[Bug 1732357] [NEW] g_strsplit: assertion 'string != NULL' failed

2017-11-14 Thread Juerg Haefliger
Public bug reported: Tons of the following in the log on 17.10: Nov 15 07:49:08 gollum gnome-software[3355]: g_strv_length: assertion 'str_array != NULL' failed Nov 15 07:49:08 gollum gnome-software[3355]: json_object_has_member: assertion 'member_name != NULL' failed Nov 15 07:49:08 gollum

[Bug 1729858] [NEW] virt-clone fails with: Unknown driver 'iso'

2017-11-03 Thread Juerg Haefliger
Public bug reported: Cloning a uvt VM fails with error: Unknown driver 'iso' To reproduce: uvt-simplestreams-libvirt sync release=xenial arch=amd64 uvt-kvm create test-vm release=xenial arch=amd64 virsh destroy test-vm virt-clone -o test-vm -n cloned-vm --auto-clone Which results in: WARNING

[Bug 1729858] Re: virt-clone fails with: Unknown driver 'iso'

2017-11-03 Thread Juerg Haefliger
Upsttream fix: https://www.redhat.com/archives/libvir- list/2017-March/msg00259.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1729858 Title: virt-clone fails with: Unknown driver 'iso' To

[Bug 1729858] Re: virt-clone fails with: Unknown driver 'iso'

2017-11-03 Thread Juerg Haefliger
Backported and tested patch attached. ** Patch added: "0001-storage-Don-t-pass-iso-format-to-qemu-img.patch" https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1729858/+attachment/5003020/+files/0001-storage-Don-t-pass-iso-format-to-qemu-img.patch -- You received this bug notification

[Bug 1744173] Re: artful: rfi-flush: Switch to new linear fallback flush

2018-05-08 Thread Juerg Haefliger
Hi Breno, Sorry for the late reply. Regarding Xenial, we updated the kernel to a later upstream stable version since you posted the patches. 4.4.0-123.147 from -proposed should be in sync with 4.4.128 now and your patches don't apply cleanly any longer. When updating to 4.4.117 we reverted a

[Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-08 Thread Juerg Haefliger
** Description changed: + [Impact] Change flush from congruence-first with dependencies to linear with no dependencies, which increases flush performance by 8x on P8, and 3x on P9 (as measured with null syscall loop, which will have the flush area in the L2). The flush also becomes

[Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-08 Thread Juerg Haefliger
** Summary changed: - artful: rfi-flush: Switch to new linear fallback flush + rfi-flush: Switch to new linear fallback flush -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744173 Title:

[Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-25 Thread Juerg Haefliger
** Description changed: [Impact] - Change flush from congruence-first with dependencies to linear with - no dependencies, which increases flush performance by 8x on P8, and - 3x on P9 (as measured with null syscall loop, which will have the - flush area in the L2). + Change flush method from

[Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-06 Thread Juerg Haefliger
** Description changed: - Upstream's Spectre v1 mitigation prevents speculation on a user - controlled pointer. This part of the Spectre v1 patchset was never - backported to 4.4 (for unknown reasons) so Xenial is lacking it as well. - All the other stable upstream kernels include it, so add it

[Bug 1775771] Re: Xenial update to 4.4.134 stable release

2018-06-08 Thread Juerg Haefliger
** Description changed: - SRU Justification Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly

[Bug 1775771] Re: Xenial update to 4.4.134 stable release

2018-06-08 Thread Juerg Haefliger
List of previously applied patches: * mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl() * bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y * virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS -- You received this bug notification

[Bug 1775771] [NEW] Xenial update to 4.4.134 stable release

2018-06-08 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1777389] Re: Xenial update to 4.4.138 stable release

2018-06-18 Thread Juerg Haefliger
Skipped the following already-applied patches: * Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (applied as: UBUNTU: SAUCE: Input: elan_i2c - add ELAN0612 to the ACPI table) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1777389] [NEW] Xenial update to 4.4.138 stable release

2018-06-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Bug 1777063] [NEW] Xenial update to 4.4.137 stable release

2018-06-15 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Bug 1777063] Re: Xenial update to 4.4.137 stable release

2018-06-15 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Incomplete ** Changed in: linux (Ubuntu) Status: Incomplete => Invalid ** Description changed: + SRU Justification - SRU Justification + Impact: +    The upstream process for stable tree updates is quite similar +    

[Bug 1776158] [NEW] Xenial update to 4.4.135 stable release

2018-06-11 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from a mainline/stable

[Bug 1776177] [NEW] Xenial update to 4.4.136 stable release

2018-06-11 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from a mainline/stable

[Bug 1776177] Re: Xenial update to 4.4.136 stable release

2018-06-11 Thread Juerg Haefliger
List of previously applied patches: * Revert "ima: limit file hash setting by user to fix and log modes" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1776177 Title: Xenial update to 4.4.136

[Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-30 Thread Juerg Haefliger
Thanks for the clarification, @brenohl. I decided to drop the two and adjust the patch that collided. See https://lists.ubuntu.com/archives /kernel-team/2018-May/092834.html. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-05-29 Thread Juerg Haefliger
For the latest xenial patchset: What's the purpose of patches 0001 & 0004?? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744173 Title: rfi-flush: Switch to new linear fallback flush To manage

[Bug 1774173] [NEW] Xenial update to 4.4.132 stable release

2018-05-30 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1775137] [NEW] Prevent speculation on user controlled pointer

2018-06-05 Thread Juerg Haefliger
Public bug reported: Upstream's Spectre v1 mitigation prevents speculation on a user controlled pointer. This part of the Spectre v1 patchset was never backported to 4.4 (for unknown reasons) so Xenial is lacking it as well. All the other stable upstream kernels include it, so add it to Xenial.

[Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-06-05 Thread Juerg Haefliger
** Summary changed: - Add array_index_nospec + Update to upstream's implementation of Spectre v1 mitigation -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1774181 Title: Update to upstream's

[Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-06-06 Thread Juerg Haefliger
** Description changed: Xenial is currently lacking full support of upstream's Spectre v1 - mitigation. As a first step to get there, add the array_index_nospec - macro and all the (simple) patches that make use of it. + mitigation. Add the missing patches and merge them with Ubuntu's current +

[Bug 1774173] Re: Xenial update to 4.4.132 stable release

2018-06-07 Thread Juerg Haefliger
Skipped the following patches (already applied): * KVM: s390: Enable all facility bits that are known good for passthrough -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1774173 Title: Xenial

[Bug 1772671] Re: Kernel produces empty lines in /proc/PID/status

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1772671 Title: Kernel produces empty lines in /proc/PID/status To

[Bug 1772575] Re: Kernel 4.4 NBD size overflow with image size exceeding 1TB

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1772575 Title: Kernel 4.4 NBD size overflow with image size exceeding

[Bug 1772775] Re: 4.4.0-127.153 generates many "sit: non-ECT" messages

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1772775 Title: 4.4.0-127.153 generates many "sit: non-ECT" messages

[Bug 1773905] Re: Support UVC1.5 Camera for Xenial

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1773905 Title: Support UVC1.5 Camera for Xenial To manage notifications

[Bug 1771301] Re: Setting ipv6.disable=1 prevents both IPv4 and IPv6 socket opening for VXLAN tunnels

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771301 Title: Setting ipv6.disable=1 prevents both IPv4 and IPv6

[Bug 1771826] Re: Creation of IMA file hashes fails when appraisal is enabled

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771826 Title: Creation of IMA file hashes fails when appraisal is

[Bug 1744173] Re: rfi-flush: Switch to new linear fallback flush

2018-06-06 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744173 Title: rfi-flush: Switch to new linear fallback flush To

[Bug 1767857] Re: Kernel 4.4.0-122 Breaks qemu-system-x86

2018-05-29 Thread Juerg Haefliger
I'm not able to reproduce this on a physical host. Works just fine for all the 32-bit kernels that I tested. When you say 'black screen', do you not get anything at all? Not even some BIOS flickering in the beginning? What do you get when you run the following: $ qemu-system-i386 -cdrom

[Bug 1774181] [NEW] Add array_index_nospec

2018-05-30 Thread Juerg Haefliger
Public bug reported: Xenial is currently lacking full support of upstream's Spectre v1 mitigation. As a first step to get there, add the array_index_nospec macro and all the (simple) patches that make use of it. ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Juerg Haefliger

[Bug 1765007] Re: Xenial update to 4.4.127 stable release

2018-06-04 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Incomplete ** Changed in: linux (Ubuntu) Status: Incomplete => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1765007 Title:

[Bug 1767857] Re: Kernel 4.4.0-122 Breaks qemu-system-x86

2018-05-28 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1767857 Title: Kernel 4.4.0-122 Breaks qemu-system-x86 To man

[Bug 1779848] [NEW] Cleanup Meltdown/Spectre implementation

2018-07-03 Thread Juerg Haefliger
Public bug reported: Ubuntu kernels contain Meltdown and Spectre mitigations that are largely based on embargoed patches but what eventually landed in upstream is different in some places. We should cleanup the different kernels to bring them closer in line with upstream. ** Affects: linux

