[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-03-14 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-83.127

---
linux (3.13.0-83.127) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1555839

  [ Florian Westphal ]

  * SAUCE: [nf,v2] netfilter: x_tables: don't rely on well-behaving
userspace
- LP: #1555338

linux (3.13.0-82.126) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1554732

  [ Upstream Kernel Changes ]

  * Revert "drm/radeon: call hpd_irq_event on resume"
- LP: #1554608
  * net: generic dev_disable_lro() stacked device handling
- LP: #1547680

linux (3.13.0-81.125) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1552316

  [ Upstream Kernel Changes ]

  * Revert "firmware: dmi_scan: Fix UUID endianness for SMBIOS >= 2.6"
- LP: #1551419
  * bcache: Fix a lockdep splat in an error path
- LP: #1551327

linux (3.13.0-80.124) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1548519

  [ Andy Whitcroft ]

  * [Debian] hv: hv_set_ifconfig -- convert to python3
- LP: #1506521
  * [Debian] hv: hv_set_ifconfig -- switch to approved indentation
- LP: #1540586
  * [Debian] hv: hv_set_ifconfig -- fix numerous parameter handling issues
- LP: #1540586

  [ Dan Streetman ]

  * SAUCE: nbd: ratelimit error msgs after socket close
- LP: #1505564

  [ Upstream Kernel Changes ]

  * Revert "workqueue: make sure delayed work run in local cpu"
- LP: #1546320
  * [media] gspca: ov534/topro: prevent a division by 0
- LP: #1542497
  * [media] media: dvb-core: Don't force CAN_INVERSION_AUTO in oneshot mode
- LP: #1542497
  * tools lib traceevent: Fix output of %llu for 64 bit values read on 32
bit machines
- LP: #1542497
  * KVM: x86: correctly print #AC in traces
- LP: #1542497
  * drm/radeon: call hpd_irq_event on resume
- LP: #1542497
  * xhci: refuse loading if nousb is used
- LP: #1542497
  * arm64: Clear out any singlestep state on a ptrace detach operation
- LP: #1542497
  * time: Avoid signed overflow in timekeeping_get_ns()
- LP: #1542497
  * rtlwifi: fix memory leak for USB device
- LP: #1542497
  * wlcore/wl12xx: spi: fix oops on firmware load
- LP: #1542497
  * EDAC, mc_sysfs: Fix freeing bus' name
- LP: #1542497
  * EDAC: Don't try to cancel workqueue when it's never setup
- LP: #1542497
  * EDAC: Robustify workqueues destruction
- LP: #1542497
  * powerpc: Make value-returning atomics fully ordered
- LP: #1542497
  * powerpc: Make {cmp}xchg* and their atomic_ versions fully ordered
- LP: #1542497
  * dm space map metadata: remove unused variable in brb_pop()
- LP: #1542497
  * dm thin: fix race condition when destroying thin pool workqueue
- LP: #1542497
  * futex: Drop refcount if requeue_pi() acquired the rtmutex
- LP: #1542497
  * drm/radeon: clean up fujitsu quirks
- LP: #1542497
  * mmc: sdio: Fix invalid vdd in voltage switch power cycle
- LP: #1542497
  * mmc: sdhci: Fix sdhci_runtime_pm_bus_on/off()
- LP: #1542497
  * udf: limit the maximum number of indirect extents in a row
- LP: #1542497
  * nfs: Fix race in __update_open_stateid()
- LP: #1542497
  * USB: cp210x: add ID for ELV Marble Sound Board 1
- LP: #1542497
  * NFSv4: Don't perform cached access checks before we've OPENed the file
- LP: #1542497
  * NFS: Fix attribute cache revalidation
- LP: #1542497
  * posix-clock: Fix return code on the poll method's error path
- LP: #1542497
  * rtlwifi: rtl8192de: Fix incorrect module parameter descriptions
- LP: #1542497
  * rtlwifi: rtl8192se: Fix module parameter initialization
- LP: #1542497
  * rtlwifi: rtl8192ce: Fix handling of module parameters
- LP: #1542497
  * rtlwifi: rtl8192cu: Add missing parameter setup
- LP: #1542497
  * bcache: fix a livelock when we cause a huge number of cache misses
- LP: #1542497
  * bcache: Add a cond_resched() call to gc
- LP: #1542497
  * bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing
device
- LP: #1542497
  * bcache: fix a leak in bch_cached_dev_run()
- LP: #1542497
  * bcache: unregister reboot notifier if bcache fails to unregister device
- LP: #1542497
  * bcache: add mutex lock for bch_is_open
- LP: #1542497
  * bcache: allows use of register in udev to avoid "device_busy" error.
- LP: #1542497
  * bcache: Change refill_dirty() to always scan entire disk if necessary
- LP: #1542497
  * wlcore/wl12xx: spi: fix NULL pointer dereference (Oops)
- LP: #1542497
  * Input: i8042 - add Fujitsu Lifebook U745 to the nomux list
- LP: #1542497
  * libxfs: pack the agfl header structure so XFS_AGFL_SIZE is correct
- LP: #1542497
  * x86/xen: don't reset vcpu_info on a cancelled suspend
- LP: #1542497
  * udf: Prevent buffer overrun with multi-byte characters
- LP: #1542497
  * udf: Check output buffer length when converting name to CS0
- LP: #1542497
 

[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-03-14 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.2.0-34.39

---
linux (4.2.0-34.39) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1555821

  [ Florian Westphal ]

  * SAUCE: [nf] netfilter: x_tables: check for size overflow
- LP: #1555353
  * SAUCE: [nf,v2] netfilter: x_tables: don't rely on well-behaving
userspace
- LP: #1555338

linux (4.2.0-33.38) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1554649

  [ Upstream Kernel Changes ]

  * Revert "drm/radeon: call hpd_irq_event on resume"
- LP: #1554608
  * cxl: Fix PSL timebase synchronization detection
- LP: #1532914

linux (4.2.0-32.37) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1550045

  [ Kamal Mostafa ]

  * Merged back Ubuntu-4.2.0-31.36

linux (4.2.0-31.36) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1548579

  [ Andy Whitcroft ]

  * [Debian] hv: hv_set_ifconfig -- convert to python3
- LP: #1506521
  * [Debian] hv: hv_set_ifconfig -- switch to approved indentation
- LP: #1540586
  * [Debian] hv: hv_set_ifconfig -- fix numerous parameter handling issues
- LP: #1540586

  [ Carol L Soto ]

  * SAUCE: IB/IPoIB: Do not set skb truesize since using one linearskb
- LP: #1541326

  [ Dan Streetman ]

  * SAUCE: nbd: ratelimit error msgs after socket close
- LP: #1505564

  [ Tim Gardner ]

  * Revert "SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover
failure"
- LP: #1541635
  * Revert "SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port
1"
- LP: #1541635
  * [Config] ARMV8_DEPRECATED=y
- LP: #1545542

  [ Upstream Kernel Changes ]

  * x86/xen/p2m: hint at the last populated P2M entry
- LP: #1542941
  * mm: add dma_pool_zalloc() call to DMA API
- LP: #1543737
  * sctp: Prevent soft lockup when sctp_accept() is called during a timeout
event
- LP: #1543737
  * xen-netback: respect user provided max_queues
- LP: #1543737
  * xen-netfront: respect user provided max_queues
- LP: #1543737
  * xen-netfront: update num_queues to real created
- LP: #1543737
  * iio: adis_buffer: Fix out-of-bounds memory access
- LP: #1543737
  * KVM: PPC: Fix emulation of H_SET_DABR/X on POWER8
- LP: #1543737
  * KVM: PPC: Fix ONE_REG AltiVec support
- LP: #1543737
  * x86/irq: Call chip->irq_set_affinity in proper context
- LP: #1543737
  * drm/amdgpu: fix tonga smu resume
- LP: #1543737
  * perf kvm record/report: 'unprocessable sample' error while
recording/reporting guest data
- LP: #1543737
  * hrtimer: Handle remaining time proper for TIME_LOW_RES
- LP: #1543737
  * timerfd: Handle relative timers with CONFIG_TIME_LOW_RES proper
- LP: #1543737
  * posix-timers: Handle relative timers with CONFIG_TIME_LOW_RES proper
- LP: #1543737
  * itimers: Handle relative timers with CONFIG_TIME_LOW_RES proper
- LP: #1543737
  * drm/amdgpu: Use drm_calloc_large for VM page_tables array
- LP: #1543737
  * drm/amdgpu: fix amdgpu_bo_pin_restricted VRAM placing v2
- LP: #1543737
  * drm/radeon: properly byte swap vce firmware setup
- LP: #1543737
  * ACPI: Revert "ACPI / video: Add Dell Inspiron 5737 to the blacklist"
- LP: #1543737
  * ACPI / PCI / hotplug: unlock in error path in acpiphp_enable_slot()
- LP: #1543737
  * hwmon: (dell-smm) Blacklist Dell Studio XPS 8000
- LP: #1543737
  * usb: cdc-acm: handle unlinked urb in acm read callback
- LP: #1543737
  * usb: cdc-acm: send zero packet for intel 7260 modem
- LP: #1543737
  * cdc-acm:exclude Samsung phone 04e8:685d
- LP: #1543737
  * usb: hub: do not clear BOS field during reset device
- LP: #1543737
  * USB: cp210x: add ID for IAI USB to RS485 adaptor
- LP: #1543737
  * USB: visor: fix null-deref at probe
- LP: #1543737
  * USB: serial: visor: fix crash on detecting device without write_urbs
- LP: #1543737
  * USB: serial: option: Adding support for Telit LE922
- LP: #1543737
  * ALSA: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup()
- LP: #1543737
  * ALSA: seq: Degrade the error message for too many opens
- LP: #1543737
  * USB: serial: ftdi_sio: add support for Yaesu SCU-18 cable
- LP: #1543737
  * arm64: kernel: fix architected PMU registers unconditional access
- LP: #1543737
  * USB: option: fix Cinterion AHxx enumeration
- LP: #1543737
  * ALSA: compress: Disable GET_CODEC_CAPS ioctl for some architectures
- LP: #1543737
  * ALSA: usb-audio: Fix TEAC UD-501/UD-503/NT-503 usb delay
- LP: #1543737
  * virtio_pci: fix use after free on release
- LP: #1543737
  * ALSA: bebob: Use a signed return type for get_formation_index
- LP: #1543737
  * arm64: errata: Add -mpc-relative-literal-loads to build flags
- LP: #1533009, #1543737
  * arm64: mm: avoid calling apply_to_page_range on empty range
- LP: #1543737
  * x86/mm: Fix types used in pgprot cacheability

[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-03-03 Thread Chris Valean
** Tags removed: verification-needed-trusty verification-needed-wily
** Tags added: verification-done-trusty verification-done-wily

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Released

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-03-03 Thread Adrian Suhov
Hi!
I tested this issue on Trusty with 3.13.0-81-generic kernel and it is solved, 
ip injection works as expected.
It also works as expected on Wily with 4.2.0-32-generic kernel.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Released

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-25 Thread Brad Figg
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-trusty

** Tags added: verification-needed-wily

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Released

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-25 Thread Brad Figg
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Released

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-7.22

---
linux (4.4.0-7.22) xenial; urgency=low

  [ Tim Gardner ]

  * Release Tracking Bug
- LP: #1547205

  * need arm64 acpi parking protocol support in xenial (LP: #1547047)
- [Config] Enabled ARM64_ACPI_PARKING_PROTOCOL
- arm64: kernel: implement ACPI parking protocol

  * Please pull cgroup namespaces (LP: #1546775)
- SAUCE: (noup) kernfs: Add API to generate relative kernfs path
- SAUCE: (noup) sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- SAUCE: (noup) cgroup: introduce cgroup namespaces
- SAUCE: (noup) cgroup: cgroup namespace setns support
- SAUCE: (noup) kernfs: define kernfs_node_dentry
- SAUCE: (noup) cgroup: mount cgroupns-root when inside non-init cgroupns
- SAUCE: (noup) Add FS_USERNS_FLAG to cgroup fs
- SAUCE: (noup) cgroup: Add documentation for cgroup namespaces

  * [Feature]Pulse-Width Modulation enabling on Broxton-P (LP: #1520436)
- [Config] CONFIG_PWM_OMAP_DMTIMER=m
- pwm: lpss: Remove ->free() callback
- pwm: bcm2835: Calculate scaler in ->config()
- pwm: bcm2835: Prevent division by zero
- pwm: bcm2835: Fix email address specification
- pwm: lpss: Update PWM setting for Broxton
- pwm: lpss: Select core part automatically
- pwm: lpss: Rework the sequence of programming PWM_SW_UPDATE
- pwm: fsl-ftm: Fix clock enable/disable when using PM
- pwm: lpc32xx: correct number of PWM channels from 2 to 1
- pwm: lpc32xx: make device usable with common clock framework
- pwm: lpc32xx: fix and simplify duty cycle and period calculations
- pwm: lpc32xx: return ERANGE, if requested period is not supported
- pwm: rcar: Improve accuracy of frequency division setting
- pwm: Add PWM driver for OMAP using dual-mode timers
- pwm: add HAS_IOMEM dependency to PWM_FSL_FTM
- pwm: omap-dmtimer: Potential NULL dereference on error
- pwm: Mark all devices as "might sleep"

  * [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection 
(LP: #1540586)
- [Debian] hv: hv_set_ifconfig -- switch to approved indentation
- [Debian] hv: hv_set_ifconfig -- fix numerous parameter handling issues

  * Update megaraid driver to MR6.10 (LP: #1544679)
- megaraid_sas: Do not allow PCI access during OCR
- megaraid_sas: MFI IO timeout handling
- megaraid_sas: Syncing request flags macro names with firmware
- megaraid_sas: Task management support
- megaraid_sas: Update device queue depth based on interface type
- megaraid_sas: Fastpath region lock bypass
- megaraid_sas: Reply Descriptor Post Queue (RDPQ) support
- megaraid_sas: Code optimization build_and_issue_cmd return-type
- megaraid_sas: Dual queue depth support
- megaraid_sas: IO throttling support
- megaraid_sas: Make adprecovery variable atomic
- megaraid_sas: MFI adapter OCR changes
- megaraid_sas: Introduce module parameter for SCSI command timeout
- megaraid_sas: SPERC OCR changes
- megaraid_sas: driver version upgrade
- megaraid: fix null pointer check in megasas_detach_one().
- megaraid_sas: Fix for IO failing post OCR in SRIOV environment
- megaraid_sas: Fix SMAP issue
- megaraid_sas: Add an i/o barrier

  * Surelock-GA2:kernel panic @ cxl_configure_adapter+0x418/0x8b0 (LP: #1546145)
- powerpc/powernv: Fix stale PE primary bus

  * In A Single Power VM LPAR : Network Configuration Fails in Ubuntu16.04 
while installation (LP: #1544321)
- [Config] Update bnx2x d-i firmware to 7.12.30

  * Miscellaneous Ubuntu changes
- rebase to v4.4.2

  * Miscellaneous upstream changes
- openvswitch: allow management from inside user namespaces
- net: thunderx: nicvf_queues: nivc_*_intr: remove duplication
- net, thunderx: Remove unnecessary rcv buffer start address management
- net: thunderx: HW TSO support for pass-2 hardware
- net: thunderx: Enable CQE count threshold interrupt
- net: cavium: liquidio: use helpers ns_to_timespec64()
- irqchip/gic-v3: Make sure read from ICC_IAR1_EL1 is visible on 
redestributor
- arm64: KVM: Configure TCR_EL2.PS at runtime
- arm64: prefetch: don't provide spin_lock_prefetch with LSE
- arm64: prefetch: add alternative pattern for CPUs without a prefetcher
- arm64: lib: improve copy_page to deal with 128 bytes at a time
- arm64: lib: patch in prfm for copy_page if requested
- arm64: prefetch: add missing #include for spin_lock_prefetch
- net, thunderx: Add TX timeout and RX buffer alloc failure stats.
- net: thunderx: Use napi_schedule_irqoff()
- net: thunderx: Assign affinity hints to vf's interrupts
- net: thunderx: bgx: Use standard firmware node infrastructure.
- net: thunderx: bgx: Add log message when setting mac address
- net: thunderx: Alloc higher order pages when pagesize is small
- net: cavium: liquidio: Return correct error code
- net: cavium: liquidio: f

[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-22 Thread Brad Figg
** Changed in: linux (Ubuntu Wily)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-22 Thread Brad Figg
** Changed in: linux (Ubuntu Trusty)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  In Progress
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-17 Thread Andy Whitcroft
Note that this bug was spawned out of Bug #1506521 and the fix for this
should be released with that.

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Trusty)
   Status: New => In Progress

** Changed in: linux (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Trusty)
 Assignee: (unassigned) => Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Wily)
 Assignee: (unassigned) => Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Xenial)
   Importance: Medium => High

** Changed in: linux (Ubuntu Wily)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Xenial)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Wily:
  In Progress
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-09 Thread Chris Valean
This version looks good, all 3 values - ipaddr, netmask and gateway are showing 
up as parsed from the host.
Verified it on Trusty and Vivid.
Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Wily:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-09 Thread Chris Valean
Typo correction:  Verified it on Trusty and Wily (not Vivid).

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Wily:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-09 Thread Andy Whitcroft
@Chris -- ok this script is basic broken in just about every possible
way.  I am attaching a majorly reworked version which attempts to fix
this mess up.  Could you test this one and let me know how you fair with
it.

** Attachment added: "hv_set_ifconfig"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+attachment/4567716/+files/hv_set_ifconfig

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Wily:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-09 Thread Andy Whitcroft
@Chris  -- it appears that the format of the intermediate file is
somewhat inconsistent, IPADDR and NETMASK have suffixes for 0, but
GATEWAY does not.  As we handle these consistently we are clearly
broken.  I will review all of these relative to the spec.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Wily:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-09 Thread Andy Whitcroft
We need to confirm this will work as expected in trusty with python3.4

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Wily:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-02 Thread Joseph Salisbury
** Changed in: linux (Ubuntu Wily)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Tags added: kernel-da-key

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Wily:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-02 Thread Tim Gardner
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: Confirmed

** Also affects: linux (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
Milestone: None => ubuntu-16.04

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Wily:
  New
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-01 Thread Chris Valean
Parsed ifcg-eth0 file that is going to be converted to a network
interface config on the guest

** Description changed:

  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.
  
  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.
  
  Kernel: 4.2.0-23-generic
  
  Generated ifcfg-eth0 file:
  /var/lib/hyperv/ifcfg-eth0
  
  Sample contents:
  HWADDR=00:15:5D:XX:XX:XX
  DEVICE=eth0
  BOOTPROTO=none
  IPADDR0=10.123.120.12
  NETMASK0=255.255.254.0
  GATEWAY=10.123.119.1
  DNS1=anything
+ 
+ syslog doesn't record any related events to the netmask, and also
+ manually executing hv_set_ifconfig against the generated ifcfg works
+ with no errors.
+ 
+ The interfaces files gets modified to this:
+ iface eth0 inet static
+ address 10.123.120.199
+ gateway 10.123.119.1
+ dns-nameservers anything_changed
+ 
+ #End of hv_set_ifconfig stanzas

** Description changed:

  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.
  
  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.
  
  Kernel: 4.2.0-23-generic
  
- Generated ifcfg-eth0 file:
- /var/lib/hyperv/ifcfg-eth0
- 
- Sample contents:
- HWADDR=00:15:5D:XX:XX:XX
- DEVICE=eth0
- BOOTPROTO=none
- IPADDR0=10.123.120.12
- NETMASK0=255.255.254.0
- GATEWAY=10.123.119.1
- DNS1=anything
+ Attaching generated ifcfg-eth0 file that is used by this script.
  
  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.
  
  The interfaces files gets modified to this:
  iface eth0 inet static
- address 10.123.120.199
- gateway 10.123.119.1
- dns-nameservers anything_changed
+ address 10.123.120.199
+ gateway 10.123.119.1
+ dns-nameservers anything_changed
  
  #End of hv_set_ifconfig stanzas

** Attachment added: "ifcfg-eth0.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+attachment/4561635/+files/ifcfg-eth0.txt

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

** Summary changed:

- Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection
+ [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp