[Kernel-packages] [Bug 1208740] Re: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards

2013-10-24 Thread Simon Déziel
The precise kernel version 3.2.0-56.86 fixes the issue, thanks! Why no verification-needed flag? Anyway, consider this verification- done-precise. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1208740] Re: Large pastes into readline enabled programs causes breakage from kernels v2.6.31 onwards

2013-10-28 Thread Simon Déziel
** Tags removed: verification-needed-precise ** Tags added: verification-done-precise -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1208740 Title: Large pastes into readline enabled

[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-06-10 Thread Simon Déziel
John, are there any plans to SRU this to Trusty? Thanks -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package

[Kernel-packages] [Bug 1298972] [NEW] stacktrace in ext4: /build/buildd/linux-3.13.0/fs/ext4/ext4_jbd2.c:259 __ext4_handle_dirty_metadata+0x1a2/0x1c0()

2014-03-28 Thread Simon Déziel
Public bug reported: I was running an apt-get dist-upgrade when the FS suddenly remounted to RO. The 2 audit lines are from apt-dater running successively apt- get update and apt-get dist-upgrade: [153439.007924] type=1006 audit(1396010484.706:46): pid=16029 uid=0 old auid=4294967295 new

[Kernel-packages] [Bug 1298972] CurrentDmesg.txt

2014-03-28 Thread Simon Déziel
apport information ** Attachment added: CurrentDmesg.txt https://bugs.launchpad.net/bugs/1298972/+attachment/4048672/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1298972] ProcCpuinfo.txt

2014-03-28 Thread Simon Déziel
apport information ** Attachment added: ProcCpuinfo.txt https://bugs.launchpad.net/bugs/1298972/+attachment/4048673/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1298972] WifiSyslog.txt

2014-03-28 Thread Simon Déziel
apport information ** Attachment added: WifiSyslog.txt https://bugs.launchpad.net/bugs/1298972/+attachment/4048678/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1298972] ProcInterrupts.txt

2014-03-28 Thread Simon Déziel
apport information ** Attachment added: ProcInterrupts.txt https://bugs.launchpad.net/bugs/1298972/+attachment/4048674/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1298972] UdevLog.txt

2014-03-28 Thread Simon Déziel
apport information ** Attachment added: UdevLog.txt https://bugs.launchpad.net/bugs/1298972/+attachment/4048677/+files/UdevLog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1298972] UdevDb.txt

2014-03-28 Thread Simon Déziel
apport information ** Attachment added: UdevDb.txt https://bugs.launchpad.net/bugs/1298972/+attachment/4048676/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1298972

[Kernel-packages] [Bug 1298972] Re: stacktrace in ext4: /build/buildd/linux-3.13.0/fs/ext4/ext4_jbd2.c:259 __ext4_handle_dirty_metadata+0x1a2/0x1c0()

2014-03-28 Thread Simon Déziel
** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1298972 Title: stacktrace in ext4:

[Kernel-packages] [Bug 1298972] ProcModules.txt

2014-03-28 Thread Simon Déziel
apport information ** Attachment added: ProcModules.txt https://bugs.launchpad.net/bugs/1298972/+attachment/4048675/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1298972] Re: stacktrace in ext4: /build/buildd/linux-3.13.0/fs/ext4/ext4_jbd2.c:259 __ext4_handle_dirty_metadata+0x1a2/0x1c0()

2014-03-28 Thread Simon Déziel
I'm attaching the dmesg extract as it reads more easily (same content as what's in the issue description). ** Attachment added: dmesg-extract.log https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1298972/+attachment/4048521/+files/dmesg-extract.log -- You received this bug notification

[Kernel-packages] [Bug 1274444] Re: echo string to /dev/kmsg fails to appear on /var/log/syslog

2014-08-22 Thread Simon Déziel
The verification on Precise was done using the linux-image-generic-lts- trusty kernel. ** Tags removed: verification-needed ** Tags added: verification-done-precise verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed

[Kernel-packages] [Bug 1367932] [NEW] qemu VM crashes the host

2014-09-10 Thread Simon Déziel
Public bug reported: My qemu host keeps crashing every once in a while and this seems to happen when there is some load and/or network traffic happening in the 2 guests it powers. This time I was able to capture a crash trace: Sep 10 16:49:45 ocelot kernel: [204709.569951] general protection

[Kernel-packages] [Bug 1367932] Re: qemu VM crashes the host

2014-09-10 Thread Simon Déziel
Attaching the libvirt definition of the 2 guests ** Attachment added: fw guest (OpenBSD 5.5 64bit) https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1367932/+attachment/4200959/+files/fw.xml -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1367932] Re: qemu VM crashes the host

2014-09-10 Thread Simon Déziel
** Attachment added: bck guest (Trusty 64bit) https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1367932/+attachment/4200960/+files/bck.xml -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

Re: [Kernel-packages] [Bug 1367932] Re: qemu VM crashes the host

2014-09-11 Thread Simon Déziel
On 09/10/2014 06:03 PM, Joseph Salisbury wrote: id this issue occur in a previous version of Ubuntu, or is this a new issue? The problem also happened when the host was running Saucy and the OpenBSD guest was at version 5.4. Looking at the trace more closely, I noticed

Re: [Kernel-packages] [Bug 1367932] Re: qemu VM crashes the host

2014-09-11 Thread Simon Déziel
Hi Chris, On 09/11/2014 01:16 PM, Chris J Arges wrote: How often does this occur? It depends: can be once a week or 3 days in a row. It almost always happened at night (during backup jobs). Have you been able to reproduce this issue without pinning your VMs to cpus? Can you still reproduce

Re: [Kernel-packages] [Bug 1367932] Re: qemu VM crashes the host

2014-09-12 Thread Simon Déziel
On 09/12/2014 07:33 AM, Christopher M. Penalver wrote: ** Tags added: bios-outdated-0502 I'm not sure about this flag since the outdated BIOS version was 305 and the 502 one is the latest. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1367932] Re: qemu VM crashes the host

2014-09-23 Thread Simon Déziel
Not any crash since I updated the BIOS to version 502 and after installing linux-crashdump. It's been 11 days since the last crash so maybe the BIOS update was the fix. I'll wait some more days and will remove linux-crashdump just to see if this could have some impact. -- You received this bug

Re: [Kernel-packages] [Bug 1298972] Re: stacktrace in ext4: /build/buildd/linux-3.13.0/fs/ext4/ext4_jbd2.c:259 __ext4_handle_dirty_metadata+0x1a2/0x1c0()

2014-09-29 Thread Simon Déziel
Hi Russell, On 09/28/2014 01:43 AM, Russell Smith wrote: https://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.14.2 contains ext4 patches related to the code in this stack dump; ad6599ab3ac98a4474544086e048ce86ec15a4d1 specifically references incorrect freeing of the function. I'm

Re: [Kernel-packages] [Bug 1298972] Re: stacktrace in ext4: /build/buildd/linux-3.13.0/fs/ext4/ext4_jbd2.c:259 __ext4_handle_dirty_metadata+0x1a2/0x1c0()

2014-10-02 Thread Simon Déziel
Hi Russell, On 10/02/2014 06:06 AM, Russell Smith wrote: I behaved lazily... and have been trying to collect more data before posting back. Sorry for the delay. 1. I can only reproduce the bug about once a week on 3.13 kernel that is running on ubuntu 14.04. 2. I was lazy and after

[Kernel-packages] [Bug 1367932] Re: qemu VM crashes the host

2014-10-04 Thread Simon Déziel
Finally marking as invalid since the BIOS upgrade fixed the problem. ** Changed in: linux (Ubuntu) Status: Incomplete = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1399064] [NEW] bridges cannot have a mtu 1500 by themselves

2014-12-03 Thread Simon Déziel
Public bug reported: A linux bridge always adopts the smallest MTU of the enslaved devices. When no device are enslaved, it defaults to a MTU of 1500 and refuses to use a larger one. This is problematic when using bridges enslaving only virtual NICs (vnetX) like it's common with KVM guests.

