[Kernel-packages] [Bug 1774815] Re: Add bpftool to linux-tools-common

2019-03-06 Thread Nicolas Dichtel
Any news on this topic? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1774815 Title: Add bpftool to linux-tools-common Status in linux package in Ubuntu: Triaged Status in linux

[Kernel-packages] [Bug 1806392] Re: tun/tap: unable to manage carrier state from userland

2019-03-20 Thread Nicolas Dichtel
** Tags removed: verification-needed-bionic verification-needed-cosmic ** Tags added: verification-done-bionic verification-done-cosmic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1806392] Re: tun/tap: unable to manage carrier state from userland

2019-02-13 Thread Nicolas Dichtel
Any news for this patch? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1806392 Title: tun/tap: unable to manage carrier state from userland Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1812875] Re: ip6_gre: fix tunnel list corruption for x-netns

2019-02-11 Thread Nicolas Dichtel
I reported this bug on behalf of a colleague. He is off this week and will not be able to test this patch before next week. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1812875 Title:

[Kernel-packages] [Bug 1812875] Re: ip6_gre: fix tunnel list corruption for x-netns

2019-01-30 Thread Nicolas Dichtel
This issue is a kernel panic ... We reproduce it on ubuntu-18.04 with a third party software -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1812875 Title: ip6_gre: fix tunnel list

[Kernel-packages] [Bug 1830756] [NEW] tuntap: correctly set SOCKWQ_ASYNC_NOSPACE

2019-05-28 Thread Nicolas Dichtel
Public bug reported: The upstream commit 2f3ab6221e4c ("tuntap: correctly set SOCKWQ_ASYNC_NOSPACE") is missing. Without this patch, userspace apps that use tuntap may be blocked. https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2f3ab6221e4c ** Affects: linux

[Kernel-packages] [Bug 1823725] Re: packet: reset network header if packet shorter than ll reserved space

2019-06-12 Thread Nicolas Dichtel
This bug is still there, valid packets may be dropped with variable length protocols like IP tunnels for example. Any actions expected on my side? ** Changed in: linux (Ubuntu) Status: Expired => New -- You received this bug notification because you are a member of Kernel Packages, which

[Kernel-packages] [Bug 1825985] Re: macvlan: add ndo_change_proto_down support

2019-06-25 Thread Nicolas Dichtel
Can I do something to help? ** Changed in: linux (Ubuntu) Status: Expired => New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1825985 Title: macvlan: add ndo_change_proto_down

[Kernel-packages] [Bug 1642514] Re: sched: Match-all classifier is missing in xenial

2019-04-19 Thread Nicolas Dichtel
root@ubuntu1604:~# dpkg --list | grep iproute2 ii iproute2 4.3.0-1ubuntu3.16.04.4 amd64networking and traffic control tools root@ubuntu1604:~# apt-get install iproute2/xenial-proposed Reading package lists... Done Building dependency tree

[Kernel-packages] [Bug 1836261] [NEW] xfrm interface: several kernel panic

2019-07-11 Thread Nicolas Dichtel
Public bug reported: There was several problems reported upstream: 1/ 56c5ee1a5823: xfrm interface: fix memory leak on creation https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=56c5ee1a5823 2/ xfrm interface: avoid corruption on changelink

[Kernel-packages] [Bug 1825985] [NEW] macvlan: add ndo_change_proto_down support

2019-04-23 Thread Nicolas Dichtel
Public bug reported: The following linux upstream patches are missing to support vrrp with frr: - b58996795dc4 ("net: dev: add generic protodown handler") - 2e8b4ba64676 ("macvlan: add ndo_change_proto_down support") - 8f1af75df3a7 ("vxlan: add ndo_change_proto_down support")

[Kernel-packages] [Bug 1834465] [NEW] ipv6: fix neighbour resolution with raw socket

2019-06-27 Thread Nicolas Dichtel
Public bug reported: With an IPv6 raw socket, packets may be dropped during the neighbour resolution. It is fixed upstream by these patches: 9b1c1ef13b35 ipv6: constify rt6_nexthop() 2c6b55f45d53 ipv6: fix neighbour resolution with raw socket

