This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 3.13.0-137.186
---
linux (3.13.0-137.186) trusty; urgency=low
* linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 3.13.0-137.186
---
linux (3.13.0-137.186) trusty; urgency=low
* linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
*** This bug is a duplicate of bug 1736118 ***
https://bugs.launchpad.net/bugs/1736118
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm,
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
*** This bug is a duplicate of bug 1736152 ***
https://bugs.launchpad.net/bugs/1736152
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp:
*** This bug is a duplicate of bug 1736194 ***
https://bugs.launchpad.net/bugs/1736194
This bug was fixed in the package linux - 3.13.0-137.186
---
linux (3.13.0-137.186) trusty; urgency=low
* linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
* CVE-2017-1000405
-
*** This bug is a duplicate of bug 1736181 ***
https://bugs.launchpad.net/bugs/1736181
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm,
This bug was fixed in the package linux - 3.13.0-137.186
---
linux (3.13.0-137.186) trusty; urgency=low
* linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Description changed:
+ [Impact]
+ When panic_timeout is set, the user would expect the system to reboot.
However, it is shutdown, possibly requiring user intervention to power on the
system again. This may impact availability. This happens under certain versions
of qemu (2.10+) emulating
** Description changed:
- This is impacting us for ubuntu autopkgtests. Eventually the whole
- region ends up dying because each worker is hit by this bug in turn and
- backs off until the next reset (6 hourly).
+ == SRU Justification ==
+
+ The fix to bug 1672819 can cause an lockup because it
We've traced the problem to "UBUNTU: SAUCE: exec: ensure file system
accounting in check_unsafe_exec is correct." cking has a fix which will
be used for zesty and artful. I've reverted the patch in bionic since
there's a fix available for golang and we do not want Ubuntu userspace
to become
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
SRU request submitted:
https://lists.ubuntu.com/archives/kernel-team/2017-December/088666.html
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => In Progress
** Changed in: linux (Ubuntu Xenial)
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-artful
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736118
Title:
linux: 4.13.0-19.22
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-zesty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736152
Title:
linux: 4.10.0-42.46
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1736182
Title:
linux-aws:
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736181
Title:
linux: 4.4.0-103.126
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1736187
Title:
linux-aws:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-precise
** Tags removed: block-proposed
--
You received this bug notification because
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1736195
Title:
linux-lts-trusty:
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736152
Title:
linux: 4.10.0-42.46 -proposed
** Changed in: kernel-sru-workflow/certification-testing
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736181
Title:
linux: 4.4.0-103.126
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736194
Title:
linux: 3.13.0-137.186
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736118
Title:
linux: 4.13.0-19.22 -proposed
--- Comment From hegdevas...@in.ibm.com 2017-12-07 11:07 EDT---
(In reply to comment #15)
> Hello IBM,
>
> Could you please verify if the Xenial kernel currently in -proposed fixes
> the issue?
We have verified and confirm that it fixes the issue.
Thanks
-Vasant
--
You received this
Here's the Zesty test; all looks good.
ubuntu@ubuntu:~$ cat /etc/cloud/build.info
build_name: server
serial: 20171207
ubuntu@ubuntu:~$ uname -a
Linux ubuntu 4.10.0-40-generic #44~lp1729145 SMP Wed Dec 6 16:21:45 UTC
2017 x86_64 x86_64 x86_64 GNU/Linux
ubuntu@ubuntu:~$ tree /dev/bcache
/dev/bcache
Only one arm64 missing and I hear images went MIA.
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Tags added: artful kernel-key
** Also affects: linux (Ubuntu Artful)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Artful)
Status: New => Triaged
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
** Changed in: linux (Ubuntu Artful)
4.13.0-17-generic #20~lp1734327 kernel with commits reverted is not
affected.
Thanks for all your effort.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1734327
Title:
Kernel panic on
Overriding manually. There are currently 32 ppc64el results missing in
ADT. Looking at the logs the problem happens at prep stage while
installing the kernel to test and seems to be a problem during grub-
probe (reports an error "no a directory"). Even if this is a kernel
issue, it would be in the
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: makedumpfile (Ubuntu)
** Changed in: linux (Ubuntu)
Status: New => In Progress
** Changed in: linux (Ubuntu)
Importance: Undecided => High
** Changed in: linux (Ubuntu)
Assignee:
For several reasons I had to scrap the machine and rebuild with
different hardware, I couldn't afford such long boot time, so I can't
run the apport-collect command.
I had those reports sitting for quite some time before I made the present
ticket.
However the information in ticket #1704614 are
** Changed in: makedumpfile (Ubuntu)
Status: New => In Progress
** Changed in: makedumpfile (Ubuntu)
Importance: Undecided => High
** Changed in: makedumpfile (Ubuntu)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
--
You received this bug notification
The relevant commit that namespaces this file is:
commit 13b287e8d1cad951634389f85b8c9b816bd3bb1e
Author: Nikolay Borisov
Date: Thu Jan 7 16:38:43 2016 +0200
ipv4: Namespaceify tcp_keepalive_time sysctl knob
Different net namespaces might have different requirements
Upstream commit: a3b2cb30f252b21a6f962e0dd107c8b897ca65e4 ("powerpc: Do
not call ppc_md.panic in fadump panic notifier").
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to makedumpfile in Ubuntu.
https://bugs.launchpad.net/bugs/1736954
Public bug reported:
When panic_timeout is set, the user would expect that the system would
reboot after some timeout after a panic.
However, on powerpc architecture, a panic notifier may not ever return
and even shutdown the system. The main example that impacts platforms we
support is pseries
I tested on 4.14 (Ubuntu) and 4.15 (Mainline) tcp_keepalive_time appears
on both in new user namespaces.
** Tags added: kernel-fixed-upstream
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Verified that panic is correctly set.
However, as I tested on some environment running qemu, and qemu has
changed the behavior of os-term RTAS call, we now need to fix it,
otherwise, panic_timeout won't have the desired effect. Not on those
environments, at least. There is a fix upstream already
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1736947
and then change the status of the bug to 'Confirmed'.
If, due to the
There is little information here to work with, best I can tell is that
some post-installation script returned an error. I can't tell which one,
but chances are that the problem is with the package that provided the
script and not actually with linux-firmware.
--
You received this bug
One of the scripts which is run while generating the initramfs is
returning an error.
E: /usr/share/initramfs-tools/hooks/casper-memdisk failed with return 1.
I don't know what package that comes from, but the problem is with that
script and not a problem in linux-firmware itself.
--
You
new tests, maybe not USB related after all, look at #1736947
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1704614
Title:
very long kernel boot time with some KVM switch
Status in
Public bug reported:
I have a Chelsio T320 10GBASE-R RNIC in my machine apparently triggering
a very long boot time.
I initially thought about a USB problem as I wrote in ticket #1704614
but new tests showed me otherwise.
booting with this parameters yield some interesting things:
--- Comment From bren...@br.ibm.com 2017-12-07 06:03 EDT---
Patch made powerpc-tree now.
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next=371b80447ff33ddac392c189cf884a5a3e18faeb
--
You received this bug notification because you are a member of Kernel
To be realistic I probably won't be testing this with different kernels.
It's happening on a production laptop which I need daily and is a bit
tricky to reproduce. Maybe someone else suffering from the issue can do
the tests.
More info: the bug doesn't happen on every boot. Suspend/resume cycles
Hi Christopher, is it possible to install this latest kernel on Ubuntu
Live? Currently I don't have ubuntu installed on my laptop anymore (I've
switched to arch linux (kernel v4.13.x) since it has no this issue).
--
You received this bug notification because you are a member of Kernel
Packages,
Skipping this round as we got some issue with the AWS Trusty subscription.
Brad will talk to CPC team for this.
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Assignee: Canonical Hardware
4.4.0-1042.51 - aws
Regression test CMPL.
Issue to note in x86_64 (aws):
aio_dio_bugs - failed on t2.nano due to apt connection error, passed on the
rest
ebizzy - failed only on one instance (t2.nano), passed on the rest
libhugetlbfs - 1 failed (brk_near_huge), Killed by signal 1, bad
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736152
Title:
linux: 4.10.0-42.46
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736181
Title:
linux: 4.4.0-103.126
4.13.0-18.21 - generic
Regression test CMPL.
Issue to note in amd64:
hwclock - lodygin will have time changed to 2080, bug 1714229
libhugetlbfs - failed 7 (Heap did not shrink, small_const is not hugepage ),
killed by signal 7, bad config 1
monotonic_time - tsc failed on lodygin, bug
101 - 198 of 198 matches
Mail list logo