFLA_CARRIER_UP_COUNT instead of
IFLA_NEW_IFI
It works for me, thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774225
Title:
netns: unable to follow an interface that moves to another netns
Status in linux package in Ubuntu
Public bug reported:
The following command does not work:
$ ip route add 10.201.0.0/24 nexthop encap mpls 300 via 10.200.0.1 dev ntfp2
Error: "nexthop" or end of line is expected instead of "encap"
In fact, iproute2 version points to v4.3.0, but the xenial kernel is a 4.4.
$ ip -V
ip utility, ip
Public bug reported:
FRR puts its own proto numbers when inserting a route, example:
$ ip route
[snip]
2.2.2.0/24 via 3.3.3.2 dev eth2 proto 188 metric 20
iproute2 defines some protocols, but not all:
https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/tree/etc/iproute2/rt_protos
A p
** Package changed: linux (Ubuntu) => iproute2 (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to iproute2 in Ubuntu.
Matching subscriptions: iproute2
https://bugs.launchpad.net/bugs/1771764
Title:
iproute2: unable to add ip lwt m
Any news for the iproute2 part?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to iproute2 in Ubuntu.
Matching subscriptions: iproute2
https://bugs.launchpad.net/bugs/1642514
Title:
sched: Match-all classifier is missing in xenial
Status
Still in progress?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642510
Title:
sched: clsact qdisc is missing in xenial
Status in linux package in Ubuntu:
Fix Released
Status in lin
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1766573
Title:
linux < 4.11: unable to use netfilter lo
I tested the patch, it works.
Thank you.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to iproute2 in Ubuntu.
Matching subscriptions: iproute2
https://bugs.launchpad.net/bugs/1771764
Title:
iproute2: unable to add ip lwt mpls route on xe
Test is ok on my side.
Thank you for the quick fix!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1766573
Title:
linux < 4.11: unable to use netfilter logging from non-init namespaces
Well, it could be a workaround but it would be great to have it in the
4.4 if it's not too complicated for you. What do you think?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774225
Ti
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774225
Title:
netns: unable to follow an interface tha
This issue is a kernel panic ...
We reproduce it on ubuntu-18.04 with a third party software
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1812875
Title:
ip6_gre: fix tunnel list corrup
I reported this bug on behalf of a colleague. He is off this week and
will not be able to test this patch before next week.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1812875
Title:
Any news for this patch?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1806392
Title:
tun/tap: unable to manage carrier state from userland
Status in linux package in Ubuntu:
Triaged
It works on my side:
$ ./ip/ip r a 2.2.2.0/24 via 10.0.2.123 dev mgmt0 proto 188 metric 20
$ ./ip/ip r | grep 2.2.2
2.2.2.0/24 via 10.0.2.123 dev mgmt0 proto 188 metric 20
$ mkdir -p /etc/iproute2/rt_protos.d
$ echo "188 foo" > /etc/iproute2/rt_protos.d/bar.conf
$ ./ip/ip r | grep 2.2.2
2.2.2.0/
> Note that the iproute2 patch will be needed to use this filter:
>
> https://git.kernel.org/cgit/linux/kernel/git/shemminger/iproute2.git/commit/?id=d5cbf3ff0561
> (embedded headers must be updated also).
This link is dead, here is another one:
https://git.kernel.org/pub/scm/network/iproute2/ipr
Public bug reported:
This upstream patch is missing: 26d31925cd5e ("tun: implement carrier
change").
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-
next.git/commit/?id=26d31925cd5e
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug n
Tests are ok on my side, thanks.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1806392
Title:
tun/tap: unable to manage carrier state from userland
Status in linux package in Ubuntu:
Any news on this topic?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774815
Title:
Add bpftool to linux-tools-common
Status in linux package in Ubuntu:
Triaged
Status in linux sour
Public bug reported:
The following upstream patch is missing in ubuntu-18.04: ab5098fa25b9
("ip6_gre: fix tunnel list corruption for x-netns").
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ab5098fa25b9
** Affects: linux (Ubuntu)
Importance: Undecided
Public bug reported:
The following upstream patches are missing:
ba9989069f4e rtnl/do_setlink(): notify when a netdev is modified
90c325e3bfe1 rtnl/do_setlink(): last arg is now a set of flags
1889b0e7efe8 rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated
5d1180fcacc5 rtnl/do_setlink()
Public bug reported:
[Impact]
When a user dump pdp contextes, it cannot associate them with existing
gtp interfaces. Thus, the dump is unusable.
This problem has been fixed in the upstream commit b274e47d9e3f ("gtp: add
GTPA_LINK info to msg sent to userspace"):
https://git.kernel.org/pub/scm/l
Public bug reported:
[Impact]
tc ebpf program that uses BPF_FUNC_skb_change_head are rejected.
This helper exists since linux v4.10, but it cannot be used until the the
upstream commit 6f3f65d80dac ("net: bpf: Allow TC programs to call
BPF_FUNC_skb_change_head"):
https://git.kernel.org/pub/scm
With a newer kernel, the last command succeeds (not output):
root@ubuntu1804hwe:~# uname -a
Linux ubuntu1804hwe 5.9.0-rc3-ge1b81391421b+6wind-net #1 SMP Mon Sep 21
19:31:31 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
root@ubuntu1804hwe:~# tc filter add dev dummy1 egress matchall action bpf obj
./tes
I forget to explain how to check that the tc command was accepted:
root@ubuntu1804hwe:~# tc filter show dev dummy1 egress
filter protocol all pref 49152 matchall chain 0
filter protocol all pref 49152 matchall chain 0 handle 0x1
not_in_hw
action order 1: bpf test.o:[test] id 9 tag 26af
Here is an example:
root@ubuntu1804hwe:~# uname -a
Linux ubuntu1804hwe 5.4.0-47-generic #51~18.04.1-Ubuntu SMP Sat Sep 5 14:35:50
UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
root@ubuntu1804hwe:~# cat test.c
#include
#include
#ifndef __section
# define __section(NAME) __attribute__((section(NAME),
Public bug reported:
[Impact]
When the user tries to update the priority field of a SP, the SP is not
updated *AND* a new SP is created. This results to a broken IPsec
configuration.
This problem has been fixed in the upstream commit 4f47e8ab6ab7 ("xfrm: policy:
match with both mark and mask on
I don't understand which kernel should be tested on xenial. The kernel
4.15.0-112-generic does not have the bug.
** Tags removed: verification-needed-bionic verification-needed-focal
** Tags added: verification-done-bionic verification-done-focal
--
You received this bug notification because you
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1896504
Title:
tc/ebpf: unable to use BPF_FUNC_skb_change
Public bug reported:
These upstream patches are needed to correctly handle 5G, 25G and 50G
speeds in 802.3ad:
19ddde1eeca1 bonding: add 802.3ad support for 25G speeds
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19ddde1eeca1e
c7c550670afd bonding: fix 802.3ad sup
** Summary changed:
- linux > 4.2: bonding 802.3ad does not work with 5G, 25G and 50G link speeds
+ linux >= 4.2: bonding 802.3ad does not work with 5G, 25G and 50G link speeds
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubu
Sorry, I just discussed with Thibaut (he has spotted this bug), and I
forgot one backport:
3952af4d5034 bonding: add 802.3ad support for 100G speeds
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3952af4d5034
This patch has been pushed in kernel 4.5.
We only have 1
As I explain before, we can only test 100G. It means that the third
patch is needed for us to test xenial.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1697892
Title:
linux >= 4.2: bon
And you said, you had already backport it :D
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1697892
Title:
linux >= 4.2: bonding 802.3ad does not work with 5G, 25G and 50G link
speeds
Thibaut will test the xenial kernel next week. Is it ok?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1697892
Title:
linux >= 4.2: bonding 802.3ad does not work with 5G, 25G and 50G li
Thibaut confirms that the bug is resolved for 100G (xenial).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1697892
Title:
linux >= 4.2: bonding 802.3ad does not work with 5G, 25G and 50
: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by: Nicolas Dichtel
Signed-off-by: David S. Miller
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634545/+subscriptions
--
Mailing list: https://launchpad.ne
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633404
Title:
audit: prevent a new auditd to stop an o
Note that the iproute2 patch will be needed to use this filter:
https://git.kernel.org/cgit/linux/kernel/git/shemminger/iproute2.git/commit/?id=d5cbf3ff0561
(embedded headers must be updated also).
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
** Also affect
My tests are ok, thank you.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1690094
Title:
linux <3.18: netlink notification is missing when an interface is
modified
Status in linux pa
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1662096
Title:
ipv6: fix a refcnt leak with peer addr
What is the plan?
Those patches will be applied again when bug #1703401 will be fixed?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1690094
Title:
linux <3.18: netlink notification is
Public bug reported:
Here is the reproducer:
ip netns add foo
ip -n foo link add dummy1 type dummy
ip -n foo link add dummy2 type dummy
modprobe bonding
ip -n foo link add bond1 type bond
ip -n foo link set dev bond1 down
ip -n foo addr add 10.10.10.1/24 dev bond1
ip -n foo link set dev bond1 up
This bug was found on ubuntu 16.04.
I don't reproduce the bug with your Artful kernel.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1704102
Title:
bonding: stack dump when unregisteri
Public bug reported:
The following upstream patch is missing in ubuntu-14.04:
f24062b07dda ipv6: fix a refcnt leak with peer addr
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f24062b07dda
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
There is also two other patches that are needed:
- e7478dfc4656 ipv6: use addrconf_get_prefix_route() to remove peer addr
- 8e3d5be73681 ipv6: Avoid double dst_free
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e7478dfc4656f
http://git.kernel.org/cgit/linux/kernel/git
I probably miss something, but I didn't find any new 3.19 kernel in the
trusty-proposed repo:
$ apt-get install linux-generic-lts-vivid/trusty-proposed
linux-headers-generic-lts-vivid/trusty-proposed
linux-image-generic-lts-vivid/trusty-proposed
Reading package lists... Done
Building dependency
** Summary changed:
- ip6_vti is broken with a kernel 3.19 (vivid)
+ ip_vti/ip6_vti is broken with a kernel 3.19 (vivid)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1541330
Title:
ip
> I built a test kernel with a cherry-pick of those three commits. The test
> kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1541330
>
> Can you test this kernel and see if it resolves this bug?
Tests are ok with these packages.
Thank you,
Nicolas
--
You received this b
Tests are ok here.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1541313
Title:
kernel panic when um
Any news on this?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1525324
Title:
kernel/bonding: wrong netlink messages when deleting a bonding
interface
Status in linux-lts
Public bug reported:
This upstream commit is missing:
da362b09e42e umount: Do not allow unmounting rootfs.
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=da362b09e42e
The commit log of this patch explains how to reproduce the kernel panic
(see below).
Note that this pa
Public bug reported:
$ uname -a
Linux ubuntu1404es 3.19.0-39-generic #44~14.04.1-Ubuntu SMP Wed Dec 2 10:00:35
UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
The following upstream patches are missing:
d55c670cbc54 ip_vti/ip6_vti: Preserve skb->mark after rcv_cb call
049f8e2e28d9 xfrm: Override skb->ma
It's a kernel panic, so yes, I'm unable to do anything after the bug.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/15
This file is painful to get on a target with no internet access.
The exact kernel version is stated in the bug description. Even more, upstream
kernel commits and ubuntu kernel commits are listed.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug noti
** Summary changed:
- ip_vti6 is broken with a kernel 3.19 (vivid)
+ ip6_vti is broken with a kernel 3.19 (vivid)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1541330
Title:
ip6_vti i
Yes, it is for that kernel.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1541330
Title:
ip6_vti is broken with a kernel 3.19 (vivid)
Status in linux package in Ubuntu:
Triaged
Statu
It does, thank you!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1541313
Title:
kernel panic when umouting rootfs
Status in linux package in Ubuntu:
In Progress
Status in linux sour
Tests succeeded for us.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1525324
Title:
kernel/bonding:
I'm off for one week, so I won't be able to test it before Monday the
22th.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1541330
Title:
ip6_vti is broken with a kernel 3.19 (vivid)
St
I fail to use this tool. The kernel version was provided in the bug
description. This bug affects all architectures.
The patches needed to fix this issue are also public upstream patches.
What kind of information do you need?
FYI, here is the screen shot. Note that the browser was successfully
la
Here it is.
** Attachment added: "bug.apport"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1525324/+attachment/4553431/+files/bug.apport
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
Christopher, I just saw that you have removed the tag '6wind'.
I'm not sure how this field should be used, but it was useful to tag bugs
opened by our company with that tag ('6wind') to be able to find them easily.
Is there a way to found all bugs opened by someone and/or a company? For
example
Thank you for your quick answer Christopher.
In fact, the last link, only shows opened bugs.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1525324
Title:
kernel/bonding: wrong netlink
> git describe --contains 395eea6ccf2b
> v3.19-rc1~118^2~64
> So this bug should not exist in Vivid, Wily or Xenial. Can you confirm that?
Kernel >= 3.19 are ok.
> I built a Trusty test kernel with these two commits. It can be downloaded
> from:
> http://kernel.ubuntu.com/~jsalisbury/lp1525324/
Here is the list (with the dependencies):
0c7aecd4bde4 netns: add rtnl cmd to add and get peer netns ids
d37512a277df rtnl: add link netns id to interface messages
1728d4fabd1b tunnels: advertise link netns via netlink
317f4810e45e rtnl: allow to create device with IFLA_LINK_NETNSID set
bdef279b99
Public bug reported:
These upstream patches are needed:
ovs/gre,geneve: fix error path when creating an iface
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=106da663ff495e0aea3ac15b8317aa410754fcac
ovs/vxlan: fix rtnl notifications on iface deletion
http://git.kernel.org/cg
apport information
** Tags added: apport-collected
** Description changed:
These upstream patches are needed:
ovs/gre,geneve: fix error path when creating an iface
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=106da663ff495e0aea3ac15b8317aa410754fcac
ovs/vxl
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684981/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1593235
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684977/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1593235
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684978/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
1 - 100 of 173 matches
Mail list logo