[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2017-01-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-59.80

---
linux (4.4.0-59.80) xenial; urgency=low

  [ John Donnelly ]

  * Release Tracking Bug
- LP: #1654282

  * [2.1.1] MAAS has nvme0n1 set as boot disk, curtin fails (LP: #1651602)
- (fix) nvme: only require 1 interrupt vector, not 2+

linux (4.4.0-58.79) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1651402

  * Support ACPI probe for IIO sensor drivers from ST Micro (LP: #1650123)
- SAUCE: iio: st_sensors: match sensors using ACPI handle
- SAUCE: iio: st_accel: Support sensor i2c probe using acpi
- SAUCE: iio: st_pressure: Support i2c probe using acpi
- [Config] CONFIG_HTS221=m, CONFIG_HTS221_I2C=m, CONFIG_HTS221_SPI=m

  * Fix channel data parsing in ST Micro sensor IIO drivers (LP: #1650189)
- SAUCE: iio: common: st_sensors: fix channel data parsing

  * ST Micro lng2dm 3-axis "femto" accelerometer support (LP: #1650112)
- SAUCE: iio: st-accel: add support for lis2dh12
- SAUCE: iio: st_sensors: support active-low interrupts
- SAUCE: iio: accel: Add support for the h3lis331dl accelerometer
- SAUCE: iio: st_sensors: verify interrupt event to status
- SAUCE: iio: st_sensors: support open drain mode
- SAUCE: iio:st_sensors: fix power regulator usage
- SAUCE: iio: st_sensors: switch to a threaded interrupt
- SAUCE: iio: accel: st_accel: Add lis3l02dq support
- SAUCE: iio: st_sensors: fix scale configuration for h3lis331dl
- SAUCE: iio: accel: st_accel: add support to lng2dm
- SAUCE: iio: accel: st_accel: inline per-sensor data
- SAUCE: Documentation: dt: iio: accel: add lng2dm sensor device binding

  * ST Micro hts221 relative humidity sensor support (LP: #1650116)
- SAUCE: iio: humidity: add support to hts221 rh/temp combo device
- SAUCE: Documentation: dt: iio: humidity: add hts221 sensor device binding
- SAUCE: iio: humidity: remove
- SAUCE: iio: humidity: Support acpi probe for hts211

  * crypto : tolerate new crypto hardware for z Systems (LP: #1644557)
- s390/zcrypt: Introduce CEX6 toleration

  * Acer, Inc ID 5986:055a is useless after 14.04.2 installed. (LP: #1433906)
- uvcvideo: uvc_scan_fallback() for webcams with broken chain

  * vmxnet3 driver could causes kernel panic with v4.4 if LRO enabled.
(LP: #1650635)
- vmxnet3: segCnt can be 1 for LRO packets

  * system freeze when swapping to encrypted swap partition (LP: #1647400)
- mm, oom: rework oom detection
- mm: throttle on IO only when there are too many dirty and writeback pages

  * Kernel Fixes to get TCMU File Backed Optical to work (LP: #1646204)
- target/user: Use sense_reason_t in tcmu_queue_cmd_ring
- target/user: Return an error if cmd data size is too large
- target/user: Fix comments to not refer to data ring
- SAUCE: (no-up) target/user: Fix use-after-free of tcmu_cmds if they are
  expired

  * CVE-2016-9756
- KVM: x86: drop error recovery in em_jmp_far and em_ret_far

  * Dell Precision 5520 & 3520 freezes at login screent (LP: #1650054)
- ACPI / blacklist: add _REV quirks for Dell Precision 5520 and 3520

  * CVE-2016-9794
- ALSA: pcm : Call kill_fasync() in stream lock

  * Allow fuse user namespace mounts by default in xenial (LP: #1634964)
- (namespace) mnt: Move the FS_USERNS_MOUNT check into sget_userns
- (namespace) Revert "UBUNTU: SAUCE: fs: Refuse uid/gid changes which don't
  map into s_user_ns"
- (namespace) fs: Refuse uid/gid changes which don't map into s_user_ns
- (namespace) Revert "UBUNTU: SAUCE: fs: Update posix_acl support to handle
  user namespace mounts"
- (namespace) vfs: Verify acls are valid within superblock's s_user_ns.
- SAUCE: (namespace) posix_acl: Export posix_acl_fix_xattr_userns() to 
modules
- SAUCE: (namespace) fuse: Translate ids in posix acl xattrs
- (namespace) vfs: Don't modify inodes with a uid or gid unknown to the vfs
- (namespace) vfs: Don't create inodes with a uid or gid unknown to the vfs
- (namespace) Revert "UBUNTU: SAUCE: quota: Require that qids passed to
  dqget() be valid and map into s_user_ns"
- (namespace) Revert "UBUNTU: SAUCE: quota: Convert ids relative to 
s_user_ns"
- (namespace) quota: Ensure qids map to the filesystem
- (namespace) quota: Handle quota data stored in s_user_ns in 
quota_setxquota
- (namespace) dquot: For now explicitly don't support filesystems outside of
  init_user_ns
- (namespace) Revert "UBUNTU: SAUCE: ima/evm: Allow root in s_user_ns to set
  xattrs"
- SAUCE: (namespace) security/integrity: Harden against malformed xattrs
- (namespace) Revert "UBUNTU: SAUCE: fs: Allow superblock owner to change
  ownership of inodes with unmappable ids"
- SAUCE: (namespace) fs: Allow superblock owner to change ownership of 
inodes
- (namespace) Revert "UBUNTU: SAUCE: fs: Don't remove suid for CAP_FSETID in
  

[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2017-01-03 Thread Seth Forshee
Verified in linux 4.4.0-58.79.

** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-12-22 Thread Luis Henriques
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag 'verification-needed-xenial' to 'verification-failed-
xenial'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags removed: verification-done-xenial
** Tags added: verification-needed-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-12-15 Thread Luis Henriques
** Changed in: linux (Ubuntu Xenial)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-11-30 Thread Seth Forshee
Not actually released yet since the patches were reverted.

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Released => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-51.72

---
linux (4.4.0-51.72) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1644611

  * 4.4.0-1037-snapdragon #41: kernel panic on boot (LP: #1644596)
- Revert "dma-mapping: introduce the DMA_ATTR_NO_WARN attribute"
- Revert "powerpc: implement the DMA_ATTR_NO_WARN attribute"
- Revert "nvme: use the DMA_ATTR_NO_WARN attribute"

linux (4.4.0-50.71) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1644169

  * xenial 4.4.0-49.70 kernel breaks LXD userspace (LP: #1644165)
- Revert "UBUNTU: SAUCE: (namespace) fuse: Allow user namespace mounts by
  default"
- Revert "UBUNTU: SAUCE: (namespace) fs: Don't remove suid for CAP_FSETID 
for
  userns root"
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Don't remove suid for
  CAP_FSETID in s_user_ns""
- Revert "UBUNTU: SAUCE: (namespace) fs: Allow superblock owner to change
  ownership of inodes"
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Allow superblock owner to
  change ownership of inodes with unmappable ids""
- Revert "UBUNTU: SAUCE: (namespace) security/integrity: Harden against
  malformed xattrs"
- Revert "(namespace) Revert "UBUNTU: SAUCE: ima/evm: Allow root in 
s_user_ns
  to set xattrs""
- Revert "(namespace) dquot: For now explicitly don't support filesystems
  outside of init_user_ns"
- Revert "(namespace) quota: Handle quota data stored in s_user_ns in
  quota_setxquota"
- Revert "(namespace) quota: Ensure qids map to the filesystem"
- Revert "(namespace) Revert "UBUNTU: SAUCE: quota: Convert ids relative to
  s_user_ns""
- Revert "(namespace) Revert "UBUNTU: SAUCE: quota: Require that qids passed
  to dqget() be valid and map into s_user_ns""
- Revert "(namespace) vfs: Don't create inodes with a uid or gid unknown to
  the vfs"
- Revert "(namespace) vfs: Don't modify inodes with a uid or gid unknown to
  the vfs"
- Revert "UBUNTU: SAUCE: (namespace) fuse: Translate ids in posix acl 
xattrs"
- Revert "UBUNTU: SAUCE: (namespace) posix_acl: Export
  posix_acl_fix_xattr_userns() to modules"
- Revert "(namespace) vfs: Verify acls are valid within superblock's
  s_user_ns."
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Update posix_acl support to
  handle user namespace mounts""
- Revert "(namespace) fs: Refuse uid/gid changes which don't map into
  s_user_ns"
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Refuse uid/gid changes 
which
  don't map into s_user_ns""
- Revert "(namespace) mnt: Move the FS_USERNS_MOUNT check into sget_userns"

linux (4.4.0-49.70) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1640921

  * Infiniband driver (kernel module) needed for Azure (LP: #1641139)
- SAUCE: RDMA Infiniband for Windows Azure
- [Config] CONFIG_HYPERV_INFINIBAND_ND=m
- SAUCE: Makefile RDMA infiniband driver for Windows Azure
- [Config] Add hv_network_direct.ko to generic inclusion list
- SAUCE: RDMA Infiniband for Windows Azure is dependent on amd64

linux (4.4.0-48.69) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1640758

  * lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace: being capable wrt a process requires
  mapped uids/gids"
- (upstream) mm: Add a user_ns owner to mm_struct and fix ptrace permission
  checks

  * take 'P' command from upstream xmon (LP: #1637978)
- powerpc/xmon: Add xmon command to dump process/task similar to ps(1)

  * zfs: importing zpool with vdev on zvol hangs kernel (LP: #1636517)
- SAUCE: (noup) Update zfs to 0.6.5.6-0ubuntu15

  * I2C touchpad does not work on AMD platform (LP: #1612006)
- pinctrl/amd: Configure GPIO register using BIOS settings
- pinctrl/amd: switch to using a bool for level

  * [LTCTest] vfio_pci not loaded on Ubuntu 16.10 by default (LP: #1636733)
- [Config] CONFIG_VFIO_PCI=y for ppc64el

  * QEMU throws failure msg while booting guest with SRIOV VF (LP: #1630554)
- KVM: PPC: Always select KVM_VFIO, plus Makefile cleanup

  * Allow fuse user namespace mounts by default in xenial (LP: #1634964)
- (namespace) mnt: Move the FS_USERNS_MOUNT check into sget_userns
- (namespace) Revert "UBUNTU: SAUCE: fs: Refuse uid/gid changes which don't
  map into s_user_ns"
- (namespace) fs: Refuse uid/gid changes which don't map into s_user_ns
- (namespace) Revert "UBUNTU: SAUCE: fs: Update posix_acl support to handle
  user namespace mounts"
- (namespace) vfs: Verify acls are valid within superblock's s_user_ns.
- SAUCE: (namespace) posix_acl: Export posix_acl_fix_xattr_userns() to 
modules
- SAUCE: (namespace) fuse: Translate ids in posix acl xattrs
- (namespace) vfs: Don't modify inodes with a uid 

[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-11-23 Thread Luis Henriques
** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Triaged

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-11-22 Thread Seth Forshee
Verified in the proposed xenial kernel.

** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-11-16 Thread Luis Henriques
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1634964] Re: Allow fuse user namespace mounts by default in xenial

2016-11-08 Thread Luis Henriques
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1634964

Title:
  Allow fuse user namespace mounts by default in xenial

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This is a requirement for supporting snaps within lxd containers in
  xenial. It is already allowed in yakkety, so enablement in xenial
  consists of backporting some changes and changing the fuse
  userns_mounts parameter to be enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp