** No longer affects: linux-gke (Ubuntu Focal)
** No longer affects: linux-gke (Ubuntu Mantic)
** No longer affects: linux-gke (Ubuntu Lunar)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net
Thanks @mloza1 - I see well this looks different from the issue I am
investigating, but maybe I can still help.
There are 10s of thousands of changes between linux-image-5.15.0-25 and
linux-image-5.15.0-67 so it's difficult to know what caused this. I
think bisecting the changes is our best bet. M
- so the risk is considered minimal.
+
+ More information at:
+ https://canonical.lightning.force.com/lightning/r/Case/5008e0HNldDAAT/view
** Changed in: linux-gcp (Ubuntu Focal)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Changed in: linux-gcp (Ubuntu Jammy)
Assig
Public bug reported:
This fix is requested to resolve an issue with NFS-backed mounts when
used with BPF-load-balancing:
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-
next.git/commit/?id=0bdf399342c5
** Affects: linux-gcp (Ubuntu)
Importance: Undecided
Status: New
**
** Changed in: linux-gcp (Ubuntu)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Changed in: linux-gcp (Ubuntu Lunar)
Assignee: (unassigned) => Khaled El Mously (kmously)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscri
** Description changed:
Support is requested for 3 TDX-specific features:
- - Unaccepted memory, aka "lazy memory accept"
- - TDX "Get Quote" - is needed for attestation
- - Marking the TSC as reliable
+ - Unaccepted memory, aka "lazy memory accept"
+ - TDX "Get Quote" - is needed for a
** Summary changed:
- Support 3 TDX subfeatures
+ Add support 3 TDX subfeatures
** Summary changed:
- Add support 3 TDX subfeatures
+ Add support for 3 TDX subfeatures
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
Public bug reported:
Support is requested for 3 TDX-specific features:
- Unaccepted memory, aka "lazy memory accept"
- TDX "Get Quote" - is needed for attestation
- Marking the TSC as reliable
More information at:
https://canonical.lightning.force.com/lightning/r/Case/5008e0FTWGcAAP/vi
** Description changed:
The following upstream fix is requested to resolve issues with SEV live-
migration:
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=ac3f9c9f1b37edaa7d1a9b908bc79d843955a1a2
More details in:
https://canonical.lightning.force.com/lig
Hello @mloza1, Are you using AMD SEV here by any chance?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/2024500
Title:
KVM: after upgrading the kernel to 5.15.0-75, VM hangs aft
** Also affects: linux-gcp (Ubuntu Mantic)
Importance: Undecided
Status: New
** Changed in: linux-gcp (Ubuntu Focal)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Changed in: linux-gcp (Ubuntu Jammy)
Assignee: (unassigned) => Khaled El Mously (kmously)
** C
** Description changed:
The following upstream fix is requested to resolve issues with SEV live-
migration:
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=ac3f9c9f1b37edaa7d1a9b908bc79d843955a1a2
More details in:
https://canonical.lightning.force.com/lig
Public bug reported:
The following upstream fix is requested to resolve issues with SEV live-
migration:
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=ac3f9c9f1b37edaa7d1a9b908bc79d843955a1a2
More details in:
https://canonical.lightning.force.com/lightning/r/Case/5008e0
: linux-gcp (Ubuntu)
Importance: Undecided
Assignee: Khaled El Mously (kmously)
Status: In Progress
** Affects: linux-gcp (Ubuntu Lunar)
Importance: Undecided
Assignee: Khaled El Mously (kmously)
Status: In Progress
** Description changed:
See SalesForce for more
The kernels that are currently in -proposed should have resolved this
issue. Kernel versions:
5.4.0-154.171 (focal)
5.15.0-77.84 (jammy)
The new NFS behaviour has been made to be opt-in only using the "nfs_fasc=1"
