[Group.of.nepali.translators] [Bug 2049044] Re: xenial/linux: 4.4.0-250.284 -proposed tracker

2024-01-23 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2049044

Title:
  xenial/linux: 4.4.0-250.284 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow abi-testing series:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: fe24b8600173295f
route-entry: 2
  comments:
abi-testing: 1
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
bugs-spammed: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-10905
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Signoff
  phase-changed: Wednesday, 17. January 2024 10:06 UTC
  reason:
kernel-signoff: Stalled -s waiting for signoff
promote-to-updates: Stalled -- waiting for earlier spin to move to
  Updates
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2049042
trusty/linux-lts-xenial: bug 2049043
xenial/linux-aws: bug 2049037
xenial/linux-cascade: bug 2049039
xenial/linux-fips: bug 2049040
xenial/linux-kvm: bug 2049041
xenial/linux/caracalla-kernel: bug 2049034
xenial/linux/pc-kernel: bug 2049035
xenial/linux/stlouis-kernel: bug 2049036
  variant: debs
  versions:
main: 4.4.0-250.284
meta: 4.4.0.250.256
signed: 4.4.0-250.284
  ~~:
announce:
  swm-transition-crankable: 2024-01-14 13:55:28.819239
clamps:
  new-review: fe24b8600173295f
  promote-to-proposed: fe24b8600173295f
  self: 4.4.0-250.284
  sru-review: fe24b8600173295f
tracker:
  last-message: '2024-01-15 14:45:19.067508+00:00'

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2049044/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2046291] Re: xenial/linux: 4.4.0-249.283 -proposed tracker

2024-01-12 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2046291

Title:
  xenial/linux: 4.4.0-249.283 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow abi-testing series:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 40748aab94bfeeb3
route-entry: 1
  comments:
abi-testing: 1
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
bugs-spammed: true
proposed-announcement-sent: true
proposed-testing-requested: true
stream-from-cycle: true
  issue: KSRU-10570
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Friday, 12. January 2024 08:55 UTC
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2046289
trusty/linux-lts-xenial: bug 2046290
xenial/linux-aws: bug 2046284
xenial/linux-cascade: bug 2046286
xenial/linux-fips: bug 2046287
xenial/linux-kvm: bug 2046288
xenial/linux/caracalla-kernel: bug 2046281
xenial/linux/pc-kernel: bug 2046282
xenial/linux/stlouis-kernel: bug 2046283
  variant: debs
  versions:
main: 4.4.0-249.283
meta: 4.4.0.249.255
signed: 4.4.0-249.283
  ~~:
announce:
  swm-transition-crankable: 2023-12-12 23:46:38.912295
clamps:
  new-review: 40748aab94bfeeb3
  promote-to-proposed: 40748aab94bfeeb3
  self: 4.4.0-249.283
  sru-review: 40748aab94bfeeb3
tracker:
  last-message: '2023-12-14 00:00:22.610206+00:00'

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2046291/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2046291] Re: xenial/linux: 4.4.0-249.283 -proposed tracker

2024-01-08 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/kernel-signoff
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Thadeu Lima de 
Souza Cascardo (cascardo)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2046291

Title:
  xenial/linux: 4.4.0-249.283 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow abi-testing series:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 40748aab94bfeeb3
route-entry: 1
  comments:
abi-testing: 1
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
bugs-spammed: true
proposed-announcement-sent: true
proposed-testing-requested: true
stream-from-cycle: true
  issue: KSRU-10570
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Testing
  phase-changed: Monday, 08. January 2024 09:40 UTC
  reason:
certification-testing: Ongoing -s testing in progress
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2046289
trusty/linux-lts-xenial: bug 2046290
xenial/linux-aws: bug 2046284
xenial/linux-cascade: bug 2046286
xenial/linux-fips: bug 2046287
xenial/linux-kvm: bug 2046288
xenial/linux/caracalla-kernel: bug 2046281
xenial/linux/pc-kernel: bug 2046282
xenial/linux/stlouis-kernel: bug 2046283
  variant: debs
  versions:
main: 4.4.0-249.283
meta: 4.4.0.249.255
signed: 4.4.0-249.283
  ~~:
announce:
  swm-transition-crankable: 2023-12-12 23:46:38.912295
clamps:
  new-review: 40748aab94bfeeb3
  promote-to-proposed: 40748aab94bfeeb3
  self: 4.4.0-249.283
  sru-review: 40748aab94bfeeb3
tracker:
  last-message: '2023-12-14 00:00:22.610206+00:00'

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2046291/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2044347] Re: xenial/linux: 4.4.0-248.282 -proposed tracker

2023-12-04 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2044347

Title:
  xenial/linux: 4.4.0-248.282 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow abi-testing series:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 9ba544dfc50287a9
route-entry: 2
  comments:
abi-testing: 1
  delta:
promote-to-proposed: [main, meta, signed, generate]
promote-to-updates: [main, meta, signed]
  flag:
boot-testing-requested: true
bugs-spammed: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-10526
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Promote to Updates
  phase-changed: Monday, 04. December 2023 19:06 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2042030
trusty/linux-lts-xenial: bug 2042031
xenial/linux-aws: bug 2042025
xenial/linux-cascade: bug 2042027
xenial/linux-fips: bug 2042028
xenial/linux-kvm: bug 2042029
xenial/linux/caracalla-kernel: bug 2044344
xenial/linux/pc-kernel: bug 2044345
xenial/linux/stlouis-kernel: bug 2044346
  variant: debs
  versions:
main: 4.4.0-248.282
meta: 4.4.0.248.254
signed: 4.4.0-248.282
  ~~:
announce:
  swm-transition-crankable: 2023-11-23 09:21:07.407552
clamps:
  new-review: 9ba544dfc50287a9
  promote-to-proposed: 9ba544dfc50287a9
  self: 4.4.0-248.282
  sru-review: 9ba544dfc50287a9
tracker:
  last-message: '2023-11-23 22:30:10.833966+00:00'

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2044347/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2038362] Re: xenial/linux: 4.4.0-246.280 -proposed tracker

2023-10-18 Thread Thadeu Lima de Souza Cascardo
** Tags added: regression-testing-passed

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2038362

Title:
  xenial/linux: 4.4.0-246.280 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 8e256b11e4b77a63
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
bugs-spammed: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-10144
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Wednesday, 18. October 2023 23:55 UTC
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2038360
trusty/linux-lts-xenial: bug 2038361
xenial/linux-aws: bug 2038355
xenial/linux-cascade: bug 2038357
xenial/linux-fips: bug 2038358
xenial/linux-kvm: bug 2038359
xenial/linux/caracalla-kernel: bug 2038352
xenial/linux/pc-kernel: bug 2038353
xenial/linux/stlouis-kernel: bug 2038354
  variant: debs
  versions:
main: 4.4.0-246.280
meta: 4.4.0.246.252
signed: 4.4.0-246.280
  ~~:
announce:
  swm-transition-crankable: 2023-10-04 17:51:02.178420
clamps:
  new-review: 8e256b11e4b77a63
  promote-to-proposed: 8e256b11e4b77a63
  self: 4.4.0-246.280
  sru-review: 8e256b11e4b77a63

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2038362/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2035248] Re: xenial/linux-azure: 4.15.0-1170.185~16.04.1 -proposed tracker

2023-09-25 Thread Thadeu Lima de Souza Cascardo
Security only update.

** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2035248

Title:
  xenial/linux-azure: 4.15.0-1170.185~16.04.1 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-azure source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 3a778cbddb788293
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
promote-to-updates: [main, meta, signed]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-9770
  kernel-stable-master-bug: 2035250
  packages:
generate: linux-generate-azure
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Ready for Promote to Updates
  phase-changed: Monday, 25. September 2023 11:33 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  variant: debs
  versions:
main: 4.15.0-1170.185~16.04.1
meta: 4.15.0.1170.154
signed: 4.15.0-1170.185~16.04.1
  ~~:
announce:
  swm-transition-crankable: 2023-09-21 19:40:30.817985
clamps:
  new-review: 3a778cbddb788293
  promote-to-proposed: 3a778cbddb788293
  self: 4.15.0-1170.185~16.04.1
  sru-review: 3a778cbddb788293

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2035248/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2035248] Re: xenial/linux-azure: 4.15.0-1170.185~16.04.1 -proposed tracker

2023-09-22 Thread Thadeu Lima de Souza Cascardo
** Summary changed:

- xenial/linux-azure: 4.15.0-1169.184~16.04.2 -proposed tracker
+ xenial/linux-azure: 4.15.0-1170.185~16.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Released => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Philip Cox (philcox) => Thadeu Lima de Souza Cascardo (cascardo)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2035248

Title:
  xenial/linux-azure: 4.15.0-1170.185~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-generate series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  New
Status in Kernel SRU Workflow stakeholder-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-azure source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
route-entry: 2
  issue: KSRU-9770
  kernel-stable-master-bug: 2035250
  packages:
generate: linux-generate-azure
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Packaging
  phase-changed: Friday, 22. September 2023 08:46 UTC
  reason:
:prepare-packages: 'Ongoing -b Being cranked by: cascardo'
prepare-package: Pending -- tag not published and package not
  uploaded
prepare-package-generate: Pending -- package not uploaded
prepare-package-meta: Pending -- tag not published and package not
  uploaded
prepare-package-signed: Pending -- tag not published and package not
  uploaded
  synthetic:
:promote-to-as-proposed: Invalid
  variant: debs
  ~~:
announce:
  swm-transition-crankable: 2023-09-21 19:40:30.817985
clamps:
  self: 4.15.0-1170.185~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/2035248/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2035275] Re: xenial/linux: 4.4.0-245.279 -proposed tracker

2023-09-19 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2035275

Title:
  xenial/linux: 4.4.0-245.279 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 0a6b631f3f372cf6
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-9784
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Tuesday, 19. September 2023 12:40 UTC
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2035273
trusty/linux-lts-xenial: bug 2035274
xenial/linux-aws: bug 2035268
xenial/linux-cascade: bug 2035270
xenial/linux-fips: bug 2035271
xenial/linux-kvm: bug 2035272
xenial/linux/caracalla-kernel: bug 2035265
xenial/linux/pc-kernel: bug 2035266
xenial/linux/stlouis-kernel: bug 2035267
  variant: debs
  versions:
main: 4.4.0-245.279
meta: 4.4.0.245.251
signed: 4.4.0-245.279
  ~~:
announce:
  swm-transition-crankable: 2023-09-12 17:38:36.775694
clamps:
  new-review: 0a6b631f3f372cf6
  promote-to-proposed: 0a6b631f3f372cf6
  self: 4.4.0-245.279
  sru-review: 0a6b631f3f372cf6

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2035275/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2024572] Re: xenial/linux: 4.4.0-242.276 -proposed tracker

2023-07-10 Thread Thadeu Lima de Souza Cascardo
Certification testing has run for pc-kernel and other snaps.

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2024572

Title:
  xenial/linux: 4.4.0-242.276 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 7d70d6dda65f284d
route-entry: 1
  delta:
promote-to-proposed: [main, meta, signed, generate]
promote-to-updates: [main, meta, signed]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
stream-from-cycle: true
  issue: KSRU-8097
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Promote to Updates
  phase-changed: Monday, 10. July 2023 13:21 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2024570
trusty/linux-lts-xenial: bug 2024571
xenial/linux-aws: bug 2024564
xenial/linux-cascade: bug 2024566
xenial/linux-fips: bug 2024567
xenial/linux-kvm: bug 2024569
xenial/linux/caracalla-kernel: bug 2024561
xenial/linux/pc-kernel: bug 2024562
xenial/linux/stlouis-kernel: bug 2024563
  variant: debs
  versions:
main: 4.4.0-242.276
meta: 4.4.0.242.248
signed: 4.4.0-242.276
  ~~:
clamps:
  new-review: 7d70d6dda65f284d
  promote-to-proposed: 7d70d6dda65f284d
  self: 4.4.0-242.276
  sru-review: 7d70d6dda65f284d

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2024572/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2024214] Re: xenial/linux-azure: 4.15.0-1167.182~16.04.1 -proposed tracker

2023-06-28 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2024214

Title:
  xenial/linux-azure: 4.15.0-1167.182~16.04.1 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Incomplete
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-azure source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: e5bce9f0f966e277
route-entry: 1
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7803
  kernel-stable-master-bug: 2024216
  packages:
generate: linux-generate-azure
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Testing
  phase-changed: Tuesday, 27. June 2023 01:55 UTC
  reason:
regression-testing: Stalled -s testing FAILED
  synthetic:
:promote-to-as-proposed: Invalid
  variant: debs
  versions:
main: 4.15.0-1167.182~16.04.1
meta: 4.15.0.1167.151
signed: 4.15.0-1167.182~16.04.1
  ~~:
clamps:
  new-review: e5bce9f0f966e277
  promote-to-proposed: e5bce9f0f966e277
  self: 4.15.0-1167.182~16.04.1
  sru-review: e5bce9f0f966e277

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2024214/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2019719] Re: xenial/linux: 4.4.0-241.275 -proposed tracker

2023-06-07 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/kernel-signoff
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Thadeu Lima de 
Souza Cascardo (cascardo)

** Tags added: kernel-override-hold-promote-to-updates

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2019719

Title:
  xenial/linux: 4.4.0-241.275 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 262a286fecbe6c3a
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
promote-to-updates: [main, meta, signed]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7650
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Promote to Updates
  phase-changed: Wednesday, 07. June 2023 20:16 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2019717
trusty/linux-lts-xenial: bug 2019718
xenial/linux-aws: bug 2019712
xenial/linux-cascade: bug 2019714
xenial/linux-fips: bug 2019715
xenial/linux-kvm: bug 2019716
xenial/linux/caracalla-kernel: bug 2019709
xenial/linux/pc-kernel: bug 2019710
xenial/linux/stlouis-kernel: bug 2019711
  variant: debs
  versions:
main: 4.4.0-241.275
meta: 4.4.0.241.247
signed: 4.4.0-241.275
  ~~:
clamps:
  new-review: 262a286fecbe6c3a
  promote-to-proposed: 262a286fecbe6c3a
  self: 4.4.0-241.275
  sru-review: 262a286fecbe6c3a

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2019719/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2019719] Re: xenial/linux: 4.4.0-241.275 -proposed tracker

2023-06-07 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2019719

Title:
  xenial/linux: 4.4.0-241.275 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Confirmed
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 262a286fecbe6c3a
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7650
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Signoff
  phase-changed: Wednesday, 07. June 2023 18:25 UTC
  reason:
kernel-signoff: Stalled -s waiting for signoff
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2019717
trusty/linux-lts-xenial: bug 2019718
xenial/linux-aws: bug 2019712
xenial/linux-cascade: bug 2019714
xenial/linux-fips: bug 2019715
xenial/linux-kvm: bug 2019716
xenial/linux/caracalla-kernel: bug 2019709
xenial/linux/pc-kernel: bug 2019710
xenial/linux/stlouis-kernel: bug 2019711
  variant: debs
  versions:
main: 4.4.0-241.275
meta: 4.4.0.241.247
signed: 4.4.0-241.275
  ~~:
clamps:
  new-review: 262a286fecbe6c3a
  promote-to-proposed: 262a286fecbe6c3a
  self: 4.4.0-241.275
  sru-review: 262a286fecbe6c3a

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2019719/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2023220] Re: Some INVLPG implementations can leave Global translations unflushed when PCIDs are enabled

2023-06-07 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux-oem-6.1 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Bionic)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Kinetic)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Lunar)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Mantic)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2023220

Title:
  Some INVLPG implementations can leave Global translations unflushed
  when PCIDs are enabled

Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-6.1 package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Incomplete
Status in linux-oem-6.1 source package in Trusty:
  Invalid
Status in linux source package in Xenial:
  Incomplete
Status in linux-oem-6.1 source package in Xenial:
  Invalid
Status in linux source package in Bionic:
  Incomplete
Status in linux-oem-6.1 source package in Bionic:
  Invalid
Status in linux source package in Focal:
  In Progress
Status in linux-oem-6.1 source package in Focal:
  Invalid
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-6.1 source package in Jammy:
  New
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-6.1 source package in Kinetic:
  Invalid
Status in linux source package in Lunar:
  In Progress
Status in linux-oem-6.1 source package in Lunar:
  Invalid
Status in linux source package in Mantic:
  Fix Released
Status in linux-oem-6.1 source package in Mantic:
  Invalid

Bug description:
  [Impact]
  When PCIDs are enabled on Alder Lake and Raptor Lake, INVLPG will not flush 
the global TLB entries. This can lead to info leak or undefined behavior.

  [Mitigation]
  Boot with nopcid on affected systems.

  [Test case]
  There is no particular test case.

  [Potential regressions]
  This affects performance on the affected systems. TLB behavior could also be 
affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2023220/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2023220] Re: Some INVLPG implementations can leave Global translations unflushed when PCIDs are enabled

2023-06-07 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Jammy)
   Status: Incomplete => In Progress

** Changed in: linux (Ubuntu Focal)
   Status: Incomplete => In Progress

** Also affects: linux-oem-6.1 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-6.1 (Ubuntu Trusty)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2023220

Title:
  Some INVLPG implementations can leave Global translations unflushed
  when PCIDs are enabled

Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-6.1 package in Ubuntu:
  New
Status in linux source package in Trusty:
  Incomplete
Status in linux-oem-6.1 source package in Trusty:
  Invalid
Status in linux source package in Xenial:
  Incomplete
Status in linux-oem-6.1 source package in Xenial:
  Invalid
Status in linux source package in Bionic:
  Incomplete
Status in linux-oem-6.1 source package in Bionic:
  Invalid
Status in linux source package in Focal:
  In Progress
Status in linux-oem-6.1 source package in Focal:
  New
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-6.1 source package in Jammy:
  New
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-6.1 source package in Kinetic:
  New
Status in linux source package in Lunar:
  In Progress
Status in linux-oem-6.1 source package in Lunar:
  New
Status in linux source package in Mantic:
  Fix Released
Status in linux-oem-6.1 source package in Mantic:
  New

Bug description:
  [Impact]
  When PCIDs are enabled on Alder Lake and Raptor Lake, INVLPG will not flush 
the global TLB entries. This can lead to info leak or undefined behavior.

  [Mitigation]
  Boot with nopcid on affected systems.

  [Test case]
  There is no particular test case.

  [Potential regressions]
  This affects performance on the affected systems. TLB behavior could also be 
affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2023220/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2023220] Re: Some INVLPG implementations can leave Global translations unflushed when PCIDs are enabled

2023-06-07 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Mantic)
   Status: Incomplete => Fix Released

** Changed in: linux (Ubuntu Lunar)
   Status: Incomplete => In Progress

** Changed in: linux (Ubuntu Kinetic)
   Status: Incomplete => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2023220

Title:
  Some INVLPG implementations can leave Global translations unflushed
  when PCIDs are enabled

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Incomplete
Status in linux source package in Xenial:
  Incomplete
Status in linux source package in Bionic:
  Incomplete
Status in linux source package in Focal:
  Incomplete
Status in linux source package in Jammy:
  Incomplete
Status in linux source package in Kinetic:
  In Progress
Status in linux source package in Lunar:
  In Progress
Status in linux source package in Mantic:
  Fix Released

Bug description:
  [Impact]
  When PCIDs are enabled on Alder Lake and Raptor Lake, INVLPG will not flush 
the global TLB entries. This can lead to info leak or undefined behavior.

  [Mitigation]
  Boot with nopcid on affected systems.

  [Test case]
  There is no particular test case.

