[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-05-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1090.95

---
linux-snapdragon (4.4.0-1090.95) xenial; urgency=medium

  * linux-snapdragon: 4.4.0-1090.95 -proposed tracker (LP: #1763689)

  * Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON

  [ Ubuntu: 4.4.0-121.145 ]

  * linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
  * Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON

linux-snapdragon (4.4.0-1089.94) xenial; urgency=medium

  * linux-snapdragon: 4.4.0-1089.94 -proposed tracker (LP: #1761448)


  [ Ubuntu: 4.4.0-120.144 ]

  * linux: 4.4.0-120.144 -proposed tracker (LP: #1761438)
  * intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-2017-5715 (Spectre v2 Intel)
- Revert "x86/mm: Only set IBPB when the new thread cannot ptrace current
  thread"
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch
  * DKMS driver builds fail with: Cannot use CONFIG_STACK_VALIDATION=y, please
install libelf-dev, libelf-devel or elfutils-libelf-devel (LP: #1760876)
- [Packaging] include the retpoline extractor in the headers
  * retpoline hints: primary infrastructure and initial hints (LP: #1758856)
- [Packaging] retpoline-extract: flag *0xNNN(%reg) branches
- x86/speculation, objtool: Annotate indirect calls/jumps for objtool
- x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 
32bit
- x86/paravirt, objtool: Annotate indirect calls
- x86/asm: Stop depending on ptrace.h in alternative.h
- [Packaging] retpoline -- add safe usage hint support
- [Packaging] retpoline-check -- only report additions
- [Packaging] retpoline -- widen indirect call/jmp detection
- [Packaging] retpoline -- elide %rip relative indirections
- [Packaging] retpoline -- clear hint information from packages
- SAUCE: modpost: add discard to non-allocatable whitelist
- KVM: x86: Make indirect calls in emulator speculation safe
- KVM: VMX: Make indirect call speculation safe
- x86/boot, objtool: Annotate indirect jump in secondary_startup_64()
- SAUCE: early/late -- annotate indirect calls in early/late initialisation
  code
- SAUCE: vga_set_mode -- avoid jump tables
- [Config] retpoline -- switch to new format
- [Packaging] final-checks -- remove check for empty retpoline files
  * Xenial update to 4.4.117 stable release (LP: #1756860)
- IB/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH 
ports
- PM / devfreq: Propagate error from devfreq_add_device()
- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls
- ARM: dts: STi: Add gpio polarity for "hdmi,hpd-gpio" property
- arm: spear600: Add missing interrupt-parent of rtc
- arm: spear13xx: Fix dmas cells
- arm: spear13xx: Fix spics gpio controller's warning
- ALSA: seq: Fix regression by incorrect ioctl_mutex usages
- KVM/x86: Reduce retpoline performance impact in slot_handle_level_range(),
  by always inlining iterator helper methods
- x86/cpu: Change type of x86_cache_size variable to unsigned int
- drm/radeon: adjust tested variable
- rtc-opal: Fix handling of firmware error codes, prevent busy loops
- ext4: save error to disk in __ext4_grp_locked_error()
- ext4: correct documentation for grpid mount option
- mm: hide a #warning for COMPILE_TEST
- video: fbdev: atmel_lcdfb: fix display-timings lookup
- console/dummy: leave .con_font_get set to NULL
- rtlwifi: rtl8821ae: Fix connection lost problem correctly
- Btrfs: fix deadlock in run_delalloc_nocow
- Btrfs: fix crash due to not cleaning up tree log block's dirty bits
- Btrfs: fix unexpected -EEXIST when creating new inode
- ALSA: hda - Fix headset mic detection problem for two Dell machines
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute
- ALSA: hda/realtek: PCI quirk for Fujitsu U7x7
- ALSA: usb-audio: add implicit fb quirk for Behringer UFX1204
- ALSA: seq: Fix racy pool initializations
- mvpp2: fix multicast address filter
- dm: correctly handle chained bios in dec_pending()
- x86: fix build warnign with 32-bit PAE
- vfs: don't do RCU lookup of empty pathnames
- ARM: pxa/tosa-bt: add MODULE_LICENSE tag
- ARM: dts: s5pv210: add interrupt-parent for ohci
- media: r820t: fix r820t_write_reg for KASAN
- Linux 4.4.117
  * zfs system process hung on container stop/delete (LP: #1754584)
- SAUCE: (noup) zfs to 0.6.5.6-0ubuntu19
- SAUCE: Fix non-prefaulted page deadlock (LP: #1754584)
  * apparmor: fix bad __initdata tagging on, apparmor_initialized (LP: #1758471)
- SAUCE: apparmor: fix bad __initdata tagging on, apparmor_initialized
  * Xenial update to 4.4.116 stable release (LP: #1756121)
- 