[Kernel-packages] [Bug 1399064] Re: bridges cannot have a mtu 1500 by themselves

2014-12-04 Thread Simon Déziel
On 12/04/2014 01:44 PM, Joseph Salisbury wrote: Did this issue occur in a previous version of Ubuntu, or is this a new issue? This is reproducible on 12.04 too. Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please

Re: [Kernel-packages] [Bug 1399064] Re: bridges cannot have a mtu 1500 by themselves

2014-12-05 Thread Simon Déziel
On 12/05/2014 01:20 AM, Andy Whitcroft wrote: Which is calculated rather simplistically where there are no attached devices: int br_min_mtu(const struct net_bridge *br) { [...] if (list_empty(br-port_list)) mtu = ETH_DATA_LEN; [...] It is not entirely

[Kernel-packages] [Bug 1393317] Re: Intel 7265 [8086:095b] Wireless disconnect automatically

2014-12-19 Thread Simon Déziel
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1393317 Title: Intel 7265 [8086:095b] Wireless

[Kernel-packages] [Bug 1423672] [NEW] ext4 turned read-only following a cronjob run

2015-02-19 Thread Simon Déziel
Public bug reported: I noticed that one of my VM had this dmesg -T output: [Tue Feb 17 09:53:27 2015] systemd-udevd[5433]: starting version 204 [Thu Feb 19 06:25:08 2015] EXT4-fs error (device vda1): ext4_mb_generate_buddy:756: group 5, block bitmap and bg descriptor inconsistent: 16446 vs

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only following a cronjob run

2015-02-19 Thread Simon Déziel
apport information ** Tags added: apport-collected ** Description changed: I noticed that one of my VM had this dmesg -T output: [Tue Feb 17 09:53:27 2015] systemd-udevd[5433]: starting version 204 [Thu Feb 19 06:25:08 2015] EXT4-fs error (device vda1): ext4_mb_generate_buddy:756:

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only following a cronjob run

2015-02-19 Thread Simon Déziel
** Attachment added: /proc/version_signature https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1423672/+attachment/4322692/+files/version.log -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1423672] ProcModules.txt

2015-02-19 Thread Simon Déziel
apport information ** Attachment added: ProcModules.txt https://bugs.launchpad.net/bugs/1423672/+attachment/4322705/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1423672] ProcCpuinfo.txt

2015-02-19 Thread Simon Déziel
apport information ** Attachment added: ProcCpuinfo.txt https://bugs.launchpad.net/bugs/1423672/+attachment/4322703/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1423672] WifiSyslog.txt

2015-02-19 Thread Simon Déziel
apport information ** Attachment added: WifiSyslog.txt https://bugs.launchpad.net/bugs/1423672/+attachment/4322708/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1423672] ProcInterrupts.txt

2015-02-19 Thread Simon Déziel
apport information ** Attachment added: ProcInterrupts.txt https://bugs.launchpad.net/bugs/1423672/+attachment/4322704/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1423672] UdevLog.txt

2015-02-19 Thread Simon Déziel
apport information ** Attachment added: UdevLog.txt https://bugs.launchpad.net/bugs/1423672/+attachment/4322707/+files/UdevLog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1423672] UdevDb.txt

2015-02-19 Thread Simon Déziel
apport information ** Attachment added: UdevDb.txt https://bugs.launchpad.net/bugs/1423672/+attachment/4322706/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1423672

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only following a cronjob run

2015-02-19 Thread Simon Déziel
It was a one time event. I'll report here if/when this happens again. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1425398] Re: Apparmor uses rsyslogd profile for different processes - utopic HWE

2015-03-17 Thread Simon Déziel
Same problem here (Trusty+HWE kernel) and adding /dev/log r, to /etc/apparmor.d/local/usr.sbin.rsyslogd does not help. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1425398

Re: [Kernel-packages] [Bug 1423672] Re: ext4 turned read-only during logrotate daily run