[Kernel-packages] [Bug 1830756] Re: tuntap: correctly set SOCKWQ_ASYNC_NOSPACE

2019-08-13 Thread Nicolas Dichtel
** Changed in: linux (Ubuntu) Status: Expired => New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1830756 Title: tuntap: correctly set SOCKWQ_ASYNC_NOSPACE Status in linux

[Kernel-packages] [Bug 1823725] Re: packet: reset network header if packet shorter than ll reserved space

2019-08-13 Thread Nicolas Dichtel
** Changed in: linux (Ubuntu) Status: Expired => New ** Description changed: After backport of linux upstream commit 9ed988cd5915 ("packet: validate variable length ll headers") (https://kernel.ubuntu.com/git/ubuntu /ubuntu-bionic.git/commit/?id=c6026847a0a1) the following upstream

[Kernel-packages] [Bug 1834465] Re: ipv6: fix neighbour resolution with raw socket

2019-08-29 Thread Nicolas Dichtel
** Description changed: + [SRU Justification] + + == Impact == + + IPv6 packets may be dropped during the neighbor resolution when a + userspace program uses IPv6 raw sockets. The commit that introduces + this bug has not been identified, but it's here at least from Xenial (4.4). + This was

[Kernel-packages] [Bug 1830756] Re: tuntap: correctly set SOCKWQ_ASYNC_NOSPACE

2019-09-17 Thread Nicolas Dichtel
** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1830756 Title: tuntap: correctly set

[Kernel-packages] [Bug 1836261] Re: xfrm interface: several kernel panic

2019-09-16 Thread Nicolas Dichtel
Here are the official commits from Linus tree: 56c5ee1a5823 ("xfrm interface: fix memory leak on creation") e9e7e85d75f3 ("xfrm interface: avoid corruption on changelink") e0aaa332e6a9 ("xfrm interface: ifname may be wrong in logs") c5d1030f2300 ("xfrm interface: fix list corruption for x-netns")

[Kernel-packages] [Bug 1834465] Re: ipv6: fix neighbour resolution with raw socket

2019-09-06 Thread Nicolas Dichtel
Tests are ok for us. ** Tags removed: verification-needed-disco ** Tags added: verification-done-disco -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1834465 Title: ipv6: fix neighbour

[Kernel-packages] [Bug 1836261] Re: xfrm interface: several kernel panic

2019-07-25 Thread Nicolas Dichtel
The series has been included in the ipsec tree: https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git/log/?h=22d6552f827e It will hit linus tree soon. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1849085] [NEW] netns: fix NLM_F_ECHO mechanism for RTM_NEWNSID

2019-10-21 Thread Nicolas Dichtel
Public bug reported: The following upstream patch is missing: - 993e4c929a07 netns: fix NLM_F_ECHO mechanism for RTM_NEWNSID https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=993e4c929a07 ** Affects: linux (Ubuntu) Importance: Undecided Status: New --

[Kernel-packages] [Bug 1849085] Re: netns: fix NLM_F_ECHO mechanism for RTM_NEWNSID

2019-10-21 Thread Nicolas Dichtel
** Description changed: - The following upstream patch is missing: + [SRU Justification] - - 993e4c929a07 netns: fix NLM_F_ECHO mechanism for RTM_NEWNSID + [Impact] + + The netlink flag NLM_F_ECHO has no effect with the rtnetlink command + RTM_NEWNSID. This has been fixed in v5.4 by the

[Kernel-packages] [Bug 1836261] Re: xfrm interface: several kernel panic

2019-10-07 Thread Nicolas Dichtel
root@dut-vm:~# ip netns add foo root@dut-vm:~# ip netns add bar root@dut-vm:~# ip -n foo netns set bar 0 root@dut-vm:~# ip -n foo link add xfrmi0 link-netnsid 0 type xfrm dev lo if_id 23 root@dut-vm:~# ip -n bar link ls xfrmi0 Device "xfrmi0" does not exist. root@dut-vm:~# ip -n foo link ls

[Kernel-packages] [Bug 1834465] Re: ipv6: fix neighbour resolution with raw socket

2019-10-03 Thread Nicolas Dichtel
Tests are ok here. ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1834465 Title: ipv6: fix neighbour

[Kernel-packages] [Bug 1860969] Re: ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets

2020-02-25 Thread Nicolas Dichtel
** Tags removed: verification-needed-eoan ** Tags added: verification-done-eoan -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1860969 Title: ipsec interfaces: fix sending with

[Kernel-packages] [Bug 1860969] [NEW] ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets

2020-01-27 Thread Nicolas Dichtel
Public bug reported: [SRU Justification] [Impact] Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an AF_PACKET socket are dropped (no carrier). This has been fixed in v5.5 by the following upstream commits - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()") -

[Kernel-packages] [Bug 1860986] Re: openvswitch: same tcp session encapsulated with different udp src port for ovs vxlan tunnel

2020-01-27 Thread Nicolas Dichtel
** Description changed: [SRU Justification] [Impact] Packets encapsulated into a vxlan tunnel with openvswitch don't have the same udp source port for the first packet and the following ones of the same TCP flow in a DOCKER scenario usecase. In fact, when using the kernel

[Kernel-packages] [Bug 1860969] Re: ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets

2020-01-27 Thread Nicolas Dichtel
** Description changed: [SRU Justification] [Impact] Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an AF_PACKET socket are dropped (no carrier). This has been fixed in v5.5 by the following upstream commits - - 95224166a903 ("vti[6]: fix packet tx through

[Kernel-packages] [Bug 1894605] [NEW] gtp: unable to associate contextes to interfaces

2020-09-07 Thread Nicolas Dichtel
Public bug reported: [Impact] When a user dump pdp contextes, it cannot associate them with existing gtp interfaces. Thus, the dump is unusable. This problem has been fixed in the upstream commit b274e47d9e3f ("gtp: add GTPA_LINK info to msg sent to userspace"):

[Kernel-packages] [Bug 1890796] Re: ipsec: policy priority management is broken

2020-08-18 Thread Nicolas Dichtel
I don't understand which kernel should be tested on xenial. The kernel 4.15.0-112-generic does not have the bug. ** Tags removed: verification-needed-bionic verification-needed-focal ** Tags added: verification-done-bionic verification-done-focal -- You received this bug notification because

[Kernel-packages] [Bug 1896504] Re: tc/ebpf: unable to use BPF_FUNC_skb_change_head

2020-09-22 Thread Nicolas Dichtel
Here is an example: root@ubuntu1804hwe:~# uname -a Linux ubuntu1804hwe 5.4.0-47-generic #51~18.04.1-Ubuntu SMP Sat Sep 5 14:35:50 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux root@ubuntu1804hwe:~# cat test.c #include #include #ifndef __section # define __section(NAME)

[Kernel-packages] [Bug 1896504] Re: tc/ebpf: unable to use BPF_FUNC_skb_change_head

2020-09-22 Thread Nicolas Dichtel
With a newer kernel, the last command succeeds (not output): root@ubuntu1804hwe:~# uname -a Linux ubuntu1804hwe 5.9.0-rc3-ge1b81391421b+6wind-net #1 SMP Mon Sep 21 19:31:31 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux root@ubuntu1804hwe:~# tc filter add dev dummy1 egress matchall action bpf obj

[Kernel-packages] [Bug 1896504] Re: tc/ebpf: unable to use BPF_FUNC_skb_change_head

2020-09-22 Thread Nicolas Dichtel
I forget to explain how to check that the tc command was accepted: root@ubuntu1804hwe:~# tc filter show dev dummy1 egress filter protocol all pref 49152 matchall chain 0 filter protocol all pref 49152 matchall chain 0 handle 0x1 not_in_hw action order 1: bpf test.o:[test] id 9 tag

[Kernel-packages] [Bug 1896504] [NEW] tc/ebpf: unable to use BPF_FUNC_skb_change_head

2020-09-21 Thread Nicolas Dichtel
Public bug reported: [Impact] tc ebpf program that uses BPF_FUNC_skb_change_head are rejected. This helper exists since linux v4.10, but it cannot be used until the the upstream commit 6f3f65d80dac ("net: bpf: Allow TC programs to call BPF_FUNC_skb_change_head"):

[Kernel-packages] [Bug 1890796] [NEW] ipsec: policy priority management is broken

2020-08-07 Thread Nicolas Dichtel
Public bug reported: [Impact] When the user tries to update the priority field of a SP, the SP is not updated *AND* a new SP is created. This results to a broken IPsec configuration. This problem has been fixed in the upstream commit 4f47e8ab6ab7 ("xfrm: policy: match with both mark and mask

[Kernel-packages] [Bug 1881907] [NEW] xfrm interface: fix oops when deleting a x-netns interface

2020-06-03 Thread Nicolas Dichtel
Public bug reported: [Impact] When a netns is removed, it may corrupt x-netns xfrm interfaces that have their link part in this netns. It will later trigger an oops when those interfaces are removed. This problem has been fixed in the upstream commit c95c5f58b35e ("xfrm interface: fix oops when

[Kernel-packages] [Bug 1896504] Re: tc/ebpf: unable to use BPF_FUNC_skb_change_head

2020-11-20 Thread Nicolas Dichtel
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1896504 Title: tc/ebpf: unable to use

[Kernel-packages] [Bug 1935040] [NEW] dev_forward_skb: do not scrub skb mark within the same name space

2021-07-08 Thread Nicolas Dichtel
Public bug reported: [Impact] The ebpf function 'bpf_redirect' reset the mark when used with the flag BPF_F_INGRESS. There are two main problems with that: - it's not consistent between legacy tunnels and ebpf; - it's not consistent between ingress and egress. In fact, the eBPF program can

[Kernel-packages] [Bug 1935040] Re: dev_forward_skb: do not scrub skb mark within the same name space

2021-08-23 Thread Nicolas Dichtel
** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1935040 Title: dev_forward_skb: do not scrub skb mark

[Kernel-packages] [Bug 1935040] Re: dev_forward_skb: do not scrub skb mark within the same name space

2021-08-23 Thread Nicolas Dichtel
** Tags removed: verification-needed-hirsute ** Tags added: verification-done-hirsute -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1935040 Title: dev_forward_skb: do not scrub skb

[Kernel-packages] [Bug 1935040] Re: dev_forward_skb: do not scrub skb mark within the same name space

2021-08-23 Thread Nicolas Dichtel
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1935040 Title: dev_forward_skb: do not scrub skb mark

[Kernel-packages] [Bug 1947164] [NEW] ebpf: bpf_redirect fails with ip6 gre interfaces

2021-10-14 Thread Nicolas Dichtel
Public bug reported: [Impact] The tc ebpf bpf_redirect() function cannot be used with ipv6 gre interface. This is fixed upstream with commit a3fa449ffcf5 ("net: handle ARPHRD_IP6GRE in dev_is_mac_header_xmit()"), included in linux v5.14.

[Kernel-packages] [Bug 1945180] [NEW] vrf: fix refcnt leak with vxlan slaves

2021-09-27 Thread Nicolas Dichtel
Public bug reported: [Impact] There are cases, where deleting a VRF device can hang waiting for the refcnt to drop to 0, with the message: unregister_netdevice: waiting for vrf1 to become free. Usage count = 1 This is fixed upstream with commit b87b04f5019e ("ipv4: Fix device used for

[Kernel-packages] [Bug 1951606] [NEW] bonding: arp monitoring is failing with tuntap interfaces

2021-11-19 Thread Nicolas Dichtel
Public bug reported: [Impact] When tuntap interfaces are slaves of a bonding interface, arp monitoring is unusable. This is fixed upstream with commit a31d27fbed5d ("tun: fix bonding active backup with arp monitoring"). It will be included in linux v5.16.

[Kernel-packages] [Bug 1947164] Re: ebpf: bpf_redirect fails with ip6 gre interfaces

2021-11-09 Thread Nicolas Dichtel
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1947164 Title: ebpf: bpf_redirect fails with ip6 gre

[Kernel-packages] [Bug 1947164] Re: ebpf: bpf_redirect fails with ip6 gre interfaces

2021-11-09 Thread Nicolas Dichtel
** Tags removed: verification-needed-hirsute ** Tags added: verification-done-hirsute -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1947164 Title: ebpf: bpf_redirect fails with ip6

[Kernel-packages] [Bug 1947164] Re: ebpf: bpf_redirect fails with ip6 gre interfaces

2021-11-09 Thread Nicolas Dichtel
** Tags removed: verification-needed-impish ** Tags added: verification-done-impish -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1947164 Title: ebpf: bpf_redirect fails with ip6 gre

