This bug was fixed in the package linux - 3.13.0-144.193
---
linux (3.13.0-144.193) trusty; urgency=medium
* linux: 3.13.0-144.193 -proposed tracker (LP: #1755227)
* CVE-2017-12762
- isdn/i4l: fix buffer overflow
* CVE-2017-17807
- KEYS: add missing permission check
This bug was fixed in the package linux - 4.4.0-119.143
---
linux (4.4.0-119.143) xenial; urgency=medium
* linux: 4.4.0-119.143 -proposed tracker (LP: #1760327)
* Dell XPS 13 9360 bluetooth scan can not detect any device (LP: #1759821)
- Revert "Bluetooth: btusb: fix QCA
Hi,
We do ship an iso for ppc64le for Trusty - I'm not sure whether it does
bare metal/PowerNV or just as an LPAR under PowerVM, but it's probably a
bit moot at this point.
The good news is that as you can see, the artful kernel was released with the
fix.
The Xenial kernel also contains the
This bug was fixed in the package linux - 4.13.0-38.43
---
linux (4.13.0-38.43) artful; urgency=medium
* linux: 4.13.0-38.43 -proposed tracker (LP: #1755762)
* Servers going OOM after updating kernel from 4.10 to 4.13 (LP: #1748408)
- i40e: Fix memory leak related filter
I didn't think Trusty would even run baremetal on ppc64el?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1715519
Title:
bnx2x_attn_int_deasserted3:4323 MC assert!
To manage notifications about
Fantastic!
If I understand correctly, that is sufficient for verification-done-
artful, so I am changing that over for you.
The one remaining kernel is Trusty 3.13. I am guessing your module
doesn't compile for that? If it doesn't, there probably isn't much point
on booting with just a virtual
Full test passes. No crash with proposed hwe-16.04 kernel and tso/gso
enabled.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1715519
Title:
bnx2x_attn_int_deasserted3:4323 MC assert!
To manage
After conferring with the IBM Novalink dev team, we found a way to
exploit some undocumented preliminary artful support in the DKMS, to
successfully install the hwe-16.04 kernel (4.13.0-38) from xenial-
proposed. It boots and passes traffic. I hope to report back later today
or possibly tomorrow
These Linux LPARs are running Novalink, in a mode that allows them to
serve in place of the traditional PowerVM AIX VIO server. So they're
providing virtual I/O for other LPARs (this is how we ended up sending
64k packets into the bnx2x nics via open vswitch). The DKMS modules
enable that
Hi,
Thanks for the Xenial test!
The kernel team process is that patches will always be committed from
the most recent kernel first and then back to older kernels, so that no-
one ends up with a regression if they upgrade to a more recent kernel.
So if it is applied to Xenial it will be applied
We're not set up to test the artful kernel, but I can envision a near-
to-mid-term future where we will need this patch to be present in the
artful kernel. What's the best way for me to help make sure that future
obtains?
--
You received this bug notification because you are a member of Ubuntu
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1715519
Title:
bnx2x_attn_int_deasserted3:4323 MC assert!
To
Our validation tests pass with tso/gso enabled and 4.4.0-117 (no crash).
We'll do a couple more tests but it's looking good so far.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1715519
Title:
I was able to install the ppc64el 4.4.0-117 kernel from xenial-proposed.
It boots and passes at least enough traffic to make an interactive ssh
session function.
I'm having some DKMS issues, however, which are preventing me from
validating the patch prevents crash as expected (one of the modules
Ok, that works. I should be able to provide basic validation much more
easily.
We are having trouble reproducing the crash with the unpatched kernel,
as we've put many remediating workarounds in place and it's been an
adventure to remember where they all are and how exactly they all
interacted
Hi,
As well as Po-Hsu's comment above, I also have this internal update from
the kernel team:
As this is also a security fix, don't stress too much. If things
could be verified for at least for one of the kernels until next week
that is better than nothing. We are rather unlikely rip out
In addition to what Po-Hsu Lin and Daniel Axtens said, to have each of
the kernels test-booted and checked for obvious regressions would be
great and if in addition one of those can be tested for the reported
problem being fixed, then this is sufficient. But mainly this procedure
is to ensure we
Hello r.stricklin,
The planned SRU schedule this cycle
* Current cycle: 09-Mar through 31-Mar
09-Mar Last day for kernel commits for this cycle.
12-Mar - 17-Mar Kernel prep week.
18-Mar - 30-Mar Bug verification & Regression testing.
02-Apr
Hi,
I am the support engineer on the Canonical side who has been working on
this with IBM Support on your behalf. Apologies for the confusion. I
will contact our kernel team now and get this clarified for you as soon
as I can.
Now, I can't speak for the kernel team or make any commitments on
I am the end user who originally reported this problem. We have been
working with Canonical through IBM Support to get this problem resolved
-- When I last spoke with IBM about this a few weeks ago, I got the
impression we'd have a little extra time to perform verification (e.g.
the test period
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'. If the problem still exists,
change the tag
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
artful' to 'verification-done-artful'. If the problem still exists,
change the tag
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New
** Also affects: linux (Ubuntu Artful)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Artful)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed in the package linux - 4.15.0-10.11
---
linux (4.15.0-10.11) bionic; urgency=medium
* linux: 4.15.0-10.11 -proposed tracker (LP: #1749250)
* "swiotlb: coherent allocation failed" dmesg spam with linux 4.15.0-9.10
(LP: #1749202)
- swiotlb: suppress
** Description changed:
SRU Justification
=
A ppc64le system runs as a guest under PowerVM. This guest has a bnx2x
card attached, and uses openvswitch to bridge an ibmveth interface for
traffic from other LPARs.
We see the following crash sometimes when running
This has been assigned CVE-2018-126.
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2018-126
** Description changed:
SRU Justification
=
A ppc64le system runs as a guest under PowerVM. This guest has a bnx2x
card attached, and uses openvswitch
** Description changed:
SRU Justification
=
A ppc64le system runs as a guest under PowerVM. This guest has a bnx2x
card attached, and uses openvswitch to bridge an ibmveth interface for
traffic from other LPARs.
We see the following crash sometimes when running
** Description changed:
- (This bug provides a place to track the progress of this issue upstream
- and then in to Ubuntu.)
+ SRU Justification
+ =
A ppc64le system runs as a guest under PowerVM. This guest has a bnx2x
card attached, and uses openvswitch to bridge an
A set of 2 patches to fix this was accepted upstream:
https://github.com/torvalds/linux/commit/2b16f048729bf35e6c28a40cbfad07239f9dcd90
https://github.com/torvalds/linux/commit/8914a595110a6eca69a5e275b323f5d09e18f4f9
I will send an SRU shortly.
--
You received this bug notification because
31 matches
Mail list logo