2015-03-09 Thread Simon Déziel
On 03/04/2015 05:07 PM, Simon Déziel wrote: Before loosing anyone's time on this issue, I'll first make sure the hypervisor's RAM is sane. So I'll get back after some memtest86+ then I'll look at the 4.0 kernel. After 15+ hours of memtest86+ (8 full passes), I don't think the RAM is at fault

Re: [Kernel-packages] [Bug 1423672] Re: ext4 turned read-only during logrotate daily run

2015-03-09 Thread Simon Déziel
On 03/09/2015 04:18 PM, Oliver Brakmann wrote: Only ever happens on VMs, never on physical machines. All my virtual disks use Virtio, cache mode 'none' (yeah, I know), I/O mode 'native', with raw LVM volumes as backend. Exact same setup here. What's wrong with cache mode set to none? This

[Kernel-packages] [Bug 1239578] Re: No wireless support for Realtek RTL8192EE [10ec:818b]

2015-04-01 Thread Simon Déziel
Users of Trusty should give a try to the HWE kernel (3.16 ATM) that is officially supported. For details on how to enable this: https://wiki.ubuntu.com/Kernel/LTSEnablementStack -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only following a cronjob run

2015-03-02 Thread Simon Déziel
This problem just occurred on *another* VM. Again, right after the cron.daily run. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1423672 Title: ext4 turned read-only following a

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only during logrotate daily run

2015-03-04 Thread Simon Déziel
This occurred on another VM. I guess I will have to roll our the 4.0-rc2 kernel everywhere. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1423672 Title: ext4 turned read-only during

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only during logrotate daily run

2015-03-04 Thread Simon Déziel
** Summary changed: - ext4 turned read-only following a cronjob run + ext4 turned read-only during logrotate daily run -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1423672 Title:

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only during logrotate daily run

2015-03-04 Thread Simon Déziel
The first occurrence of this problem goes back to Feb 17th. While I keep all the VMs up to date on a daily basis, I now have doubts about the hypervisor's RAM (not ECC by the way). I brought all the VMs offline to have their FSes checked (all ext4). Several of them needed fixing by fsck. Since

[Kernel-packages] [Bug 1425398] Re: Apparmor uses rsyslogd profile for different processes - utopic HWE

2015-05-07 Thread Simon Déziel
Works here too, thanks! ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1425398 Title: Apparmor uses

Re: [Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Simon Déziel
On 05/15/2015 11:55 AM, Pete Cheslock wrote: I'm still able to recreate this issue with kernel version 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux The fix landed in the kernel (#86) right after the one you are running (#85). -- You received

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only during logrotate daily run

2015-06-10 Thread Simon Déziel
Things seem to have stabilized recently as the last occurrence I witnessed was on May 13th. I searched all my 2014 and 2015 logs for ext4_mb_generate_buddy and here is what I got: Nov 24 02:54:03 smb kernel: [842091.081319] EXT4-fs error (device vda1): ext4_mb_generate_buddy:756: group 1, block

[Kernel-packages] [Bug 642930] Re: linux-image-virtual - No watchdog drivers enabled.

2015-06-17 Thread Simon Déziel
While installing linux-image-extra-virtual will work, it also eats up ~230 MB more of storage: $ sudo apt-get install --no-install-recommends linux-image-extra-virtual Reading package lists... Done Building dependency tree Reading state information... Done The following extra packages will

[Kernel-packages] [Bug 1423672] Re: ext4 turned read-only during logrotate daily run

2015-06-15 Thread Simon Déziel
** Changed in: linux (Ubuntu Trusty) Status: Incomplete = Confirmed ** Summary changed: - ext4 turned read-only during logrotate daily run + ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y -- You received this bug notification because you are a

[Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2015-06-15 Thread Simon Déziel
And yet again: root@rproxy:~# dmesg -T | tail [Thu Jun 11 15:28:56 2015] type=1400 audit(1434050938.364:24): apparmor=STATUS operation=profile_replace profile=unconfined name=nc pid=658 comm=apparmor_parser [Thu Jun 11 15:28:59 2015] init: plymouth-upstart-bridge main process ended, respawning

