[Kernel-packages] [Bug 1819701] Re: linux-ibm-gt: 4.15.0-1017.19 -proposed tracker

2019-03-14 Thread Juerg Haefliger
cal-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) --

[Kernel-packages] [Bug 1779848] Re: Cleanup Meltdown/Spectre implementation

2019-03-13 Thread Juerg Haefliger
Xenial's implementation has been update via updates to newer 4.4 upstream stable versions. ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are

[Kernel-packages] [Bug 1804149] Re: Kernel panic, Oops: 0004 ilc:3 [#1] SMP, iscsi_q_20 iscsi_xmitworker [libiscsi]

2019-03-13 Thread Juerg Haefliger
Can you please give this test kernel a try: https://kernel.ubuntu.com/~juergh/lp1804149/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1804149 Title: Kernel panic,Oops: 0004 ilc:3 [#1]

[Kernel-packages] [Bug 1816716] Re: kernel net tls selftest fails on 5.0

2019-03-11 Thread Juerg Haefliger
The commit that added the test has been reverted. ** Changed in: linux (Ubuntu Disco) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1816716

[Kernel-packages] [Bug 1736390] Re: openvswitch: kernel oops destroying interfaces on i386

2019-03-11 Thread Juerg Haefliger
** Description changed: + == SRU Justification == + + Commit 120645513f55 ("openvswitch: Add eventmask support to CT action.") + introduced a regression on i386. Simply running the following commands + in a loop will trigger a crash rather quickly: + + ovs-vsctl add-br test + ovs-vsctl del-br

[Kernel-packages] [Bug 1736390] Re: openvswitch: kernel oops destroying interfaces on i386

2019-03-11 Thread Juerg Haefliger
https://lore.kernel.org/lkml/20190305104010.6342e9b9@gollum/ ** Also affects: linux (Ubuntu Disco) Importance: High Status: In Progress ** Also affects: openvswitch (Ubuntu Disco) Importance: Undecided Status: Invalid -- You received this bug notification because you are a

[Kernel-packages] [Bug 1818815] Re: Xenial update: 4.4.176 upstream stable release

2019-03-06 Thread Juerg Haefliger
Skipped the following patches (modifications already applied previously): * KVM: VMX: Fix x2apic check in vmx_msr_bitmap_mode() -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818815

[Kernel-packages] [Bug 1818815] Re: Xenial update: 4.4.176 upstream stable release

2019-03-06 Thread Juerg Haefliger
List of already applied patches: * kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818815 Title: Xenial update:

[Kernel-packages] [Bug 1818815] [NEW] Xenial update: 4.4.176 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1818813] Re: Xenial update: 4.4.175 upstream stable release

2019-03-06 Thread Juerg Haefliger
List of already applied patches: * KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222) * KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221) * igb: Fix an issue that PME is not enabled during runtime suspend -- You received this bug

[Kernel-packages] [Bug 1818813] [NEW] Xenial update: 4.4.175 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1818806] [NEW] Xenial update: 4.4.174 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1818803] [NEW] Xenial update: 4.4.173 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1818797] Re: Xenial update: 4.4.172 upstream stable release

2019-03-06 Thread Juerg Haefliger
Skipped the following patches (modifications already applied via SAUCE patches): * proc: Remove empty line in /proc/self/status -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818797

[Kernel-packages] [Bug 1818797] Re: Xenial update: 4.4.172 upstream stable release

2019-03-06 Thread Juerg Haefliger
List of already applied patches: * xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818797 Title:

[Kernel-packages] [Bug 1818797] [NEW] Xenial update: 4.4.172 upstream stable release

2019-03-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-03-05 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1736390 *** https://bugs.launchpad.net/bugs/1736390 ** This bug has been marked a duplicate of bug 1736390 openvswitch: kernel oops destroying interfaces on i386 -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-03-04 Thread Juerg Haefliger
8] CR2: 0074 [ 125.362329] ---[ end trace ce5d2e276f1f9782 ]--- ** Also affects: linux (Ubuntu Disco) Importance: Undecided Assignee: Juerg Haefliger (juergh) Status: Incomplete ** Also affects: linux (Ubuntu Cosmic) Importance: Undecided Status: New -- You received th

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-03-04 Thread Juerg Haefliger
After doing some bisection I found the following commit to introduce the problem: 120645513f55a4ac5543120d9e79925d30a0156f is the first bad commit commit 120645513f55a4ac5543120d9e79925d30a0156f Author: Jarno Rajahalme Date: Fri Apr 21 16:48:06 2017 -0700 openvswitch: Add eventmask

[Kernel-packages] [Bug 1818237] [NEW] Xenial update: 4.4.171 upstream stable release

2019-03-01 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly

[Kernel-packages] [Bug 1816716] Re: kernel net tls selftest fails on 5.0

2019-02-20 Thread Juerg Haefliger
tls.recv_peek_large_buf_mult_recs is a new test that never passed (for upstream). It tests a functionality (mult-record PEEk) that hasn't been (properly) implemented yet. https://lkml.org/lkml/2018/9/18/847 ** Changed in: linux (Ubuntu Disco) Status: New => Confirmed -- You received

[Kernel-packages] [Bug 1816716] [NEW] kernel net tls selftest fails on 5.0

2019-02-20 Thread Juerg Haefliger
Public bug reported: Running the kernel net tls selftests on 5.0 produces: # tools/testing/selftests/net/tls [==] Running 28 tests from 2 test cases. [ RUN ] tls.sendfile [ OK ] tls.sendfile [ RUN ] tls.send_then_sendfile [ OK ] tls.send_then_sendfile [ RUN ]

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixup and missing commits

2019-02-18 Thread Juerg Haefliger
Verified that all commits are applied. ** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811646 Title:

[Kernel-packages] [Bug 1811803] Re: Crash on "ip link add foo type ipip"

2019-02-18 Thread Juerg Haefliger
Successfully tested Xenial, Bionic and Cosmic kernels. ** Tags removed: verification-needed-bionic verification-needed-cosmic verification-needed-xenial ** Tags added: verification-done-bionic verification-done-cosmic verification-done-xenial -- You received this bug notification because you

[Kernel-packages] [Bug 1812086] Re: kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296!

2019-02-18 Thread Juerg Haefliger
Tested successfully. ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1812086 Title: kernel BUG at

[Kernel-packages] [Bug 1813532] Re: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-02-18 Thread Juerg Haefliger
Successfully tested both kernels. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1813532 Title: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a Status in linux

[Kernel-packages] [Bug 1813532] Re: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-02-18 Thread Juerg Haefliger
** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic ** Tags removed: verification-needed-cosmic ** Tags added: verification-done-cosmic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1811850] Re: linux-ibm-gt: 4.15.0-1015.17 -proposed tracker

2019-02-07 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1815061 *** https://bugs.launchpad.net/bugs/1815061 ** This bug has been marked a duplicate of bug 1815061 linux-ibm-gt: -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux

[Kernel-packages] [Bug 1815061] [NEW] linux-ibm-gt: 4.15.0-1016.18 -proposed tracker

2019-02-07 Thread Juerg Haefliger
(canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Juerg Haefliger (juergh) Status: In Progress ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Juerg Haefliger (juergh

[Kernel-packages] [Bug 1814647] Re: linux: 4.4.0-143.169 -proposed tracker

2019-02-05 Thread Juerg Haefliger
eam) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-

[Kernel-packages] [Bug 1814054] Re: BUG: unable to handle kernel paging request at ee835a95

2019-01-31 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1814054 Title: BUG: unable to handle kernel pag

[Kernel-packages] [Bug 1814054] [NEW] BUG: unable to handle kernel paging request at ee835a95

2019-01-31 Thread Juerg Haefliger
Public bug reported: Booting Bionic i386 in a VM and running the following commands repeatedly: ovs-vsctl add-br test ovs-vsctl del-br test eventually leads to: [ 44.476751] IP: kmem_cache_alloc_trace+0x91/0x1d0 [ 44.477299] *pdpt = 1ae13001 *pde = [ 44.477956]

[Kernel-packages] [Bug 1813532] Re: x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-01-28 Thread Juerg Haefliger
** Description changed: - Booting an i386 Bionic kernel in a VM leads to: + == SRU Justification == + + Booting an i386 Bionic kernel in a VM with a 64-bit CPU leads to: [1.074702] Freeing unused kernel memory: 1092K [1.084027] Write protecting the kernel text: 8836k [

[Kernel-packages] [Bug 1813532] [NEW] x86/mm: Found insecure W+X mapping at address (ptrval)/0xc00a0000

2019-01-28 Thread Juerg Haefliger
Public bug reported: Booting an i386 Bionic kernel in a VM leads to: [1.074702] Freeing unused kernel memory: 1092K [1.084027] Write protecting the kernel text: 8836k [1.085115] Write protecting the kernel read-only data: 3480k [1.086361] NX-protecting the kernel data: 7548k [

[Kernel-packages] [Bug 1811850] Re: linux-ibm-gt: 4.15.0-1015.17 -proposed tracker

2019-01-25 Thread Juerg Haefliger
** Description changed: - This bug is for tracking the upload package. This - bug will contain status and testing results related to that upload. + This bug is for tracking the 4.15.0-1015.17 upload package. This bug + will contain status and testing results related to that upload. For an

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2019-01-25 Thread Juerg Haefliger
Jose, I'm confused. I never provided a kernel with the patches from comment #8 yet you did some testing and need a follow-on patch? What kernel did you test? Also, this ticket is closed as "won't fix" so you should not add new requests to it. And since the patches are for the ibm-gt kernel (which

[Kernel-packages] [Bug 1812086] Re: kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296!

2019-01-21 Thread Juerg Haefliger
** Description changed: + == SRU Justification == + Rebooting an iSCSI target while the initiator is writing to a LUN leads to the following trace: [ 59.879202] [ cut here ] [ 59.879202] kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296! [

[Kernel-packages] [Bug 1811803] Re: Crash on "ip link add foo type ipip"

2019-01-17 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Importance: Undecided => High ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1812086] Re: kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296!

2019-01-17 Thread Juerg Haefliger
For clarification, this happens on the target after it comes back from the reboot and restores the iSCSI configuration. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1812086 Title:

[Kernel-packages] [Bug 1812086] Re: kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296!

2019-01-16 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1812086 Title: kernel BUG at

[Kernel-packages] [Bug 1812086] Re: kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296!

2019-01-16 Thread Juerg Haefliger
** Attachment added: "Kernel log" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1812086/+attachment/5229717/+files/dmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1812086] [NEW] kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296!

2019-01-16 Thread Juerg Haefliger
Public bug reported: Rebooting an iSCSI target while the initiator is writing to a LUN leads to the following trace: [ 59.879202] [ cut here ] [ 59.879202] kernel BUG at /build/linux-vxxS7y/linux-4.15.0/mm/slub.c:296! [ 59.880636] invalid opcode: [#1] SMP PTI [

[Kernel-packages] [Bug 1811850] Re: linux-ibm-gt: 4.15.0-1015.17 -proposed tracker

2019-01-16 Thread Juerg Haefliger
cal-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) --

[Kernel-packages] [Bug 1811850] Re: linux-ibm-gt: -proposed tracker

2019-01-15 Thread Juerg Haefliger
** Tags added: kernel-sru-derivative-of-1811419 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811850 Title: linux-ibm-gt: -proposed tracker Status in Kernel SRU Workflow: In

[Kernel-packages] [Bug 1811850] Re: linux-ibm-gt: -proposed tracker

2019-01-15 Thread Juerg Haefliger
** Tags added: kernel-sru-cycle-2019.01.14-1 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811850 Title: linux-ibm-gt: -proposed tracker Status in Kernel SRU Workflow: In Progress

[Kernel-packages] [Bug 1811850] [NEW] linux-ibm-gt: -proposed tracker

2019-01-15 Thread Juerg Haefliger
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow ** Affects: kernel-sru-workflow

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixup and missing commits

2019-01-14 Thread Juerg Haefliger
** Summary changed: - x86/kvm: Backport fixup and missing commits + x86/kvm: Backport fixup and missing commits -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811646 Title: x86/kvm:

[Kernel-packages] [Bug 1811080] Re: Xenial update: 4.4.168 upstream stable release

2019-01-14 Thread Juerg Haefliger
The modifications from the following patches are already present (from previous SAUCE/embargoed patches): * x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest * x86/bugs, KVM: Support the combination of guest and host IBRS -- You received this bug notification because you are a member of

[Kernel-packages] [Bug 1811252] Re: Xenial update: 4.4.169 upstream stable release

2019-01-14 Thread Juerg Haefliger
Added SAUCE patch: * UBUNTU: [Config] Remove CONFIG_CIFS_POSIX=y -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811252 Title: Xenial update: 4.4.169 upstream stable release Status

[Kernel-packages] [Bug 1811080] Re: Xenial update: 4.4.168 upstream stable release

2019-01-14 Thread Juerg Haefliger
The following already present commits are incomplete and need fixing: * KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD * x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixups and bugfixes

2019-01-14 Thread Juerg Haefliger
** Summary changed: - x86/kvm: Backport fixup commits + x86/kvm: Backport fixups and bugfixes ** Summary changed: - x86/kvm: Backport fixups and bugfixes + x86/kvm: Backport fixup and missing commits ** Description changed: == SRU Justification == The update to stable 4.4.168

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixup commits

2019-01-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811646 Title: x86/kvm: Backport fixup comm

[Kernel-packages] [Bug 1811647] Re: Xenial update: 4.4.170 upstream stable release

2019-01-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811647 Title: Xenial update: 4.4.170 upstr

[Kernel-packages] [Bug 1811646] Re: x86/kvm: Backport fixup commits

2019-01-14 Thread Juerg Haefliger
** Description changed: == SRU Justification == - The update to stable 4.4.169 contains a couple of x86/kvm related + The update to stable 4.4.168 contains a couple of x86/kvm related commits that have later fixup commits in upstream. == Fix == Cherry-pick or backport the

[Kernel-packages] [Bug 1811646] [NEW] x86/kvm: Backport fixup commits

2019-01-14 Thread Juerg Haefliger
Public bug reported: == SRU Justification == The update to stable 4.4.169 contains a couple of x86/kvm related commits that have later fixup commits in upstream. == Fix == Cherry-pick or backport the relevant commits. == Regression Potential == Low. The relevant commits have been in upstream

[Kernel-packages] [Bug 1811647] [NEW] Xenial update: 4.4.170 upstream stable release

2019-01-14 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly

[Kernel-packages] [Bug 1764956] Re: Guests using IBRS incur a large performance penalty

2019-01-14 Thread Juerg Haefliger
The update to stable 4.4.169 will fix the majority of the issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1764956 Title: Guests using IBRS incur a large performance penalty

[Kernel-packages] [Bug 1811252] [NEW] Xenial update: 4.4.169 upstream stable release

2019-01-10 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1811080] Re: Xenial update: 4.4.168 upstream stable release

2019-01-09 Thread Juerg Haefliger
List of already applied patches: * posix-timers: Sanitize overrun handling * KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES * x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec * x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} * x86: Introduce

[Kernel-packages] [Bug 1811080] [NEW] Xenial update: 4.4.168 upstream stable release

2019-01-09 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1811077] Re: Xenial update: 4.4.167 upstream stable release

2019-01-09 Thread Juerg Haefliger
Already applied patches: * mm: mlock: avoid increase mm->locked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1811077 Title: Xenial

[Kernel-packages] [Bug 1811077] [NEW] Xenial update: 4.4.167 upstream stable release

2019-01-09 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1810967] [NEW] Xenial update: 4.4.166 upstream stable release

2019-01-08 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1810958] Re: Xenial update: 4.4.165 upstream stable release

2019-01-08 Thread Juerg Haefliger
Skipped the following commit: * Revert "Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV" The commit that is reverted was never added to Xenial 4.4. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1810958] [NEW] Xenial update: 4.4.165 upstream stable release

2019-01-08 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1810947] Re: Xenial update: 4.4.164 upstream stable release

2019-01-08 Thread Juerg Haefliger
Correction, the following patch has not been applied previously: * HID: hiddev: fix potential Spectre v1 There is an older commit with the same subject but different content, hence the confusion. -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1810947] Re: Xenial update: 4.4.164 upstream stable release

2019-01-08 Thread Juerg Haefliger
List of previously applied patches: * cdrom: fix improper type cast, which can leat to information leak. * mount: Don't allow copying MNT_UNBINDABLE|MNT_LOCKED mounts * mount: Retest MNT_LOCKED in do_umount * HID: hiddev: fix potential Spectre v1 -- You received this bug notification

[Kernel-packages] [Bug 1810947] [NEW] Xenial update: 4.4.164 upstream stable release

2019-01-08 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly

[Kernel-packages] [Bug 1810807] Re: Xenial update: 4.4.163 upstream stable release

2019-01-08 Thread Juerg Haefliger
List of previously applied patches: * gro: Allow tunnel stacking in the case of FOU/GUE * tpm: fix: return rc when devm_add_action() fails * ixgbe: Correct X550EM_x revision check * ixgbe: fix RSS limit for X550 * ixgbevf: Fix handling of NAPI budget when multiple queues are enabled per

[Kernel-packages] [Bug 1810807] [NEW] Xenial update: 4.4.163 upstream stable release

2019-01-07 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly

[Kernel-packages] [Bug 1810806] [NEW] Bionic update: 4.4.163 upstream stable release

2019-01-07 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1802772] Re: linux-lts-trusty: 3.13.0-163.213~precise1 -proposed tracker

2018-11-15 Thread Juerg Haefliger
** Changed in: kernel-sru-workflow/prepare-package Status: Fix Released => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Released => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Status: Fix Released => In Progress

[Kernel-packages] [Bug 1802772] Re: linux-lts-trusty: 3.13.0-163.213~precise1 -proposed tracker

2018-11-14 Thread Juerg Haefliger
nel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-14 Thread Juerg Haefliger
The kernel patches were delivered via a custom kernel. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1800649 Title: Add support for NVIDIA GPU passthrough Status in linux package in

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Bionic) Status: New => Fix Released ** Changed in: linux (Ubuntu) Status: Incomplete => Fix Released ** Changed in: linux (Ubuntu) Status: Fix Released => Won't Fix ** Changed in: linux (Ubuntu Bionic) Status: Fix Released => Won't Fix

[Kernel-packages] [Bug 1802777] Re: linux: 3.2.0-138.184 -proposed tracker

2018-11-14 Thread Juerg Haefliger
eam) => Juerg Haefliger (juergh) ** Changed in: kernel-sru-workflow/prepare-package-lbm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lbm Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger (juergh) ** Changed in: kernel-

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-13 Thread Juerg Haefliger
** Also affects: qemu (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1800649 Title: Add support for NVIDIA GPU passthrough Status

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-11-12 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-11-10 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1800649] Re: Add support for NVIDIA GPU passthrough

2018-11-07 Thread Juerg Haefliger
** Summary changed: - Add support to NVIDIA GPU passthrough + Add support for NVIDIA GPU passthrough -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1800649 Title: Add support for

[Kernel-packages] [Bug 1786894] Re: test_265_config_retpoline in kernel_security_test failed on 3.13 Precise

2018-11-07 Thread Juerg Haefliger
I talked to the security team. There is no reason to check for CONFIG_RETPOLINE != 'y' in Precise. CONFIG_RETPOLINE should always be set to 'y', even if the toolchain doesn't support it. There are minimal mitigations that we get even without toolchain support but for that we need CONFIG_RETPOLINE

[Kernel-packages] [Bug 1801900] Re: Xenial update: 4.4.162 upstream stable release

2018-11-06 Thread Juerg Haefliger
Skipped the following patches (already applied): * Drivers: hv: utils: Invoke the poll function after handshake * Drivers: hv: util: Pass the channel information during the init call * Drivers: hv: kvp: fix IP Failover -- You received this bug notification because you are a member of

[Kernel-packages] [Bug 1801900] [NEW] Xenial update: 4.4.162 upstream stable release

2018-11-06 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Kernel-packages] [Bug 1801893] Re: Xenial update: 4.4.161 upstream stable release

2018-11-06 Thread Juerg Haefliger
Skipped the following patches (already applied): * powerpc/fadump: Return error when fadump registration fails -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1801893 Title: Xenial

[Kernel-packages] [Bug 1801893] [NEW] Xenial update: 4.4.161 upstream stable release

2018-11-06 Thread Juerg Haefliger
Haefliger (juergh) Status: New ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) ** Description changed: + SRU Justification - SRU Justification + Imp

[Kernel-packages] [Bug 1779848] Re: Cleanup Meltdown/Spectre implementation

2018-11-05 Thread Juerg Haefliger
Ran the Trusty -proposed kernel through some basic tests, looks good. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1800649] Re: Add support to NVIDIA GPU passthrough

2018-11-02 Thread Juerg Haefliger
https://lists.ubuntu.com/archives/kernel-team/2018-October/096352.html ** Project changed: qemu-kvm => linux ** Project changed: linux => linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1795675] Re: kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930!

2018-10-05 Thread Juerg Haefliger
Turns out that it is the cpu hotplug kernel selftest that crashes the kernel. Simply run: $ bash tools/testing/selftests/cpu-hotplug/on-off-test.sh from the Trusty 3.13 tree and the machine will fall over a couple of minutes later. -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1795675] Re: kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930!

2018-10-05 Thread Juerg Haefliger
Works fine in a VM. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1795675 Title: kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930! Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1795675] [NEW] kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930!

2018-10-02 Thread Juerg Haefliger
Public bug reported: Running a set of autotests on Trusty with kernel 3.13.0-160-generic results in the following reproducible crash: [10870.247844] kernel BUG at /build/linux-PygFzL/linux-3.13.0/kernel/timer.c:930! [10870.255080] invalid opcode: [#1] SMP [10870.259339] Modules linked in:

[Kernel-packages] [Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-09-28 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1788817 Title: BUG: soft lockup - CPU#0 stuck for 23s!

[Kernel-packages] [Bug 1779848] Re: Cleanup Meltdown/Spectre implementation

2018-09-17 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: Expired => Incomplete ** Changed in: linux (Ubuntu) Status: Incomplete => In Progress ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) ** Description changed: + == SRU Justification == + Ubunt

[Kernel-packages] [Bug 1789215] Re: i40e NIC not recognized

2018-09-17 Thread Juerg Haefliger
Boot tested on relevant HW. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1789215 Title: i40e NIC

[Kernel-packages] [Bug 1789215] [NEW] i40e NIC not recognized

2018-08-27 Thread Juerg Haefliger
Public bug reported: == SRU Justification == Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box with a i40e NIC results in no network. The 3.13 i40e driver doesn't support the following HW: 3d:00.0 Ethernet controller: Intel Corporation Device 37d2 (rev 02)

[Kernel-packages] [Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
eam update) + and received testing there. + + == Test Case == + + Booted a patched kernel on HW to verify it comes up without stuck CPU + warnings. ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Ke

[Kernel-packages] [Bug 1788817] [NEW] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
Public bug reported: Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box results in stuck CPU warnings: [ 33.551942] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119] [ 33.558560] Modules linked in: hid_generic ast(+) crct10dif_pclmul syscopyarea crc32_pclmul

[Kernel-packages] [Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
Per git bisect, the fix for this should be: commit 6c971c09f38704513c426ba6515f22fb3d6c87d5 Author: Y.C. Chen Date: Thu Jan 26 09:45:40 2017 +0800 drm/ast: Fixed system hanged if disable P2A The original ast driver will access some BMC configuration through P2A bridge that

[Kernel-packages] [Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-08-22 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1774181 Title: Update to upstream's implementation of

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-08-22 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled

[Kernel-packages] [Bug 1767857] Re: Kernel 4.4.0-122 Breaks qemu-system-x86

2018-08-15 Thread Juerg Haefliger
Chances are slim that this will fix itself automagically. And as long as we're not able to reproduce this, it's going to be difficult. I'll try to take another look in a couple of days once the current kernel respin frenzy is over. -- You received this bug notification because you are a

  1   2   3   >