  [Potential regressions]
  This affects performance on the affected systems. TLB behavior could also be 
affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2023220/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2019688] Re: xenial/linux-azure: 4.15.0-1166.181~16.04.1 -proposed tracker

2023-05-26 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2019688

Title:
  xenial/linux-azure: 4.15.0-1166.181~16.04.1 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Incomplete
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-azure source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 51157feb2d2fa3b3
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7630
  kernel-stable-master-bug: 2019690
  packages:
generate: linux-generate-azure
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Testing
  phase-changed: Friday, 26. May 2023 02:06 UTC
  reason:
regression-testing: Stalled -s testing FAILED
  synthetic:
:promote-to-as-proposed: Invalid
  variant: debs
  versions:
main: 4.15.0-1166.181~16.04.1
meta: 4.15.0.1166.150
signed: 4.15.0-1166.181~16.04.1
  ~~:
clamps:
  new-review: 51157feb2d2fa3b3
  promote-to-proposed: 51157feb2d2fa3b3
  self: 4.15.0-1166.181~16.04.1
  sru-review: 51157feb2d2fa3b3

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2019688/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2016715] Re: xenial/linux-aws-hwe: 4.15.0-1155.168~16.04.1 -proposed tracker

2023-04-26 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/regression-testing
   Status: Triaged => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2016715

Title:
  xenial/linux-aws-hwe: 4.15.0-1155.168~16.04.1 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-aws-hwe source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 037dc33603e99d7b
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7262
  kernel-stable-master-bug: 2016716
  packages:
generate: linux-generate-aws-hwe
main: linux-aws-hwe
meta: linux-meta-aws-hwe
signed: linux-signed-aws-hwe
  phase: Holding before Promote to Updates
  phase-changed: Wednesday, 26. April 2023 21:22 UTC
  reason:
promote-to-updates: Holding -- parent tracker not ready for release
  synthetic:
:promote-to-as-proposed: Invalid
  variant: debs
  versions:
main: 4.15.0-1155.168~16.04.1
meta: 4.15.0.1155.138
signed: 4.15.0-1155.168~16.04.1
  ~~:
clamps:
  new-review: 037dc33603e99d7b
  promote-to-proposed: 037dc33603e99d7b
  self: 4.15.0-1155.168~16.04.1
  sru-review: 037dc33603e99d7b

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2016715/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2016737] Re: xenial/linux-hwe: 4.15.0-210.221~16.04.1 -proposed tracker

2023-04-26 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/regression-testing
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2016737

Title:
  xenial/linux-hwe: 4.15.0-210.221~16.04.1 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-hwe source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 727b8b810fe276cc
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
promote-to-updates: [main, meta, signed]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7284
  kernel-stable-master-bug: 2016738
  packages:
generate: linux-generate-hwe
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
  phase: Ready for Promote to Updates
  phase-changed: Wednesday, 26. April 2023 21:21 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  variant: debs
  versions:
main: 4.15.0-210.221~16.04.1
meta: 4.15.0.210.195
signed: 4.15.0-210.221~16.04.1
  ~~:
clamps:
  new-review: 727b8b810fe276cc
  promote-to-proposed: 727b8b810fe276cc
  self: 4.15.0-210.221~16.04.1
  sru-review: 727b8b810fe276cc

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2016737/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2016718] Re: xenial/linux-azure: 4.15.0-1164.179~16.04.1 -proposed tracker

2023-04-26 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/stakeholder-signoff
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2016718

Title:
  xenial/linux-azure: 4.15.0-1164.179~16.04.1 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-azure source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: bc8c2a47d466cd52
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7265
  kernel-stable-master-bug: 2016720
  packages:
generate: linux-generate-azure
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Holding before Promote to Updates
  phase-changed: Wednesday, 26. April 2023 13:11 UTC
  reason:
promote-to-updates: Holding -- parent tracker not ready for release
  synthetic:
:promote-to-as-proposed: Invalid
  variant: debs
  versions:
main: 4.15.0-1164.179~16.04.1
meta: 4.15.0.1164.148
signed: 4.15.0-1164.179~16.04.1
  ~~:
clamps:
  new-review: bc8c2a47d466cd52
  promote-to-proposed: bc8c2a47d466cd52
  self: 4.15.0-1164.179~16.04.1
  sru-review: bc8c2a47d466cd52

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2016718/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2017289] Re: xenial/linux: 4.4.0-240.274 -proposed tracker

2023-04-25 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2017289

Title:
  xenial/linux: 4.4.0-240.274 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 22cfb0aa53a63843
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-7365
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Tuesday, 25. April 2023 18:39 UTC
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2017287
trusty/linux-lts-xenial: bug 2017288
xenial/linux-aws: bug 2017282
xenial/linux-cascade: bug 2017284
xenial/linux-fips: bug 2017285
xenial/linux-kvm: bug 2017286
xenial/linux/caracalla-kernel: bug 2017279
xenial/linux/pc-kernel: bug 2017280
xenial/linux/stlouis-kernel: bug 2017281
  variant: debs
  versions:
main: 4.4.0-240.274
meta: 4.4.0.240.246
signed: 4.4.0-240.274
  ~~:
clamps:
  new-review: 22cfb0aa53a63843
  promote-to-proposed: 22cfb0aa53a63843
  self: 4.4.0-240.274
  sru-review: 22cfb0aa53a63843

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2017289/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2009937] Re: xenial/linux-fips: -proposed tracker

2023-04-25 Thread Thadeu Lima de Souza Cascardo
*** This bug is a duplicate of bug 2017285 ***
https://bugs.launchpad.net/bugs/2017285

** This bug is no longer a duplicate of bug 2012770
   xenial/linux-fips: 4.4.0-1087.94 -proposed tracker
** This bug has been marked a duplicate of bug 2017285
   xenial/linux-fips: 4.4.0-1088.95 -proposed tracker

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2009937

Title:
  xenial/linux-fips:  -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-generate series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow sru-review series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
route-entry: 2
  flag:
stream-from-cycle: true
  issue: KSRU-6761
  kernel-stable-master-bug: 2009941
  packages:
generate: linux-generate-fips
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Holding before Packaging
  phase-changed: Friday, 10. March 2023 11:18 UTC
  reason:
:prepare-packages: Holding -b Not ready to be cranked
prepare-package: Holding -- waiting for parent tracker
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/2009937/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2017289] Re: xenial/linux: 4.4.0-240.274 -proposed tracker

2023-04-24 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2017289

Title:
  xenial/linux: 4.4.0-240.274 -proposed tracker

Status in canonical-signing-jobs task00 series:
  In Progress
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  New
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Committed
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 22cfb0aa53a63843
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-testing-requested: true
  issue: KSRU-7365
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Promote to Proposed
  phase-changed: Monday, 24. April 2023 16:11 UTC
  reason:
canonical-signing-jobs/task00: Ongoing -s signing request
  in-progress
promote-to-proposed: Ongoing -- packages copying to Signing
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2017287
trusty/linux-lts-xenial: bug 2017288
xenial/linux-aws: bug 2017282
xenial/linux-cascade: bug 2017284
xenial/linux-fips: bug 2017285
xenial/linux-kvm: bug 2017286
xenial/linux/caracalla-kernel: bug 2017279
xenial/linux/pc-kernel: bug 2017280
xenial/linux/stlouis-kernel: bug 2017281
  variant: debs
  versions:
main: 4.4.0-240.274
meta: 4.4.0.240.246
signed: 4.4.0-240.274
  ~~:
clamps:
  new-review: 22cfb0aa53a63843
  promote-to-proposed: 22cfb0aa53a63843
  self: 4.4.0-240.274
  sru-review: 22cfb0aa53a63843

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2017289/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2012774] Re: xenial/linux: 4.4.0-239.273 -proposed tracker

2023-04-11 Thread Thadeu Lima de Souza Cascardo
Kernels ready to release.

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2012774

Title:
  xenial/linux: 4.4.0-239.273 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: b304c3f05dd52050
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-6956
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Tuesday, 11. April 2023 08:26 UTC
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2012772
trusty/linux-lts-xenial: bug 2012773
xenial/linux-aws: bug 2012767
xenial/linux-cascade: bug 2012769
xenial/linux-fips: bug 2012770
xenial/linux-kvm: bug 2012771
xenial/linux/caracalla-kernel: bug 2012764
xenial/linux/pc-kernel: bug 2012765
xenial/linux/stlouis-kernel: bug 2012766
  variant: debs
  versions:
main: 4.4.0-239.273
meta: 4.4.0.239.245
signed: 4.4.0-239.273
  ~~:
clamps:
  new-review: b304c3f05dd52050
  promote-to-proposed: b304c3f05dd52050
  self: 4.4.0-239.273
  sru-review: b304c3f05dd52050

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2012774/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2012774] Re: xenial/linux: 4.4.0-239.273 -proposed tracker

2023-04-11 Thread Thadeu Lima de Souza Cascardo
Snaps were tested.

** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2012774

Title:
  xenial/linux: 4.4.0-239.273 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: b304c3f05dd52050
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-6956
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Tuesday, 11. April 2023 08:26 UTC
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2012772
trusty/linux-lts-xenial: bug 2012773
xenial/linux-aws: bug 2012767
xenial/linux-cascade: bug 2012769
xenial/linux-fips: bug 2012770
xenial/linux-kvm: bug 2012771
xenial/linux/caracalla-kernel: bug 2012764
xenial/linux/pc-kernel: bug 2012765
xenial/linux/stlouis-kernel: bug 2012766
  variant: debs
  versions:
main: 4.4.0-239.273
meta: 4.4.0.239.245
signed: 4.4.0-239.273
  ~~:
clamps:
  new-review: b304c3f05dd52050
  promote-to-proposed: b304c3f05dd52050
  self: 4.4.0-239.273
  sru-review: b304c3f05dd52050

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2012774/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2015213] [NEW] xfstests ext4/054 will BUG_ON

2023-04-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

When running xfstests ext4/054 test, the kernel will BUG_ON. This
requires a mangled filesystem (the test uses debugfs, the tool, not the
kernel filesystem).

[23967.165615] [ cut here ]
[23967.169587] kernel BUG at 
/build/linux-aws-wwoDm1/linux-aws-4.4.0/fs/ext4/mballoc.c:3222!
[23967.169587] invalid opcode:  [#1] SMP 
[23967.169587] Modules linked in: binfmt_misc serio_raw ib_iser rdma_cm iw_cm 
ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi 
scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel 
aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd
[23967.169587] CPU: 0 PID: 4559 Comm: xfs_io Not tainted 4.4.0-1155-aws 
#170-Ubuntu
[23967.169587] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006
[23967.169587] task: 8800cce02a00 ti: 8800d43f4000 task.ti: 
8800d43f4000
[23967.169587] RIP: 0010:[]  [] 
ext4_mb_normalize_request.constprop.29+0x40e/0x4c0
[23967.169587] RSP: 0018:8800d43f7860  EFLAGS: 00010246
[23967.169587] RAX:  RBX: 8800c2fbecb8 RCX: 1500
[23967.169587] RDX: 1500 RSI: 8800d43f79e8 RDI: 8800e14b8080
[23967.169587] RBP: 8800d43f78b0 R08: 000a R09: 0001
[23967.169587] R10: 0001 R11: 0800 R12: 8800e14b8080
[23967.169587] R13:  R14: 1500 R15: 8800c2fbecb8
[23967.169587] FS:  7fec45ce6700() GS:88010b20() 
knlGS:
[23967.169587] CS:  0010 DS:  ES:  CR0: 80050033
[23967.169587] CR2: 0125 CR3: c0e8a000 CR4: 00160670
[23967.169587] Stack:
[23967.169587]  8800d43f79e8  8800c2fbea60 
8800e559c800
[23967.169587]  1500 8800e559c800 8800d43f79c4 
8800e5599800
[23967.169587]  8800d43f79e8 8800e14b8080 8800d43f7960 
812e5096
[23967.169587] Call Trace:
[23967.169587]  [] ext4_mb_new_blocks+0x5d6/0xac0
[23967.169587]  [] ? __read_extent_tree_block+0xcd/0x140
[23967.169587]  [] ? ext4_ext_search_right+0x297/0x2f0
[23967.169587]  [] ? ext4_ext_search_right+0x297/0x2f0
[23967.169587]  [] ext4_ext_map_blocks+0x63d/0xfe0
[23967.169587]  [] ? __schedule+0x341/0x810
[23967.169587]  [] ? cfq_group_served+0x3e1/0x4b0
[23967.169587]  [] ext4_map_blocks+0x1b4/0x5b0
[23967.169587]  [] ? kmem_cache_alloc+0x1cc/0x1f0
[23967.169587]  [] ? alloc_buffer_head+0x21/0x60
[23967.169587]  [] _ext4_get_block+0xbe/0x220
[23967.169587]  [] ext4_get_block+0x16/0x20
[23967.169587]  [] ext4_block_write_begin+0x193/0x4e0
[23967.169587]  [] ? _ext4_get_block+0x220/0x220
[23967.169587]  [] ? __ext4_journal_start_sb+0x6d/0x120
[23967.169587]  [] ext4_write_begin+0x19a/0x460
[23967.169587]  [] generic_perform_write+0xce/0x1d0
[23967.169587]  [] ? file_update_time+0xcc/0x110
[23967.169587]  [] __generic_file_write_iter+0x1a2/0x1e0
[23967.169587]  [] ext4_file_write_iter+0x1c4/0x4b0
[23967.169587]  [] ? mem_cgroup_try_charge+0x69/0x1d0
[23967.169587]  [] ? 
lru_cache_add_active_or_unevictable+0x27/0xa0
[23967.169587]  [] new_sync_write+0xa5/0xf0
[23967.169587]  [] __vfs_write+0x29/0x40
[23967.169587]  [] vfs_write+0xa9/0x1a0
[23967.169587]  [] SyS_pwrite64+0x95/0xb0
[23967.169587]  [] entry_SYSCALL_64_fastpath+0x22/0xd0
[23967.169587] Code: d0 49 29 c5 e9 ca fd ff ff 41 bd 00 80 00 00 e9 8e fd ff 
ff 8b 56 10 31 c0 e9 70 fd ff ff 0f 0b 41 bd 00 00 01 00 e9 77 fd ff ff <0f> 0b 
0f 0b 0f 0b 41 bd 00 00 02 00 e9 66 fd ff ff 0f 0b 41 bd 
[23967.169587] RIP  [] 
ext4_mb_normalize_request.constprop.29+0x40e/0x4c0
[23967.169587]  RSP 
[23967.533188] ---[ end trace 7e0e603d5fd1fa33 ]---

** Affects: ubuntu-kernel-tests
 Importance: Medium
 Status: Triaged

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: Opinion

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Opinion

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Also affects: ubuntu-kernel-tests
   Importance: Undecided
   Status: New

** Changed in: ubuntu-kernel-tests
   Status: New => Triaged

** Changed in: ubuntu-kernel-tests
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2015213

Title:
  xfstests ext4/054 will BUG_ON

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Opinion

Bug description:
  When running xfstests ext4/054 test, the 

[Group.of.nepali.translators] [Bug 2015164] Re: btrfs send BUG or NULL pointer derefence

2023-04-03 Thread Thadeu Lima de Souza Cascardo
btrfs send ioctl requires CAP_SYS_ADMIN on the initial user namespace.

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => Won't Fix

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Low

** Also affects: ubuntu-kernel-tests
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2015164

Title:
  btrfs send BUG or NULL pointer derefence

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Won't Fix

Bug description:
  When running xfstests btrfs/187, btrfs send will cause a NULL pointer
  dereference or a BUG.

  
  [  308.924126] BTRFS error (device xvdb2): did not find backref in send_root. 
inode=44681, offset=0, disk_byte=3193700352 found extent=3193700352
  [  310.054883] BTRFS info (device xvdb2): found 15529 extents
  [  310.099436] BTRFS info (device xvdb2): relocating block group 4194304 
flags 4
  [  310.369359] BTRFS info (device xvdb2): found 473 extents
  [  310.393830] BTRFS info (device xvdb2): relocating block group 0 flags 2
  [  310.420026] BTRFS info (device xvdb2): found 1 extents
  [  311.561421] BTRFS info (device xvdb2): relocating block group 7000293376 
flags 2
  [  311.592206] BTRFS info (device xvdb2): relocating block group 6731857920 
flags 4
  [  312.268390] BTRFS error (device xvdb2): parent transid verify failed on 
6483984384 wanted 25 found 54
  [  312.277947] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [  312.285471] IP: [] read_extent_buffer+0x1f/0x190 [btrfs]
  [  312.285471] PGD 8000c3509067 PUD c350a067 PMD 0 
  [  312.285471] Oops:  [#1] SMP 
  [  312.285471] Modules linked in: lkp_Ubuntu_4_4_0_1128_142_aws_83(OE) 
binfmt_misc serio_raw ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr 
iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 
raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper 
cryptd
  [  312.285471] CPU: 0 PID: 1464 Comm: btrfs Tainted: G   OE K 
4.4.0-1128-aws #142-Ubuntu
  [  312.285471] Hardware name: Xen HVM domU, BIOS 4.2.amazon 08/24/2006
  [  312.285471] task: 8800e8f57000 ti: 8800c3518000 task.ti: 
8800c3518000
  [  312.285471] RIP: 0010:[]  [] 
read_extent_buffer+0x1f/0x190 [btrfs]
  [  312.285471] RSP: 0018:8800c351bb38  EFLAGS: 00010292
  [  312.285471] RAX:  RBX: 0011 RCX: 
0011
  [  312.285471] RDX: 0065 RSI: 8800c351bb97 RDI: 

  [  312.285471] RBP: 8800c351bb68 R08: 00018140 R09: 
00019140
  [  312.421177] R10: ea0002a021c0 R11:  R12: 
8800c351bb97
  [  312.421177] R13: 8800c351bc45 R14:  R15: 
8800c351bc3c
  [  312.421177] FS:  7fd136bdd8c0() GS:88010b20() 
knlGS:
  [  312.421177] CS:  0010 DS:  ES:  CR0: 80050033
  [  312.421177] CR2:  CR3: c34dc000 CR4: 
00160670
  [  312.421177] Stack:
  [  312.421177]  0674 8800b62d3d80  
8800c351bc45
  [  312.421177]  0002 8800c351bc3c 8800c351bb78 
c014fba2
  [  312.421177]  8800c351bbd8 c01088df 8800c351bc45 
0eff8800c1d2d000
  [  312.421177] Call Trace:
  [  312.421177]  [] btrfs_node_key+0x22/0x30 [btrfs]
  [  312.421177]  [] tree_advance+0x12f/0x1d0 [btrfs]
  [  312.421177]  [] btrfs_compare_trees+0x264/0x720 [btrfs]
  [  312.492582] BTRFS info (device xvdb2): found 2362 extents
  [  312.421177]  [] ? process_all_refs+0x200/0x200 [btrfs]
  [  312.421177]  [] btrfs_ioctl_send+0xf62/0x11c0 [btrfs]
  [  312.421177]  [] ? ___slab_alloc+0x207/0x4b0
  [  312.421177]  [] ? update_curr+0x79/0x170
  [  312.421177]  [] btrfs_ioctl+0x29d/0x26a0 [btrfs]
  [  312.421177]  [] ? update_cfs_shares+0xb1/0xf0
  [  312.530672] BTRFS info (device xvdb2): relocating block group 6463422464 
flags 4
  [  312.421177]  [] ? check_preempt_wakeup+0xfa/0x220
  [  312.421177]  [] do_vfs_ioctl+0x2af/0x4b0
  [  312.421177]  [] ? _do_fork+0xec/0x360
  [  312.421177]  [] SyS_ioctl+0x79/0x90
  [  312.421177]  [] entry_SYSCALL_64_fastpath+0x22/0xd0
  [  312.421177] Code: 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 
89 e5 41 57 41 56 41 55 41 54 49 89 fe 53 49 89 f4 48 89 cb 48 83 ec 08 <48> 8b 
3f 49 8b 4e 08 48 89 fe 81 e6 ff 0f 00 00 4c 8d 2c 16 4d 
  [  312.421177] RIP  [] read_extent_buffer+0x1f/0x190 [btrfs]
  [ 

[Group.of.nepali.translators] [Bug 2007452] Re: xenial/linux: 4.4.0-237.271 -proposed tracker

2023-03-06 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2007452

Title:
  xenial/linux: 4.4.0-237.271 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 3393c62942b480c0
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
promote-to-updates: [signed, main, meta]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
stream-from-cycle: true
  issue: KSRU-6553
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Promote to Updates
  phase-changed: Monday, 06. March 2023 16:11 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2007450
trusty/linux-lts-xenial: bug 2007451
xenial/linux-aws: bug 2007445
xenial/linux-cascade: bug 2007447
xenial/linux-fips: bug 2007448
xenial/linux-kvm: bug 2007449
xenial/linux/caracalla-kernel: bug 2007442
xenial/linux/pc-kernel: bug 2007443
xenial/linux/stlouis-kernel: bug 2007444
  variant: debs
  versions:
main: 4.4.0-237.271
meta: 4.4.0.237.243
signed: 4.4.0-237.271+1
  ~~:
clamps:
  new-review: 3393c62942b480c0
  promote-to-proposed: 3393c62942b480c0
  self: 4.4.0-237.271
  sru-review: 3393c62942b480c0

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2007452/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2007452] Re: xenial/linux: 4.4.0-237.271 -proposed tracker

2023-03-01 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2007452

Title:
  xenial/linux: 4.4.0-237.271 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 3393c62942b480c0
route-entry: 2
  delta:
promote-to-proposed: [main, meta, signed, generate]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
stream-from-cycle: true
  issue: KSRU-6553
  packages:
generate: linux-generate
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Testing
  phase-changed: Friday, 24. February 2023 16:21 UTC
  reason:
certification-testing: Ongoing -s testing in progress
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2007450
trusty/linux-lts-xenial: bug 2007451
xenial/linux-aws: bug 2007445
xenial/linux-cascade: bug 2007447
xenial/linux-fips: bug 2007448
xenial/linux-kvm: bug 2007449
xenial/linux/caracalla-kernel: bug 2007442
xenial/linux/pc-kernel: bug 2007443
xenial/linux/stlouis-kernel: bug 2007444
  variant: debs
  versions:
main: 4.4.0-237.271
meta: 4.4.0.237.243
signed: 4.4.0-237.271+1
  ~~:
clamps:
  new-review: 3393c62942b480c0
  promote-to-proposed: 3393c62942b480c0
  self: 4.4.0-237.271
  sru-review: 3393c62942b480c0

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2007452/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 2000934] Re: xenial/linux: 4.4.0-236.270 -proposed tracker

2023-01-12 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

** Tags removed: kernel-block-derivatives
** Tags added: boot-testing-passed regression-testing-passed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2000934

Title:
  xenial/linux: 4.4.0-236.270 -proposed tracker

Status in canonical-signing-jobs:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 8f3857d88bcc1344
route-entry: 2
  delta:
promote-to-proposed: [meta, signed, main]
promote-to-updates: [signed, main, meta]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-5894
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Promote to Updates
  phase-changed: Thursday, 12. January 2023 10:56 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 2000932
trusty/linux-lts-xenial: bug 2000933
xenial/linux-aws: bug 2000927
xenial/linux-cascade: bug 2000929
xenial/linux-fips: bug 2000930
xenial/linux-kvm: bug 2000931
xenial/linux/caracalla-kernel: bug 2000923
xenial/linux/pc-kernel: bug 2000924
xenial/linux/stlouis-kernel: bug 2000925
  variant: debs
  versions:
main: 4.4.0-236.270
meta: 4.4.0.236.242
signed: 4.4.0-236.270
  ~~:
clamps:
  new-review: 8f3857d88bcc1344
  promote-to-proposed: 8f3857d88bcc1344
  self: 4.4.0-236.270
  sru-review: 8f3857d88bcc1344

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/+bug/2000934/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1997020] Re: xenial/linux: 4.4.0-235.269 -proposed tracker

2022-11-29 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1997020

Title:
  xenial/linux: 4.4.0-235.269 -proposed tracker

Status in canonical-signing-jobs:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 30dad6590db472f5
route-entry: 1
  delta:
promote-to-proposed: [main, meta, signed]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-5515
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Wednesday, 30. November 2022 01:37 UTC
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1997018
trusty/linux-lts-xenial: bug 1997019
xenial/linux-aws: bug 1997012
xenial/linux-cascade: bug 1997014
xenial/linux-fips: bug 1997015
xenial/linux-kvm: bug 1997016
xenial/linux/caracalla-kernel: bug 1997008
xenial/linux/pc-kernel: bug 1997009
xenial/linux/stlouis-kernel: bug 1997010
  variant: debs
  versions:
main: 4.4.0-235.269
meta: 4.4.0.235.241
signed: 4.4.0-235.269
  ~~:
clamps:
  new-review: 30dad6590db472f5
  promote-to-proposed: 30dad6590db472f5
  self: 4.4.0-235.269
  sru-review: 30dad6590db472f5

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/+bug/1997020/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1990413] Re: xenial/linux: 4.4.0-234.268 -proposed tracker

2022-09-29 Thread Thadeu Lima de Souza Cascardo
Marking Certification Testing as Invalid in order to get this expedited.
Some Cert Testing has been done on the snap side.

** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1990413

Title:
  xenial/linux: 4.4.0-234.268 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 471482a4a1714d38
route-entry: 1
  delta:
promote-to-proposed: [signed, main, meta]
promote-to-updates: [meta, signed, main]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-5052
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Promote to Updates
  phase-changed: Thursday, 29. September 2022 09:41 UTC
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1990411
trusty/linux-lts-xenial: bug 1990412
xenial/linux-aws: bug 1990406
xenial/linux-cascade: bug 1990408
xenial/linux-fips: bug 1990409
xenial/linux-kvm: bug 1990410
xenial/linux/caracalla-kernel: bug 1990402
xenial/linux/pc-kernel: bug 1990403
xenial/linux/stlouis-kernel: bug 1990404
  variant: debs
  versions:
main: 4.4.0-234.268
meta: 4.4.0.234.240
signed: 4.4.0-234.268
  ~~:
clamps:
  new-review: 471482a4a1714d38
  promote-to-proposed: 471482a4a1714d38
  self: 4.4.0-234.268
  sru-review: 471482a4a1714d38

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1990413/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1990413] Re: xenial/linux: 4.4.0-234.268 -proposed tracker

2022-09-28 Thread Thadeu Lima de Souza Cascardo
Tested the perf changes, which seemed to be the more risky. Exercised
some of the changed code and no crashes, warnings observed.

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1990413

Title:
  xenial/linux: 4.4.0-234.268 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
from: 471482a4a1714d38
route-entry: 1
  delta:
promote-to-proposed: [signed, main, meta]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-5052
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Testing
  phase-changed: Monday, 26. September 2022 13:37 UTC
  reason:
certification-testing: Ongoing -s testing in progress
kernel-signoff: Stalled -s waiting for signoff
regression-testing: Ongoing -s testing in progress
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1990411
trusty/linux-lts-xenial: bug 1990412
xenial/linux-aws: bug 1990406
xenial/linux-cascade: bug 1990408
xenial/linux-fips: bug 1990409
xenial/linux-kvm: bug 1990410
xenial/linux/caracalla-kernel: bug 1990402
xenial/linux/pc-kernel: bug 1990403
xenial/linux/stlouis-kernel: bug 1990404
  variant: debs
  versions:
main: 4.4.0-234.268
meta: 4.4.0.234.240
signed: 4.4.0-234.268
  ~~:
clamps:
  new-review: 471482a4a1714d38
  promote-to-proposed: 471482a4a1714d38
  self: 4.4.0-234.268
  sru-review: 471482a4a1714d38

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1990413/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1985080] Re: xenial/linux: 4.4.0-233.267 -proposed tracker

2022-08-15 Thread Thadeu Lima de Souza Cascardo
Kernels seem fine. We should release today.

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1985080

Title:
  xenial/linux: 4.4.0-233.267 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  built:
from: ba5b402d1d75ba16
route-entry: 1
  delta:
promote-to-proposed: [signed, meta, main]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  issue: KSRU-4710
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Testing
  phase-changed: Friday, 12. August 2022 13:46 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
certification-testing: Ongoing -s testing in progress
kernel-signoff: Stalled -s waiting for signoff
regression-testing: Ongoing -s testing in progress
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1985078
trusty/linux-lts-xenial: bug 1985079
xenial/linux-aws: bug 1985073
xenial/linux-cascade: bug 1985075
xenial/linux-fips: bug 1985076
xenial/linux-kvm: bug 1985077
xenial/linux/caracalla-kernel: bug 1985069
xenial/linux/pc-kernel: bug 1985070
xenial/linux/stlouis-kernel: bug 1985071
  variant: debs
  versions:
main: 4.4.0-233.267
meta: 4.4.0.233.239
signed: 4.4.0-233.267
  ~~:
clamps:
  new-review: ba5b402d1d75ba16
  promote-to-proposed: ba5b402d1d75ba16
  self: 4.4.0-233.267
  sru-review: ba5b402d1d75ba16

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1985080/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1985527] [NEW] xen blkfront leaks memory when disconnecting devices

2022-08-11 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

[Impact]
When xen blkfront devices are unbound, removed, disconnected or suspended, if 
bouncing is enabled but persistent grants are not, it would leak memory.

[Fix]
Revert commit introducing the regression.

[Test case]
suspend/resume a Xen AWS instance and check for memory leaks.

[Potential regression]
AWS Xen instances can see failures on their block devices.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Critical
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Critical

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1985527

Title:
  xen blkfront leaks memory when disconnecting devices

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  [Impact]
  When xen blkfront devices are unbound, removed, disconnected or suspended, if 
bouncing is enabled but persistent grants are not, it would leak memory.

  [Fix]
  Revert commit introducing the regression.

  [Test case]
  suspend/resume a Xen AWS instance and check for memory leaks.

  [Potential regression]
  AWS Xen instances can see failures on their block devices.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1985527/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1983030] [NEW] Kernel fails to boot on some AMD systems

2022-07-28 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

[Impact]
4.4 kernels will fail to boot on AWS instance types m6a and c6a.

[Test case]
Boot kernels on those instance types.

[Fix]
Flushes TLB global mappings when system is not affected by Meltdown.

[Potential regression]
Missing TLB flushes may lead to security vulnerabilities. Unneeded TLB flushes 
lead to performance impact.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1983030

Title:
  Kernel fails to boot on some AMD systems

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress

Bug description:
  [Impact]
  4.4 kernels will fail to boot on AWS instance types m6a and c6a.

  [Test case]
  Boot kernels on those instance types.

  [Fix]
  Flushes TLB global mappings when system is not affected by Meltdown.

  [Potential regression]
  Missing TLB flushes may lead to security vulnerabilities. Unneeded TLB 
flushes lead to performance impact.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1983030/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1982029] Re: xenial/linux: 4.4.0-230.264 -proposed tracker

2022-07-21 Thread Thadeu Lima de Souza Cascardo
Tested the one reproducer we have and the other testing seem fine.
Signing off for release.

** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1982029

Title:
  xenial/linux: 4.4.0-230.264 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  built:
from: 9e2ff1593470bdae
route-entry: 1
  delta:
promote-to-proposed: [signed, meta, main]
  flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Testing
  phase-changed: Wednesday, 20. July 2022 16:01 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
certification-testing: Ongoing -s testing in progress
regression-testing: Ongoing -s testing in progress
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1982027
trusty/linux-lts-xenial: bug 1982028
xenial/linux-aws: bug 1982022
xenial/linux-cascade: bug 1982024
xenial/linux-fips: bug 1982025
xenial/linux-kvm: bug 1982026
xenial/linux/caracalla-kernel: bug 1982018
xenial/linux/pc-kernel: bug 1982019
xenial/linux/stlouis-kernel: bug 1982020
  variant: debs
  versions:
main: 4.4.0-230.264
meta: 4.4.0.230.236
signed: 4.4.0-230.264
  ~~:
clamps:
  new-review: 9e2ff1593470bdae
  promote-to-proposed: 9e2ff1593470bdae
  self: 4.4.0-230.264
  sru-review: 9e2ff1593470bdae

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1982029/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1971450] Re: xenial/linux: 4.4.0-224.257 -proposed tracker

2022-05-10 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1971450

Title:
  xenial/linux: 4.4.0-224.257 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  built:
from: 310354cb3a4a805c
route-entry: 1
  delta:
promote-to-proposed:
- main
- meta
- signed
promote-to-updates:
- main
- meta
- signed
sru-review:
- signed
- main
- meta
  issue: KSRU-1934
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Promote to Updates
  phase-changed: Tuesday, 10. May 2022 12:31 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-updates: Pending -- ready to copy
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1971448
trusty/linux-lts-xenial: bug 1971449
xenial/linux-aws: bug 1971443
xenial/linux-cascade: bug 1971445
xenial/linux-fips: bug 1971446
xenial/linux-kvm: bug 1971447
xenial/linux/caracalla-kernel: bug 1971439
xenial/linux/pc-kernel: bug 1971440
xenial/linux/stlouis-kernel: bug 1971441
  variant: debs
  versions:
main: 4.4.0-224.257
meta: 4.4.0.224.231
signed: 4.4.0-224.257
  ~~:
clamps:
  promote-to-proposed: 310354cb3a4a805c
  self: 4.4.0-224.257
  sru-review: 310354cb3a4a805c

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1971450/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1971480] [NEW] issuing invalid ioctl to /dev/vsock may spam dmesg

2022-05-03 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

[Impact]
Any user may spam dmesg may issuing an invalid ioctl to /dev/vsock.

[Fix]
Do not print anything to dmesg when an invalid ioctl is issued to /dev/vsock.

[Test case]
ioctl(open("/dev/vsock", O_RDONLY), garbage, 0);

[Potential regression]
vsock users may regress.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: linux (Ubuntu Xenial)
 Importance: Low
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Affects: linux (Ubuntu Bionic)
 Importance: Low
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Affects: linux (Ubuntu Focal)
 Importance: Low
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Fix Released

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu Focal)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
     Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1971480

Title:
  issuing invalid ioctl to /dev/vsock may spam dmesg

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Focal:
  In Progress

Bug description:
  [Impact]
  Any user may spam dmesg may issuing an invalid ioctl to /dev/vsock.

  [Fix]
  Do not print anything to dmesg when an invalid ioctl is issued to /dev/vsock.

  [Test case]
  ioctl(open("/dev/vsock", O_RDONLY), garbage, 0);

  [Potential regression]
  vsock users may regress.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971480/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1966469] Re: xenial/linux: 4.4.0-223.256 -proposed tracker

2022-03-31 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/kernel-signoff
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1966469

Title:
  xenial/linux: 4.4.0-223.256 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  built:
route-entry: 1
  delta:
promote-to-proposed:
- signed
- main
- meta
sru-review:
- meta
- signed
- main
  issue: KSRU-1575
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Updates
  phase-changed: Thursday, 31. March 2022 11:25 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1966467
trusty/linux-lts-xenial: bug 1966468
xenial/linux-aws: bug 1966462
xenial/linux-cascade: bug 1966464
xenial/linux-fips: bug 1966465
xenial/linux-kvm: bug 1966466
xenial/linux/caracalla-kernel: bug 1966458
xenial/linux/pc-kernel: bug 1966459
xenial/linux/stlouis-kernel: bug 1966460
  variant: debs
  versions:
main: 4.4.0-223.256
meta: 4.4.0.223.230
signed: 4.4.0-223.256
  ~~:
clamps:
  promote-to-proposed: 8e0429e775e85189
  self: 4.4.0-223.256
  sru-review: 8e0429e775e85189

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1966469/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1966469] Re: xenial/linux: 4.4.0-223.256 -proposed tracker

2022-03-30 Thread Thadeu Lima de Souza Cascardo
Investigating a failure with CVE-2016-3135.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3135

** Changed in: kernel-sru-workflow/regression-testing
   Status: Fix Released => Incomplete

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1966469

Title:
  xenial/linux: 4.4.0-223.256 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  built:
route-entry: 1
  delta:
promote-to-proposed:
- signed
- main
- meta
sru-review:
- meta
- signed
- main
  issue: KSRU-1575
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Ready for Signoff
  phase-changed: Wednesday, 30. March 2022 11:41 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
kernel-signoff: Stalled -s waiting for signoff
promote-to-updates: Pending -- snap not yet in candidate
  synthetic:
:promote-to-as-proposed: Invalid
  trackers:
trusty/linux-aws: bug 1966467
trusty/linux-lts-xenial: bug 1966468
xenial/linux-aws: bug 1966462
xenial/linux-cascade: bug 1966464
xenial/linux-fips: bug 1966465
xenial/linux-kvm: bug 1966466
xenial/linux/caracalla-kernel: bug 1966458
xenial/linux/pc-kernel: bug 1966459
xenial/linux/stlouis-kernel: bug 1966460
  variant: debs
  versions:
main: 4.4.0-223.256
meta: 4.4.0.223.230
signed: 4.4.0-223.256
  versions-clamp:
self: 4.4.0-223.256

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1966469/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1961338] Re: Disable unprivileged BPF by default

2022-03-09 Thread Thadeu Lima de Souza Cascardo
** Information type changed from Private Security to Public Security

** Changed in: linux (Ubuntu Xenial)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1961338

Title:
  Disable unprivileged BPF by default

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Focal:
  Fix Released

Bug description:
  [Impact]
  Unprivileged users have access to BPF, allowing them to execute code in the 
kernel under their control. Though restricted and verified, a lot of security 
issues have been uncovered over the years, indicating that it should be 
disabled by default in order to protect our users.

  Admins can reenable that access or give CAP_BPF to programs if needed.

  [Test case]
  A qa-regression-testing testcase has been added that checks for the ability 
to load BPF programs under different circumstances.

  [Potential regression]
  Users who rely on unprivileged BPF access will need to change the setting or 
give CAP_BPF to their programs. Also, sysctl and bpf code might be affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1961338/+subscriptions


___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1892165] Re: futex_wake04 from ubuntu_ltp_syscalls failed on X i386

2021-06-08 Thread Thadeu Lima de Souza Cascardo
https://lists.linux.it/pipermail/ltp/2021-June/023076.html

** Changed in: linux (Ubuntu Bionic)
   Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: Won't Fix => Invalid

** Changed in: ubuntu-kernel-tests
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: ubuntu-kernel-tests
   Status: New => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1892165

Title:
  futex_wake04 from ubuntu_ltp_syscalls failed on X i386

Status in ubuntu-kernel-tests:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Invalid
Status in linux source package in Bionic:
  Invalid

Bug description:
  Issue found on Xenial i386 node "pepe" with 4.4.0-189.219 generic /
  low-latency (passed on other arches)

  <<>>
  tag=futex_wake04 stime=1597828807
  cmdline="futex_wake04"
  contacts=""
  analysis=exit
  <<>>
  incrementing stop
  tst_hugepage.c:58: INFO: 1 hugepage(s) reserved
  tst_test.c:1250: INFO: Timeout per run is 0h 05m 00s
  futex_wake04.c:60: INFO: Testing variant: syscall with old kernel spec
  futex_wake04.c:98: INFO: Hugepagesize 2097152
  futex_utils.h:51: INFO: Thread 13011 not sleeping yet
  futex_wake04.c:85: FAIL: Bug: wait_thread2 did not wake after 30 secs.: 
EINVAL (22)
  futex_utils.h:62: INFO: 0 threads sleeping, expected 2
  tst_test.c:1250: INFO: Timeout per run is 0h 05m 00s
  futex_wake04.c:60: INFO: Testing variant: syscall time64 with kernel spec
  ../../../../include/tst_timer.h:261: CONF: syscall(422) __NR_futex_time64 not 
supported

  Summary:
  passed   0
  failed   1
  skipped  1
  warnings 0
  <<>>
  initiation_status="ok"
  duration=0 termination_type=exited termination_id=33 corefile=no
  cutime=0 cstime=4
  <<>>

  This can be reproduced on 4.4.0-187-generic as well, not a regression.

  Possibly cause by commit https://github.com/linux-test-
  project/ltp/commit/8d2c9c7d597c4b220c52bbbd0ab849ece86fe12c in LTP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1892165/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1892165] Re: futex_wake04 from ubuntu_ltp_syscalls failed on X i386

2021-06-08 Thread Thadeu Lima de Souza Cascardo
Hi, PHLin.

I have done some work on futex recently, I can take a look at this on
bionic, since we are not going to fix it on xenial.

Cascardo.

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => Won't Fix

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1892165

Title:
  futex_wake04 from ubuntu_ltp_syscalls failed on X i386

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Won't Fix
Status in linux source package in Bionic:
  New

Bug description:
  Issue found on Xenial i386 node "pepe" with 4.4.0-189.219 generic /
  low-latency (passed on other arches)

  <<>>
  tag=futex_wake04 stime=1597828807
  cmdline="futex_wake04"
  contacts=""
  analysis=exit
  <<>>
  incrementing stop
  tst_hugepage.c:58: INFO: 1 hugepage(s) reserved
  tst_test.c:1250: INFO: Timeout per run is 0h 05m 00s
  futex_wake04.c:60: INFO: Testing variant: syscall with old kernel spec
  futex_wake04.c:98: INFO: Hugepagesize 2097152
  futex_utils.h:51: INFO: Thread 13011 not sleeping yet
  futex_wake04.c:85: FAIL: Bug: wait_thread2 did not wake after 30 secs.: 
EINVAL (22)
  futex_utils.h:62: INFO: 0 threads sleeping, expected 2
  tst_test.c:1250: INFO: Timeout per run is 0h 05m 00s
  futex_wake04.c:60: INFO: Testing variant: syscall time64 with kernel spec
  ../../../../include/tst_timer.h:261: CONF: syscall(422) __NR_futex_time64 not 
supported

  Summary:
  passed   0
  failed   1
  skipped  1
  warnings 0
  <<>>
  initiation_status="ok"
  duration=0 termination_type=exited termination_id=33 corefile=no
  cutime=0 cstime=4
  <<>>

  This can be reproduced on 4.4.0-187-generic as well, not a regression.

  Possibly cause by commit https://github.com/linux-test-
  project/ltp/commit/8d2c9c7d597c4b220c52bbbd0ab849ece86fe12c in LTP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1892165/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1924611] Re: setting extended attribute may cause memory leak

2021-04-19 Thread Thadeu Lima de Souza Cascardo
$ uname -a
Linux focal 5.6.0-1055-oem #59-Ubuntu SMP Fri Apr 16 08:43:28 UTC 2021 x86_64 
x86_64 x86_64 GNU/Linux
$ ./leak.sh
$ echo $?
0
$ 


** Changed in: linux-hwe (Ubuntu)
   Status: New => Invalid

** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1924611

Title:
  setting extended attribute may cause memory leak

Status in linux package in Ubuntu:
  Invalid
Status in linux-gke-5.3 package in Ubuntu:
  Invalid
Status in linux-hwe package in Ubuntu:
  Invalid
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux-raspi2-5.3 package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Committed
Status in linux-gke-5.3 source package in Xenial:
  Invalid
Status in linux-hwe source package in Xenial:
  Invalid
Status in linux-oem-5.6 source package in Xenial:
  Invalid
Status in linux-raspi2-5.3 source package in Xenial:
  Invalid
Status in linux source package in Bionic:
  Invalid
Status in linux-gke-5.3 source package in Bionic:
  Triaged
Status in linux-hwe source package in Bionic:
  Fix Committed
Status in linux-oem-5.6 source package in Bionic:
  Invalid
Status in linux-raspi2-5.3 source package in Bionic:
  In Progress
Status in linux source package in Focal:
  Invalid
Status in linux-gke-5.3 source package in Focal:
  Invalid
Status in linux-hwe source package in Focal:
  Invalid
Status in linux-oem-5.6 source package in Focal:
  Fix Committed
Status in linux-raspi2-5.3 source package in Focal:
  Invalid

Bug description:
  [Impact]
  A memory leak may happen when an error happens when setting extended 
attributes.

  [Fix]
  The issue was introduced by an improper backport, so the fix is specific to 
Ubuntu, so a SAUCE patch.

  [Test case]
  Test setting attribute under a user namespace.

  [Regression potential]
  A double free bug might be introduced. Or setting extended attributes might 
fail.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1924611/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1924644] Re: xenial/linux: 4.4.0-210.242 -proposed tracker

2021-04-19 Thread Thadeu Lima de Souza Cascardo
$ uname -a
Linux xenial 4.4.0-210-generic #242-Ubuntu SMP Fri Apr 16 09:57:56 UTC 2021 
x86_64 x86_64 x86_64 GNU/Linux
$ ./leak.sh
$ echo $?
0
$ 


** Changed in: kernel-sru-workflow/verification-testing
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1924644

Title:
  xenial/linux: 4.4.0-210.242 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  built:
main: build#1
meta: build#1
signed: build#1
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Signoff
  phase-changed: Monday, 19. April 2021 12:17 UTC
  promote:
  - main
  - meta
  - signed
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-updates: 'Holding -- waiting for signoffs:
  security-signoff'
security-signoff: Pending -- waiting for signoff
  synthetic:
:promote-to-as-proposed: Fix Released
  trackers:
trusty/linux-aws: bug 1924641
trusty/linux-lts-xenial: bug 1924642
xenial/linux-aws: bug 1924632
xenial/linux-cascade: bug 1924634
xenial/linux-fips: bug 1924635
xenial/linux-kvm: bug 1924636
xenial/linux-raspi2: bug 1924638
xenial/linux-snapdragon: bug 1924640
xenial/linux/caracalla-kernel: bug 1924628
xenial/linux/pc-kernel: bug 1924629
xenial/linux/stlouis-kernel: bug 1924630
  variant: debs
  versions:
main: 4.4.0-210.242
meta: 4.4.0.210.216
signed: 4.4.0-210.242
source: 4.4.0-210.242

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1924644/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1924611] [NEW] setting extended attribute may cause memory leak

2021-04-15 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

[Impact]
A memory leak may happen when an error happens when setting extended attributes.

[Fix]
The issue was introduced by an improper backport, so the fix is specific to 
Ubuntu, so a SAUCE patch.

[Test case]
Test setting attribute under a user namespace.

[Regression potential]
A double free bug might be introduced. Or setting extended attributes might 
fail.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-gke-5.3 (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-oem-5.6 (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-raspi2-5.3 (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Critical
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Affects: linux-gke-5.3 (Ubuntu Xenial)
 Importance: Undecided
 Status: Invalid

** Affects: linux-oem-5.6 (Ubuntu Xenial)
 Importance: Undecided
 Status: Invalid

** Affects: linux-raspi2-5.3 (Ubuntu Xenial)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Bionic)
 Importance: Undecided
 Status: Invalid

** Affects: linux-gke-5.3 (Ubuntu Bionic)
 Importance: Critical
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: Triaged

** Affects: linux-oem-5.6 (Ubuntu Bionic)
 Importance: Undecided
 Status: Invalid

** Affects: linux-raspi2-5.3 (Ubuntu Bionic)
 Importance: Critical
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Affects: linux (Ubuntu Focal)
 Importance: Undecided
 Status: Invalid

** Affects: linux-gke-5.3 (Ubuntu Focal)
 Importance: Undecided
 Status: Invalid

** Affects: linux-oem-5.6 (Ubuntu Focal)
 Importance: Critical
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: Triaged

** Affects: linux-raspi2-5.3 (Ubuntu Focal)
 Importance: Undecided
 Status: Invalid

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Critical

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Also affects: linux-oem-5.6 (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.6 (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-5.6 (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-oem-5.6 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-oem-5.6 (Ubuntu Focal)
   Status: New => Triaged

** Changed in: linux-oem-5.6 (Ubuntu Focal)
   Importance: Undecided => Critical

** Changed in: linux-oem-5.6 (Ubuntu Focal)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.6 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Invalid

** Changed in: linux-oem-5.6 (Ubuntu Bionic)
   Status: New => Invalid

** Also affects: linux-gke-5.3 (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2-5.3 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-gke-5.3 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-gke-5.3 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-gke-5.3 (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-gke-5.3 (Ubuntu Bionic)
   Importance: Undecided => Critical

** Changed in: linux-gke-5.3 (Ubuntu Bionic)
   Status: New => Triaged

** Changed in: linux-gke-5.3 (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux-raspi2-5.3 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-raspi2-5.3 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2-5.3 (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-raspi2-5.3 (Ubuntu Bionic)
   Importance: Undecided => Critical

** Changed in: linux-raspi2-5.3 (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux-raspi2-5.3 (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://

[Group.of.nepali.translators] [Bug 1910749] Re: stop building nvidia dkms on kernels with no lrm

2021-02-02 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-hwe-5.0 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-hwe-5.0 (Ubuntu Bionic)
   Status: New => Fix Committed

** Changed in: linux-hwe-5.0 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-kvm (Ubuntu Bionic)
   Status: New => Fix Committed

** Changed in: linux-kvm (Ubuntu)
   Status: New => Invalid

** Changed in: linux-hwe-5.0 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-kvm (Ubuntu Xenial)
   Status: New => Invalid

** Also affects: linux-gke-5.0 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-gke-5.0 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-gke-5.0 (Ubuntu Bionic)
   Status: New => Fix Committed

** Changed in: linux-gke-5.0 (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1910749

Title:
  stop building nvidia dkms on kernels with no lrm

Status in linux package in Ubuntu:
  Invalid
Status in linux-gke-5.0 package in Ubuntu:
  Invalid
Status in linux-hwe-5.0 package in Ubuntu:
  Invalid
Status in linux-kvm package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Committed
Status in linux-gke-5.0 source package in Xenial:
  Invalid
Status in linux-hwe-5.0 source package in Xenial:
  Invalid
Status in linux-kvm source package in Xenial:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in linux-gke-5.0 source package in Bionic:
  Fix Committed
Status in linux-hwe-5.0 source package in Bionic:
  Fix Committed
Status in linux-kvm source package in Bionic:
  Fix Committed

Bug description:
  [Impact]
  Building these modules wastes build time, and also may potentially lead to 
unnecessary updates.

  [Fix]
  Set do_dkms_nvidia = false on amd64.mk.

  [Test case]
  Build test the kernel.

  [Potential regression]
  Missing signed bits for these modules, in case someone uses them without LRMs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1910749/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1866149] Re: CONFIG_BASE_SMALL=1 restricts pid space, which conflicts with systemd default sysctl

2021-01-08 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu)
   Status: Incomplete => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux (Ubuntu Bionic)
   Status: New => Invalid

** Changed in: linux (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux (Ubuntu Groovy)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1866149

Title:
  CONFIG_BASE_SMALL=1 restricts pid space, which conflicts with systemd
  default sysctl

Status in linux package in Ubuntu:
  Invalid
Status in linux-kvm package in Ubuntu:
  Incomplete
Status in linux source package in Xenial:
  Invalid
Status in linux-kvm source package in Xenial:
  In Progress
Status in linux source package in Bionic:
  Invalid
Status in linux-kvm source package in Bionic:
  In Progress
Status in linux source package in Focal:
  Invalid
Status in linux-kvm source package in Focal:
  In Progress
Status in linux source package in Groovy:
  Invalid
Status in linux-kvm source package in Groovy:
  In Progress

Bug description:
  [Impact]
  systemd-systemctl will fail to set kernel.pid_max, leading to a degraded boot.

  [Fix]
  Set CONFIG_BASE_FULL=y, CONFIG_BASE_SMALL=0.

  [Test case]
  Write 419304 to /proc/sys/kernel/pid_max.

  [Potential regression]
  Boot time may be affected.

  
  

  I'm not completely sure which package to log this against.

  I'm running the kvm focal minimal cloud image from 20200302. I noticed
  on boot that there was an error complaining that systemd-systemctl
  couldn't update pid_max to the value it wanted:

  systemd-sysctl[117]: Couldn't write '4194304' to 'kernel/pid_max':
  Invalid argument

  Digging into it a bit more, this comes from /usr/lib/sysctl.d/50-pid-max.conf:
  # Bump the numeric PID range to its maximum of 2^22 (from the in-kernel 
default
  # of 2^16), to make PID collisions less likely.
  kernel.pid_max = 4194304

  However, the linux-image-kvm kernel is compiled with
  CONFIG_BASE_SMALL=1

  and this triggers the following code in include/linux/threads.h

  #define PID_MAX_LIMIT (CONFIG_BASE_SMALL ? PAGE_SIZE * 8 : \
   (sizeof(long) > 4 ? 4 * 1024 * 1024 : PID_MAX_DEFAULT))

  which means that if CONFIG_BASE_SMALL is set we get a maximum limit of
  PAGE_SIZE * 8, which on x86 would be 32768.

  As a workaround I can override it with a file in /etc/sysctl.d/ but
  this shouldn't be needed.

  I really don't know if CONFIG_BASE_SMALL makes any sense on x86 cloud
  images, they really aren't small machines in the scheme of things!

  Cheers

  David

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1866149/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1910749] [NEW] stop building nvidia dkms on kernels with no lrm

2021-01-08 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

[Impact]
Building these modules wastes build time, and also may potentially lead to 
unnecessary updates.

[Fix]
Set do_dkms_nvidia = false on amd64.mk.

[Test case]
Build test the kernel.

[Potential regression]
Missing signed bits for these modules, in case users use them somewhat, without 
our support.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Low
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Affects: linux (Ubuntu Bionic)
 Importance: Low
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1910749

Title:
  stop building nvidia dkms on kernels with no lrm

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Bionic:
  In Progress

Bug description:
  [Impact]
  Building these modules wastes build time, and also may potentially lead to 
unnecessary updates.

  [Fix]
  Set do_dkms_nvidia = false on amd64.mk.

  [Test case]
  Build test the kernel.

  [Potential regression]
  Missing signed bits for these modules, in case users use them somewhat, 
without our support.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1910749/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1842479] Re: timer_create will fail with invalid error code

2020-11-26 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1842479

Title:
  timer_create will fail with invalid error code

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Disco:
  Won't Fix
Status in linux source package in Eoan:
  Won't Fix

Bug description:
  [Impact]
  On some OpenPower systems, RTC does not support set_alarm, and 
timer_create(CLOCK_REALTIME_ALARM, ...) will fail with ENOTSUPP instead of 
EOPNOTSUPP. This will break some regression testing that expects the later 
value.

  [Test cases]
  Run LTP syscalls regression testing, which we do before releasing kernels.

  [Regression potential]
  This should not break any userspace, as none should be using/expecting 
ENOTSUPP for any call. In order to do so, they would have to go out of their 
way as it's not defined on libc headers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1842479/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1905475] Re: Fails to build on powerpc

2020-11-24 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Incomplete => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1905475

Title:
  Fails to build on powerpc

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  [Impact]
  powerpc flavor powerpc64-emb fails to build with kernel 4.4.0-196.

  [Test case]
  Build the kernel with all powerpc flavors.

  [Potential regression]
  The kernel might still not boot. Userspace data might be corrupted when 
kernel writes to it. Kernel might not read userspace data correctly and on-disk 
data would get corrupted.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1905475/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1876982] Re: tunnels over IPv6 are unencrypted when using IPsec

2020-07-03 Thread Thadeu Lima de Souza Cascardo
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1876982

Title:
  tunnels over IPv6 are unencrypted when using IPsec

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released

Bug description:
  [Impact]
  When tunnels are configured over IPv6 using a xfrm policy, it's ignored. That 
means data will be unencrypted when it shouldn't.

  [Test case]

  Launch a VM with the given kernel and monitor its network link on the host 
with:
  tcpdump -n -i virbr0 ip6 and port 4789

  In the guest, set up a tunnel using an IPv6 address:
  ip link add type vxlan id 5 remote fd00:cafe::2 dstport 4789

  When setting the link up, observe packets being output on the host side:
  ip link set vxlan0 up

  Set the link down, and add a xfrm policy to block output to that given IPv6 
address:
  ip link set vxlan0 down
  ip xfrm policy add dst fd00:cafe::2 dir out action block

  Check that using ping won't work with Operation not permitted:
  ping6 fd00:cafe::2
  connect: Operation not permitted

  Set the vxlan link up and watch that no packets appear on tcpdump:
  ip link set vxlan0 up

  [Regression potential]
  Tunnels like VXLAN, GENEVE, etc, will stop to send. The test has shown that 
it still sends at least when no xfrm policy is configured.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1876982/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1881339] [NEW] readdir performance when copying to userspace

2020-05-29 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

The following fixes were backported to bionic and xenial to prevent a
potential security issue:

- Make filldir[64]() verify the directory entry filename is valid
- filldir[64]: remove WARN_ON_ONCE() for bad directory entries

In that process, they introduced a potential performace impact on
readdir. How much is yet to be measured.

9f79b78ef74436c7507bac6bfb7b8b989263bccb Convert filldir[64]() from 
__put_user() to unsafe_put_user()
c512c69187197fe08026cb5bbe7b9709f4f89b73 uaccess: implement a proper 
unsafe_copy_to_user() and switch filldir over to it

The two commits above try to mitigate that performance impact. At least
on x86 with SMAP, that should have some effect. At any other platforms,
at least on bionic and xenial, any improvements should be measured.
Though that is true for x86 with SMAP too.

This bug is opened in order to keep track of that possible performance
improvement we might add in the future as followup for those two
commits.

Cascardo.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: linux (Ubuntu Xenial)
 Importance: Low
 Status: Triaged

** Affects: linux (Ubuntu Bionic)
 Importance: Low
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: kernel-sru-workflow

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Triaged

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881339

Title:
  readdir performance when copying to userspace

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Triaged
Status in linux source package in Bionic:
  In Progress

Bug description:
  The following fixes were backported to bionic and xenial to prevent a
  potential security issue:

  - Make filldir[64]() verify the directory entry filename is valid
  - filldir[64]: remove WARN_ON_ONCE() for bad directory entries

  In that process, they introduced a potential performace impact on
  readdir. How much is yet to be measured.

  9f79b78ef74436c7507bac6bfb7b8b989263bccb Convert filldir[64]() from 
__put_user() to unsafe_put_user()
  c512c69187197fe08026cb5bbe7b9709f4f89b73 uaccess: implement a proper 
unsafe_copy_to_user() and switch filldir over to it

  The two commits above try to mitigate that performance impact. At
  least on x86 with SMAP, that should have some effect. At any other
  platforms, at least on bionic and xenial, any improvements should be
  measured. Though that is true for x86 with SMAP too.

  This bug is opened in order to keep track of that possible performance
  improvement we might add in the future as followup for those two
  commits.

  Cascardo.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1881339/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1876982] [NEW] tunnels over IPv6 are unencrypted when using IPsec

2020-05-05 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

[Impact]
When tunnels are configured over IPv6 using a xfrm policy, it's ignored. That 
means data will be unencrypted when it shouldn't.

[Test case]

[Regression potential]
Tunnels like VXLAN, GENEVE, etc, will stop to send. The test has shown that it 
still sends at least when no xfrm policy is configured.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1876982

Title:
  tunnels over IPv6 are unencrypted when using IPsec

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  New
Status in linux source package in Bionic:
  New

Bug description:
  [Impact]
  When tunnels are configured over IPv6 using a xfrm policy, it's ignored. That 
means data will be unencrypted when it shouldn't.

  [Test case]

  [Regression potential]
  Tunnels like VXLAN, GENEVE, etc, will stop to send. The test has shown that 
it still sends at least when no xfrm policy is configured.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1876982/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1349028] Re: getitimer returns it_value=0 erroneously

2020-04-23 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Medium
 Assignee: Colin Ian King (colin-king)
   Status: Fix Released

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1349028

Title:
  getitimer returns it_value=0 erroneously

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Eoan:
  In Progress
Status in linux source package in Focal:
  Fix Released

Bug description:
  According to the 'getitimer()' man page: "The element it_value is set
  to the amount of time remaining on the timer, or zero if the  timer is
  disabled.  Similarly, it_interval is set to the reset value."

  As such the following Perl program should never exit:

  use Time::HiRes;
  $SIG{VTALRM} = sub { };
  Time::HiRes::setitimer(::HiRes::ITIMER_VIRTUAL, 0.5, 0.4);
  while (1) {
  my @t = Time::HiRes::getitimer(::HiRes::ITIMER_VIRTUAL);
  exit 0 if $t[0] == 0;
  }

  and on linux-image 3.11.0-18-generic (and all other systems tested) it
  loops forever but 3.13.0-32-generic it exits.  Have not bisected
  between those kernels, nor am I likely to be able to do so soon.

  This Perl program shows the timer countdown:

  use Time::HiRes;
  my $r = [Time::HiRes::gettimeofday()];
  sub display {
  my ($desc) = @_;
  my @t = Time::HiRes::getitimer(::HiRes::ITIMER_VIRTUAL);
  my $i = Time::HiRes::tv_interval($r);
  printf "%s: elasped=%.8f; time left=%.6f reset time=%.6f\n", $desc,
  $i,@t;
  }
  $SIG{VTALRM} = sub {
  display('VTALRM');
  exit;
  };
  Time::HiRes::setitimer(::HiRes::ITIMER_VIRTUAL, 0.5, 0.4);
  while (1) {
  display('inloop');
  }

  on other (working) systems it gives:

  inloop: elasped=1.65178400; time left=0.001000 reset time=0.401000
  inloop: elasped=1.65184200; time left=0.001000 reset time=0.401000
  inloop: elasped=1.65186800; time left=0.001000 reset time=0.401000
  inloop: elasped=1.65192300; time left=0.001000 reset time=0.401000
  inloop: elasped=1.65198100; time left=0.001000 reset time=0.401000
  VTALRM: elasped=1.65209800; time left=0.40 reset time=0.401000
  (end of file)

  but on the 3.13.0-32-generic or later kernel I get:

  inloop: elasped=0.54692100; time left=0.33 reset time=0.40
  inloop: elasped=0.54692800; time left=0.26 reset time=0.40
  inloop: elasped=0.54693500; time left=0.20 reset time=0.40
  inloop: elasped=0.54694100; time left=0.13 reset time=0.40
  inloop: elasped=0.54694800; time left=0.07 reset time=0.40
  inloop: elasped=0.54695500; time left=0.00 reset time=0.40
  inloop: elasped=0.54696200; time left=0.004000 reset time=0.40
  [...]
  VTALRM: elasped=0.55013600; time left=0.397062 reset time=0.40
  (end of file)

  The reset time also looks dodgy.

  Hardware is an Intel Core i7-920 on Asus P6T Deluxe v2 (X58)
  motherboard and hasn't changed.

  
  Requested information:

  Ubuntu 3.13.0-32.57-generic 3.13.11.4

  Description:  Ubuntu 14.04.1 LTS
  Release:  14.04

  # apt-cache policy linux-image-generic
  linux-image-generic:
Installed: 3.13.0.32.38
Candidate: 3.13.0.32.38
Version table:
   *** 3.13.0.32.38 0
  500 http://us.archive.ubuntu.com/ubuntu/ trusty-updates/main amd64 
Packages
  500 http://us.archive.ubuntu.com/ubuntu/ trusty-security/main amd64 
Packages
  500 http://us.archive.ubuntu.com/ubuntu/ trusty-proposed/main amd64 
Packages
  500 http://ppa.launchpad.net/canonical-kernel-team/ppa/ubuntu/ 
trusty/main amd64 Packages
  100 /var/lib/dpkg/status
   3.13.0.24.28 0
  500 http://us.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages
  --- 
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPI

[Group.of.nepali.translators] [Bug 1800566] Re: Make reset_devices parameter default for kdump and decouple kdump systemd service from the KDUMP_CMDLINE_APPEND

2019-12-20 Thread Thadeu Lima de Souza Cascardo
** Changed in: makedumpfile (Ubuntu Disco)
   Status: Confirmed => Won't Fix

** Changed in: makedumpfile (Ubuntu Focal)
   Status: Confirmed => In Progress

** Changed in: makedumpfile (Ubuntu Eoan)
   Status: Confirmed => In Progress

** Changed in: makedumpfile (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Changed in: makedumpfile (Ubuntu Xenial)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1800566

Title:
  Make reset_devices parameter default for kdump and decouple kdump
  systemd service from the KDUMP_CMDLINE_APPEND

Status in makedumpfile package in Ubuntu:
  In Progress
Status in makedumpfile source package in Trusty:
  Won't Fix
Status in makedumpfile source package in Xenial:
  In Progress
Status in makedumpfile source package in Bionic:
  In Progress
Status in makedumpfile source package in Cosmic:
  Won't Fix
Status in makedumpfile source package in Disco:
  Won't Fix
Status in makedumpfile source package in Eoan:
  In Progress
Status in makedumpfile source package in Focal:
  In Progress

Bug description:
  [Impact]

  * Kdump does not configure by default the crash kernel to perform a
  device reset by default, by passing the "reset_devices" parameter.
  Also, the systemd service "kdump-tools-dump" is tightly-coupled with
  KDUMP_CMDLINE_APPEND and it shouldn't, to prevent user confusion.

  * Kernel has the "reset_devices" parameter that drivers can opt-in,
  and perform special activity in case this parameter is parsed from
  command-line. For example, in kdump kernels it hints the drivers that
  they are booting from a non-healthy condition and needs to issue some
  form of reset to the adapter, like clearing DMA mapping in their
  firmware for example. Users currently (kernel v5.2) are: aacraid,
  hpsa, ipr, megaraid_sas, mpt3sas, smartpqi, xenbus.

  This should be enabled by default in the kdump config file to be added
  in the kdump kernel command-line for all versions.

  * The systemd service"kdump-tools-dump" is responsible for triggering the 
execution of the makedumpfile tool ultimately. Kdump from Xenial+ releases rely 
on systemd as their init system, so this service is the way to trigger the 
kdump mechanism. Currently it is configured as any other parameter in 
KDUMP_CMDLINE_APPEND, meaning if user decides to change the line they need to 
remember adding the systemd service back. It's not really a parameter that 
should be easily manipulated in kdump line, since there's no use for it except 
to instruct systemd to load kdump; the only 
  reasonable case for removing it is to debug kdump itself.

  
  [Test Case]

  1) Deploy a Disco VM e.g. with uvt-kvm
  2) Install the kdump-tools package
  3) Run `kdump-config test`and check for the 'reset_devices' parameter:

  $ kdump-config test
  ...
  kexec command to be used:
    /sbin/kexec -p --command-line="BOOT_IMAGE=/boot/vmlinuz-4.15.0-45-generic 
root=LABEL=cloudimg-rootfs ro console=tty1 console=ttyS0 nr_cpus=1 
systemd.unit=kdump-tools.service irqpoll nousb ata_piix.prefer_ms_hyperv=0" 
/var/lib/kdump/vmlinuz

  Also, by changing the KDUMP_CMDLINE_APPEND we can see "systemd.unit
  =kdump-tools.service" to be removed.

  
  [Regression Potential]

  The regression potential is low, since it doesn't need any changes in
  makedumpfile code and we're only adding a parameter on the crash
  kernel command-line. The risks are related with bad behavior with the
  kernel when using "reset_devices", like if the driver has bugs in this
  path. It's considered safer to have the option (and this way prevent
  problems for booting a unhealthy kernel with potential stuck DMAs in
  the devices) than not having it.

  Regarding the other change, about the systemd service, it'll only
  affect users the are debugging kdump itself and it has no known
  regression potential.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1800566/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828596] Re: kdump fails when crash is triggered after DLPAR cpu add operation

2019-12-19 Thread Thadeu Lima de Souza Cascardo
** Changed in: makedumpfile (Ubuntu Disco)
   Status: In Progress => Won't Fix

** Changed in: makedumpfile (Ubuntu Xenial)
   Status: New => In Progress

** Patch added: "focal debdiff"
   
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1828596/+attachment/5314048/+files/makedumpfile_1.6.6-4ubuntu1.debdiff

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828596

Title:
  kdump fails when crash is triggered after DLPAR cpu add operation

Status in The Ubuntu-power-systems project:
  In Progress
Status in makedumpfile package in Ubuntu:
  In Progress
Status in makedumpfile source package in Xenial:
  In Progress
Status in makedumpfile source package in Bionic:
  In Progress
Status in makedumpfile source package in Cosmic:
  Won't Fix
Status in makedumpfile source package in Disco:
  Won't Fix
Status in makedumpfile source package in Eoan:
  In Progress

Bug description:
  [Impact]
  After a CPU add/hotplug operation on Power systems, kdump will fail after a 
crash. The kdump kernel needs to be reloaded after a CPU add/hotplug.

  [Test case]
  Do CPU add/hotplug, trigger a crash, and check for a successful kdump.

  [Regression potential]
  Multiple reloads caused by multiple sequential CPU adds may cause spurious 
log results, and systemd may fail to properly reload the kdump kernel. This has 
been handled by resetting the failure counter when doing such reloads.

  == Comment: #0 - Hari Krishna Bathini - 2019-05-10 05:55:40 ==
  ---Problem Description---
  kdump fails when crash is triggered after CPU add operation.

  Machine Type = na

  ---System Hang---
   Crashed in early boot process of kdump kernel after crash

  Had to issue system reset from HMC to reclaim

  ---Steps to Reproduce---
   1. Configure kdump.
  2. Add cpu from HMC.
  3. Trigger crash.
  4. Machine hangs after crash as below:

  ---
  [169250.213166] IPI complete
  [169250.234331] kexec: Starting switchover sequence.
  I'm in purgatory
   --- STRUCK HERE ---

  ---uname output---
  na

  ---Debugger---
  A debugger is not configured

  == Comment: #1 - Hari Krishna Bathini  - 2019-05-10 05:56:46 ==
  The problem is, kexec udev rule to restart kdump-tools service - when a core 
is added,
  is not being triggered. The old DT created by kexec (before the core is added)
  is being used by KDump Kernel. So, when system crashes on a thread from
  the added core(s), KDump kernel is failing to get the 'boot_cpuid' and
  eventually failing to boot..

  == Comment: #2 - Hari Krishna Bathini - 2019-05-10 06:02:27 ==
  The udev rule when CPU is added is not triggered because ppc64 does not
  eject add/remove event when a CPU is hot added/removed. It only ejects
  online/offline event to user space when CPU is hot added/removed.

  So, the below udev rules are never triggered when needed:

  SUBSYSTEM=="cpu", ACTION=="add", PROGRAM="/bin/systemctl try-restart 
kdump-tools.service"
  SUBSYSTEM=="cpu", ACTION=="remove", PROGRAM="/bin/systemctl try-restart 
kdump-tools.service"

  Also, with how CPU hot add & remove are handled in ppc64, a udev trigger
  to reload kdump after CPU is hot removed is NOT necessary. So, fix the CPU
  hot add case by updating the udev rule and drop the udev rule meant for CPU
  hot remove in the kdump udev rules file:

  SUBSYSTEM=="cpu", ACTION=="online", PROGRAM="/bin/systemctl try-
  restart kdump-tools.service"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1828596/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1828596] Re: kdump fails when crash is triggered after DLPAR cpu add operation

2019-09-18 Thread Thadeu Lima de Souza Cascardo
** Changed in: makedumpfile (Ubuntu Eoan)
   Status: Fix Released => In Progress

** Changed in: makedumpfile (Ubuntu Disco)
   Status: Fix Committed => In Progress

** Changed in: makedumpfile (Ubuntu Bionic)
   Status: Won't Fix => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1828596

Title:
  kdump fails when crash is triggered after DLPAR cpu add operation

Status in The Ubuntu-power-systems project:
  In Progress
Status in makedumpfile package in Ubuntu:
  In Progress
Status in makedumpfile source package in Xenial:
  New
Status in makedumpfile source package in Bionic:
  In Progress
Status in makedumpfile source package in Cosmic:
  Won't Fix
Status in makedumpfile source package in Disco:
  In Progress
Status in makedumpfile source package in Eoan:
  In Progress

Bug description:
  [Impact]
  After a CPU add/hotplug operation on Power systems, kdump will fail after a 
crash. The kdump kernel needs to be reloaded after a CPU add/hotplug.

  [Test case]
  Do CPU add/hotplug, trigger a crash, and check for a successful kdump.

  [Regression potential]
  Multiple reloads caused by multiple sequential CPU adds may cause spurious 
log results, and systemd may fail to properly reload the kdump kernel. This has 
been handled by resetting the failure counter when doing such reloads.

  == Comment: #0 - Hari Krishna Bathini - 2019-05-10 05:55:40 ==
  ---Problem Description---
  kdump fails when crash is triggered after CPU add operation.

  Machine Type = na

  ---System Hang---
   Crashed in early boot process of kdump kernel after crash

  Had to issue system reset from HMC to reclaim

  ---Steps to Reproduce---
   1. Configure kdump.
  2. Add cpu from HMC.
  3. Trigger crash.
  4. Machine hangs after crash as below:

  ---
  [169250.213166] IPI complete
  [169250.234331] kexec: Starting switchover sequence.
  I'm in purgatory
   --- STRUCK HERE ---

  ---uname output---
  na

  ---Debugger---
  A debugger is not configured

  == Comment: #1 - Hari Krishna Bathini  - 2019-05-10 05:56:46 ==
  The problem is, kexec udev rule to restart kdump-tools service - when a core 
is added,
  is not being triggered. The old DT created by kexec (before the core is added)
  is being used by KDump Kernel. So, when system crashes on a thread from
  the added core(s), KDump kernel is failing to get the 'boot_cpuid' and
  eventually failing to boot..

  == Comment: #2 - Hari Krishna Bathini - 2019-05-10 06:02:27 ==
  The udev rule when CPU is added is not triggered because ppc64 does not
  eject add/remove event when a CPU is hot added/removed. It only ejects
  online/offline event to user space when CPU is hot added/removed.

  So, the below udev rules are never triggered when needed:

  SUBSYSTEM=="cpu", ACTION=="add", PROGRAM="/bin/systemctl try-restart 
kdump-tools.service"
  SUBSYSTEM=="cpu", ACTION=="remove", PROGRAM="/bin/systemctl try-restart 
kdump-tools.service"

  Also, with how CPU hot add & remove are handled in ppc64, a udev trigger
  to reload kdump after CPU is hot removed is NOT necessary. So, fix the CPU
  hot add case by updating the udev rule and drop the udev rule meant for CPU
  hot remove in the kdump udev rules file:

  SUBSYSTEM=="cpu", ACTION=="online", PROGRAM="/bin/systemctl try-
  restart kdump-tools.service"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1828596/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1842744] [NEW] xenial/linux-hwe: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1842746
variant: debs

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-hwe (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-hwe (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1842746 kernel-sru-cycle-2019.08.12-11 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux-hwe (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-hwe (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   

[Group.of.nepali.translators] [Bug 1842739] [NEW] linux-hwe-edge: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1842744
variant: debs

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-hwe-edge (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-hwe-edge (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.08.12-11 kernel-sru-derivative-of-1842744 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux-hwe-edge (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-hwe-edge (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team 

[Group.of.nepali.translators] [Bug 1842742] [NEW] linux-deeplens: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1842744
replaces: bug 1840004
variant: debs

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Invalid

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Invalid

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Status: Invalid


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.08.12-11 kernel-sru-derivative-of-1842744 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed 

[Group.of.nepali.translators] [Bug 1842738] [NEW] linux-gcp: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
variant: debs

** Affects: kernel-sru-workflow
 Importance: Undecided
 Status: New

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-gcp (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.08.12-11 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux-gcp (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-gcp (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: 

[Group.of.nepali.translators] [Bug 1842734] [NEW] linux-azure: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
variant: debs

** Affects: kernel-sru-workflow
 Importance: Undecided
 Status: New

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/stakeholder-signoff
 Importance: Medium
 Assignee: linux-azure stakeholder signoff (linux-azure-signoff)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-azure (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-azure (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.08.12-11 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/stakeholder-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux-azure (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-azure (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team 

[Group.of.nepali.translators] [Bug 1842724] [NEW] linux-oracle: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1842727
variant: debs

** Affects: kernel-sru-workflow
 Importance: Undecided
 Status: New

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-oracle (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1842727 kernel-sru-cycle-2019.08.12-11 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux-oracle (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-oracle (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: (unassigned) => Canonical 

[Group.of.nepali.translators] [Bug 1842731] [NEW] linux-azure-edge: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1842734
variant: debs

** Affects: kernel-sru-workflow
 Importance: Undecided
 Status: New

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-azure-edge (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-azure-edge (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.08.12-11 kernel-sru-derivative-of-1842734 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux-azure-edge (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-azure-edge (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team 

[Group.of.nepali.translators] [Bug 1842717] [NEW] linux-aws-hwe: -proposed tracker

2019-09-04 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1842718
variant: debs

** Affects: kernel-sru-workflow
 Importance: Undecided
 Status: New

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-aws-hwe (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-aws-hwe (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1842718 kernel-sru-cycle-2019.08.12-11 xenial

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: kernel-release-tracking-bug xenial

** Also affects: linux-aws-hwe (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-aws-hwe (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** 

[Group.of.nepali.translators] [Bug 1821903] Re: svm in ubuntu_kvm_unit_test failed on 3.13 / 4.4

2019-04-19 Thread Thadeu Lima de Souza Cascardo
The upstream submission:
https://marc.info/?l=kvm=155561857003690=2

** Changed in: linux (Ubuntu Cosmic)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Xenial)
   Status: Incomplete => Fix Committed

** Changed in: linux-signed-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-signed-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-signed-lts-xenial (Ubuntu Cosmic)
   Status: New => Invalid

** Tags added: verification-needed verification-needed-xenial

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1821903

Title:
  svm in ubuntu_kvm_unit_test failed on 3.13 / 4.4

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Trusty:
  Incomplete
Status in linux-signed-lts-xenial source package in Trusty:
  Fix Committed
Status in linux source package in Xenial:
  Fix Committed
Status in linux-signed-lts-xenial source package in Xenial:
  Invalid
Status in linux source package in Cosmic:
  Fix Committed
Status in linux-signed-lts-xenial source package in Cosmic:
  Invalid

Bug description:
  This svm test timeouted on T-3.13
  failed on T-4.4 with:

  
root@gonzo:/home/ubuntu/autotest/client/tmp/ubuntu_kvm_unit_tests/src/kvm-unit-tests#
  TESTNAME=svm TIMEOUT=90s ACCEL= ./x86/run x86/svm.flat -smp 2 -cpu qemu64,+svm
  timeout -k 1s --foreground 90s /usr/bin/qemu-system-x86_64 -nodefaults 
-device pc-testdev -device isa-debug-exit,iobase=0xf4,iosize=0x4 -vnc none 
-serial stdio -device pci-testdev -machine accel=kvm -kernel x86/svm.flat -smp 
2 -cpu qemu64,+svm # -initrd /tmp/tmp.PDi0UKyCcl

  enabling apic
  enabling apic
  paging enabled
  cr0 = 80010011
  cr3 = 466000
  cr4 = 20
  PASS: null
  PASS: vmrun
  PASS: ioio
  PASS: vmrun intercept check
  PASS: cr3 read intercept
  PASS: cr3 read nointercept
  PASS: cr3 read intercept emulate
  PASS: dr intercept check
  PASS: msr intercept check
  PASS: mode_switch
  PASS: asid_zero
  PASS: sel_cr0_bug
  FAIL: tsc_adjust
  Latency VMRUN : max: 80562 min: 19763 avg: 20374
  Latency VMEXIT: max: 83146 min: 20193 avg: 20834
  PASS: latency_run_exit
  Latency VMLOAD: max: 38298 min: 4619 avg: 4838
  Latency VMSAVE: max: 32870 min: 4637 avg: 4809
  Latency STGI:   max: 55478 min: 3846 avg: 3923
  Latency CLGI:   max: 67473 min: 3379 avg: 3437
  PASS: latency_svm_insn
  SUMMARY: 15 tests, 1 unexpected failures

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-4.4.0-143-generic 4.4.0-143.169~14.04.2
  ProcVersionSignature: User Name 4.4.0-143.169~14.04.2-generic 4.4.170
  Uname: Linux 4.4.0-143-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.29
  Architecture: amd64
  Date: Wed Mar 27 11:00:42 2019
  SourcePackage: linux-signed-lts-xenial
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1821903/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1818552] Re: disable a.out support

2019-04-15 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-hwe-edge (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1818552

Title:
  disable a.out support

Status in linux package in Ubuntu:
  Fix Released
Status in linux-hwe-edge package in Ubuntu:
  New
Status in linux source package in Precise:
  Won't Fix
Status in linux-hwe-edge source package in Precise:
  New
Status in linux source package in Trusty:
  Won't Fix
Status in linux-hwe-edge source package in Trusty:
  New
Status in linux source package in Xenial:
  Confirmed
Status in linux-hwe-edge source package in Xenial:
  New
Status in linux source package in Bionic:
  Confirmed
Status in linux-hwe-edge source package in Bionic:
  Fix Committed
Status in linux source package in Cosmic:
  Confirmed
Status in linux-hwe-edge source package in Cosmic:
  New
Status in linux source package in Disco:
  Fix Released
Status in linux-hwe-edge source package in Disco:
  New

Bug description:
  Hello,

  I suggest we disable a.out support in our kernels. It's quite old,
  likely has security problems, and unlikely to have users.

  
  Here's a hand-filtered list of kernel configs that were returned from this 
list:

  grep -rl -e AOUT=m -e AOUT=y | sort -n

  I've selected what looks like the most recent kernels from among:
  precise
  trusty
  xenial
  bionic
  cosmic

  There is no disco because it's not on the kernel.ubuntu.com/kernel-
  config rsync source.

  Thanks

  precise/linux/3.2.0-126.169/i386-config.flavour.generic
  precise/linux/3.2.0-126.169/i386-config.flavour.generic-pae
  precise/linux/3.2.0-126.169/i386-config.flavour.lowlatency
  precise/linux/3.2.0-126.169/i386-config.flavour.virtual
  precise/linux/3.8.0-25.36/armel-config.flavour.omap4
  precise/linux/3.8.0-25.36/armhf-config.flavour.omap4
  precise/linux/3.8.0-25.36/i386-config.flavour.generic
  precise/linux/3.8.0-25.36/i386-config.flavour.lowlatency
  precise/linux-armadaxp/3.2.0-1687.114/i386-config.flavour.generic
  precise/linux-armadaxp/3.2.0-1687.114/i386-config.flavour.lowlatency
  precise/linux-lts-trusty/3.13.0-148.197~precise1/i386-config.flavour.generic
  
precise/linux-lts-trusty/3.13.0-148.197~precise1/i386-config.flavour.lowlatency
  precise/linux-ti-omap4/3.2.0-1504.131/i386-config.flavour.generic
  precise/linux-ti-omap4/3.2.0-1504.131/i386-config.flavour.lowlatency
  trusty/linux/3.13.0-148.197/i386-config.flavour.generic
  trusty/linux/3.13.0-148.197/i386-config.flavour.lowlatency
  trusty/linux-aws/4.4.0-1004.4/i386-config.flavour.generic
  trusty/linux-aws/4.4.0-1004.4/i386-config.flavour.lowlatency
  trusty/linux-lts-xenial/4.4.0-125.150~14.04.1/i386-config.flavour.generic
  trusty/linux-lts-xenial/4.4.0-125.150~14.04.1/i386-config.flavour.lowlatency
  xenial/linux/4.4.0-125.150/i386-config.flavour.generic
  xenial/linux/4.4.0-125.150/i386-config.flavour.lowlatency
  xenial/linux-aws/4.4.0-1055.64/i386-config.flavour.generic
  xenial/linux-aws/4.4.0-1055.64/i386-config.flavour.lowlatency
  xenial/linux-azure/4.13.0-1001.1/i386-config.flavour.generic
  xenial/linux-azure/4.13.0-1001.1/i386-config.flavour.lowlatency
  xenial/linux-euclid/4.4.0-9019.20/i386-config.flavour.generic
  xenial/linux-euclid/4.4.0-9019.20/i386-config.flavour.lowlatency
  xenial/linux-flo/3.4.0-5.19/i386-config.flavour.generic
  xenial/linux-flo/3.4.0-5.19/i386-config.flavour.lowlatency
  xenial/linux-flo/3.4.0-5.23/armhf-config.flavour.flo
  xenial/linux-gcp/4.10.0-1009.9/i386-config.flavour.generic
  xenial/linux-gcp/4.10.0-1009.9/i386-config.flavour.lowlatency
  xenial/linux-gcp/4.8.0-1002.2/i386-config.flavour.generic
  xenial/linux-gcp/4.8.0-1002.2/i386-config.flavour.lowlatency
  xenial/linux-gke/4.4.0-1034.34/i386-config.flavour.generic
  xenial/linux-gke/4.4.0-1034.34/i386-config.flavour.lowlatency
  xenial/linux-gke/4.4.0-1036.36/armhf-config.flavour.mako
  xenial/linux-goldfish/3.4.0-4.26/i386-config.flavour.generic
  xenial/linux-goldfish/3.4.0-4.26/i386-config.flavour.generic-pae
  xenial/linux-goldfish/3.4.0-4.26/i386-config.flavour.goldfish
  xenial/linux-goldfish/3.4.0-4.26/i386-config.flavour.lowlatency
  xenial/linux-goldfish/3.4.0-4.26/i386-config.flavour.virtual
  xenial/linux-goldfish/3.4.0-4.27/armhf-config.flavour.goldfish
  xenial/linux-goldfish/3.4.0-4.27/i386-config.flavour.goldfish
  xenial/linux-hwe/4.13.0-42.47~16.04.1/i386-config.flavour.generic
  xenial/linux-hwe/4.13.0-42.47~16.04.1/i386-config.flavour.lowlatency
  xenial/linux-hwe/4.8.0-49.52~16.04.1/armel-config.flavour.omap4
  xenial/linux-hwe/4.8.0-49.52~16.04.1/armhf-config.flavour.omap4
  xenial/linux-hwe/4.8.0-58.63~16.04.1/i386-config.flavour.generic
  xenial/linux-hwe/4.8.0-58.63~16.04.1/i386-config.flavour.lowlatency
  xenial/linux-hwe-edge/4.15.0-21.22~16.04.1/i386-config.flavour.generic
  

[Group.of.nepali.translators] [Bug 1800562] Re: Replace "nousb" option in kdump command-line for the newer "usbcore.nousb"

2019-02-20 Thread Thadeu Lima de Souza Cascardo
Have you seen this cause any issue when kdumping from bionic or any
releases later than xenial?

Because we should not disable usb, and I would apply the opposite fix
and just remove "nousb" from the command line.

The reason for this is supporting kdump on encrypted systems, where the
user must type a password and use a USB keyboard.

Cascardo.

** Changed in: makedumpfile (Ubuntu Disco)
   Status: In Progress => Opinion

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1800562

Title:
  Replace "nousb" option in kdump command-line for the newer
  "usbcore.nousb"

Status in makedumpfile package in Ubuntu:
  Opinion
Status in makedumpfile source package in Xenial:
  In Progress
Status in makedumpfile source package in Bionic:
  In Progress
Status in makedumpfile source package in Cosmic:
  In Progress
Status in makedumpfile source package in Disco:
  Opinion

Bug description:
  [Impact]
  Crash kernels come up with the usb subsystem enabled, even when it should be 
disabled by default.

  [Description]
  Since kernel v4.5, the correct parameter to disable USB subsystem 
initialization is "usbcore.nousb" always (instead of "nousb" in case the 
subsystem is built-in). This was changed by commit 097a9ea0e48 ("usb: make 
"nousb" a clear module parameter").

  We need to take this into account in kdump-tools, or else we may boot
  with USB in kdump even the command-line saying the opposite.

  This affects Xenial onwards, since the system may be running an HWE or
  other supported v4.5+ kernel.

  [Test Case]
  1) Deploy a Disco VM e.g. with uvt-kvm
  2) Install the kdump-tools package
  3) Run `kdump-config test`and check for the 'usbcore.nousb' parameter:

  $ kdump-config test
  ...
  kexec command to be used:
    /sbin/kexec -p --command-line="BOOT_IMAGE=/boot/vmlinuz-4.15.0-45-generic 
root=LABEL=cloudimg-rootfs ro console=tty1 console=ttyS0 nr_cpus=1 
systemd.unit=kdump-tools.service irqpoll nousb ata_piix.prefer_ms_hyperv=0" 
/var/lib/kdump/vmlinuz

  [Regression Potential]
  The regression potential is very low, since it doesn't need any changes in 
makedumpfile and we're only adding a parameter on the crashkernel cmdline.
  According to kernel documentation [0], unknown parameters will be ignored if 
they contain a dot (usbcore.nousb), so this change should have no impact on 
v4.4 and earlier kernels.
  Nonetheless, the fix will be tested with autopkgtests and normal kdump 
use-case scenarios.

  [0] https://www.kernel.org/doc/Documentation/admin-guide/kernel-
  parameters.rst

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1800562/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1655280] Re: ISST-LTE:pVM:roselp4:ubuntu 16.04: cp: error reading '/proc/vmcore': Bad address when trying to dump vmcore

2019-01-18 Thread Thadeu Lima de Souza Cascardo
This should be in disco soon.

** Also affects: linux (Ubuntu Disco)
   Importance: High
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
   Status: Invalid

** Also affects: makedumpfile (Ubuntu Disco)
   Importance: High
   Status: In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1655280

Title:
  ISST-LTE:pVM:roselp4:ubuntu 16.04: cp: error reading '/proc/vmcore':
  Bad address when trying to dump vmcore

Status in The Ubuntu-power-systems project:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in makedumpfile package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  New
Status in makedumpfile source package in Xenial:
  New
Status in linux source package in Bionic:
  New
Status in makedumpfile source package in Bionic:
  New
Status in linux source package in Cosmic:
  Invalid
Status in makedumpfile source package in Cosmic:
  In Progress
Status in linux source package in Disco:
  Invalid
Status in makedumpfile source package in Disco:
  In Progress

Bug description:
  == Comment: #0 - Ping Tian Han  - 2017-01-09 02:51:00 ==
  ---Problem Description---
  Vmcore cannot be saved when triggering bug 150353 on roselp4:

  Copying data   : [  2.0 %] \/usr/sbin/kdump-config: line 
591:  5502 Bus error   makedumpfile $MAKEDUMP_ARGS $vmcore_file 
$KDUMP_CORETEMP
  [  512.833872] kdump-tools[5450]:  * kdump-tools: makedumpfile failed, 
falling back to 'cp'
  [  573.595449] kdump-tools[5450]: cp: error reading '/proc/vmcore': Bad 
address
  [  573.605717] kdump-tools[5450]:  * kdump-tools: failed to save vmcore in 
/var/crash/201701090223
  [  573.765417] kdump-tools[5450]:  * running makedumpfile --dump-dmesg 
/proc/vmcore /var/crash/201701090223/dmesg.201701090223
  [  574.285506] kdump-tools[5450]: The kernel version is not supported.
  [  574.285672] kdump-tools[5450]: The makedumpfile operation may be 
incomplete.
  [  574.285767] kdump-tools[5450]: The dmesg log is saved to 
/var/crash/201701090223/dmesg.201701090223.
  [  574.305422] kdump-tools[5450]: makedumpfile Completed.
  [  574.315363] kdump-tools[5450]:  * kdump-tools: saved dmesg content in 
/var/crash/201701090223
  [  574.615688] kdump-tools[5450]: Mon, 09 Jan 2017 02:24:26 -0600
  [  574.705384] kdump-tools[5450]: Rebooting.
   Stopping ifup for ib0...
  [  OK  ] Stopped ifup for ib0.
  [ 1008.579897] reboot: Restarting system
   
  Contact Information = Ping Tian Han/pt...@cn.ibm.com Carrie 
Mitsuyoshi/carri...@us.ibm.com 
   
  ---uname output---
  Linux roselp4 4.8.0-34-generic #36~16.04.1-Ubuntu SMP Wed Dec 21 18:53:20 UTC 
2016 ppc64le ppc64le ppc64le GNU/Linux
   
  Machine Type = lpar 
   
  ---Debugger---
  A debugger is not configured
   
  ---Steps to Reproduce---
   1. config kdump on roselp4
  2. try to trigger bug 150353

   
  *Additional Instructions for Ping Tian Han/pt...@cn.ibm.com Carrie 
Mitsuyoshi/carri...@us.ibm.com: 
  -Post a private note with access information to the machine that the bug is 
occuring on.

  == Comment: #3 - Brahadambal Srinivasan  -
  2017-01-10 02:42:25 ==

  root@roselp4:~# cat /proc/cmdline
  BOOT_IMAGE=/boot/vmlinux-4.8.0-34-generic 
root=UUID=0bcf3431-df8b-499c-9a13-33070f242e0c ro splash quiet 
crashkernel=384M-:512M

  root@roselp4:~# dmesg | grep Reser
  [0.00] Reserving 512MB of memory at 128MB for crashkernel (System 
RAM: 21760MB)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1655280/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1746088] Re: [Ubuntu 16.04.4] Unable to analyze the vmcore generated by kdump on 4.13.0-26-generic kernel

2018-12-21 Thread Thadeu Lima de Souza Cascardo
I have just marked this as Invalid for Bionic, as the crash version on
Bionic is capable of analyzing 4.15 kernels (and older 4.13 kernels,
even though no one should be using such kernels on Bionic).

