> I see these patches in David Miller's tree. However, they have not
landed in mainline as of yet.
Yes, thank you.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1593235
Title:
ovs/gre,
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684976/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684980/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684975/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684982/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1593235/+attachment/4684979/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
Public bug reported:
Fixed upstream by this patch:
d913d3a763a6 openvswitch: fix conntrack netlink event delivery
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Incomplete
** Tags: 6wind
--
You received this bug notification because you are a member of Kernel
Packages,
> @Julien, do you mind re-testing against the -proposed version? Thanks!
He will be back on Monday the 1st August.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1491729
Title:
dkms: add
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1613787
Title:
xfrm: ipsec crash when updating spd thre
Test done on ubuntu-16.04 (Linux ubuntu1604 4.4.0-37-generic #56-Ubuntu)
and ubuntu-14.04 (Linux ubuntu1404 3.19.0-69-generic
#77~14.04.1-Ubuntu).
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of K
Public bug reported:
This is implemented in linux v4.5 by the following upstream patch:
1f211a1b929c ("net, sched: add clsact qdisc")
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f211a1b929c
The backport is straightforward.
** Affects: linux (Ubuntu)
Importanc
Public bug reported:
The following upstream fix is missing in xenial:
599b076d15ee ("i40e: fix call of ndo_dflt_bridge_getlink()")
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=599b076d15ee
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
Public bug reported:
This is implemented in linux v4.8 by the following upstream patch:
bf3994d2ed31 ("net/sched: introduce Match-all classifier")
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf3994d2ed31
The backport is straightforward. It's useful in combination wi
Public bug reported:
This upstream patch is missing (needed for all kernel between 3.9 and
4.4 (both included)):
266b495f11d6 bonding: don't use stale speed and duplex information
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=266b495f11d6
Without this patch, reported
The official sha1 (from linus tree) is:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6916fb3b10b3
$ git describe --contains 6916fb3b10b3
v4.8-rc7~35^2~11^2~2
=> Included in 4.8, thus there is nothing to do for Yakkety.
--
You received this bug notification because y
The bug has been seen by one of our client and the patch has fixed the
problem for them, but we never succeed to reproduce the problem. The
commitlog of the patch also confirms the analysis.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
It resolves our bug, thank you.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1593235
Title:
ovs/gre,vxlan, geneve: interface deletion are not notified via netlink
with linux >= 4.3
: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by: Nicolas Dichtel
Signed-off-by: David S. Miller
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634545/+subscriptions
--
Mailing list: https://launchpad.ne
CC: Maruthi Thotad
CC: Sabrina Dubroca
CC: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by: Nicolas Dichtel
Signed-off-by: David S. Miller
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634545/+subscriptions
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633404
Title:
audit: prevent a new auditd to stop an o
Public bug reported:
The following upstream patch (v4.6) has fixed this problem:
audit: stop an old auditd being starved out by a new auditd
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=133e1e5acd4a
** Affects: linux (Ubuntu)
Importance: Undecided
Statu
Fixes: 33d99113b110 ("ipv6: reallocate addrconf router for ipv6 address when lo
device up")
Reported-by: Francesco Santoro
Reported-by: Samuel Gauthier
CC: Balakumaran Kannan
CC: Maruthi Thotad
CC: Sabrina Dubroca
CC: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by:
ported-by: Francesco Santoro
Reported-by: Samuel Gauthier
CC: Balakumaran Kannan
CC: Maruthi Thotad
CC: Sabrina Dubroca
CC: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by: Nicolas Dichtel
Signed-off-by: David S. Miller
To manage notifications about this bug go
Samuel Gauthier
CC: Balakumaran Kannan
CC: Maruthi Thotad
CC: Sabrina Dubroca
CC: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by: Nicolas Dichtel
Signed-off-by: David S. Miller
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubu
> The test kernels can be downloaded from:
> Trusty: http://kernel.ubuntu.com/~jsalisbury/lp1633404/trusty
> Xenial: http://kernel.ubuntu.com/~jsalisbury/lp1633404/xenial/
>
> Can you test this kernels and see if it resolves this bug?
Xenial tests are ok.
On Trusty, dkms fails:
In file included
Public bug reported:
Fixed upstream by this commit (only in IPsec tree for now):
https://git.kernel.org/cgit/linux/kernel/git/klassert/ipsec.git/commit/?id=6916fb3b10b3cbe3b1f9f5b680675f53e4e299eb
http://patchwork.ozlabs.org/patch/654026/
To update the thresholds: 'ip xfrm policy set hthresh4 24
This kernel solves the crash.
This patch is needed for all kernel >= 3.19: vivid and wily are EoL if I'm not
wrong, thus only xenial and yakkety.
Thank you for the quick answer.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ub
What is the status of this bug?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1593235
Title:
ovs/gre,vxlan, geneve: interface deletion are not notified via netlink
with linux >= 4.3
I had problems (for now, I don't know exactly why) to test this kernel.
I'm now off for about two weeks, so I won't be able to make more tests
before.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.
reallocate addrconf router for ipv6 address when
lo device up")
Reported-by: Francesco Santoro
Reported-by: Samuel Gauthier
CC: Balakumaran Kannan
CC: Maruthi Thotad
CC: Sabrina Dubroca
CC: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by: Nicolas
ed-by: Samuel Gauthier
CC: Balakumaran Kannan
CC: Maruthi Thotad
CC: Sabrina Dubroca
CC: Hannes Frederic Sowa
CC: Weilong Chen
CC: Gao feng
Signed-off-by: Nicolas Dichtel
Signed-off-by: David S. Miller
To manage notifications about this bug go to:
https://bugs.launchpad.ne
Test is ok, thank you.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633404
Title:
audit: prevent a new auditd to stop an old auditd still alive
Status in linux package in Ubuntu:
I
Public bug reported:
The following upstream patches are needed in order to avoid failures
when binding a netlink socket:
1f734a8f892a lib/socket: randomize the generated local port
http://git.infradead.org/users/tgr/libnl.git/commitdiff/1f734a8f892a
4dd5fdd0af2c lib/socket: retry generate local
** Also affects: libnl3 (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1511735
Title:
libnl: fa
Will this patch be backported in Trusty version also?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1491729
Title:
dkms: add module build ordering for ZFS on Linux
Status in dkms packag
Public bug reported:
Here is the bug:
root@ubuntu1404:~# modprobe bonding
root@ubuntu1404:~# modprobe dummy
root@ubuntu1404:~# ip link set dummy0 master bond0
root@ubuntu1404:~# ip monitor link&
[1] 1065
root@ubuntu1404:~# ip link del bond0
Deleted 6: bond0: mtu 1500 qdisc noop state DOWN
group
Public bug reported:
[Impact]
The last merge of the v5.15 stable (see
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2003134) has
introduced a bug on netlink netfilter conntrack messages.
The problematic commit is 95fcb42e5f20 ("netfilter: ctnetlink: fix compilation
warning after data rac
** Description changed:
[Impact]
- after the last merge of the v5.15 stable (see
+ The last merge of the v5.15 stable (see
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2003134) has
introduced a bug on netlink netfilter conntrack messages.
The problematic commit is 95fcb42e5f2
Public bug reported:
[Impact]
There are cases, where deleting a VRF device can hang waiting for the refcnt to
drop to 0, with the message:
unregister_netdevice: waiting for vrf1 to become free. Usage count = 1
This is fixed upstream with commit b87b04f5019e ("ipv4: Fix device used
for dst_al
For the record, the patch has been backported in Lunar/Jammy/Focal:
https://lists.ubuntu.com/archives/kernel-team/2023-August/141562.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2024
Tests are ok.
** Tags removed: verification-needed-kinetic
** Tags added: verification-done-kinetic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2016269
Title:
conntrack mark is not a
In fact, those patches are not enough, a lot more are needed:
- ba79a32acfde ("crypto: qat - replace deprecated MSI API")
- 0e64dcd7c94b ("crypto: qat - remove unmatched CPU affinity to cluster IRQ")
- 9832fdc917de ("crypto: qat - free irqs only if allocated")
- 70fead3adb4e ("crypto: qat - fre
Test with linux-nvidia-5.19/5.19.0-1014.14 are ok.
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2016269
Public bug reported:
[Impact]
When a userland application sends packets through an IPv4 or IPv6 raw
socket, these packets don't match ipsec policies that are configured
with a protocol selector.
The problem has been fixed in linux v6.4 with commit 3632679d9e4f
("ipv{4,6}/raw: fix output xfrm loo
Tests with linux-image-unsigned-5.15.0-1033-intel-iotg are ok.
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1947164
Title:
ebpf: bpf_redirect fails with ip6 gre int
** Tags removed: verification-needed-hirsute
** Tags added: verification-done-hirsute
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1947164
Title:
ebpf: bpf_redirect fails with ip6 gre
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1947164
Title:
ebpf: bpf_redirect fails with ip6 gre i
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1947164
Title:
ebpf: bpf_redirect fails with ip6 gre i
Public bug reported:
[Impact]
When tuntap interfaces are slaves of a bonding interface, arp monitoring
is unusable.
This is fixed upstream with commit a31d27fbed5d ("tun: fix bonding
active backup with arp monitoring"). It will be included in linux v5.16.
https://git.kernel.org/pub/scm/linux/ke
** Description changed:
[Impact]
An xfrm interface cannot be changed any more since Ubuntu-hwe-5.4-5.4.0-105.
In fact, the regression has been introduced by this backport:
https://kernel.ubuntu.com/git/ubuntu/ubuntu-focal.git/commit/?id=13a02539b135
It has been fixed upstream by thi
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1968591
Title:
xfrm interface cannot be changed anymore
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1968591
Title:
xfrm interface cannot be changed anymore
This patch has been backported in the official linux stable 5.4:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.4.y&id=01a7ecd36d1e
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https:
The patch has been merged in ubuntu focal:
https://kernel.ubuntu.com/git/ubuntu/ubuntu-focal.git/commit/?id=fa748ace5184
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1951606
Title:
bon
Public bug reported:
[Impact]
An xfrm interface cannot be changed any more since Ubuntu-hwe-5.4-5.4.0-105. In
fact, the regression has been introduced by this backport:
https://kernel.ubuntu.com/git/ubuntu/ubuntu-focal.git/commit/?id=13a02539b135
It has been fixed upstream by this commit:
https
I cannot test this kernel.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988809
Title:
ip/nexthop: fix default address selection for connected nexthop
Status in linux package in Ubunt
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1935040
Title:
dev_forward_skb: do not scrub skb mark wit
** Tags removed: verification-needed-hirsute
** Tags added: verification-done-hirsute
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1935040
Title:
dev_forward_skb: do not scrub skb mark
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1935040
Title:
dev_forward_skb: do not scrub skb mark w
Public bug reported:
[Impact]
The ebpf function 'bpf_redirect' reset the mark when used with the flag
BPF_F_INGRESS.
There are two main problems with that:
- it's not consistent between legacy tunnels and ebpf;
- it's not consistent between ingress and egress.
In fact, the eBPF program can ea
Public bug reported:
[Impact]
The ipv6 sysctl entry 'disable_policy' has effect for local packets only
(while the ipv4 version is for all packets coming from the specified
interface).
This is fixed upstream with commit ccd27f05ae7b ("ipv6: fix
'disable_policy' for fwd packets").
https://git.ker
The series has been included in the ipsec tree:
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git/log/?h=22d6552f827e
It will hit linus tree soon.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://b
Public bug reported:
[Target]
Jammy kernel.
[Impact]
The PCI device cannot be initialized.
This has been fixed in linux v5.18 with the below commits:
- a9dc0d966605 ("crypto: qat - add PFVF support to the GEN4 host driver")
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Tests are ok.
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2016269
Title:
conntrack mark is not adver
Any news?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2024187
Title:
xfrm: packets sent trough a raw socket don't match ipsec policies with
proto selector
Status in linux package i
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584
Title:
cgroup: all controllers mounted when using 'cgroup_no_v1='
Status in linux package i
Public bug reported:
[Impact]
The tc ebpf bpf_redirect() function cannot be used with ipv6 gre
interface.
This is fixed upstream with commit a3fa449ffcf5 ("net: handle
ARPHRD_IP6GRE in dev_is_mac_header_xmit()"), included in linux v5.14.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/
Public bug reported:
[Impact]
When mounting a cgroup hierarchy with disabled controller in cgroup v1,
all available controllers will be attached.
For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
enabled con
** Summary changed:
- cgroup: all controller mounted when using 'cgroup_no_v1='
+ cgroup: all controllers mounted when using 'cgroup_no_v1='
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
Public bug reported:
[Impact]
Packets sent by userland apps are rejected/dropped if the source address
is not specified and the corresponding route is using a connected
nexthop object.
This bug exists since linux v5.3 and has been fixed in v5.19 by the following
upstream commits:
- 747c1430721
** Tags added: verification-done-focal verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988809
Title:
ip/nexthop: fix default address selection for connected nexth
Before the update:
++
root@ubuntu2004:~/linux# uname -a
Linux ubuntu2004 5.4.0-124-generic #140-Ubuntu SMP Thu Aug 4 02:23:37 UTC 2022
x86_64 x86_64 x86_64 GNU/Linux
root@ubuntu2004:~/linux# tools/testing/selftests/net/fib_nexthop_nongw.sh
TEST: nexthop: get route with nexthop wit
101 - 173 of 173 matches
Mail list logo