[Bug 1768429] Re: Xenial update to 4.4.129 stable release

2018-05-02 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Bug 1768429] Re: Xenial update to 4.4.129 stable release

2018-05-02 Thread Juerg Haefliger
Skipped the following commit (commit to be reverted is not applied): * Revert "perf tests: Decompress kernel module before objdump" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1768429 Title:

[Bug 1768429] [NEW] Xenial update to 4.4.129 stable release

2018-05-02 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1768474] [NEW] Xenial update to 4.4.130 stable release

2018-05-02 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1768474] Re: Xenial update to 4.4.130 stable release

2018-05-02 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Bug 1766577] Re: 4.15.0-15 mdadm: CREATE group disk not found

2018-04-26 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1765232 *** https://bugs.launchpad.net/bugs/1765232 Marking this as a duplicate of #1765232. ** This bug has been marked a duplicate of bug 1765232 Kernel 4.15.0-15 breaks Dell PowerEdge 12th Gen servers -- You received this bug notification because

[Bug 1767971] [NEW] No such man page: kernel_lockdown.7

2018-04-30 Thread Juerg Haefliger
Public bug reported: When booting in secure boot mode, the Bionic kernel emits the following message: [ 52.035055] Lockdown: Loading of unsigned modules is restricted; see man kernel_lockdown.7 But there is no such man page. ** Affects: linux (Ubuntu) Importance: Undecided

[Bug 1696710] Re: Ubuntu 16.04.02: depmod: WARNING: needs unknown symbol .TOC.

2018-05-03 Thread Juerg Haefliger
Verified that the new package fixes the issue. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1696710 Title:

[Bug 1768474] Re: Xenial update to 4.4.130 stable release

2018-05-03 Thread Juerg Haefliger
Skipped the following patch (already applied): * KVM: s390: wire up bpb feature -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1768474 Title: Xenial update to 4.4.130 stable release To manage

[Bug 1768825] [NEW] Xenial update to 4.4.131 stable release

2018-05-03 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1768825] Re: Xenial update to 4.4.131 stable release

2018-05-03 Thread Juerg Haefliger
Skipped the following commits: * ALSA: hda: Hardening for potential Spectre v1 * ALSA: seq: oss: Hardening for potential Spectre v1 * ALSA: control: Hardening for potential Spectre v1 * ALSA: rme9652: Hardening for potential Spectre v1 * ALSA: hdspm: Hardening for potential Spectre

[Bug 1722454] Re: Duplicity fails with MemoryError

2017-10-27 Thread Juerg Haefliger
*** This bug is a duplicate of bug 1720159 *** https://bugs.launchpad.net/bugs/1720159 Hmm... Why do you think this is a duplicate of #1720159? My stack trace looks different. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1743156] Re: [regression] 4.4.0-110 doesn't load AMD microcode

2018-01-14 Thread Juerg Haefliger
Confirmed, 110 doesn't load microcode on my old laptop. $ cat /proc/cpuinfo | grep -m1 'model name' model name : AMD E1-1200 APU with Radeon(tm) HD Graphics $ uname -a Linux cq58 4.4.0-110-generic #133-Ubuntu SMP Fri Jan 12 18:53:57 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux $ dmesg | grep

[Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-06-21 Thread Juerg Haefliger
** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1774181 Title: Update to upstream's implementation of Spectre v1

[Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-22 Thread Juerg Haefliger
** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled pointer To

[Bug 1767857] Re: Kernel 4.4.0-122 Breaks qemu-system-x86

2018-08-15 Thread Juerg Haefliger
Chances are slim that this will fix itself automagically. And as long as we're not able to reproduce this, it's going to be difficult. I'll try to take another look in a couple of days once the current kernel respin frenzy is over. -- You received this bug notification because you are a

[Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
Per git bisect, the fix for this should be: commit 6c971c09f38704513c426ba6515f22fb3d6c87d5 Author: Y.C. Chen Date: Thu Jan 26 09:45:40 2017 +0800 drm/ast: Fixed system hanged if disable P2A The original ast driver will access some BMC configuration through P2A bridge that

[Bug 1788817] [NEW] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
Public bug reported: Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box results in stuck CPU warnings: [ 33.551942] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119] [ 33.558560] Modules linked in: hid_generic ast(+) crct10dif_pclmul syscopyarea crc32_pclmul

[Bug 1788817] Re: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

2018-08-24 Thread Juerg Haefliger
eam update) + and received testing there. + + == Test Case == + + Booted a patched kernel on HW to verify it comes up without stuck CPU + warnings. ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member o

[Bug 1774181] Re: Update to upstream's implementation of Spectre v1 mitigation

2018-08-22 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1774181 Title: Update to upstream's implementation of Spectre v1

[Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-08-22 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled pointer To

[Bug 1789215] [NEW] i40e NIC not recognized

2018-08-27 Thread Juerg Haefliger
Public bug reported: == SRU Justification == Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box with a i40e NIC results in no network. The 3.13 i40e driver doesn't support the following HW: 3d:00.0 Ethernet controller: Intel Corporation Device 37d2 (rev 02)

[Bug 1780062] [NEW] Cloud-init causes potentially huge boot delays with 4.15 kernels

2018-07-04 Thread Juerg Haefliger
Public bug reported: Newer 4.15 kernels contain the following fix for CVE-2018-1108: 43838a23a05fb ("random: fix crng_ready() test") This causes cloud-init to stall for a potentially long time during boot (waiting for entropy I presume). Google reported boot delays of 75 minutes. I've tracked

[Bug 1780062] Re: Cloud-init causes potentially huge boot delays with 4.15 kernels

2018-07-04 Thread Juerg Haefliger
mvo: fwiw jinja2 imports random and that reads 2500 chars from /dev/urandom on import -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1780062 Title: Cloud-init causes potentially huge boot delays

[Bug 1780062] Re: Cloud-init causes potentially huge boot delays with 4.15 kernels

2018-07-04 Thread Juerg Haefliger
** Also affects: cloud-init (Ubuntu) Importance: Undecided Status: New ** Changed in: cloud-init (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1755509] Re: Xenial update to 4.4.115 stable release

2018-03-13 Thread Juerg Haefliger
** Description changed: + SRU Justification - SRU Justification + Impact: +    The upstream process for stable tree updates is quite similar +    in scope to the Ubuntu SRU process, e.g., each patch has to +    demonstrably fix a bug, and each patch is vetted by upstream +    by

[Bug 1755509] [NEW] Xenial update to 4.4.115 stable release

2018-03-13 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either

[Bug 1755509] Re: Xenial update to 4.4.115 stable release

2018-03-13 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1755509 Title: Xenial update to 4.4.115 stable release To manage notifications about this

[Bug 1755509] Re: Xenial update to 4.4.115 stable release

2018-03-13 Thread Juerg Haefliger
** Description changed: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from a

[Bug 1755509] Re: Xenial update to 4.4.115 stable release

2018-03-14 Thread Juerg Haefliger
** Description changed: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from a

[Bug 1756121] Re: Xenial update to 4.4.116 stable release

2018-03-15 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Bug 1756121] [NEW] Xenial update to 4.4.116 stable release

2018-03-15 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1756121] Re: Xenial update to 4.4.116 stable release

2018-03-15 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1756121 Title: Xenial update to 4.4.116 stable release To manage notifications about this

[Bug 1755509] Re: Xenial update to 4.4.115 stable release

2018-03-16 Thread Juerg Haefliger
Skipped the following patches (previously applied already): * bpf: fix branch pruning logic * loop: fix concurrent lo_open/lo_release -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1755509

[Bug 1755817] Re: Segmentation fault in ldt_gdt_64

2018-03-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Trusty) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1755817 Title: Segmentation fault in ldt_gdt_64 To man

[Bug 1755817] Re: Segmentation fault in ldt_gdt_64

2018-03-14 Thread Juerg Haefliger
y: Jiri Slaby <jsl...@suse.cz> + (cherry picked from commit 62fc7228f8cc8c89ecbd37008a0495ac28e41c5c) + Signed-off-by: Juerg Haefliger <juerg.haefli...@canonical.com> + Signed-off-by: Stefan Bader <stefan.ba...@canonical.com> -- You received this bug notification beca

[Bug 1755817] [NEW] Segmentation fault in ldt_gdt_64

2018-03-14 Thread Juerg Haefliger
471bd865b318db34c7b628.1438291540.git.l...@kernel.org Signed-off-by: Ingo Molnar <mi...@kernel.org> Signed-off-by: Jiri Slaby <jsl...@suse.cz> (cherry picked from commit 62fc7228f8cc8c89ecbd37008a0495ac28e41c5c) Signed-off-by: Juerg Haefliger <juerg.haefli...@canonical.com

[Bug 1756866] Re: Xenial update to 4.4.118 stable release

2018-04-03 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1756866 Title: Xenial update to 4.4.118 stable release To manage notifications about this

[Bug 1762453] [NEW] Xenial update to 4.4.119 stable release

2018-04-09 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1762453] Re: Xenial update to 4.4.119 stable release

2018-04-10 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Bug 1756866] Re: Xenial update to 4.4.118 stable release

2018-04-09 Thread Juerg Haefliger
Skipping the following patches (already applied): * KVM: VMX: Make indirect call speculation safe * KVM: x86: Make indirect calls in emulator speculation safe * Drivers: hv: vmbus: fix build warning -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1756866] Re: Xenial update to 4.4.118 stable release

2018-04-09 Thread Juerg Haefliger
Skipping the following patches: * x86/kvm: Update spectre-v1 mitigation * x86/spectre: Report get_user mitigation for spectre_v1 * nl80211: Sanitize array index in parse_txq_params * vfs, fdtable: Prevent bounds-check bypass via speculative execution * x86/syscall: Sanitize syscall

[Bug 1764666] [NEW] Xenial update to 4.4.123 stable release

2018-04-17 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1764627] Re: Xenial update to 4.4.122 stable release

2018-04-17 Thread Juerg Haefliger
Skipped the following patches because they were applied already: * netfilter: x_tables: pack percpu counter allocations * netfilter: x_tables: pass xt_counters struct to counter allocator * netfilter: x_tables: pass xt_counters struct instead of packet counter * ARM: omap2: hide

[Bug 1764666] Re: Xenial update to 4.4.123 stable release

2018-04-17 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Bug 1764627] [NEW] Xenial update to 4.4.122 stable release

2018-04-17 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1764666] Re: Xenial update to 4.4.123 stable release

2018-04-17 Thread Juerg Haefliger
Skipped the following patches because they're applied already: * bpf: fix incorrect sign extension in check_alu_op() * scsi: ses: don't get power status of SES device slot on probe -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1765010] Re: Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
Skipped the following commit since it introduces a build failure as shown below: * perf tests: Decompress kernel module before objdump CC tests/llvm-src-base.o CC tests/llvm-src-kbuild.o LD util/libperf-in.o tests/code-reading.c: In function 'read_object_code':

[Bug 1764762] [NEW] Xenial update to 4.4.124 stable release

2018-04-17 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1765007] Re: Xenial update to 4.4.127 stable release

2018-04-18 Thread Juerg Haefliger
Skipped the following commits because they modify upstream's Spectre v1 code which we haven't pulled in (yet) with the 4.4.118 stable update: * nospec: Kill array_index_nospec_mask_check() * nospec: Move array_index_nospec() parameter checking into separate macro -- You received this bug

[Bug 1765010] [NEW] Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1765010] Re: Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
Skipped the following commits because they're already applied: * scsi: libiscsi: Allow sd_shutdown on bad transport * blk-mq: NVMe 512B/4K+T10 DIF/DIX format returns I/O error on dd with split op -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1764999] [NEW] Xenial update to 4.4.126 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1765007] [NEW] Xenial update to 4.4.127 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1765010] Re: Xenial update to 4.4.128 stable release

2018-04-18 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: New => Invalid ** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch

[Bug 1764762] Re: Xenial update to 4.4.124 stable release

2018-04-18 Thread Juerg Haefliger
Reverted the following SAUCE patch to be replaced by its upstream equivalent: * UBUNTU: SAUCE: (no-up) iio: st_pressure: st_accel: Initialise sensor platform data properly Skipped the following patches since they're already applied: * CIFS: Enable encryption during session setup phase *

[Bug 1764973] [NEW] Xenial update to 4.4.125 stable release

2018-04-18 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1764973] Re: Xenial update to 4.4.125 stable release

2018-04-18 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Bug 1764762] Re: Xenial update to 4.4.124 stable release

2018-04-18 Thread Juerg Haefliger
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Bug 1764367] Re: Xenial update to 4.4.121 stable release

2018-04-16 Thread Juerg Haefliger
Skipped the following patch: * x86/syscall: Sanitize syscall table de-references under speculation fix Which fixes a Spectre v1 commit from upstream 4.4.118 which we haven't applied (yet). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1764316] [NEW] Xenial update to 4.4.120 stable release

2018-04-16 Thread Juerg Haefliger
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable

[Bug 1764367] Re: Xenial update to 4.4.121 stable release

2018-04-16 Thread Juerg Haefliger
Skipped the following patch: * mpls, nospec: Sanitize array index in mpls_label_ok() It references array_index_nospec() which comes from upstream's Spectre v1 implementation. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

<    1   2   3   4   5   6   7   8   9   10   >