modprobe option. So default behaviour should be back to normal unless this
** Tags removed: verification-needed-focal verification-needed-jammy
** Tags added: verification-done-focal verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gke in Ubuntu.
https://bugs.launchpad.net/bugs/202209
** Description changed:
GCP is requesting the backport of the patch "6b080c4e815ceba3c08f
iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support" from
- upstream 6.2 to the 5.19 (kinetic) gcp kernel
+ upstream 6.2 to the 5.19 gcp kernel
The following two patches are required f
** Description changed:
GCP is requesting the backport of the patch "6b080c4e815ceba3c08f
iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support" from
upstream 6.2 to the 5.19 (kinetic) gcp kernel
The following two patches are required for the backport:
6b080c4e815ceba3c0
** Tags removed: verification-needed-kinetic
** Tags added: verification-done-kinetic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2021830
Title:
GVE: Performance improvement for "
on-SEV environment on AMD
hardware.
** Also affects: linux-gcp (Ubuntu Kinetic)
Importance: Undecided
Status: New
** Changed in: linux-gcp (Ubuntu Kinetic)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Changed in: linux-gcp (Ubuntu)
Assignee: (unassigned) => Khaled
Public bug reported:
GCP is asking for a backport of the patch "iommu/amd: Add
map/unmap_pages() iommu_domain_ops callback support" to the 5.19
(kinetic) gcp kernel
The following two patches are pre-requisites:
6b080c4e815ceba3c08ffa980c858595c07e7 iommu/amd/io-pgtable: Implement
map_pages io_
** Tags removed: verification-needed-jammy verification-needed-kinetic
** Tags added: verification-done-jammy verification-done-kinetic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/20
** Changed in: linux (Ubuntu Focal)
Importance: Undecided => Critical
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => Critical
** Changed in: linux (Ubuntu Jammy)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu Focal)
Status: Incomplete => In Progr
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2022098
Title:
Severe NFS performance degradation after LP #200
** Changed in: linux-gcp (Ubuntu Kinetic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2021830
Title:
GVE: Performance improvement for "jumbo" f
** Changed in: linux-gke (Ubuntu Focal)
Status: New => Fix Committed
** Changed in: linux-gke (Ubuntu Jammy)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gke in Ubuntu.
https://bugs.laun
** Description changed:
The fix to LP #2003053 has caused massively increased NFS server access
in some use-cases, which caused severe performance degradation to the
point of being unusable in some cases.
+ The solution to this issue, at least temporarily and at least for linux-
+ gke, is
** Description changed:
The fix to LP #2003053 has caused massively increased NFS server access
in some use-cases, which caused severe performance degradation to the
point of being unusable in some cases.
+
+
+ The solution to this issue, at least temporarily and at least for linux-gke,
i
Public bug reported:
The fix to LP #2003053 has caused massively increased NFS server access
in some use-cases, which caused severe performance degradation to the
point of being unusable in some cases.
** Affects: linux-gke (Ubuntu)
Importance: Critical
Assignee: Khaled El Mously
** Changed in: linux-gcp (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux-gcp (Ubuntu Kinetic)
Importance: Undecided => Medium
** Changed in: linux-gcp (Ubuntu)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Changed in: linux-gcp (Ubuntu Kinetic)
Public bug reported:
This patch
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=82fd151d38d9fda714c5bb2e9e79ecd6bdc72da6
is a performance improvement fix for handling 9k frames on gvnic and is
being requested by GCP for the 5.19 kernel.
Testing:
- Boot tested with
** Changed in: linux (Ubuntu Kinetic)
Status: New => Fix Committed
** Changed in: linux-gcp (Ubuntu Jammy)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.
** No longer affects: linux (Ubuntu Lunar)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2013198
Title:
Fix (+follow-up) needed for SEV-SNP vulnerability
Status in linux package in Ubu
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Kinetic)
Importance: Undecided
Status: New
** Also affects: linux-gcp (Ubuntu Kinetic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Lunar)
Importa
** Also affects: linux-gcp (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-oracle (Ubuntu)
** No longer affects: linux-oracle (Ubuntu Jammy)
** No longer affects: linux-oracle (Ubuntu Kinetic)
** No longer affects: linux-oracle (Ubuntu Lunar)
** No longer affec
This issue was originally reported on GKE and verified by the GKE team.