[Kernel-packages] [Bug 1947164] Re: ebpf: bpf_redirect fails with ip6 gre interfaces

2021-11-09 Thread Nicolas Dichtel
** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1947164 Title: ebpf: bpf_redirect fails with ip6 gre

[Kernel-packages] [Bug 1936475] [NEW] ipv6: fix 'disable_policy' for forwarded packets

2021-07-16 Thread Nicolas Dichtel
Public bug reported: [Impact] The ipv6 sysctl entry 'disable_policy' has effect for local packets only (while the ipv4 version is for all packets coming from the specified interface). This is fixed upstream with commit ccd27f05ae7b ("ipv6: fix 'disable_policy' for fwd packets").

[Kernel-packages] [Bug 1951606] Re: bonding: arp monitoring is failing with tuntap interfaces

2022-03-21 Thread Nicolas Dichtel
The patch has been merged in ubuntu focal: https://kernel.ubuntu.com/git/ubuntu/ubuntu-focal.git/commit/?id=fa748ace5184 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1951606 Title:

[Kernel-packages] [Bug 1951606] Re: bonding: arp monitoring is failing with tuntap interfaces

2022-01-18 Thread Nicolas Dichtel
This patch has been backported in the official linux stable 5.4: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.4.y=01a7ecd36d1e -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1968591] [NEW] xfrm interface cannot be changed anymore

2022-04-11 Thread Nicolas Dichtel
Public bug reported: [Impact] An xfrm interface cannot be changed any more since Ubuntu-hwe-5.4-5.4.0-105. In fact, the regression has been introduced by this backport: https://kernel.ubuntu.com/git/ubuntu/ubuntu-focal.git/commit/?id=13a02539b135 It has been fixed upstream by this commit:

[Kernel-packages] [Bug 2024187] Re: xfrm: packets sent trough a raw socket don't match ipsec policies with proto selector

2023-09-27 Thread Nicolas Dichtel
For the record, the patch has been backported in Lunar/Jammy/Focal: https://lists.ubuntu.com/archives/kernel-team/2023-August/141562.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1968591] Re: xfrm interface cannot be changed anymore

2022-04-20 Thread Nicolas Dichtel
** Description changed: [Impact] An xfrm interface cannot be changed any more since Ubuntu-hwe-5.4-5.4.0-105. In fact, the regression has been introduced by this backport: https://kernel.ubuntu.com/git/ubuntu/ubuntu-focal.git/commit/?id=13a02539b135 It has been fixed upstream by

[Kernel-packages] [Bug 1968591] Re: xfrm interface cannot be changed anymore

2022-04-20 Thread Nicolas Dichtel
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1968591 Title: xfrm interface cannot be changed anymore

[Kernel-packages] [Bug 1968591] Re: xfrm interface cannot be changed anymore

2022-04-20 Thread Nicolas Dichtel
** Tags removed: verification-needed-impish ** Tags added: verification-done-impish -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1968591 Title: xfrm interface cannot be changed

[Kernel-packages] [Bug 1988809] [NEW] ip/nexthop: fix default address selection for connected nexthop

2022-09-06 Thread Nicolas Dichtel
Public bug reported: [Impact] Packets sent by userland apps are rejected/dropped if the source address is not specified and the corresponding route is using a connected nexthop object. This bug exists since linux v5.3 and has been fixed in v5.19 by the following upstream commits: -

[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-10-26 Thread Nicolas Dichtel
** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1988584 Title: cgroup: all controllers mounted when using 'cgroup_no_v1=' Status in linux package

[Kernel-packages] [Bug 1988809] Re: ip/nexthop: fix default address selection for connected nexthop

2022-09-22 Thread Nicolas Dichtel
Before the update: ++ root@ubuntu2004:~/linux# uname -a Linux ubuntu2004 5.4.0-124-generic #140-Ubuntu SMP Thu Aug 4 02:23:37 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux root@ubuntu2004:~/linux# tools/testing/selftests/net/fib_nexthop_nongw.sh TEST: nexthop: get route with nexthop

[Kernel-packages] [Bug 1988809] Re: ip/nexthop: fix default address selection for connected nexthop

2022-09-22 Thread Nicolas Dichtel
** Tags added: verification-done-focal verification-done-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1988809 Title: ip/nexthop: fix default address selection for connected

[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-09-02 Thread Nicolas Dichtel
** Summary changed: - cgroup: all controller mounted when using 'cgroup_no_v1=' + cgroup: all controllers mounted when using 'cgroup_no_v1=' -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1988584] [NEW] cgroup: all controller mounted when using 'cgroup_no_v1='

2022-09-02 Thread Nicolas Dichtel
Public bug reported: [Impact] When mounting a cgroup hierarchy with disabled controller in cgroup v1, all available controllers will be attached. For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all enabled

[Kernel-packages] [Bug 1988809] Re: ip/nexthop: fix default address selection for connected nexthop

2022-12-12 Thread Nicolas Dichtel
I cannot test this kernel. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1988809 Title: ip/nexthop: fix default address selection for connected nexthop Status in linux package in

[Kernel-packages] [Bug 2016269] Re: conntrack mark is not advertised via netlink

2023-04-14 Thread Nicolas Dichtel
** Description changed: [Impact] - after the last merge of the v5.15 stable (see + The last merge of the v5.15 stable (see https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2003134) has introduced a bug on netlink netfilter conntrack messages. The problematic commit is

[Kernel-packages] [Bug 2016269] [NEW] conntrack mark is not advertised via netlink

2023-04-14 Thread Nicolas Dichtel
Public bug reported: [Impact] The last merge of the v5.15 stable (see https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2003134) has introduced a bug on netlink netfilter conntrack messages. The problematic commit is 95fcb42e5f20 ("netfilter: ctnetlink: fix compilation warning after data

[Kernel-packages] [Bug 2016269] Re: conntrack mark is not advertised via netlink

2023-06-08 Thread Nicolas Dichtel
Test with linux-nvidia-5.19/5.19.0-1014.14 are ok. ** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2016269

[Kernel-packages] [Bug 2016269] Re: conntrack mark is not advertised via netlink

2023-05-22 Thread Nicolas Dichtel
Tests are ok. ** Tags removed: verification-needed-kinetic ** Tags added: verification-done-kinetic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2016269 Title: conntrack mark is not

[Kernel-packages] [Bug 2019543] Re: crypto / qat: unable to init GEN4 device

2023-05-22 Thread Nicolas Dichtel
In fact, those patches are not enough, a lot more are needed: - ba79a32acfde ("crypto: qat - replace deprecated MSI API") - 0e64dcd7c94b ("crypto: qat - remove unmatched CPU affinity to cluster IRQ") - 9832fdc917de ("crypto: qat - free irqs only if allocated") - 70fead3adb4e ("crypto: qat -

[Kernel-packages] [Bug 2024187] Re: xfrm: packets sent trough a raw socket don't match ipsec policies with proto selector

2023-07-24 Thread Nicolas Dichtel
Any news? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2024187 Title: xfrm: packets sent trough a raw socket don't match ipsec policies with proto selector Status in linux package

[Kernel-packages] [Bug 2024187] [NEW] xfrm: packets sent trough a raw socket don't match ipsec policies with proto selector

2023-06-16 Thread Nicolas Dichtel
Public bug reported: [Impact] When a userland application sends packets through an IPv4 or IPv6 raw socket, these packets don't match ipsec policies that are configured with a protocol selector. The problem has been fixed in linux v6.4 with commit 3632679d9e4f ("ipv{4,6}/raw: fix output xfrm

[Kernel-packages] [Bug 2016269] Re: conntrack mark is not advertised via netlink

2023-06-16 Thread Nicolas Dichtel
Tests with linux-image-unsigned-5.15.0-1033-intel-iotg are ok. ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2019543] [NEW] crypto / qat: unable to init GEN4 device

2023-05-15 Thread Nicolas Dichtel
Public bug reported: [Target] Jammy kernel. [Impact] The PCI device cannot be initialized. This has been fixed in linux v5.18 with the below commits: - a9dc0d966605 ("crypto: qat - add PFVF support to the GEN4 host driver")

[Kernel-packages] [Bug 2016269] Re: conntrack mark is not advertised via netlink

2023-05-16 Thread Nicolas Dichtel
Tests are ok. ** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2016269 Title: conntrack mark is not

<    1   2