[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1090.95

---
linux-snapdragon (4.4.0-1090.95) xenial; urgency=medium

  * linux-snapdragon: 4.4.0-1090.95 -proposed tracker (LP: #1763689)

  * Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON

  [ Ubuntu: 4.4.0-121.145 ]

  * linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
  * Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON

linux-snapdragon (4.4.0-1089.94) xenial; urgency=medium

  * linux-snapdragon: 4.4.0-1089.94 -proposed tracker (LP: #1761448)


  [ Ubuntu: 4.4.0-120.144 ]

  * linux: 4.4.0-120.144 -proposed tracker (LP: #1761438)
  * intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-2017-5715 (Spectre v2 Intel)
- Revert "x86/mm: Only set IBPB when the new thread cannot ptrace current
  thread"
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch
  * DKMS driver builds fail with: Cannot use CONFIG_STACK_VALIDATION=y, please
install libelf-dev, libelf-devel or elfutils-libelf-devel (LP: #1760876)
- [Packaging] include the retpoline extractor in the headers
  * retpoline hints: primary infrastructure and initial hints (LP: #1758856)
- [Packaging] retpoline-extract: flag *0xNNN(%reg) branches
- x86/speculation, objtool: Annotate indirect calls/jumps for objtool
- x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 
32bit
- x86/paravirt, objtool: Annotate indirect calls
- x86/asm: Stop depending on ptrace.h in alternative.h
- [Packaging] retpoline -- add safe usage hint support
- [Packaging] retpoline-check -- only report additions
- [Packaging] retpoline -- widen indirect call/jmp detection
- [Packaging] retpoline -- elide %rip relative indirections
- [Packaging] retpoline -- clear hint information from packages
- SAUCE: modpost: add discard to non-allocatable whitelist
- KVM: x86: Make indirect calls in emulator speculation safe
- KVM: VMX: Make indirect call speculation safe
- x86/boot, objtool: Annotate indirect jump in secondary_startup_64()
- SAUCE: early/late -- annotate indirect calls in early/late initialisation
  code
- SAUCE: vga_set_mode -- avoid jump tables
- [Config] retpoline -- switch to new format
- [Packaging] final-checks -- remove check for empty retpoline files
  * Xenial update to 4.4.117 stable release (LP: #1756860)
- IB/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH 
ports
- PM / devfreq: Propagate error from devfreq_add_device()
- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls
- ARM: dts: STi: Add gpio polarity for "hdmi,hpd-gpio" property
- arm: spear600: Add missing interrupt-parent of rtc
- arm: spear13xx: Fix dmas cells
- arm: spear13xx: Fix spics gpio controller's warning
- ALSA: seq: Fix regression by incorrect ioctl_mutex usages
- KVM/x86: Reduce retpoline performance impact in slot_handle_level_range(),
  by always inlining iterator helper methods
- x86/cpu: Change type of x86_cache_size variable to unsigned int
- drm/radeon: adjust tested variable
- rtc-opal: Fix handling of firmware error codes, prevent busy loops
- ext4: save error to disk in __ext4_grp_locked_error()
- ext4: correct documentation for grpid mount option
- mm: hide a #warning for COMPILE_TEST
- video: fbdev: atmel_lcdfb: fix display-timings lookup
- console/dummy: leave .con_font_get set to NULL
- rtlwifi: rtl8821ae: Fix connection lost problem correctly
- Btrfs: fix deadlock in run_delalloc_nocow
- Btrfs: fix crash due to not cleaning up tree log block's dirty bits
- Btrfs: fix unexpected -EEXIST when creating new inode
- ALSA: hda - Fix headset mic detection problem for two Dell machines
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute
- ALSA: hda/realtek: PCI quirk for Fujitsu U7x7
- ALSA: usb-audio: add implicit fb quirk for Behringer UFX1204
- ALSA: seq: Fix racy pool initializations
- mvpp2: fix multicast address filter
- dm: correctly handle chained bios in dec_pending()
- x86: fix build warnign with 32-bit PAE
- vfs: don't do RCU lookup of empty pathnames
- ARM: pxa/tosa-bt: add MODULE_LICENSE tag
- ARM: dts: s5pv210: add interrupt-parent for ohci
- media: r820t: fix r820t_write_reg for KASAN
- Linux 4.4.117
  * zfs system process hung on container stop/delete (LP: #1754584)
- SAUCE: (noup) zfs to 0.6.5.6-0ubuntu19
- SAUCE: Fix non-prefaulted page deadlock (LP: #1754584)
  * apparmor: fix bad __initdata tagging on, apparmor_initialized (LP: #1758471)
- SAUCE: apparmor: fix bad __initdata tagging on, apparmor_initialized
  * Xenial update to 4.4.116 stable release (LP: #1756121)
- 