If there are any bugs about specific functionalities on that Bionic
crash version, please report it as a different bug. See, for example,
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1765660.

Cascardo.

** Changed in: crash (Ubuntu Bionic)
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1746088

Title:
  [Ubuntu 16.04.4] Unable to analyze the vmcore generated by kdump on
  4.13.0-26-generic kernel

Status in The Ubuntu-power-systems project:
  In Progress
Status in crash package in Ubuntu:
  Fix Released
Status in crash source package in Xenial:
  Fix Released
Status in crash source package in Artful:
  Won't Fix
Status in crash source package in Bionic:
  Invalid

Bug description:
  [Impact]
  It won't be possible to analyze dumps produced by newer kernels (hwe on 
xenial, for example).

  [Test Case]
  Tested that this version of crash can analyze both GA (4.4) and hwe (4.15) 
kernels.

  [Regression Potential]
  New crash versions may have bugs and some commands not work with older 
kernels. The smoke test helps a little, but more testing may be desirable.


  ---Problem Description---
  Unable to analyze the vmcore generated by kdump on 4.13.0-26-generic kernel 
(Ubuntu 16.04.4)

  ---uname output---
  Linux ltc-briggs1 4.13.0-26-generic #29~16.04.2-Ubuntu SMP Tue Jan 9 21:40:36 
UTC 2018 ppc64le ppc64le ppc64le GNU/Linux

  Machine Type = 8001-22C

  ---Steps to Reproduce---
   This bug follow up bug of 
https://bugzilla.linux.ibm.com/show_bug.cgi?id=163565
  The steps to create dump is as follows

  Once you generate the kdump
  use crash to analyze the vmcore and we get this error

  console logs ==

  root@ltc-briggs1:/var/crash/201801150227# ls
  dmesg.201801150227  vmcore.201801150227
  .0-26-generic vmcore.2018011502271150227# crash 
/usr/lib/debug/boot/vmlinux-4.13.

  crash 7.1.4
  Copyright (C) 2002-2015  Red Hat, Inc.
  Copyright (C) 2004, 2005, 2006, 2010  IBM Corporation
  Copyright (C) 1999-2006  Hewlett-Packard Co
  Copyright (C) 2005, 2006, 2011, 2012  Fujitsu Limited
  Copyright (C) 2006, 2007  VA Linux Systems Japan K.K.
  Copyright (C) 2005, 2011  NEC Corporation
  Copyright (C) 1999, 2002, 2007  Silicon Graphics, Inc.
  Copyright (C) 1999, 2000, 2001, 2002  Mission Critical Linux, Inc.
  This program is free software, covered by the GNU General Public License,
  and you are welcome to change it and/or distribute copies of it under
  certain conditions.  Enter "help copying" to see the conditions.
  This program has absolutely no warranty.  Enter "help warranty" for details.

  GNU gdb (GDB) 7.6
  Copyright (C) 2013 Free Software Foundation, Inc.
  License GPLv3+: GNU GPL version 3 or later 
  This is free software: you are free to change and redistribute it.
  There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
  and "show warranty" for details.
  This GDB was configured as "powerpc64le-unknown-linux-gnu"...

  please wait... (gathering module symbol data)
  WARNING: cannot access vmalloc'd module memory

  crash: invalid structure member offset: thread_info_task
     FILE: task.c  LINE: 598  FUNCTION: irqstacks_init()

  [/usr/bin/crash] error trace: 1008ade0 => 1011552c => 1017d220 =>
  100833e0

    100833e0: (undetermined)
    1017d220: OFFSET_verify+80
    1011552c: task_init+5084
    1008ade0: main_loop+336

  == Comment from Hari Krishna Bathini ==

  There are quite a few commits (all available upstream) that are needed for
  crash tool to work fine. I think the right thing to do here would be to use
  the latest crash tool version 7.2.0 to go with the kernel update. Also, the
  below commit would be needed on top of 7.2.0 crash utility:

    commit c8178eca9c74f81a7f803a58d339635cc152e8d9
    Author: Dave Anderson 
    Date:   Thu Nov 9 11:39:05 2017 -0500

  Update for support of Linux 4.14 and later PPC64 kernels where the
  hash page table geometry accomodates a larger virtual address range.
  Without the patch, the virtual-to-physical translation of user space
  virtual addresses by "vm -p", "vtop", and "rd -u" may generate an
  invalid translation or otherwise fail.
  (hbath...@linux.vnet.ibm.com)

  Similar thing holds true for makedumpfile tool..

  Thanks
  Hari

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1746088/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net

[Group.of.nepali.translators] [Bug 1805105] Re: /proc/self/stack does not exist in kvm kernel, causing failures in kernel security test

2018-11-27 Thread Thadeu Lima de Souza Cascardo
By the way, on 4.19, this is now only readable by root. So, now returns
EACCESS when user tries to read it.

$ cat /proc/self/stack
cat: /proc/self/stack: Permission denied

f8a00cef17206ecd1b30d3d9f99e10d9fa707aa7 proc: restrict kernel stack
dumps to root

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux (Ubuntu Bionic)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1805105

Title:
  /proc/self/stack does not exist in kvm kernel, causing failures in
  kernel security test

Status in QA Regression Testing:
  Fix Released
Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux-kvm package in Ubuntu:
  New
Status in linux source package in Xenial:
  Invalid
Status in linux-kvm source package in Xenial:
  New
Status in linux source package in Bionic:
  Invalid
Status in linux-kvm source package in Bionic:
  New
Status in linux source package in Cosmic:
  Incomplete
Status in linux-kvm source package in Cosmic:
  New
Status in linux source package in Disco:
  Incomplete
Status in linux-kvm source package in Disco:
  New

Bug description:
  Linux larry 4.18.0-1005-kvm #5-Ubuntu SMP Thu Nov 15 20:22:03 UTC 2018
  x86_64 x86_64 x86_64 GNU/Linux

  # ls /proc/self/stack
  ls: cannot access '/proc/self/stack': No such file or directory

  Thus:
  FAIL: test_095_kernel_symbols_missing_proc_self_stack 
(__main__.KernelSecurityTest)
  kernel addresses in /proc/self/stack are zeroed out
  --
  Traceback (most recent call last):
  File "./test-kernel-security.py", line 1352, in 
test_095_kernel_symbols_missing_proc_self_stack
  self._check_pK_files(self._095_kernel_symbols_missing_proc_self_stack, 
expected=expected)
  File "./test-kernel-security.py", line 1199, in _check_pK_files
  test_function(expected_restricted)
  File "./test-kernel-security.py", line 1296, in 
_095_kernel_symbols_missing_proc_self_stack
  '/proc/self/stack does not exist')
  AssertionError: /proc/self/stack does not exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/qa-regression-testing/+bug/1805105/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1797092] Re: xenial guest on arm64 drops to busybox under openstack bionic-rocky

2018-11-15 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-snapdragon (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: linux-snapdragon (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1797092

Title:
  xenial guest on arm64 drops to busybox under openstack bionic-rocky

Status in linux package in Ubuntu:
  Fix Released
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux source package in Xenial:
  Fix Committed
Status in linux-raspi2 source package in Xenial:
  Fix Committed
Status in linux-snapdragon source package in Xenial:
  Fix Committed
Status in linux source package in Bionic:
  Fix Released
Status in linux-raspi2 source package in Bionic:
  New
Status in linux-snapdragon source package in Bionic:
  New
Status in linux source package in Cosmic:
  New
Status in linux-raspi2 source package in Cosmic:
  New
Status in linux-snapdragon source package in Cosmic:
  New

Bug description:
  [Impact]
  on openstack rocky-bionic (with patch, see 1771662), xenial guests will fail 
to launch as they drop to the busybox prompt after booting. The reason is that 
the EFI firmware image switched to ACPI mode by default in bionic. We knew that 
was happening, and backported some minimal ACPI support to keep xenial guests 
booting (bug 1744754). But, now we're seeing guests panic when trying to 
initialize PCI.

  [Test Case]
  Deploy rocky-bionic OpenStack and try to launch a xenial guest.

  [Fix]
  Backport ACPI/PCIe support for arm64 from upstream.

  [ Regression Risk ]
  TLDR: Definitely warrants some regression testing on armhf/arm64, but 
regression risk seems low for other architectures. Here's a patch-by-patch risk 
analysis:

  > 0001-UBUNTU-Config-CONFIG_PCI_ECAM-y.patch
  Enables code that will be added in the next patch.

  > 0002-PCI-Provide-common-functions-for-ECAM-mapping.patch
  Only adds new code w/ no callers yet

  > 0003-PCI-generic-thunder-Use-generic-ECAM-API.patch
  As noted in the commit message:
  "The patch does not introduce any functional changes other than a very minor 
one: with the new code, on 64-bit platforms, we do just a single ioremap for 
the whole config space."

  > 0004-PCI-of-Move-PCI-I-O-space-management-to-PCI-core-cod.patch
  As noted, no functional change.

  > 0005-PCI-Move-ecam.h-to-linux-include-pci-ecam.h.patch
  As noted, no functional change.

  > 0006-PCI-Add-parent-device-field-to-ECAM-struct-pci_confi.patch
  This makes changes to the ecam code, but that was added in this series, so no 
regression risk there. The pci-thunder-pem changes will be regression tested on 
the hardware that uses that driver (Cavium ThunderX).

  > 0007-PCI-Add-pci_unmap_iospace-to-unmap-I-O-resources.patch
  Only adds new code, w/ no callers yet

  > 0008-PCI-ACPI-Support-I-O-resources-when-parsing-host-bri.patch
  Adds and calls a new function that is a no-op on !ARM (PCI_IOBASE is only 
defined on ARM). Also adds a call to pci_unmap_iospace(), which was added in a 
previous patch and is also a no-op on !ARM.

  > 0009-UBUNTU-Config-CONFIG_ACPI_MCFG-y.patch
  Enables code that will be added in the next patch.

  > 0010-PCI-ACPI-Add-generic-MCFG-table-handling.patch
  Adds parsing of a new ACPI table. A possible regression risk to platforms an 
MCFG table that were working fine w/ 4.4 and there's a latent bug in this 
parsing code.

  > 0011-PCI-Refactor-pci_bus_assign_domain_nr-for-CONFIG_PCI.patch
  As noted, no functional change intended.

  > 0012-PCI-Factor-DT-specific-pci_bus_find_domain_nr-code-o.patch
  Again, no functional change.

  > 0013-ARM64-PCI-Add-acpi_pci_bus_find_domain_nr.patch
  Only impacts ARM due to CONFIG_PCI_DOMAINS_GENERIC guard

  > 0014-ARM64-PCI-ACPI-support-for-legacy-IRQs-parsing-and-c.patch
  arm64-specific PCI initialization code - mitigate risk by regression testing 
on supported platforms (X-Gene, ThunderX).

  > 0015-ARM64-PCI-Support-ACPI-based-PCI-host-controller.patch
  Adds new code for arm64-ACPI support. We didn't previously support these 
devices, so regression risk is negligible.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1797092/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : 

[Group.of.nepali.translators] [Bug 1802320] Re: rpi3bp+: ethernet leds don't blink

2018-11-15 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1802320

Title:
  rpi3bp+: ethernet leds don't blink

Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-raspi2 source package in Xenial:
  Fix Committed

Bug description:
  Impact:

  Using a xenial/raspi2 kernel on a RaspberryPi3B+ board, ethernet leds
  don't blink (though ethernet port works fine).

  Leds not working are due to a missing (actualy reverted) upstream
  stable patch in xenial/raspi2 (a9 "UBUNTU: SAUCE: Revert "lan78xx:
  Correctly indicate invalid OTP""), but simply reverting that patch
  uncovers another more severe bug: the ethernet port completely stops
  to work since two hardware registers are not updated when, during
  bootup, the mac address is set (i explained this part of the bug here
  in detail: https://lkml.org/lkml/2018/11/7/860).

  When doing the initial enablement of the rpi3bp+ board in xenial, i
  found that the ethernet port was not working and after a bisection i
  found an upstream stable commit (the above "lan78xx: Correctly
  indicate invalid OTP") that was causing it, reverted it.

  But it turned out that this patch was legit, and the buggy behaviour
  of the lan78xx_read_otp() function (that was being fixed by the above
  "lan78xx: Correctly indicate invalid OTP" patch) was actually hiding
  another bug in the lan78xx ethernet driver:

  https://lkml.org/lkml/2018/11/7/860

  "
  Upon invocation, lan78xx_init_mac_address() checks that the mac address 
present in the RX_ADDRL & RX_ADDRH registers is a valid address, if not, it 
first tries to read a new address from an external eeprom or the otp area, and 
in case both read fail (or the address read back is invalid), it randomly 
generates a new one.

  Unfortunately, due to the way the above logic is laid out, if both
  read_eeprom() and read_otp() fail, a new mac address is correctly
  generated but is never written back to RX_ADDRL & RX_ADDRH, leaving
  the chip in an incosistent state and with an invalid mac address (e.g.
  the nic appears to be completely dead, and doesn't receive any packet,
  etc):

  lan78xx_init_mac_address()
  ...
  if (lan78xx_read_eeprom(addr ...) || lan78xx_read_otp(addr ...)) {
   if (is_valid_ether_addr(addr) {
    // nop...
   } else {
    random_ether_addr(addr);
   }

   // correctly writes back the new address
   lan78xx_write_reg(RX_ADDRL, addr ...);
   lan78xx_write_reg(RX_ADDRH, addr ...);
  } else {
   // XXX if both eeprom and otp read fail, we land here and skip
   // XXX the RX_ADDRL & RX_ADDRH update completely
   random_ether_addr(addr);
  }

  This bug went unnoticed because lan78xx_read_otp() was buggy itself and would 
never fail, up until 4bfc338 "lan78xx: Correctly indicate invalid OTP" fixed it 
and as a side effect uncovered this bug.
  "

  Upstream later decided to take an entire patch from 4.18.y instead of
  the fix i proposed, but that is fine, and is one of the patch i'm
  presenting here (patch 003 "lan78xx: Read MAC address from DT if
  present").

  Fix:

  The whole fix consist in importing a new upstream patch from 4.18.y
  for the mac address changing logic (patch 003), reverting two
  Raspberry BSP patches that clash (and are obsoleted) by this new patch
  (patch 001 and 002), and then reverting a SAUCE patch, or in other
  words, reapply the lan78xx_read_otp() upstream fix (patch 004), that
  is the actual fix for the ethernet leds.

  Chronologically, first the two reverts:

  commit 3f25fbb82f00a80e9eb3be0ce60abebfc263c84a
  Author: Paolo Pisati 
  Date:   Thu Nov 8 10:35:09 2018 +

  Revert "lan78xx: Ignore DT MAC address if already valid"

  This reverts commit 17f23a96597810ddd56b0c10584fce77d7c3707f.

  Signed-off-by: Paolo Pisati 

  and

  commit 6c8bdff882656296adc20b6ae0fb727483a73c7c
  Author: Paolo Pisati 
  Date:   Thu Nov 8 10:35:11 2018 +

  Revert "lan78xx: Read MAC address from DT if present"

  This reverts commit a23d928781936b51a61a67a0799b77b2a6becfa2.

  Signed-off-by: Paolo Pisati 

  then the upstream cherry pick for the mac changing logic:

  commit 5d9c81e3aa1dd39dafd9a6ea30da05b26b655eca
  Author: Phil Elwell 
  Date:   Thu Apr 19 17:59:38 2018 +0100

  lan78xx: Read MAC address from DT if present

  There is a standard mechanism for locating and using a MAC address from
  the Device Tree. Use this facility in the lan78xx driver to support
  applications without programmed EEPROM or OTP. At the same time,
  regularise the handling of the different address sources.

  Signed-off-by: Phil Elwell 
  Signed-off-by: David S. Miller 
  (cherry picked from commit 

[Group.of.nepali.translators] [Bug 1775068] Re: Volume control not working Dell XPS 27 (7760)

2018-11-14 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Cosmic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1775068

Title:
  Volume control not working Dell XPS 27 (7760)

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  New
Status in linux source package in Cosmic:
  Fix Committed

Bug description:
  Pressing vol up/vol down show OSD change up/down but volume all time
  is at 100%.

  I found temporary fix:

  Add section:
  [Element Master]
  switch = mute
  volume = ignore

  To:
  /usr/share/pulseaudio/alsa-mixer/paths/analog-output.conf.common
  ---
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  trolinka   1610 F pulseaudio
   /dev/snd/controlC1:  trolinka   1610 F pulseaudio
  CurrentDesktop: MATE
  DistroRelease: Ubuntu 18.04
  InstallationDate: Installed on 2018-06-02 (121 days ago)
  InstallationMedia: Ubuntu-MATE 18.04 LTS "Bionic Beaver" - Release amd64 
(20180426)
  Package: pulseaudio 1:11.1-1ubuntu7.1
  PackageArchitecture: amd64
  ProcVersionSignature: Ubuntu 4.15.0-34.37-generic 4.15.18
  Tags:  bionic
  Uname: Linux 4.15.0-34-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm audio cdrom dip lpadmin netdev plugdev sambashare scanner 
sudo vboxusers video
  _MarkForUpload: True
  dmi.bios.date: 07/13/2018
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 2.4.0
  dmi.board.name: 0T12MX
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 13
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr2.4.0:bd07/13/2018:svnDellInc.:pnXPS7760AIO:pvr:rvnDellInc.:rn0T12MX:rvrA00:cvnDellInc.:ct13:cvr:
  dmi.product.family: XPS
  dmi.product.name: XPS 7760 AIO
  dmi.sys.vendor: Dell Inc.
  ---
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  trolinka   1846 F pulseaudio
   /dev/snd/controlC1:  trolinka   1846 F pulseaudio
  CurrentDesktop: MATE
  DistroRelease: Ubuntu 18.04
  InstallationDate: Installed on 2018-06-02 (122 days ago)
  InstallationMedia: Ubuntu-MATE 18.04 LTS "Bionic Beaver" - Release amd64 
(20180426)
  MachineType: Dell Inc. XPS 7760 AIO
  Package: pulseaudio 1:11.1-1ubuntu7.1
  PackageArchitecture: amd64
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-36-generic 
root=UUID=3df8d974-f6bb-455e-a7a6-a7099388ad54 ro quiet splash vt.handoff=1
  ProcVersionSignature: Ubuntu 4.15.0-36.39-generic 4.15.18
  RelatedPackageVersions:
   linux-restricted-modules-4.15.0-36-generic N/A
   linux-backports-modules-4.15.0-36-generic  N/A
   linux-firmware 1.173.1
  Tags:  bionic
  Uname: Linux 4.15.0-36-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm audio cdrom dip lpadmin netdev plugdev sambashare scanner 
sudo vboxusers video
  _MarkForUpload: True
  dmi.bios.date: 07/13/2018
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 2.4.0
  dmi.board.name: 0T12MX
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 13
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr2.4.0:bd07/13/2018:svnDellInc.:pnXPS7760AIO:pvr:rvnDellInc.:rn0T12MX:rvrA00:cvnDellInc.:ct13:cvr:
  dmi.product.family: XPS
  dmi.product.name: XPS 7760 AIO
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1775068/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1798833] Re: Network unusable (>1s-5s pings) on e1000e

2018-10-19 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-hwe (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux-hwe (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-meta-hwe (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-meta-hwe (Ubuntu)
   Status: New => Invalid

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-hwe (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-meta-hwe (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-hwe (Ubuntu Bionic)
   Status: New => Invalid

** Changed in: linux-meta-hwe (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-meta-hwe (Ubuntu Bionic)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1798833

Title:
  Network unusable (>1s-5s pings) on e1000e

Status in linux package in Ubuntu:
  Incomplete
Status in linux-hwe package in Ubuntu:
  New
Status in linux-meta-hwe package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Invalid
Status in linux-hwe source package in Xenial:
  New
Status in linux-meta-hwe source package in Xenial:
  Invalid
Status in linux source package in Bionic:
  Incomplete
Status in linux-hwe source package in Bionic:
  Invalid
Status in linux-meta-hwe source package in Bionic:
  Invalid

Bug description:
  On DELL 7060 MicroFormFactor (MFF) machines with Intel network cards,
  installing any kernels above, but not including 4.15.0-20, break the
  network connectivity of the machine.

  Latest kernel where network card works:
  linux-image-4.15.0-20-generic   4.15.0-20.21~16.04.1  
   amd64Signed kernel image generic

  Tested kernels where network card breaks:
  4.15.0-22
  4.15.0-33
  4.15.0-36

  # lspci -nn -d ::0200
  00:1f.6 Ethernet controller [0200]: Intel Corporation Device [8086:15bb] (rev 
10)

  BIOS Information
  Vendor: Dell Inc.
  Version: 1.2.14
  Release Date: 09/06/2018

  To reproduce the issue:

  1. Install any kernel starting on 4.15.0-22 or above
  2. Boot the machine with the new kernel
  3. ping the gateway (pings are in the sub 1ms range)
  4. Attempt to do things that use the network, i.e. apt update or scp, etc. It 
may take a minute or so before things get hung, i.e. you will see apt update 
progress stop and the transfer rate drop down to just a few kb/s or simply say 
stalled.
  4. Now ping the gateway again and you will see 1-5s pings, dropped packets
  5. At this point network is no longer usable

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-generic-hwe-16.04 (not installed)
  ProcVersionSignature: Ubuntu 4.15.0-20.21~16.04.1-generic 4.15.17
  Uname: Linux 4.15.0-20-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.18
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Fri Oct 19 10:35:08 2018
  InstallationDate: Installed on 2016-08-25 (784 days ago)
  InstallationMedia: It
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: linux-meta-hwe
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1798833/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1793461] Re: Improvements to the kernel source package preparation

2018-10-08 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-hwe-edge (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-hwe-edge (Ubuntu Bionic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1793461

Title:
  Improvements to the kernel source package preparation

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-hwe-edge package in Ubuntu:
  New
Status in linux source package in Precise:
  Fix Committed
Status in linux-hwe-edge source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in linux-hwe-edge source package in Trusty:
  New
Status in linux source package in Xenial:
  Fix Committed
Status in linux-hwe-edge source package in Xenial:
  New
Status in linux source package in Bionic:
  Fix Committed
Status in linux-hwe-edge source package in Bionic:
  Fix Committed
Status in linux source package in Cosmic:
  Fix Committed
Status in linux-hwe-edge source package in Cosmic:
  New

Bug description:
  We need to improve the automation of the process that we use to
  prepare kernel source packages. That requires changes in both the
  tooling and in the kernels.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1793461/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1765660] Re: Ubuntu 18.04 [ briggs ]: "ipcs" command fails with error "invalid structure member offset" in crash prompt.

2018-08-02 Thread Thadeu Lima de Souza Cascardo
Yeah, this doesn't sound right. Bionic has 7.2.1-1, while the fix has
been applied to 7.2.2-1. The verification mentioned on comment #7 was
against a ppa.

We can't ask IBM to properly verify it on bionic until we get this
package on -proposed. Let me move the task back to In Progress.

Thanks.
Cascardo.

** Changed in: crash (Ubuntu Bionic)
   Status: Fix Released => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1765660

Title:
  Ubuntu 18.04 [ briggs ]: "ipcs" command fails with error "invalid
  structure member offset" in crash prompt.

Status in The Ubuntu-power-systems project:
  Fix Released
Status in crash package in Ubuntu:
  Fix Released
Status in crash source package in Xenial:
  Won't Fix
Status in crash source package in Artful:
  Won't Fix
Status in crash source package in Bionic:
  In Progress
Status in crash source package in Cosmic:
  Fix Released

Bug description:
  [Impact]
  Some analysis won't be possible on new kernels (hwe-edge on xenial, for 
example; or the standard bionic kernel).

  [Test Case]
  The ipcs command has been run after the fix was applied to crash, on a live 
amd64 system, with success.

  [Regression Potential]
  Analysis of crashed kernels will require that the crash file be moved to a 
system where crash doesn't have the regression. The patch, however, should 
touch only the broken command, and has been tested.

  -

  
  == Comment: #0 - PAVITHRA R. PRAKASH <> - 2018-03-29 01:14:47 ==
  ---Problem Description---

  Ubuntu 18.04: "ipcs" command fails with error "invalid structure
  member offset" in crash prompt.

  ---Environment--

  System Name :  ltc-briggs2
  Model/Type  :  P8
  Platform:  BML

  ---Uname output---

  root@ltc-briggs2:~# uname -a
  Linux ltc-briggs2 4.15.0-13-generic #14-Ubuntu SMP Sat Mar 17 13:43:15 UTC 
2018 ppc64le ppc64le ppc64le GNU/Linux

  ---Steps to reproduce--

  1. Configure kdump.
  2. Trigger crash
  3. run crash on captured dump

  ---Logs

  root@ltc-briggs2:~# dpkg -l|grep makedumpfile
  ii  makedumpfile   1:1.6.3-1  
  ppc64el  VMcore extraction tool
  root@ltc-briggs2:~# dpkg -l|grep crash
  ii  apport 2.20.9-0ubuntu1
  all  automatically generate crash reports for debugging
  ii  crash  7.2.1-1
  ppc64el  kernel debugging utility, allowing gdb like syntax
  ii  kdump-tools1:1.6.3-1  
  ppc64el  scripts and tools for automating kdump (Linux crash dumps)
  ii  python3-apport 2.20.9-0ubuntu1
  all  Python 3 library for Apport crash report handling
  root@ltc-briggs2:~# dpkg -l|grep kexec
  ii  kexec-tools1:2.0.16-1ubuntu1  
  ppc64el  tools to support fast kexec reboots
  root@ltc-briggs2:~#

  .0-13-generic dump.201803272257 03272257# crash
  /usr/lib/debug/boot/vmlinux-4.15.

  crash 7.2.1
  Copyright (C) 2002-2017  Red Hat, Inc.
  Copyright (C) 2004, 2005, 2006, 2010  IBM Corporation
  Copyright (C) 1999-2006  Hewlett-Packard Co
  Copyright (C) 2005, 2006, 2011, 2012  Fujitsu Limited
  Copyright (C) 2006, 2007  VA Linux Systems Japan K.K.
  Copyright (C) 2005, 2011  NEC Corporation
  Copyright (C) 1999, 2002, 2007  Silicon Graphics, Inc.
  Copyright (C) 1999, 2000, 2001, 2002  Mission Critical Linux, Inc.
  This program is free software, covered by the GNU General Public License,
  and you are welcome to change it and/or distribute copies of it under
  certain conditions.  Enter "help copying" to see the conditions.
  This program has absolutely no warranty.  Enter "help warranty" for details.

  GNU gdb (GDB) 7.6
  Copyright (C) 2013 Free Software Foundation, Inc.
  License GPLv3+: GNU GPL version 3 or later 
  This is free software: you are free to change and redistribute it.
  There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
  and "show warranty" for details.
  This GDB was configured as "powerpc64le-unknown-linux-gnu"...

    KERNEL: /usr/lib/debug/boot/vmlinux-4.15.0-13-generic
  DUMPFILE: dump.201803272257  [PARTIAL DUMP]
  CPUS: 160
  DATE: Tue Mar 27 22:56:58 2018
    UPTIME: 00:04:07
  LOAD AVERAGE: 1.06, 0.53, 0.20
     TASKS: 1734
  NODENAME: ltc-briggs2
   RELEASE: 4.15.0-13-generic
   VERSION: #14-Ubuntu SMP Sat Mar 17 13:43:15 UTC 2018
   MACHINE: ppc64le  (2926 Mhz)
    MEMORY: 512 GB
     PANIC: "sysrq: SysRq : Trigger a crash"
   PID: 7420
   COMMAND: "bash"
  TASK: c03e56c7c600  [THREAD_INFO: c03e56cb]
   CPU: 41
    

[Group.of.nepali.translators] [Bug 1714485] Re: Ubuntu 16.04: kdump fails with error "kdump-tools[1532]: /etc/init.d/kdump-tools: 26: [: -ne: unexpected operator" when / file system is xfs.

2018-07-23 Thread Thadeu Lima de Souza Cascardo
** Changed in: makedumpfile (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1714485

Title:
  Ubuntu 16.04: kdump fails with error "kdump-tools[1532]: /etc/init.d
  /kdump-tools: 26: [: -ne: unexpected operator" when / file system is
  xfs.

Status in The Ubuntu-power-systems project:
  Fix Committed
Status in makedumpfile package in Ubuntu:
  Fix Released
Status in makedumpfile source package in Xenial:
  Fix Released
Status in makedumpfile source package in Zesty:
  Won't Fix
Status in makedumpfile source package in Artful:
  Invalid
Status in makedumpfile source package in Bionic:
  Fix Released

Bug description:
  == Comment: #0 - PAVITHRA R. PRAKASH <> - 2017-08-31 00:33:37 ==
  ---Problem Description---

  Ubuntu 16.04.03: kdump fails with error "kdump-tools[1532]:
  /etc/init.d/kdump-tools: 26: [: -ne: unexpected operator" when / file
  system is xfs.

  ---Steps to Reproduce---

  1. Install Ubuntu 16.04.03 with / as xfs.
  2. Configure kdump.
  3. trigger crash.

  Machine hangs after below log. Attaching console log.

  [  OK  ] Reached target Network is Online.
   Starting Kernel crash dump capture service...
   Starting iSCSI initiator daemon (iscsid)...
  [   12.263089] kdump-tools[1205]: /etc/init.d/kdump-tools: 26: [: -ne: 
unexpected operator
  [  OK  ] Started Kernel crash dump capture service.
  [  OK  ] Started iSCSI initiator daemon (iscsid).
   Starting Login to default iSCSI targets...
  [  OK  ] Started Login to default iSCSI targets.
  [  OK  ] Reached target Remote File Systems (Pre).

  
  4. After manual reboot  /etc/default/kdump-tools is empty.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1714485/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1772024] Re: linux 4.13.0-42.47 ADT test failure with linux 4.13.0-42.47 (nbd-smoke-test)

2018-05-23 Thread Thadeu Lima de Souza Cascardo
** Also affects: nbd (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: nbd (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: nbd (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Cosmic)
   Importance: High
 Assignee: Colin Ian King (colin-king)
   Status: In Progress

** Also affects: nbd (Ubuntu Artful)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Artful)
   Importance: Undecided
   Status: New

** Also affects: nbd (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: nbd (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: nbd (Ubuntu Cosmic)
   Importance: Undecided => Medium

** Changed in: nbd (Ubuntu Cosmic)
   Status: New => In Progress

** Changed in: nbd (Ubuntu Cosmic)
Milestone: None => ubuntu-18.06

** Changed in: nbd (Ubuntu Cosmic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1772024

Title:
  linux 4.13.0-42.47 ADT test failure with linux 4.13.0-42.47 (nbd-
  smoke-test)

Status in linux package in Ubuntu:
  In Progress
Status in nbd package in Ubuntu:
  In Progress
Status in linux source package in Trusty:
  New
Status in nbd source package in Trusty:
  New
Status in linux source package in Xenial:
  New
Status in nbd source package in Xenial:
  New
Status in linux source package in Artful:
  New
Status in nbd source package in Artful:
  New
Status in linux source package in Bionic:
  New
Status in nbd source package in Bionic:
  New
Status in linux source package in Cosmic:
  In Progress
Status in nbd source package in Cosmic:
  In Progress

Bug description:
  Testing failed on:
  amd64: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful/artful/amd64/l/linux/20180518_040741_b3b54@/log.gz
  i386: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful/artful/i386/l/linux/20180518_050911_b3b54@/log.gz
  ppc64el: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful/artful/ppc64el/l/linux/20180518_040734_b3b54@/log.gz
  s390x: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful/artful/s390x/l/linux/20180518_035527_b3b54@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1772024/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1767410] Re: linux-hwe-edge: 4.15.0-21.22~16.04.1 -proposed tracker

2018-05-15 Thread Thadeu Lima de Souza Cascardo
Mark regression testing fix released as none of the bugs are regressions
against the latest releases.

** Changed in: kernel-sru-workflow/regression-testing
   Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1767410

Title:
  linux-hwe-edge: 4.15.0-21.22~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Confirmed
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-hwe-edge package in Ubuntu:
  Invalid
Status in linux-hwe-edge source package in Xenial:
  Confirmed

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1767397
  phase: Promoted to proposed
  proposed-announcement-sent: true
  proposed-testing-requested: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1767410/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1770245] [NEW] getlogin will fail to open /proc/self/loginuid

2018-05-09 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

python os.getlogin() uses glibc getlogin(), which reads
/proc/self/loginuid.

That file depends on CONFIG_AUDITSYSCALL. It has been there since early
Linux 2.6. All our kernels should have it enabled.

Cascardo.

** Affects: linux-kvm (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-kvm (Ubuntu Xenial)
 Importance: Medium
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Also affects: linux-kvm (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-kvm (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux-kvm (Ubuntu Xenial)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Changed in: linux-kvm (Ubuntu Xenial)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1770245

Title:
  getlogin will fail to open /proc/self/loginuid

Status in linux-kvm package in Ubuntu:
  New
Status in linux-kvm source package in Xenial:
  In Progress

Bug description:
  python os.getlogin() uses glibc getlogin(), which reads
  /proc/self/loginuid.

  That file depends on CONFIG_AUDITSYSCALL. It has been there since
  early Linux 2.6. All our kernels should have it enabled.

  Cascardo.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-kvm/+bug/1770245/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1766473] Re: linux-hwe-edge: 4.15.0-20.21~16.04.1 -proposed tracker

2018-05-03 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1766473

Title:
  linux-hwe-edge: 4.15.0-20.21~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  Invalid
Status in linux-hwe-edge package in Ubuntu:
  Invalid
Status in linux-hwe-edge source package in Xenial:
  Confirmed

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1766452
  phase: Promoted to proposed
  proposed-announcement-sent: true
  proposed-testing-requested: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1766473/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1766473] Re: linux-hwe-edge: 4.15.0-20.21~16.04.1 -proposed tracker

2018-05-01 Thread Thadeu Lima de Souza Cascardo
** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1766473

Title:
  linux-hwe-edge: 4.15.0-20.21~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Confirmed
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  Invalid
Status in linux-hwe-edge package in Ubuntu:
  Invalid
Status in linux-hwe-edge source package in Xenial:
  Confirmed

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1766452
  phase: Promoted to proposed
  proposed-announcement-sent: true
  proposed-testing-requested: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1766473/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1766727] Re: initramfs-tools exception during pm.DoInstall with do-release-upgrade from 16.04 to 18.04

2018-04-30 Thread Thadeu Lima de Souza Cascardo
** Also affects: s390-tools (Ubuntu Bionic)
   Importance: Undecided
   Status: Fix Released

** Also affects: initramfs-tools (Ubuntu Bionic)
   Importance: Undecided
   Status: Invalid

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: Invalid

** Also affects: ubuntu-release-upgrader (Ubuntu Bionic)
   Importance: Undecided
   Status: Invalid

** Changed in: linux (Ubuntu Bionic)
   Status: Invalid => In Progress

** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1766727

Title:
  initramfs-tools exception during pm.DoInstall with  do-release-upgrade
  from 16.04 to 18.04

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in initramfs-tools package in Ubuntu:
  Invalid
Status in linux package in Ubuntu:
  Fix Committed
Status in s390-tools package in Ubuntu:
  Fix Released
Status in ubuntu-release-upgrader package in Ubuntu:
  Invalid
Status in initramfs-tools source package in Xenial:
  New
Status in linux source package in Xenial:
  New
Status in s390-tools source package in Xenial:
  In Progress
Status in ubuntu-release-upgrader source package in Xenial:
  New
Status in initramfs-tools source package in Bionic:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in s390-tools source package in Bionic:
  Fix Released
Status in ubuntu-release-upgrader source package in Bionic:
  Invalid

Bug description:
  Upgrading from 16.04 to 18.04 using 'do-release-upgrade -d' results
  in:

  Errors were encountered while processing:
   initramfs-tools
  Exception during pm.DoInstall():  E:Sub-process /usr/bin/dpkg returned an 
error code (1)

  Could not install the upgrades

  The upgrade has aborted. Your system could be in an unusable state. A
  recovery will run now (dpkg --configure -a).

  ---

  Processing triggers for systemd (237-3ubuntu10) ...
  Processing triggers for initramfs-tools (0.130ubuntu3) ...
  update-initramfs: Generating /boot/initrd.img-4.4.0-121-generic
  Using config file '/etc/zipl.conf'
  Error: Ramdisk file '/boot/initrd.img' in section 'ubuntu': No such file or 
directory
  run-parts: /etc/initramfs/post-update.d//zz-zipl exited with return code 1
  dpkg: error processing package initramfs-tools (--configure):
   installed initramfs-tools package post-installation script subprocess 
returned error exit status 1
  Processing triggers for ca-certificates (20180409) ...
  Updating certificates in /etc/ssl/certs...
  0 added, 0 removed; done.
  Running hooks in /etc/ca-certificates/update.d...
  done.
  Processing triggers for dictionaries-common (1.27.2) ...
  Processing triggers for linux-image-4.15.0-19-generic (4.15.0-19.20) ...
  /etc/kernel/postinst.d/initramfs-tools:
  update-initramfs: Generating /boot/initrd.img-4.15.0-19-generic
  Using config file '/etc/zipl.conf'
  Building bootmap in '/boot'
  Building menu 'menu'
  Adding #1: IPL section 'ubuntu' (default)
  Adding #2: IPL section 'old'
  Preparing boot device: dasdb (0104).
  Done.
  /etc/kernel/postinst.d/zz-zipl:
  Using config file '/etc/zipl.conf'
  Building bootmap in '/boot'
  Building menu 'menu'
  Adding #1: IPL section 'ubuntu' (default)
  Adding #2: IPL section 'old'
  Preparing boot device: dasdb (0104).
  Done.
  Processing triggers for sgml-base (1.29) ...
  Processing triggers for resolvconf (1.79ubuntu10) ...
  Processing triggers for ureadahead (0.100.0-20) ...
  Errors were encountered while processing:
   initramfs-tools
  Log ended: 2018-04-24  13:12:40
  --- 
  ApportVersion: 2.20.9-0ubuntu6
  Architecture: s390x
  DistroRelease: Ubuntu 18.04
  Package: ubuntu-release-upgrader
  PackageArchitecture: all
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=C
   SHELL=/bin/bash
  ProcVersionSignature: Ubuntu 4.15.0-19.20-generic 4.15.17
  Tags:  bionic
  Uname: Linux 4.15.0-19-generic s390x
  UpgradeStatus: Upgraded to bionic on 2018-04-24 (0 days ago)
  UserGroups: adm cdrom cpacfstats dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1766727/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1766727] Re: initramfs-tools exception during pm.DoInstall with do-release-upgrade from 16.04 to 18.04

2018-04-30 Thread Thadeu Lima de Souza Cascardo
This will likely break with linux-hwe-edge on xenial as well. Hence,
requesting SRU for xenial with the attached debdiff.

** Also affects: s390-tools (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: initramfs-tools (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: ubuntu-release-upgrader (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: s390-tools (Ubuntu Xenial)
   Status: New => In Progress

** Patch added: "fix for s390-tools on xenial"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1766727/+attachment/5130810/+files/s390-tools_1.34.0-0ubuntu8.6.debdiff

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1766727

Title:
  initramfs-tools exception during pm.DoInstall with  do-release-upgrade
  from 16.04 to 18.04

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in initramfs-tools package in Ubuntu:
  Invalid
Status in linux package in Ubuntu:
  Invalid
Status in s390-tools package in Ubuntu:
  Fix Released
Status in ubuntu-release-upgrader package in Ubuntu:
  Invalid
Status in initramfs-tools source package in Xenial:
  New
Status in linux source package in Xenial:
  New
Status in s390-tools source package in Xenial:
  In Progress
Status in ubuntu-release-upgrader source package in Xenial:
  New

Bug description:
  Upgrading from 16.04 to 18.04 using 'do-release-upgrade -d' results
  in:

  Errors were encountered while processing:
   initramfs-tools
  Exception during pm.DoInstall():  E:Sub-process /usr/bin/dpkg returned an 
error code (1)

  Could not install the upgrades

  The upgrade has aborted. Your system could be in an unusable state. A
  recovery will run now (dpkg --configure -a).

  ---

  Processing triggers for systemd (237-3ubuntu10) ...
  Processing triggers for initramfs-tools (0.130ubuntu3) ...
  update-initramfs: Generating /boot/initrd.img-4.4.0-121-generic
  Using config file '/etc/zipl.conf'
  Error: Ramdisk file '/boot/initrd.img' in section 'ubuntu': No such file or 
directory
  run-parts: /etc/initramfs/post-update.d//zz-zipl exited with return code 1
  dpkg: error processing package initramfs-tools (--configure):
   installed initramfs-tools package post-installation script subprocess 
returned error exit status 1
  Processing triggers for ca-certificates (20180409) ...
  Updating certificates in /etc/ssl/certs...
  0 added, 0 removed; done.
  Running hooks in /etc/ca-certificates/update.d...
  done.
  Processing triggers for dictionaries-common (1.27.2) ...
  Processing triggers for linux-image-4.15.0-19-generic (4.15.0-19.20) ...
  /etc/kernel/postinst.d/initramfs-tools:
  update-initramfs: Generating /boot/initrd.img-4.15.0-19-generic
  Using config file '/etc/zipl.conf'
  Building bootmap in '/boot'
  Building menu 'menu'
  Adding #1: IPL section 'ubuntu' (default)
  Adding #2: IPL section 'old'
  Preparing boot device: dasdb (0104).
  Done.
  /etc/kernel/postinst.d/zz-zipl:
  Using config file '/etc/zipl.conf'
  Building bootmap in '/boot'
  Building menu 'menu'
  Adding #1: IPL section 'ubuntu' (default)
  Adding #2: IPL section 'old'
  Preparing boot device: dasdb (0104).
  Done.
  Processing triggers for sgml-base (1.29) ...
  Processing triggers for resolvconf (1.79ubuntu10) ...
  Processing triggers for ureadahead (0.100.0-20) ...
  Errors were encountered while processing:
   initramfs-tools
  Log ended: 2018-04-24  13:12:40
  --- 
  ApportVersion: 2.20.9-0ubuntu6
  Architecture: s390x
  DistroRelease: Ubuntu 18.04
  Package: ubuntu-release-upgrader
  PackageArchitecture: all
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=C
   SHELL=/bin/bash
  ProcVersionSignature: Ubuntu 4.15.0-19.20-generic 4.15.17
  Tags:  bionic
  Uname: Linux 4.15.0-19-generic s390x
  UpgradeStatus: Upgraded to bionic on 2018-04-24 (0 days ago)
  UserGroups: adm cdrom cpacfstats dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1766727/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1767133] [NEW] linux-image-4.15.0-20-generic install after upgrade from xenial breaks

2018-04-26 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

When installing the linux-image-4.15.0-20-generic kernel from bionic on
xenial breaks because of the unversioned Depends on linux-base.

/var/lib/dpkg/info/linux-image-4.15.0-20-generic.postinst: 50: 
/var/lib/dpkg/info/linux-image-4.15.0-20-generic.postinst: 
linux-update-symlinks: not found
dpkg: error processing package linux-image-4.15.0-20-generic (--configure):
 subprocess installed post-installation script returned error exit status 127
Errors were encountered while processing:
 linux-image-4.15.0-20-generic
E: Sub-process /usr/bin/dpkg returned an error code (1)

If the trigger is called, when some meta packages are installed, it
won't happen. If all packages are upgraded, it's possible linux-base is
going to be upgraded first, so the problem won't happen either.

So, not all upgrades will be affected.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Affects: linux-hwe-edge (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: Invalid

** Affects: linux-hwe-edge (Ubuntu Xenial)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Bionic)
 Importance: Undecided
 Assignee: Thadeu Lima de Souza Cascardo (cascardo)
 Status: In Progress

** Affects: linux-hwe-edge (Ubuntu Bionic)
 Importance: Undecided
 Status: Invalid

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)

** Also affects: linux-hwe-edge (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-hwe-edge (Ubuntu Bionic)
   Status: New => Invalid

** Changed in: linux-hwe-edge (Ubuntu Xenial)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1767133

Title:
  linux-image-4.15.0-20-generic install after upgrade from xenial breaks

Status in linux package in Ubuntu:
  In Progress
Status in linux-hwe-edge package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Invalid
Status in linux-hwe-edge source package in Xenial:
  Confirmed
Status in linux source package in Bionic:
  In Progress
Status in linux-hwe-edge source package in Bionic:
  Invalid

Bug description:
  When installing the linux-image-4.15.0-20-generic kernel from bionic
  on xenial breaks because of the unversioned Depends on linux-base.

  /var/lib/dpkg/info/linux-image-4.15.0-20-generic.postinst: 50: 
/var/lib/dpkg/info/linux-image-4.15.0-20-generic.postinst: 
linux-update-symlinks: not found
  dpkg: error processing package linux-image-4.15.0-20-generic (--configure):
   subprocess installed post-installation script returned error exit status 127
  Errors were encountered while processing:
   linux-image-4.15.0-20-generic
  E: Sub-process /usr/bin/dpkg returned an error code (1)

  If the trigger is called, when some meta packages are installed, it
  won't happen. If all packages are upgraded, it's possible linux-base
  is going to be upgraded first, so the problem won't happen either.

  So, not all upgrades will be affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1767133/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1765499] [NEW] linux-hwe-edge: -proposed tracker

2018-04-19 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1765490

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-hwe-edge (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-hwe-edge (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1765490 kernel-sru-cycle-d2018-04-19 xenial

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-hwe-edge (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Tags added: xenial

** Changed in: linux-hwe-edge (Ubuntu Xenial)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical 

[Group.of.nepali.translators] [Bug 1761184] Re: linux-hwe-edge: 4.15.0-15.16~16.04.1 -proposed tracker

2018-04-19 Thread Thadeu Lima de Souza Cascardo
< taihsiang> cascardo: no, we don't cert test hwe-edge

** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1761184

Title:
  linux-hwe-edge: 4.15.0-15.16~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  Invalid
Status in linux-hwe-edge package in Ubuntu:
  Invalid
Status in linux-hwe-edge source package in Xenial:
  Confirmed

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1761177
  phase: Promoted to proposed
  proposed-announcement-sent: true
  proposed-testing-requested: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1761184/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1761184] Re: linux-hwe-edge: 4.15.0-15.16~16.04.1 -proposed tracker

2018-04-19 Thread Thadeu Lima de Souza Cascardo
No verification test for hwe-edge, as it's the same as the bionic
kernel, so verification should have been done on the master kernel.

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1761184

Title:
  linux-hwe-edge: 4.15.0-15.16~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  Invalid
Status in linux-hwe-edge package in Ubuntu:
  Invalid
Status in linux-hwe-edge source package in Xenial:
  Confirmed

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1761177
  phase: Promoted to proposed
  proposed-announcement-sent: true
  proposed-testing-requested: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1761184/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1760684] Re: linux-hwe-edge: -proposed tracker

2018-04-04 Thread Thadeu Lima de Souza Cascardo
*** This bug is a duplicate of bug 1761184 ***
https://bugs.launchpad.net/bugs/1761184

** This bug has been marked a duplicate of bug 1761184
   linux-hwe-edge:  -proposed tracker

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1760684

Title:
  linux-hwe-edge:  -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  Confirmed
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-hwe-edge package in Ubuntu:
  Invalid
Status in linux-hwe-edge source package in Xenial:
  Confirmed

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  kernel-stable-master-bug: 1760678
  phase: Packaging

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1760684/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1760684] [NEW] linux-hwe-edge: -proposed tracker

2018-04-02 Thread Thadeu Lima de Souza Cascardo
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-master-bug: 1760678

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-hwe-edge (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-hwe-edge (Ubuntu Xenial)
 Importance: Medium
 Status: Confirmed


** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-backport-of-1760678 kernel-sru-cycle-2018.04.02-1 xenial

** Tags added: kernel-release-tracking-bug

** Tags added: kernel-release-tracking-bug-live

** Also affects: linux-hwe-edge (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Tags added: xenial

** Changed in: linux-hwe-edge (Ubuntu Xenial)
   Status: New => Confirmed

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical 

[Group.of.nepali.translators] [Bug 1736393] Re: [Artful][Wyse 3040] System hang when trying to enable an offlined CPU core

2018-03-27 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
 Assignee: Jesse Sung (wenchien)
   Status: Fix Released

** Also affects: linux-oem (Ubuntu Bionic)
   Importance: Undecided
   Status: Invalid

** Changed in: linux (Ubuntu Bionic)
   Status: Fix Released => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1736393

Title:
  [Artful][Wyse 3040] System hang when trying to enable an offlined CPU
  core

Status in HWE Next:
  Fix Released
Status in linux package in Ubuntu:
  Fix Committed
Status in linux-oem package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Invalid
Status in linux-oem source package in Xenial:
  Fix Released
Status in linux source package in Artful:
  Fix Committed
Status in linux-oem source package in Artful:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in linux-oem source package in Bionic:
  Invalid

Bug description:
  1. disable cpu[1-3] $ echo 0 > /sys/devices/system/cpu/cpu[1-3]/online
  2. enable cpu[1-3] $ echo 1 > /sys/devices/system/cpu/cpu[1-3]/online

  System will hang on step 2.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1736393/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1727228] Re: ath9k can't connect to wifi AP

2018-03-27 Thread Thadeu Lima de Souza Cascardo
** Also affects: linux-oem (Ubuntu Bionic)
   Importance: Undecided
 Assignee: AceLan Kao (acelankao)
   Status: Invalid

** Changed in: linux-oem (Ubuntu Bionic)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1727228

Title:
  ath9k can't connect to wifi AP

Status in HWE Next:
  Fix Released
Status in linux-oem package in Ubuntu:
  Fix Committed
Status in linux-oem source package in Xenial:
  Fix Released
Status in linux-oem source package in Bionic:
  Fix Committed

Bug description:
  [Impact]
  iwlist scan can search the available wifi APs, but can't get connected.

  On new Intel platforms like ApolloLake, legacy interrupt mechanism
  (INTx) is not supported, so WLAN modules are not working because
  interrupts are missing.

  The affected and listed platforms are
  Dell Inspiron 24-3460
  Dell Inspiron 14-3473
  Dell Inspiron 3472
  Dell Inspiron 3576
  Dell Vostro 3262
  Dell Vostro 15-3572
  Dell Vostro 3578

  [Fix]
  Qualcomm provided a MSI patch for ath9k, and it fixes the issue.

  [Test Case]
  Tested on the machines mentioned above, and they all work well.

  [Regression Potential]
  There shouldn't  be any regression potential. These are newly enabled 
machines and quirks are applied based on DMI_PRODUCT_NAME to only use MSI on 
such machines.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1727228/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1658733] Re: Ubuntu 16.04 KVM:kdump fails to mount root file system when noirqdistrib is missing as dump kernel parameter

2018-03-08 Thread Thadeu Lima de Souza Cascardo
** Changed in: kexec-tools (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: kexec-tools (Ubuntu Trusty)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1658733

Title:
  Ubuntu 16.04 KVM:kdump fails to mount root file system when
  noirqdistrib is missing as dump kernel parameter

Status in The Ubuntu-power-systems project:
  Fix Committed
Status in kexec-tools package in Ubuntu:
  Invalid
Status in makedumpfile package in Ubuntu:
  Fix Released
Status in kexec-tools source package in Trusty:
  Invalid
Status in makedumpfile source package in Trusty:
  Invalid
Status in kexec-tools source package in Xenial:
  Invalid
Status in makedumpfile source package in Xenial:
  Fix Committed
Status in kexec-tools source package in Zesty:
  Invalid
Status in makedumpfile source package in Zesty:
  Invalid
Status in kexec-tools source package in Artful:
  Invalid
Status in makedumpfile source package in Artful:
  Fix Committed
Status in kexec-tools source package in Bionic:
  Invalid
Status in makedumpfile source package in Bionic:
  Fix Released

Bug description:
  [Impact]
  On Power Systems, some interrupts are missed, and dumping the crash will 
fail. Adding the noirqdistrib kernel parameter to the kdump kernel will fix 
this.

  [Test Case]
  Setting up kdump to target a virtio-scsi device on a Power System.

  [Regression Potential]
  The parameter could be interpreted differently on a different platform and 
kdump would fail. However, it has been verified that no other platform uses 
such parameter. If another parameter would have been incorrectly removed on the 
patch, kdump could fail on other systems.


  == Comment: #0 - Richard M. Scheller - 2016-12-14 16:50:26 ==

  ---Problem Description---

  On a KVM guest installed to a multipath root device, the kdump kernel
  fails to mount the root file system.  This error does not occur in a
  similar guest installed to a single path device.

  Full console output of the kdump failure is attached.  These messages
  from the output may be relevant:

  Begin: Loading multipath modules ... Success: loaded module dm-multipath.
  done.
  Begin: Loading multipath hardware handlers ... Failure: failed to load module 
sc
  si_dh_alua.
  Failure: failed to load module scsi_dh_rdac.
  Failure: failed to load module scsi_dh_emc.
  done.
  Begin: Starting multipathd ... done.

  ---uname output---
  Linux dotg9 4.8.0-32-generic #34~16.04.1-Ubuntu SMP Tue Dec 13 17:01:57 UTC 
2016 ppc64le ppc64le ppc64le GNU/Linux

  Machine Type = 8247-22L Ubuntu 16.04.1 KVM guest

  ---Steps to Reproduce---
   - Install Ubuntu 16.04.1 to a muiltpath target disk
  - Install kdump-tools package
  - Configure kexec-tools to reserve sufficient RAM for the kdump kernel to 
load (I use 512MB) in /etc/default/grub.d/kexec-tools.cfg
  - Run update-grub
  - Reboot
  - Initiate a system crash using "echo c > /proc/sysrq-trigger"

  == Comment: #12 - Richard M. Scheller - 2016-12-20 20:37:45 ==
  Here is the log level 8 kdump console log requested in comment 10.

  == Comment: #21 - Richard M. Scheller - 2017-01-06 11:04:17 ==
  (In reply to comment #19)
  > Hi, I logged in dotkvm and I couldn't find the guest dotg9. Also, although I
  > found a dotg9.xml in /kte/xml/ it doesn't look like it uses multipath (it
  > uses .img files which I didn't found as disks).
  >
  > Could you please recreate the guest for further debug?

  Yes, I recreated the guest with its correct multipath lun
  configuration.  I have also attached the guest XML to this bug.

  > Besides that could you please let us know:
  >  - is the multipath the system's root? I mean / is installed/mounted on the
  > multipath device?

  Yes, the guest has only one disk.  That disk is actually a LUN from a
  fiber channel storage device with two paths on the host side.  I have
  passed through both paths to the guest, so the multipath nature of the
  target disk is known to the guest.

  In other words, the guest sees a multipath device and is using it as a
  multipath device.  The root file system is called /dev/mapper/mpatha-
  part2 on the guest.

  >  - how did you attach the device to the guest?

  Each FC LUN path on the host is mapped to a virtio-scsi controller on
  the guest using LUN passthrough.  (See the guest XML for details on
  this.)

  == Comment: #22 - Mauro Sergio Martins Rodrigues  - 2017-01-11 09:31:38 ==
  I managed to get kdump to mount rootfs and perform its tasks by setting 
KDUMP_CMDLINE_APPEND="nr_cpus=4" parameter in /etc/default/kdump-tools see 
http://pastebin.hursley.ibm.com/8239

  I'm still investigating to figure out what is the reason behind this
  behavior.

  Thanks,

  --
  maurosr

  == Comment: #23 - Mauricio Faria De Oliveira  - 2017-01-11 11:56:40 ==
  Mauro,

  (In reply to comment #22)
  > I managed to 

[Group.of.nepali.translators] [Bug 1746088] Re: [Ubuntu 16.04.4] Unable to analyze the vmcore generated by kdump on 4.13.0-26-generic kernel

2018-03-05 Thread Thadeu Lima de Souza Cascardo
By the way, it's already available on bionic, you need to update the
system.

Cascardo.

** Changed in: crash (Ubuntu Bionic)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1746088

Title:
  [Ubuntu 16.04.4] Unable to analyze the vmcore generated by kdump on
  4.13.0-26-generic kernel

Status in The Ubuntu-power-systems project:
  Triaged
Status in crash package in Ubuntu:
  Fix Released
Status in crash source package in Xenial:
  New
Status in crash source package in Artful:
  New
Status in crash source package in Bionic:
  Fix Released

Bug description:
  ---Problem Description---
  Unable to analyze the vmcore generated by kdump on 4.13.0-26-generic kernel 
(Ubuntu 16.04.4)
   
  ---uname output---
  Linux ltc-briggs1 4.13.0-26-generic #29~16.04.2-Ubuntu SMP Tue Jan 9 21:40:36 
UTC 2018 ppc64le ppc64le ppc64le GNU/Linux
   
  Machine Type = 8001-22C 

  ---Steps to Reproduce---
   This bug follow up bug of 
https://bugzilla.linux.ibm.com/show_bug.cgi?id=163565
  The steps to create dump is as follows 

  Once you generate the kdump 
  use crash to analyze the vmcore and we get this error 

  console logs ==

  root@ltc-briggs1:/var/crash/201801150227# ls
  dmesg.201801150227  vmcore.201801150227
  .0-26-generic vmcore.2018011502271150227# crash 
/usr/lib/debug/boot/vmlinux-4.13.

  crash 7.1.4
  Copyright (C) 2002-2015  Red Hat, Inc.
  Copyright (C) 2004, 2005, 2006, 2010  IBM Corporation
  Copyright (C) 1999-2006  Hewlett-Packard Co
  Copyright (C) 2005, 2006, 2011, 2012  Fujitsu Limited
  Copyright (C) 2006, 2007  VA Linux Systems Japan K.K.
  Copyright (C) 2005, 2011  NEC Corporation
  Copyright (C) 1999, 2002, 2007  Silicon Graphics, Inc.
  Copyright (C) 1999, 2000, 2001, 2002  Mission Critical Linux, Inc.
  This program is free software, covered by the GNU General Public License,
  and you are welcome to change it and/or distribute copies of it under
  certain conditions.  Enter "help copying" to see the conditions.
  This program has absolutely no warranty.  Enter "help warranty" for details.
   
  GNU gdb (GDB) 7.6
  Copyright (C) 2013 Free Software Foundation, Inc.
  License GPLv3+: GNU GPL version 3 or later 
  This is free software: you are free to change and redistribute it.
  There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
  and "show warranty" for details.
  This GDB was configured as "powerpc64le-unknown-linux-gnu"...

  please wait... (gathering module symbol data)   
  WARNING: cannot access vmalloc'd module memory

  
  crash: invalid structure member offset: thread_info_task
 FILE: task.c  LINE: 598  FUNCTION: irqstacks_init()

  [/usr/bin/crash] error trace: 1008ade0 => 1011552c => 1017d220 =>
  100833e0

100833e0: (undetermined)
1017d220: OFFSET_verify+80
1011552c: task_init+5084
1008ade0: main_loop+336

  == Comment from Hari Krishna Bathini ==

  There are quite a few commits (all available upstream) that are needed for
  crash tool to work fine. I think the right thing to do here would be to use
  the latest crash tool version 7.2.0 to go with the kernel update. Also, the
  below commit would be needed on top of 7.2.0 crash utility:

commit c8178eca9c74f81a7f803a58d339635cc152e8d9
Author: Dave Anderson 
Date:   Thu Nov 9 11:39:05 2017 -0500

  Update for support of Linux 4.14 and later PPC64 kernels where the
  hash page table geometry accomodates a larger virtual address range.
  Without the patch, the virtual-to-physical translation of user space
  virtual addresses by "vm -p", "vtop", and "rd -u" may generate an
  invalid translation or otherwise fail.
  (hbath...@linux.vnet.ibm.com)

  Similar thing holds true for makedumpfile tool..

  Thanks
  Hari

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1746088/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1750021] Re: fails to dump with latest kpti fixes

2018-03-05 Thread Thadeu Lima de Souza Cascardo
Xenial does not have 83e3c48729d9ebb7af5a31a504f3fd6aff0348c4. Though,
linux-hwe 4.13 has been shipped for Xenial. So, on the kernel side,
there is nothing to fix on our 4.4 kernels, but on the makedumpfile
side, that still needs to be fixed if we want to have some of those
kernels dumpable.

** Description changed:

  When commit 83e3c48729d9ebb7af5a31a504f3fd6aff0348c4 ("mm/sparsemem:
  Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y") was
  backported, it broke the exporting of mem_section on vmcoreinfo.
  
  makedumpfile will fail to dump in that case. Backporting a kernel fix
  will make it work again, but that means that some kernel versions won't
  be dumpable. A solution for makedumpfile should be done as well.
  
  Cascardo.
+ 
+ break-fix: 83e3c48729d9ebb7af5a31a504f3fd6aff0348c4
+ a0b1280368d1e91ab72f849ef095b4f07a39bbf1

** Tags removed: kernel-da-key
** Tags added: kernel-bug-break-fix

** Changed in: linux (Ubuntu Bionic)
   Status: Confirmed => Fix Released

** Changed in: linux (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1750021

Title:
  fails to dump with latest kpti fixes

Status in linux package in Ubuntu:
  Fix Released
Status in makedumpfile package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Invalid
Status in makedumpfile source package in Xenial:
  New
Status in linux source package in Artful:
  New
Status in makedumpfile source package in Artful:
  New
Status in linux source package in Bionic:
  Fix Released
Status in makedumpfile source package in Bionic:
  In Progress

Bug description:
  When commit 83e3c48729d9ebb7af5a31a504f3fd6aff0348c4 ("mm/sparsemem:
  Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y") was
  backported, it broke the exporting of mem_section on vmcoreinfo.

  makedumpfile will fail to dump in that case. Backporting a kernel fix
  will make it work again, but that means that some kernel versions
  won't be dumpable. A solution for makedumpfile should be done as well.

  Cascardo.

  break-fix: 83e3c48729d9ebb7af5a31a504f3fd6aff0348c4
  a0b1280368d1e91ab72f849ef095b4f07a39bbf1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1750021/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1747134] Re: [bug] [BDX]Ubuntu 16.04.3 with kernel "4.10.0-32-generic_4.10.0-32.36~16.04.1_amd64" hang if set "Cores Enabled" to 2 for both CPU

2018-03-02 Thread Thadeu Lima de Souza Cascardo
As bionic already ships a v4.15 kernel, this should be fixed in bionic.

Can you verify?

Cascardo.

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1747134

Title:
  [bug] [BDX]Ubuntu 16.04.3  with kernel
  "4.10.0-32-generic_4.10.0-32.36~16.04.1_amd64"  hang if set "Cores
  Enabled" to 2 for both CPU

Status in intel:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  New
Status in linux source package in Artful:
  Triaged
Status in linux source package in Bionic:
  Fix Released

Bug description:
  Description:
  Customer report a Ubuntu kernel issue related to Intel BDX Core numbers 
setting
  Ubuntu 16.04.3  with kernel "4.10.0-32-generic_4.10.0-32.36~16.04.1_amd64"  
hang if set "Cores Enabled" to 2 for both CPU.

  We have reproduced this issue on 17.10 release.

  With latest kernel, this issue disappears.

  now we bisect this issue is fixed by commit 947134d9b00f
  (“x86/smpboot: Do not use smp_num_siblings in __max_logical_packages
  calculation”) which was merged in v4.15-rc4.

  But after applying this commit to Ubuntu 16.04.3 kernel v4.13 code
  base or Linux upstream mainline kernel v4.13 code base, this issue
  still exists.

  Target Release: 16.04 / 17.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1747134/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1714485] Re: Ubuntu 16.04.03: kdump fails with error "kdump-tools[1532]: /etc/init.d/kdump-tools: 26: [: -ne: unexpected operator" when / file system is xfs.

2018-02-26 Thread Thadeu Lima de Souza Cascardo
Should already be fixed in bionic. If we backport the bionic package to
xenial, we will get this working as well.

Cascardo.

** Changed in: makedumpfile (Ubuntu Bionic)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1714485

Title:
  Ubuntu 16.04.03: kdump fails with error "kdump-tools[1532]:
  /etc/init.d/kdump-tools: 26: [: -ne: unexpected operator" when / file
  system is xfs.

Status in The Ubuntu-power-systems project:
  Triaged
Status in makedumpfile package in Ubuntu:
  Fix Released
Status in makedumpfile source package in Xenial:
  New
Status in makedumpfile source package in Zesty:
  Won't Fix
Status in makedumpfile source package in Artful:
  New
Status in makedumpfile source package in Bionic:
  Fix Released

Bug description:
  == Comment: #0 - PAVITHRA R. PRAKASH <> - 2017-08-31 00:33:37 ==
  ---Problem Description---

  Ubuntu 16.04.03: kdump fails with error "kdump-tools[1532]:
  /etc/init.d/kdump-tools: 26: [: -ne: unexpected operator" when / file
  system is xfs.

  ---Steps to Reproduce---

  1. Install Ubuntu 16.04.03 with / as xfs.
  2. Configure kdump.
  3. trigger crash.

  Machine hangs after below log. Attaching console log.

  [  OK  ] Reached target Network is Online.
   Starting Kernel crash dump capture service...
   Starting iSCSI initiator daemon (iscsid)...
  [   12.263089] kdump-tools[1205]: /etc/init.d/kdump-tools: 26: [: -ne: 
unexpected operator
  [  OK  ] Started Kernel crash dump capture service.
  [  OK  ] Started iSCSI initiator daemon (iscsid).
   Starting Login to default iSCSI targets...
  [  OK  ] Started Login to default iSCSI targets.
  [  OK  ] Reached target Remote File Systems (Pre).

  
  4. After manual reboot  /etc/default/kdump-tools is empty.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1714485/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1670696] Re: Typo in error msg when no crashkernel memory reservation is set

2018-02-23 Thread Thadeu Lima de Souza Cascardo
** Changed in: makedumpfile (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1670696

Title:
  Typo in error msg when no crashkernel memory reservation is set

Status in makedumpfile package in Ubuntu:
  Fix Released
Status in makedumpfile source package in Xenial:
  Won't Fix
Status in makedumpfile source package in Zesty:
  Won't Fix
Status in makedumpfile package in Debian:
  Fix Released

Bug description:
  [Impact]

   * There is a typo in ERRMSG of function show_mem_usage affecting
  Xenial/Zesty, Debian and makedumpfile upstream.

  This should be :
  "show_mem_usage: No memory is reserved for crashkernel!"

  instead of :
  "show_mem_usage: No memory is reserved for crashkenrel!"

  The typo is located here in src code :

  # filename : makedumpfile.c
  -
  int show_mem_usage(void)
   {
   uint64_t vmcoreinfo_addr, vmcoreinfo_len;
   struct cycle cycle = {0};

   if (!is_crashkernel_mem_reserved()) {
     ==>  ERRMSG("No memory is reserved for crashkenrel!\n");
   return FALSE;
   }
  -

  [Test Case]

   * Take a system with no crashkernel memory reservation set
   * run command : makedumpfile --mem-usage /proc/kcore

   * Error message :
  show_mem_usage: No memory is reserved for crashkenrel!

  [Regression Potential]

   * No regression, it is a trivial change with no behavioural change.

  [Other Info]

  * Upstream:
  Patch has been submitted upstream (ML :ke...@lists.infradead.org) 
  - AFAIK, there is no upstream bug database, so no URL available, ML only.
  - Patch will be merge in upstream version 1.6.2 # See comment #4

  * Debian bug :
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857051

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1670696/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


  1   2   >