[Kernel-packages] [Bug 1373070] Re: full fix for disconnected path (paths)

2015-05-21 Thread Simon Déziel
To add one more data point, my Trusty server using the Utopic HWE kernel also exhibits the problem: May 21 12:27:28 xeon kernel: [95104.918686] audit: type=1400 audit(1432225648.230:57): apparmor=DENIED operation=sendmsg info=Failed name lookup - disconnected path error=-13

[Kernel-packages] [Bug 1425398] Re: Apparmor uses rsyslogd profile for different processes - utopic HWE

2015-05-21 Thread Simon Déziel
Oddly enough, I'm still seeing some variation of this error: May 21 12:27:28 xeon kernel: [95104.918686] audit: type=1400 audit(1432225648.230:57): apparmor=DENIED operation=sendmsg info=Failed name lookup - disconnected path error=-13 profile=/usr/sbin/rsyslogd name=dev/log pid=3444 comm=logger

[Kernel-packages] [Bug 1516052] Re: [regression] 3.13.0-69 infinite ip rules

2015-11-13 Thread Simon Déziel
** Attachment added: "syslog from 3.13.0-69" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1516052/+attachment/4518323/+files/syslog -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1516052] [NEW] [regression] 3.13.0-69 infinite ip rules

2015-11-13 Thread Simon Déziel
Public bug reported: When I run the 3.13.0-69 -proposed kernel on Trusty, I'm seeing infinite amount of ip rules: $ ip -f inet rule show | head 0: from all lookup local 0: from all lookup local 0: from all lookup local 0: from all lookup local 0: from all lookup

[Kernel-packages] [Bug 1516052] Re: [regression] 3.13.0-69 infinite ip rules

2015-11-13 Thread Simon Déziel
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1516052 Title: [regression] 3.13.0-69 infinite ip rules Status in

[Kernel-packages] [Bug 1516052] Re: [regression] 3.13.0-69 infinite ip rules

2015-11-13 Thread Simon Déziel
*** This bug is a duplicate of bug 1514785 *** https://bugs.launchpad.net/bugs/1514785 So 3.19.0-33 doesn't have the problem. ** This bug has been marked a duplicate of bug 1514785 kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table) -- You received this bug

[Kernel-packages] [Bug 1516052] Re: [regression] 3.13.0-69 infinite ip rules

2015-11-13 Thread Simon Déziel
Indeed, the 3.13 and 3.16 -proposed kernels have the commit I'm suspecting: fib_rules: fix fib rule dumps across multiple skbs The 3.19 -proposed kernel doesn't have it so I'm wondering if it's also affected. -- You received this bug notification because you are a member of Kernel Packages,

[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)

2015-11-13 Thread Simon Déziel
It's not HWE specific as the 3.13 branch is also affected. Here's a recap of the good/bad versions: 3.13.0-68: good 3.13.0-69: bad 3.16.0-51: good 3.16.0-53: bad 3.19.0-32: good 3.19.0-33: good ** Also affects: hwe-next Importance: Undecided Status: New ** No longer affects: hwe-next

Re: [Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2015-10-13 Thread Simon Déziel
On 10/13/2015 11:50 AM, Jan Wagner wrote: > I got also hit with the problem on Debian Jessie VM [virtio] (KVM host > is Jessie as well). > > The following bug might be related: > https://bugzilla.kernel.org/show_bug.cgi?id=104571 > > I'm trying now '"cache=none"' for this VM and see how that

[Kernel-packages] [Bug 1467561] Re: IPsec VTI functionality broken in 3.16.0-39

2015-08-26 Thread Simon Déziel
Someone on the Strongswan mailing list [1] mentioned that 3.19 was also affected. I quickly skimmed the changelog between 3.16.0-38-generic to 3.16.0-39-generic and a possible culprit could be: * ip_forward: Drop frames with attached skb-sk Clemens, would you be able to just revert the

[Kernel-packages] [Bug 1467561] Re: IPsec VTI functionality broken in 3.16.0-39

2015-09-10 Thread Simon Déziel
Marking as confirmed thanks to Tom's bisection results. ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1467561 Title:

[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115

2015-12-08 Thread Simon Déziel
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522766 Title: cryptsetup hangs after kernel upgrade

[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)

2015-11-30 Thread Simon Déziel
The broken kernels just made it to -security. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1514785 Title: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing

[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)

2015-12-02 Thread Simon Déziel
@idallen, try updating to 3.19.0-39.44 which should have the fix. You might need to enable the -proposed repository: https://wiki.ubuntu.com/Testing/EnableProposed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1523155] Re: [regression] 3.13.0-72.115 unable to boot with root FS under LUKS

2015-12-06 Thread Simon Déziel
*** This bug is a duplicate of bug 1522766 *** https://bugs.launchpad.net/bugs/1522766 Luis, the kernel 3.13.0-73.116 fixes the issue, thanks! ** This bug has been marked a duplicate of bug 1522766 cryptsetup hangs after kernel upgrade to 3.13.0-72.115 -- You received this bug

[Kernel-packages] [Bug 1523133] Re: strongswan vpn does not work

2015-12-05 Thread Simon Déziel
The problem is with the kernel itself and a fix was committed upstream: https://www.spinics.net/lists/stable/msg110748.html ** Changed in: strongswan (Ubuntu) Status: New => Invalid ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Changed in: linux (Ubuntu)

[Kernel-packages] [Bug 1523155] Re: [regression] 3.13.0-72.115 unable to boot with root FS under LUKS

2015-12-05 Thread Simon Déziel
It turns out that the "dirname not found" error is a red herring because it also occurs with previous kernel and doesn't prevent booting. With the problematic kernel, giving the wrong password doesn't ask to enter the password so it seems it's not even verified. So whatever the password used,

[Kernel-packages] [Bug 1523155] [NEW] [regression] 3.13.0-72.115 unable to boot with root FS under LUKS

2015-12-05 Thread Simon Déziel
Public bug reported: Early in boot, I see this: Mounting root file system ... Begin: Running /script/local-top ... /script/local-top/cryptroot: line 24: dirname not found Then get prompted to enter the LUKS password. Once I entered the right password, nothing happens, not even any disk

[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)

2015-12-01 Thread Simon Déziel
I can confirm that 3.13.0-71.114 fixes the issue. Thanks -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1514785 Title: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing

[Kernel-packages] [Bug 1523133] Re: strongswan vpn does not work

2015-12-11 Thread Simon Déziel
volker, it's in 4.3.0-4.13: http://changelogs.ubuntu.com/changelogs/pool/main/l/linux/linux_4.3.0-4.13/changelog -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1523133 Title: strongswan

[Kernel-packages] [Bug 1530591] Re: Frequent crash after graphical corruption

2016-01-04 Thread Simon Déziel
Since I filled the bug report, I installed the vbetool and xserver-xorg- video-intel packages and I'm no longer seeing the crash (uptime: 7h+). The graphical performance is also back to what it was on Trusty. I guess my desktop install was too minimal (--no-install-recommends ubuntu- desktop). If

[Kernel-packages] [Bug 1530591] [NEW] Frequent crash after graphical corruption

2016-01-02 Thread Simon Déziel
Public bug reported: My Thinkpad T410 is frequently crashing since I'm running Xenial. Preceeding a crash, an almost entirely blank screen is displayed for a few seconds, then the laptop shuts down. I couldn't identify/correlate the crash with anything special I'm doing, it just happens after

[Kernel-packages] [Bug 1530591] Re: Frequent crash after graphical corruption

2016-01-02 Thread Simon Déziel
The graphic performance is really below what the same laptop was capable with Trusty. Under Xenial, I'm unable to smoothly scroll down/up a simple HTML page with Firefox. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2016-05-25 Thread Simon Déziel
Louie, https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818502#22 provides a simple way to reproduce. If you could give it a try that would be appreciated. FYI, when my hypervisor was running Trusty (3.13), the problem was reproducible on fresh VMs with brand new ext4 FSes, so hopefully that

[Kernel-packages] [Bug 1566465] [NEW] [regression]: Failed to call clock_adjtime(): Invalid argument

2016-04-05 Thread Simon Déziel
Public bug reported: Steps to reproduce: 1) Force a time delta date -s "now - 1 hour" 2) Restart systemd-timesyncd to have it fix the time systemctl restart systemd-timesyncd Expected behavior: The clock should be back in sync. Actual (problematic) behavior: The clock stays out of sync

[Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2016-03-21 Thread Simon Déziel
Thanks Václav, your conclusion about older Intel CPU seems to match my setup since this only happens on a Xeon E3110 (which is in fact a re- branded Core2 Duo E8400). Thanks for bisecting this and figure the fix was:

[Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2016-03-21 Thread Simon Déziel
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1423672 Title: ext4_mb_generate_buddy:756: group N, block bitmap and

[Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2016-04-28 Thread Simon Déziel
I recently reinstalled the affected host to run Xenial so I can no longer test the proposed fix for the 3.13 kernel. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1423672

[Kernel-packages] [Bug 1566465] Re: [regression]: Failed to call clock_adjtime(): Invalid argument

2016-04-16 Thread Simon Déziel
The fix included in 4.4.0-20-generic works well, thanks. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1566465 Title: [regression]: Failed to call clock_adjtime(): Invalid argument

[Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2016-04-20 Thread Simon Déziel
Thanks Chris. So far, no regression with the Trusty kernel: $ uname -a Linux xeon 3.13.0-86-generic #130~lp1423672v201604200743 SMP Wed Apr 20 12:44:20 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux Since the issue only happens rarely, more people testing it would be welcome. -- You received this

[Kernel-packages] [Bug 1660832] Re: unix domain socket cross permission check failing with nested namespaces

2017-02-24 Thread Simon Déziel
I can confirm this problem was fixed for Xenial on 4.4.0-65.86, thank you. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1660832 Title: unix domain socket cross permission check

[Kernel-packages] [Bug 1660832] Re: unix domain socket cross permission check failing with nested namespaces

2017-02-27 Thread Simon Déziel
** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1660832 Title: unix domain socket cross permission

[Kernel-packages] [Bug 1624164] Re: Possible missing firmware /lib/firmware/i915/kbl_dmc_ver1.bin for module i915_bpo

2017-02-27 Thread Simon Déziel
4.4.0-65.86 from -proposed produces no warning, thanks. ** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu.

[Kernel-packages] [Bug 1573848] Re: KASLR should be enabled by default (x86)

2016-09-06 Thread Simon Déziel
** Attachment removed: "13882350_308252829517622_547356934184648507_n.jpg" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1573848/+attachment/4719653/+files/13882350_308252829517622_547356934184648507_n.jpg ** Patch removed: "13882350_308252829517622_547356934184648507_n.jpg"

[Kernel-packages] [Bug 1423672] Re: ext4_mb_generate_buddy:756: group N, block bitmap and bg descriptor inconsistent: X vs Y

2016-10-17 Thread Simon Déziel
Chenyuchai, yes, https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?h=7dec5603b6b8dc4c3e1c65d318bd2a5a8c62a424 is the fix. It was integrated in the Trusty kernel 3.13.0-87.133 -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1624164] Re: Possible missing firmware /lib/firmware/i915/kbl_dmc_ver1.bin for module i915_bpo

2017-01-13 Thread Simon Déziel
@thornyon, why did you marked this bug as fix released? As far as I can see, linux-firmware still doesn't ship kbl_dmc_ver1.bin. I'd like to benefit from lower power usage that should come with this firmware. -- You received this bug notification because you are a member of Kernel Packages,

[Kernel-packages] [Bug 1713787] [NEW] linux 4.4.0-93 triggers call traces related to the bonding module

2017-08-29 Thread Simon Déziel
Public bug reported: == Regression details == Since the rolled out 4.4.0-93, we are getting many ~identical call traces that look like this: [ cut here ] WARNING: CPU: 0 PID: at /build/linux-YyUNAI/linux-4.4.0/net/core/dev.c:2445 skb_warn_bad_offload+0xd1/0x120()

[Kernel-packages] [Bug 1713787] Re: linux 4.4.0-93 triggers call traces related to the bonding module

2017-08-29 Thread Simon Déziel
So far those messages were only noticed on 2 of our hypervisor nodes. I'm attaching the relevant extracts of dmesg on those 2 machines. ** Attachment added: "multiple-dmesg.tgz" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1713787/+attachment/4940943/+files/multiple-dmesg.tgz -- You

[Kernel-packages] [Bug 1713787] Re: linux 4.4.0-93 triggers call traces

2017-08-29 Thread Simon Déziel
I'm now seeing similar traces on a wildly different machine that's not using the bonding module. All machines are KVM hypervisors with VHOST_NET_ENABLED=1. I'm attaching multiple dmesg extract from 3 machines, 2 PowerEdge R830 and 1 old Core 2 Duo/Xeon. ** Summary changed: - linux 4.4.0-93

[Kernel-packages] [Bug 1713787] Re: linux 4.4.0-93 triggers call traces

2017-08-30 Thread Simon Déziel
This really looks like https://patchwork.ozlabs.org/patch/799015/ which fortunately made it into 4.4.0-94.117. I'll give that -proposed kernel a test run. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1713787] Re: linux 4.4.0-93 triggers call traces

2017-08-31 Thread Simon Déziel
*** This bug is a duplicate of bug 1711535 *** https://bugs.launchpad.net/bugs/1711535 4.4.0-94.117 has solved the problem so I'll mark this as a duplicate of LP: #1711535 (update to stable kernel 4.4.82). ** This bug has been marked a duplicate of bug 1711535 Xenial update to 4.4.82

[Kernel-packages] [Bug 1772775] Re: 4.4.0-127.153 generates many "sit: non-ECT" messages

2018-05-22 Thread Simon Déziel
Between 4.4.0-124.148 and 4.4.0-127.153, the following commits references "sit": - sit: reload iphdr in ipip6_rcv - ipv6: sit: better validate user provided tunnel names - ipv6 sit: work around bogus gcc-8 -Wrestrict warning -- You received this bug notification because you are a

[Kernel-packages] [Bug 1772775] Re: 4.4.0-127.153 generates many "sit: non-ECT" messages

2018-05-22 Thread Simon Déziel
I don't know if that matters but I use fq_codel and have been for a long while. # sysctl net.core.default_qdisc net.core.default_qdisc = fq_codel ** Tags added: regression-update -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in

[Kernel-packages] [Bug 1772775] [NEW] 4.4.0-127.153 generates many "sit: non-ECT" messages

2018-05-22 Thread Simon Déziel
Public bug reported: Since deploying linux-image-4.4.0-127-generic (4.4.0-127.153) on a Xenial VM with a sit tunnel, I get such messages: May 22 10:49:38 gw kernel: [ 68.121601] sit: non-ECT from 0.0.0.0 with TOS=0x5 Those are logged quite often: # grep -cF 'sit: non-ECT' /var/log/syslog

[Kernel-packages] [Bug 1772775] ProcCpuinfoMinimal.txt

2018-05-22 Thread Simon Déziel
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1772775/+attachment/5143072/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1772775] WifiSyslog.txt

2018-05-22 Thread Simon Déziel
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1772775/+attachment/5143076/+files/WifiSyslog.txt ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages,

[Kernel-packages] [Bug 1772775] ProcModules.txt

2018-05-22 Thread Simon Déziel
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1772775/+attachment/5143074/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1772775] ProcInterrupts.txt

2018-05-22 Thread Simon Déziel
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1772775/+attachment/5143073/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

  1   2   3   >