We do not have reproduction steps.
As it is a change from upstream and a simple constant change, and since
it is has already been verified on GKE, I am verifying it on GCP by code
inspection.
** Tags removed: verification-ne
** Description changed:
- See email about SEV-SNP guest attestation
+ From email discussions with Dionna Glazee from Google:
+
+
+ > This email details a critical vulnerability in SEV-SNP attestation
+ > report integrity protection that must be patched in SEV-SNP-enabled
+ > kernels.
+ >
+ > I'm
Public bug reported:
See email about SEV-SNP guest attestation
** Affects: linux-oracle (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-oracle (Ubuntu Jammy)
Importance: Undecided
Status: New
** Affects: linux-oracle (Ubuntu Kinetic)
Importance: Und
** Description changed:
- Customers of GKE 1.25 and 1.26 are affected by the connack performance
+ Customers of GKE 1.25 and 1.26 are affected by the conntrack performance
issue that causes random connection timeouts. The fix has been committed
to to the upstream's net git repo and to prodkern
Public bug reported:
Customers of GKE 1.25 and 1.26 are affected by the connack performance
issue that causes random connection timeouts. The fix has been committed
to to the upstream's net git repo and to prodkernel and needs to be
backported to Ubuntu versions with kernel 5.15.
https://partneri
Verified the issue is no longer reproducible on linux-aws Ubuntu-
aws-5.15.0-1031.35
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
ht
Public bug reported:
Issue
resize2fs utility is used to resize the filesystem and is idempotent in
nature. But in the 5.15 kernel, successive execution of resize2fs is
returning error.
Reproduction step (on AWS):
Create an AWS instance with AMI ami-056a67ea1b8ffa0fc (Linux
5.15.0-1022-aws)
This was requested in
https://canonical.lightning.force.com/lightning/r/Case/5004K0OlOPXQA3/view
** Changed in: linux-oracle (Ubuntu)
Status: New => In Progress
** Changed in: linux-oracle (Ubuntu Focal)
Status: New => In Progress
--
You received this bug notification because
LP #1925421 is the main arm64 enablement bug - this is just a follow-up
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/2002381
Title:
arm64 support: Enable ARM_SMMU and ARM_SMMU_V
Public bug reported:
The ARM_SMMU and ARM_SMMU_V3 kernel options should be enabled as
requested in
https://canonical.lightning.force.com/lightning/r/Case/5004K0OlOPXQA3/view
** Affects: linux-oracle (Ubuntu)
Importance: Undecided
Status: In Progress
** Affects: linux-oracle (Ub
** Description changed:
Version 3 of AMD's Secure Encrypted Virtualization is called SNP (Secure
Nested Pages). Support for this has been added to the kernel, mostly in
v5.19 with some prerequisites from v5.16. This feature is requested to
be backported to Jammy (5.15).
+
+
+ More inform
Public bug reported:
Version 3 of AMD's Secure Encrypted Virtualization is called SNP (Secure
Nested Pages). Support for this has been added to the kernel, mostly in
v5.19 with some prerequisites from v5.16. This feature is requested to
be backported to Jammy (5.15).
More information at
https:/
Khaled El Mously (khalid.elmou...@canonical.com) has submted a patchset
for this bug: https://cktreview.org/r/c/dummy/+/401
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title
haha
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title:
Dummy bug for testing (please ignore)
Status in linux package in Ubuntu:
Invalid
Bug description:
I'm using this
Khaled El Mously (khalid.elmou...@canonical.com) has submted a patchset
for this bug: https://cktreview.org/r/c/dummy/+/401
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title
Khaled El Mously (khalid.elmou...@canonical.com) has submted a patchset
for this bug: https://cktreview.org/r/c/dummy/+/401
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title
Khaled El Mously (khalid.elmou...@canonical.com) has submted a patchset
for this bug: https://cktreview.org/r/c/dummy/+/401
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title
Khaled El Mously (khalid.elmou...@canonical.com) has submted a patchset
for this bug: https://cktreview.org/r/c/dummy/+/401
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title
Khaled El Mously (khalid.elmou...@canonical.com) has submted a patchset
for this bug: https://cktreview.org/r/c/dummy/+/401
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title
Khaled El Mously (khalid.elmou...@canonical.com) has submted a patchset
for this bug: https://cktreview.org/r/c/dummy/+/381
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title
hello
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title:
Dummy bug for testing (please ignore)
Status in linux package in Ubuntu:
Invalid
Bug description:
I'm using this
hello long time
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810488
Title:
Dummy bug for testing (please ignore)
Status in linux package in Ubuntu:
Invalid
Bug description:
I'm
** Also affects: linux-gcp (Ubuntu Jammy)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1953575
Title:
Update gvnic driver code
Status i
Was audio working previously on this hardware and then stopped after a
kernel (or other package) update? If so, we can try bisecting.
Note also that the 5.15.0-41.44 kernel has been out for a while now. The
most recent kernel is 5.15.0-48.54 so maybe that is worth trying as
well.
--
You received
https://lists.ubuntu.com/archives/kernel-team/2022-August/132504.html
https://lists.ubuntu.com/archives/kernel-team/2022-August/132508.html
Patches have been sent to mailing list and applied.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
** Description changed:
https://canonical.my.salesforce.com/5004K09oeuI
Upstream (v5.16) patches needed to allow live migration of confidential
VMs.
+ [Impact]
+ No support for live-migration of confidential VMs currently
+
+ [Fix]
+ Backport 5 patches from v5.16
+
+ [Test]
+ GCP
Public bug reported:
https://canonical.my.salesforce.com/5004K09oeuI
Upstream (v5.16) patches needed to allow live migration of confidential
VMs.
More details in the SF case.
** Affects: linux-gcp (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-gcp (Ubuntu Focal)
Hi @Louis..
Could you please try to reproduce this issue on the latest Jammy images
with a 5.15 kernel? (The 5.13 kernel is EOL).
I have tried to reproduce the issue myself on a BM.Standard.E3.128
instance, but I am not sure exactly how to launch the VM correctly with
SEV enabled. If you could pr
Hey Zhanglei.
We do not have a 5.16 Ubuntu kernel. We do have 5.15 kernels.
The current mainline version is 5.18 not 5.16.
I have built 2 kernels, one 5.18 and one 5.15 kernel for you.
5.15:
https://kernel.ubuntu.com/~kmously/kernel-kmously-45afdcc-gwrv/
5.18:
https://kernel.ubuntu.com/~kmou
Thanks Zhanglei. Great. We have identified the problem patch, which is
this one:
380cd49e207ba4 ata: ahci: Add Green Sardine vendor ID as
board_ahci_mobile
But I am not really sure why this patch is causing a problem.
The patch only adds one new line as you can see here:
https://pastebin.ubunt
Hello Zhanglei. Thanks. This means:
3000: BUG
3002: NO BUG
3003: NO BUG
3004: NO BUG
3005: BUG
3006: NO BUG
There are only 5 patches between 3005 and 3006 so one of them is the problem.
You can see the list of patches here:
https://pastebin.canonical.com/p/TkvDGcfHWk/plain/
Only one of them
Hello Zhanglei. Thanks for the update. This means:
3000: BUG
3002: NO BUG
3003: NO BUG
3004: NO BUG
3005: BUG
We are getting very close now. Please try version 3006 from this link:
https://kernel.ubuntu.com/~kmously/kernel-kmously-c756bab-RGcD/
Please make sure you are running 3006. Thanks.
Hello again Zhanglei.
This means that so far:
3000: BUG
3002: NO BUG
3003: NO BUG
3004: NO BUG
You can find kernel 3005 here:
https://kernel.ubuntu.com/~kmously/kernel-kmously-039f206-aRqC/
Please ensure you are running version -3005. Thank you
--
You received this bug notification because y
Thanks Zhanglei. I am building 3005 now. It should be ready in about 30
minutes. I will update again soon
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1971576
Title:
SATA device hot pl
** Changed in: linux-gcp (Ubuntu Focal)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1964527
Title:
Enable CONFIG_UNICODE for linux-gcp
Thanks Zhanglei. This means that so far:
3000: BUG
3002: NO BUG
3003: NO BUG
We are getting closer. This is the remaining set of patches:
00501b41aaf73f (tag: test-3000, tag: fail1) s390/pci: move pseudo-MMIO to
prevent MIO overlap
14914e943b0ca5 cpufreq: Fix get_cpu_device() failure in add_cp
Hello Zhanglei. Thanks for the update.
>From my understanding, so far:
3000: BUG
3002: NO BUG
I have the next kernel, 3003, available here:
https://kernel.ubuntu.com/~kmously/kernel-kmously-8243717-Kutu
Once again, please ensure that you are testing with -3003 when testing.
Thank you
--
Y
Hello Zhanglei,
Thanks for the update. I am a little surprised that this kernel failed.
There are 2 SATA related changes in kernel -100 which I suspected were
the root cause. However, the kernel that I provided (version 3000) did
NOT contain those patches, so I expected it to work.
The patches th
Hello Zhanglei, thanks for confirming the working/broken versions.
I am not sure if I will be able to reproduce the issue myself. There are
270 changes between -99 and -100. If you can help me bisect them, we
should be able to quickly identify the problem. Would you be able to
test the kernels I
Hello @zhanglei-mao thanks for creating the bug report.
There is a large time difference between those 5.4 kernels. 5.4.0-42 is
from June 2020 and 5.4.0-109 is very recent. Is it possible to find out
the first non-working 5.4 kernel? We would need to do a bisect.
Do you think you might be able to
The change for this bug has been committed to the gcp kernel. The next
focal/linux-gcp kernel release (5.4.0-1073 or later) should contain the
updated configuration. The bionic/linux-gcp-5.4 kernel will receive the
update as well.
Thanks for reporting the issue, @lhaley, and thanks for your patien
** Changed in: linux-gcp (Ubuntu Focal)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1964527
Title:
Enable CONFIG_UNICODE for linux-gcp
** Changed in: linux-gcp (Ubuntu Focal)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1964527
Title:
Enable CONFIG_UNICODE for linux-gcp
Sta
** No longer affects: linux-gcp (Ubuntu Bionic)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1925421
Title:
arm64 support
Status in linux-gcp package in Ubuntu:
New
Status in li
** Also affects: linux-gcp (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-gcp (Ubuntu Groovy)
** No longer affects: linux-gcp (Ubuntu Hirsute)
** No longer affects: linux-gcp (Ubuntu Impish)
--
You received this bug notification because you are a member of Ker
** Also affects: linux-gcp (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-oracle (Ubuntu)
** No longer affects: linux-oracle (Ubuntu Bionic)
** No longer affects: linux-oracle (Ubuntu Focal)
** No longer affects: linux-oracle (Ubuntu Jammy)
--
You received th
Public bug reported:
[Impact]
No support for arm64 currently
[Fix]
Add arm64 support, including hardware support patches
[Test]
Confirm that it boots on desired arm64 hardware, as well as VMs
[Regression Potential]
This was never working on arm64 so there should be no risk of regression.
The r
Public bug reported:
See https://lists.ubuntu.com/archives/kernel-team/2022-March/128565.html
NOTE: This config is enabled in other gcp kernels and in non-gcp
kernels.
** Affects: linux-gcp (Ubuntu)
Importance: Undecided
Assignee: Khaled El Mously (kmously)
Status: New
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1953575
Title:
Update gvnic driver code
Status in
** Changed in: linux-gcp (Ubuntu Focal)
Status: In Progress => Fix Committed
** Changed in: linux-gcp (Ubuntu Impish)
Status: In Progress => Fix Committed
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification becaus
** Also affects: linux-gcp (Ubuntu Impish)
Importance: Undecided
Status: New
** Changed in: linux-gcp (Ubuntu Impish)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Changed in: linux-gcp (Ubuntu Impish)
Importance: Undecided => Medium
** Changed in: linux-gcp (
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish
** Tags removed: verification-needed-focal
** Tags removed: verification-needed-hirsute
** Tags added: verification-done-hirsute
--
You received this bug notification because you are a member of Kernel
Packages,
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gke in Ubuntu.
https://bugs.launchpad.net/bugs/1959173
Title:
Vulnerability in af_packet handling
S
Public bug reported:
CVE-2021-22600
A vulnerability, which was classified as critical, was found in Linux
Kernel. Affected is the function packet_set_ring of the file
net/packet/af_packet.c. The manipulation with an unknown input leads to
a memory corruption vulnerability. This is going to have a
Public bug reported:
See
https://canonical.lightning.force.com/lightning/r/Case/5004K09qFamQAE/view
for more info
** Affects: linux-oracle (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-oracle (Ubuntu Hirsute)
Importance: Undecided
Status: New
** Af
Hello @Louis,
Are you able to confirm whether the 4.15 kernels are affected by this
problem?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1956575
Title:
[Regression] Focal kernel 5.4
I'm not sure I see a panic in the attached kernel log.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1955655
Title:
kernel-5.13.0-23-generic : Unable to boot when Secure Encrypted
Vir
5ab296 gve: Use dev_info/err instead of netif_info/err.
613ed2d16246f gve: Add stats for gve.
250d220740d21 gve: Get and set Rx copybreak via ethtool
** Affects: linux-gcp (Ubuntu)
Importance: Undecided
Assignee: Khaled El Mously (kmously)
Status: In Progress
** Affects: linux-g
Found on:
2021.09.27/bionic/linux-gcp-4.15/4.15.0-1110.124
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1940261
Title:
ubuntu_seccomp 11-basic-basic_errors failure on X/oracle
@Muhammed: It may be a good idea also to try a fresh Ubuntu 18.04
installation inside a different VM (with the same exact settings as this
one) to see if it has the same issues.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
** Description changed:
See
https://canonical.lightning.force.com/lightning/r/Case/5004K09WBzrQAG/view
for more info
[Impact]
Using nvme with swiotlb in confidential VMs can encounter hardware read/write
errors.
[Fix]
- The following upstream patches address this:
+ The f
)
Importance: Undecided
Status: New
** No longer affects: linux-gcp-5.4 (Ubuntu Focal)
** No longer affects: linux-gcp (Ubuntu Bionic)
** Changed in: linux-gcp (Ubuntu)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Changed in: linux-gcp-5.4 (Ubuntu)
Assignee: (una
Public bug reported:
See
https://canonical.lightning.force.com/lightning/r/Case/5004K09WBzrQAG/view
for more info
[Impact]
Using nvme hardware that uses swiotlb in confidential VMs can encounter
hardware read/write errors.
[Fix]
The following upstream patches address this:
3d2d861eb03e n
** Tags removed: verification-needed-groovy verification-needed-hirsute
** Tags added: verification-done-groovy verification-done-hirsute
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bu
** Tags removed: verification-needed-focal verification-needed-hirsute
** Tags added: verification-done-focal verification-done-hirsute
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs
1 - 100 of 2678 matches
Mail list logo