[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-121.145

---
linux (4.4.0-121.145) xenial; urgency=medium

  * linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)

  * Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON

linux (4.4.0-120.144) xenial; urgency=medium

  * linux: 4.4.0-120.144 -proposed tracker (LP: #1761438)

  * intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-2017-5715 (Spectre v2 Intel)
- Revert "x86/mm: Only set IBPB when the new thread cannot ptrace current
  thread"
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch

  * DKMS driver builds fail with: Cannot use CONFIG_STACK_VALIDATION=y, please
install libelf-dev, libelf-devel or elfutils-libelf-devel (LP: #1760876)
- [Packaging] include the retpoline extractor in the headers

  * retpoline hints: primary infrastructure and initial hints (LP: #1758856)
- [Packaging] retpoline-extract: flag *0xNNN(%reg) branches
- x86/speculation, objtool: Annotate indirect calls/jumps for objtool
- x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 
32bit
- x86/paravirt, objtool: Annotate indirect calls
- x86/asm: Stop depending on ptrace.h in alternative.h
- [Packaging] retpoline -- add safe usage hint support
- [Packaging] retpoline-check -- only report additions
- [Packaging] retpoline -- widen indirect call/jmp detection
- [Packaging] retpoline -- elide %rip relative indirections
- [Packaging] retpoline -- clear hint information from packages
- SAUCE: modpost: add discard to non-allocatable whitelist
- KVM: x86: Make indirect calls in emulator speculation safe
- KVM: VMX: Make indirect call speculation safe
- x86/boot, objtool: Annotate indirect jump in secondary_startup_64()
- SAUCE: early/late -- annotate indirect calls in early/late initialisation
  code
- SAUCE: vga_set_mode -- avoid jump tables
- [Config] retpoline -- switch to new format
- [Packaging] final-checks -- remove check for empty retpoline files

  * Xenial update to 4.4.117 stable release (LP: #1756860)
- IB/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH 
ports
- PM / devfreq: Propagate error from devfreq_add_device()
- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls
- ARM: dts: STi: Add gpio polarity for "hdmi,hpd-gpio" property
- arm: spear600: Add missing interrupt-parent of rtc
- arm: spear13xx: Fix dmas cells
- arm: spear13xx: Fix spics gpio controller's warning
- ALSA: seq: Fix regression by incorrect ioctl_mutex usages
- KVM/x86: Reduce retpoline performance impact in slot_handle_level_range(),
  by always inlining iterator helper methods
- x86/cpu: Change type of x86_cache_size variable to unsigned int
- drm/radeon: adjust tested variable
- rtc-opal: Fix handling of firmware error codes, prevent busy loops
- ext4: save error to disk in __ext4_grp_locked_error()
- ext4: correct documentation for grpid mount option
- mm: hide a #warning for COMPILE_TEST
- video: fbdev: atmel_lcdfb: fix display-timings lookup
- console/dummy: leave .con_font_get set to NULL
- rtlwifi: rtl8821ae: Fix connection lost problem correctly
- Btrfs: fix deadlock in run_delalloc_nocow
- Btrfs: fix crash due to not cleaning up tree log block's dirty bits
- Btrfs: fix unexpected -EEXIST when creating new inode
- ALSA: hda - Fix headset mic detection problem for two Dell machines
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute
- ALSA: hda/realtek: PCI quirk for Fujitsu U7x7
- ALSA: usb-audio: add implicit fb quirk for Behringer UFX1204
- ALSA: seq: Fix racy pool initializations
- mvpp2: fix multicast address filter
- dm: correctly handle chained bios in dec_pending()
- x86: fix build warnign with 32-bit PAE
- vfs: don't do RCU lookup of empty pathnames
- ARM: pxa/tosa-bt: add MODULE_LICENSE tag
- ARM: dts: s5pv210: add interrupt-parent for ohci
- media: r820t: fix r820t_write_reg for KASAN
- Linux 4.4.117

  * zfs system process hung on container stop/delete (LP: #1754584)
- SAUCE: (noup) zfs to 0.6.5.6-0ubuntu19
- SAUCE: Fix non-prefaulted page deadlock (LP: #1754584)

  * apparmor: fix bad __initdata tagging on, apparmor_initialized (LP: #1758471)
- SAUCE: apparmor: fix bad __initdata tagging on, apparmor_initialized

  * Xenial update to 4.4.116 stable release (LP: #1756121)
- powerpc/bpf/jit: Disable classic BPF JIT on ppc64le
- powerpc/64: Fix flush_(d|i)cache_range() called from modules
- powerpc: Fix VSX enabling/flushing to also test MSR_FP and MSR_VEC
- powerpc: Simplify module TOC handling
- ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
- usbip: vhci_hcd: clear just the 

[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-17 Thread Kleber Sacilotto de Souza
* linux-snapdragon kernel 4.4.0-1090.95 successfully booted and passed
all ADT tests [1] and also snap-certification tests.

* linux kernel 4.4.0-121.145 for arm64 successfully booted and passed
all ADT tests [2] and successfully booted in our internal arm64 test
systems.

[1] 
http://people.canonical.com/~kernel/status/adt-matrix/xenial-linux-meta-snapdragon.html
[2] http://people.canonical.com/~kernel/status/adt-matrix/xenial-linux-meta.html

** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux source package in Xenial:
  Fix Committed
Status in linux-snapdragon source package in Xenial:
  Fix Committed

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-16 Thread Brad Figg
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag 'verification-needed-xenial' to 'verification-failed-
xenial'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux source package in Xenial:
  Fix Committed
Status in linux-snapdragon source package in Xenial:
  Fix Committed

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-13 Thread Kleber Sacilotto de Souza
** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux source package in Xenial:
  Fix Committed
Status in linux-snapdragon source package in Xenial:
  Fix Committed

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-13 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux source package in Xenial:
  Fix Committed
Status in linux-snapdragon source package in Xenial:
  In Progress

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-13 Thread Kleber Sacilotto de Souza
** Also affects: linux-snapdragon (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux source package in Xenial:
  In Progress
Status in linux-snapdragon source package in Xenial:
  In Progress

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-13 Thread Ubuntu Foundations Team Bug Bot
** Tags added: patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Xenial:
  In Progress

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-13 Thread Kleber Sacilotto de Souza
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Xenial:
  In Progress

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1763644] Re: Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

2018-04-13 Thread Paolo Pisati
** Patch added: "0001-UBUNTU-Config-arm64-disable-BPF_JIT_ALWAYS_ON.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+attachment/5113597/+files/0001-UBUNTU-Config-arm64-disable-BPF_JIT_ALWAYS_ON.patch

** Description changed:

  [Impact]
  
  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on all
  arm64 hardware: no console output or any other sign of activity, the
  system freeze just after the bootloader loads vmlinuz, and jumps to it.
  
  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all the
  arm64 hardware: a thunderx board shows the same exact symptoms.
  
+ The regression came down as part of the 4.4.115 stable update ("79e83d1
+ bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this option that
+ crashes the arm64 kernel on boot.
+ 
+ 
  [How to test]
  
  Apply the attached patch, recompile, install and boot.
  
  [Regression potential]
  
  None, since the kernel already fails to boot.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763644

Title:
  Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]

  The Ubuntu-4.4.0-120.144 kernel (now in -proposed) fails to boot on
  all arm64 hardware: no console output or any other sign of activity,
  the system freeze just after the bootloader loads vmlinuz, and jumps
  to it.

  We first experienced it on the snapdragon kernel snap in -beta
  (dragonboard 410c) but the bug is arm64 generic, and it affects all
  the arm64 hardware: a thunderx board shows the same exact symptoms.

  The regression came down as part of the 4.4.115 stable update
  ("79e83d1 bpf: introduce BPF_JIT_ALWAYS_ON config") and enabled this
  option that crashes the arm64 kernel on boot.

  
  [How to test]

  Apply the attached patch, recompile, install and boot.

  [Regression potential]

  None, since the kernel already fails to boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763644/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp