Public bug reported:
[Impact]
powerpc flavor powerpc64-emb fails to build with kernel 4.4.0-196.
[Test case]
Build the kernel with all powerpc flavors.
[Potential regression]
The kernel might still not boot. Userspace data might be corrupted when kernel
writes to it. Kernel might not read users
t; Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Xenial)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1905475
Title:
Fails to build on
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1905475
Title:
Fails to build on powerpc
To manage notifications about
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1905336
Title:
sha1_ce and sha2_ce modules no longer load on arm64
To
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Focal)
Status: New => Confirmed
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu
** Description changed:
- When net_prio is used without setting ifpriomap and BFP cgroup is used,
- memory may be leaked. This was fixed by upstream commit
- 090e28b229af92dc5b40786ca673999d59e73056, but it had to be reverted to
- fix LP #1886668.
+ [Impact]
+ In some container scenarios, there wi
(Ubuntu Groovy)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux-riscv (Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux-riscv (Ubuntu Focal)
Status: New => Confirmed
** Changed
** Changed in: linux (Ubuntu Bionic)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Focal)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
** Changed in: linux (Ubuntu Bionic)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a me
valid
** Affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Bionic)
Importance: Medium
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Also affects: linux-raspi2 (Ubuntu)
Impor
: Low
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: Incomplete
** Affects: stress-ng (Ubuntu)
Importance: Low
Assignee: Colin Ian King (colin-king)
Status: New
** Also affects: stress-ng (Ubuntu)
Importance: Undecided
Status: New
** Changed
That sounds perfect for me, Colin. Glad I didn't try patching stress-ng,
cause I wouldn't consider this solution.
Thanks a lot!
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1906447
Title:
01:54:40 ERROR| [stderr]
seccomp_bpf.c:1902:TRACE_syscall.syscall_faked:Expected 45000 (45000) ==
syscall(236) (18446744073709551615)
01:54:40 ERROR| [stderr] TRACE_syscall.syscall_faked: Test failed at step #11
This fails after the fix for LP: #1895132. However, this is not a
regression. s390x
commit 4021854176a1f84d0990c51e88ddd6b2d901a7fe
Author: Bogdan Lezhepekov
Date: Wed Dec 30 19:36:15 2020 +0300
mtest06/mmap1: Limit distant mmap size
Limit the distant mmap size by a total memory value.
Signed-off-by: Bogdan Lezhepekov
Acked-by: Li Wang
This should
mmap1.c:257: TPASS: System survived.
Summary:
passed 1
failed 0
broken 0
skipped 0
warnings 0
$ head -1 /proc/meminfo
MemTotal:2032728 kB
$ uname -r
5.4.0-1048-aws
On a t2.small instance. But, hey, this is a 5.4 kernel. Will install a
4.15 kernel on this bionic instance.
--
You
OK. It fails on 4.15. The overcommit logic has changed between 5.1 and
5.2-rc1 with the following commit:
8c7829b04c523cdc732cb77f59f03320e09f3386 ("mm: fix false-positive
OVERCOMMIT_GUESS failures").
Compared to the new logic, the old one is overly complicated, and not
easy to account on the tes
https://lists.linux.it/pipermail/ltp/2021-May/022765.html
It was tested to work after that change.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854722
Title:
mtest06 from mm in ubuntu_
So, s390x ptrace does allow to set the syscall and return code as long
as it sets the return code at exit time.
However, when using seccomp SECCOMP_RET_TRACE, there is no possibility
to change it at exit time (by doing a ptrace after SECCOMP_RET_TRACE
stops the process). It only happens at entry t
Marking the linux-aws task as invalid because this is not a bug in the
kernel, but the test. Though we could consider backporting the
overcommit change, that should be on a different bug.
Cascardo.
** Changed in: linux-aws (Ubuntu)
Status: New => Invalid
** Changed in: ubuntu-kernel-tests
** Summary changed:
- seccomp_bpf from ubuntu_kernel_selftests.seccomp in linux ADT test failure
with linux/4.15.0-144.148
+ seccomp_bpf:syscall_faked from kselftests fail on s390x
** Description changed:
- This is a scripted bug report about ADT failures while running linux
- tests for linux/4
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubu
The problem on 4.15 kernels is due to the backport of:
5028027844cf bpf: test_maps, only support ESTABLISHED socks
that only touches the test, without the respective fixes in the kernel.
Here is the list of Fixes for 1aa12bdf1bfb ("bpf: sockmap, add sock
close() hook to remove socks"):
50280278
So, while looking further, I found out that 1aa12bdf1bfb ("bpf: sockmap,
add sock close() hook to remove socks") is not even present on our 4.15
kernels. Not sure why the two commits were backported. The tcp,ulp one
seems fine to keep.
Even 952fad8e3239 ("bpf: fix sock_map_alloc() error path") is
** Description changed:
+ [Impact]
+ test_maps bpf selftests is failing on bionic.
Hi, vcarceler.
Can you give complete dmesg from when this happens?
Thanks for you report.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931001
Title:
kernel: watchdog: BUG: soft lockup
) => Thadeu Lima de Souza Cascardo (cascardo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892165
Title:
futex_wake04 from ubuntu_ltp_syscalls failed on X i386
To manage notifications about
This is looking more like a test issue on 32-bit, so no need to
blacklist it on xenial, as we get the test fixed. :-)
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892165
Title:
futex_wa
https://lists.linux.it/pipermail/ltp/2021-June/023076.html
** Changed in: linux (Ubuntu Bionic)
Status: New => Invalid
** Changed in: linux (Ubuntu Xenial)
Status: Won't Fix => Invalid
** Changed in: ubuntu-kernel-tests
Assignee: (unassigned) => Thadeu Lima de
** Summary changed:
- placeholder bug
+ UAF on CAN BCM bcm_rx_handler
** Description changed:
- This reports a bug.
+ [Impact]
+ bcm_rx_handler may run concurrently to can_rx_unregister on bcm_release,
which will, then, free the bcm_op that is used by bcm_rx_handler, leading to a
system crash.
** Summary changed:
- placeholder bug
+ UAF on CAN J1939 j1939_can_recv
** Description changed:
- Another bug.
+ [Impact]
+ j1939_can_recv may run concurrently to can_rx_unregister on
j1939_netdev_stop, which will, then, free the priv struct that is used by
j1939_can_recv, leading to a system
** Changed in: oss4 (Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: oss4 (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in: oss4 (Ubuntu Focal)
Status: Confirmed => In Progress
--
You received this bug not
get_seconds() is gone, as it returns a 32-bit, which will wrap either
around 2038 or 2106. It is only used on Linux port of oss4 to determine
whether a "license" is good. Just conditioning the definition of that to
the macro LICENSED_VERSION should be good enough to let it build again.
If anyone ca
** Patch added: "focal fix"
https://bugs.launchpad.net/ubuntu/+source/oss4/+bug/1932168/+attachment/5506476/+files/oss4_4.2-build2010-5ubuntu6~20.04.3.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
** Description changed:
- This is a scripted bug report about ADT failures while running oss4
- tests for linux-hwe-5.11/5.11.0-20.21~20.04.1 on focal. Whether this is
- caused by the dep8 tests of the tested source or the kernel has yet to
- be determined.
+ [Impact]
+ oss4 dkms will fail to buil
** Attachment added: "failed build log"
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1932163/+attachment/5506487/+files/make.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1932163
Title:
)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Bionic)
Importance: High
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: linux
Backport of mainline commit d7a5091351756d0ae8e63134313c455624e36a13
("bpf: Update selftests to reflect new error states") is needed. The
v4.14.y version, bb53b0a9798abf96a7a43ba0701d37b1ab038e58, should apply
cleanly. Kamal has a working backport that reduces the number of
failures from 23 to 2.
Doing a full backport, as this was done before, and DRM changes are not
trivial to backport.
** Changed in: evdi (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in: evdi (Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in
** Description changed:
+ [Impact]
+ focal users running latest hwe kernel, version 5.11, won't be able to use
evdi-dkms.
+
+ [Test case]
+ Built evdi dkms and loaded the evdi module on 5.4, 5.8 and 5.11 kernels.
+
+ [Potential regression]
+ DisplayLink devices will stop working.
+
+
+ --
(Ubuntu Bionic)
Importance: Undecided
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: linux (Ubuntu Focal)
Importance: Undecided
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Also affects: linu
Well, having a newer version in focal is less than ideal. I will prepare
a quick backport and test it on hirsute. Should I do the same for
groovy?
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
Here is a debdiff against the version in hirsute. It builds fine against
5.11.0-22-generic, and loads.
Cascardo.
** Patch added: "debdiff against version in hirsute"
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1932163/+attachment/5508488/+files/evdi_1.9.1-1ubuntu3~21.04.1.debdiff
--
linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
--
You received this bug notification because you are a me
So, test_bpf is not doing either conversion and any other use on the
kernel should either be using something like sk_attach*,
bpf_prog_create*, or just using a fd that was created from
BPF_PROG_LOAD. Any user that accepts BPF programs without those checks
are up to cause issues worse than a simple
: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Bionic)
Importance: Low
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
commit 1b6cd67191e16a66f69c9881d878204c3143f03f ("netfilter: x_tables:
use pr ratelimiting in xt core") should be backported.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935837
Title:
x_tables er
https://lists.linux.it/pipermail/ltp/2021-April/022089.html
https://lists.linux.it/pipermail/ltp/2021-April/022123.html
This has been identified on LTP upstream, but notice that we are still
seeing this.
When I test it on groovy, I see:
$ df -P -B 1k /mnt | tail -n1 | awk '{print $2}'
11388
$
W
Journal size is counted as overhead and it's at least 1024 blocks, which
is 4096 "1k" blocks for a filesystem with default blocksize of 4KiB. For
a 16000 filesystem, this is already 20%.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
A patch we carry on e2fsprogs changes the default blocksize for small
filesystems. That is what breaks the test. We should probably add the
block size when creating these filesystems under LTP.
Description: Use 4k blocksize in all ext4 mke2fs.conf such that lvm migration
between non-4k PVs and 4
https://lists.linux.it/pipermail/ltp/2021-May/022536.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853610
Title:
mkfs01_ext3_sh / mkfs01_ext4_sh / nm01_sh from commands test in
ubuntu_ltp fa
** Summary changed:
- Race between two functions
+ Race between isotp_bind and isotp_setsockopt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927409
Title:
Race between isotp_bind and isotp_setsoc
Upstream commit 6185266c5a853bb0f2a459e3ff594546f277609b
("selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in
test_verifier") would likely fix this and has been applied to 5.4, 5.8
and 5.11.
5.11 was already released with it.
Ubuntu-5.4.0-73.82, from the cycle that has just ended, sho
http://10.246.72.47/5.4.0-1047.49-aws/focal-linux-aws-aws-arm64-5.4.0-a1
.2xlarge-
ubuntu_bpf/ubuntu_bpf/results/ubuntu_bpf.test_verifier/debug/ubuntu_bpf.test_verifier.DEBUG.html
28. 04/29 20:24:36 DEBUG| utils:0153| [stdout] #13/p valid read map access
into a read-only array 2 FAIL retval 6
** Changed in: linux-oem-5.6 (Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux-oem-5.6 (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in: linux-oem-5.6 (Ubuntu Focal)
Status: New => In Progress
--
You rece
It looks like all necessary commits for CVE-2020-29373 are there on the
5.6 kernel.
I am investigating if this is caused by missing commit
dd821e0c95a64b5923a0c57f07d3f7563553e756 ("io_uring: fix missing
msg_name assignment").
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-2937
https://lists.ubuntu.com/archives/kernel-team/2021-May/120236.html
Sent fix to mailing list.
** Description changed:
- io_uring02 from ubuntu_ltp_syscalls fails on F/oem-5.6 5.6.0-1056.60 on
- host spitfire
+ [Impact]
+ When using async io_uring OP_SENDMSG, a copy to kernel address 0 might be
a
Public bug reported:
Whenever I upgrade systemd on my groovy system, my gnome session is
terminated.
This is very annoying, as everything that was running on that session is
terminated.
NetworkManager also stops running.
** Affects: systemd (Ubuntu)
Importance: Undecided
Status: N
)
Importance: Undecided
Status: Invalid
** Affects: linux-raspi2-5.3 (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Xenial)
Importance: Critical
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924611
Title:
setting extended attribute may cause memory leak
To
$ uname -a
Linux bionic 5.3.0-74-generic #70-Ubuntu SMP Fri Apr 16 08:44:31 UTC 2021
x86_64 x86_64 x86_64 GNU/Linux
$ ./leak.sh
$ echo $?
0
$
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924611
Tit
$ uname -a
Linux focal 5.6.0-1055-oem #59-Ubuntu SMP Fri Apr 16 08:43:28 UTC 2021 x86_64
x86_64 x86_64 GNU/Linux
$ ./leak.sh
$ echo $?
0
$
** Changed in: linux-hwe (Ubuntu)
Status: New => Invalid
** Tags added: verification-done-focal
--
You received this bug notification because you
$ uname -a
Linux bionic 5.3.0-1043-gke #46-Ubuntu SMP Fri Apr 16 09:14:49 UTC 2021 x86_64
x86_64 x86_64 GNU/Linux
$ ./leak.sh
$ echo $?
0
$
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924611
Title
Hey, Dan.
Thanks for looking into this. I am attaching a journal log from the time
I got the failure.
Cascardo.
** Attachment added: "journalctl output"
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1923618/+attachment/5490397/+files/systemd_upgrade.log
--
You received this bug no
This was the upgrade in question.
Aptitude 0.8.12: log report
Tue, Apr 13 2021 10:34:25 -0300
IMPORTANT: this log only lists intended actions; actions which fail
due to dpkg problems may not be completed.
Will install 16 packages, and remove 0 packages.
7168 B of disk space will be used
4.15.0-150-generic
Summary: 802 PASSED, 0 FAILED
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1933385
Title:
se
changes.
[Regression Potential]
We could break changelogs, or the kernel preparation altogether.
** Affects: linux (Ubuntu)
Importance: Low
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: linux (Ubuntu Xenial)
Importance: Low
** Summary changed:
- linux 5.8.0-9-generic (all 5.8 kernels) fail to boot in qemu
+ linux-riscv 5.8.0-9-generic (all 5.8 kernels) fail to boot in qemu
** Description changed:
- 5.8.0-9.11 and other v5.8 kernels all fail to boot in qemu with opensbi
- and qemu.
+ [Impact]
+ linux-riscv won't boo
** Also affects: linux-riscv (Ubuntu Groovy)
Importance: Undecided
Status: New
** Changed in: linux-riscv (Ubuntu Groovy)
Status: New => Fix Committed
** Changed in: linux-riscv (Ubuntu Groovy)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** C
)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Description changed:
+ [Impact]
+ When running kvm-unit-tests under a guest, i
Running the attached program on 4.15.0-128-generic, memory use builds
up. This does not happen with 4.15.0-129-generic. Marking as
verification-done-bionic.
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a
Same thing on focal, when running attached test program. Memory leak
observed when running 5.4.0-58, not seen anymore with 5.4.0-59.
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, wh
.
[Regression potential]
errinjct could still be broken, or other RTAS operations could break, which
could even prevent booting on any IBM POWER systems.
** Affects: linux (Ubuntu)
Importance: Low
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: Confirmed
** Affects: linux
** Description changed:
[Impact]
errinjct open fails on IBM POWER LPAR. That prevents error injection tests to
be performed.
[Test case]
Run errinjct open on an LPAR.
Success case:
$ sudo errinjct open
RTAS error injection facility open, token = 1
Failure case:
+ $ sudo errinjc
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Bionic)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Focal)
Status: Confirmed => In Progr
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1760585
Title:
Bionic update to 4.15.15 stable release
To manage not
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-workflow
Imp
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-master-bug:
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-master-bug:
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1760675
Title:
linux: -proposed tracker
To manage notifications about this bu
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-master-bug:
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-workflow
Imp
: Medium
Assignee: Canonical Kernel Team (canonical-kernel-team)
Status: New
** Affects: kernel-sru-workflow/prepare-package
Importance: Medium
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: kernel-sru-workflow/prepare-package-meta
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-master-bug:
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-master-bug:
-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team (canonical-kernel-team) => Thadeu Lima de
Souza Cascardo (cascardo)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-maste
** Changed in: linux (Ubuntu Bionic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1760585
Title:
Bionic update to 4.15.15 stable release
To manage notifications
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: Incomplete
** Also affects: zfs-linux (Ubuntu Bionic)
Importance: Medium
Assignee: Colin Ian King (colin-king)
Status: Fix Released
** Changed in: linux (Ubuntu Bionic)
Status: Incomplete => Fix C
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: laptop-mode-tools (Ubuntu Bionic)
Importance: Undecided
Status: Confirmed
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: systemd (Ubuntu Bio
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team (canonical-kernel-team) => Thadeu Lima de
Souza Cascardo (cascardo)
** Changed in: kernel-sru-workflow/p
** Summary changed:
- linux-raspi2: -proposed tracker
+ linux-raspi2: 4.15.0-1006.7 -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1760679
Title:
linux-raspi2: 4.15.0-1006.7 -prop
7.3.0-13ubuntu1cross1 still fails.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1759369
Title:
kernel build fails on arm64
To manage notifications about this bug go to:
https://bugs.launchpad.net/
*** This bug is a duplicate of bug 1761184 ***
https://bugs.launchpad.net/bugs/1761184
** This bug has been marked a duplicate of bug 1761184
linux-hwe-edge: -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-signed
Assignee: Canonical Kernel Team (canonical-kernel-team) => Thadeu Lima de
Souza Cascardo (cascardo)
** Changed in: kernel-sru-wo
There is a package on ppa:cascardo/ppa that should fix the problem. Can
you test it and report back?
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1746088
Title:
[Ubuntu 16.04.4] Unable t
There is a package on ppa:cascardo/ppa that should fix the problem. Can
you test it and report back?
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1765660
Title:
Ubuntu 18.04 [ briggs ]:
By the way, on 4.19, this is now only readable by root. So, now returns
EACCESS when user tries to read it.
$ cat /proc/self/stack
cat: /proc/self/stack: Permission denied
f8a00cef17206ecd1b30d3d9f99e10d9fa707aa7 proc: restrict kernel stack
dumps to root
** Also affects: linux (Ubuntu)
Import
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Kleber Sacilotto de Souza (kleber-souza) => Thadeu Lima de Souza
Cascardo (cascardo)
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Kleber Sacilotto de Souza (kleber-souza) => Thadeu Lima de Souza
Ca
** Summary changed:
- linux-aws-edge: 4.18.0-1006.7~18.04.1 -proposed tracker
+ linux-aws-edge: 4.18.0-1006.7~18.04.2 -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1805606
Title:
1 - 100 of 2328 matches
Mail list logo