[Kernel-packages] [Bug 2052451] [NEW] Incorrect argument to notify_page_enc_status_changed()

2024-02-05 Thread John Cabaj
Public bug reported:

[Impact]

* Google requested fix to notify_page_enc_status_changed() passing
incorrect argument.

[Fix]

* Include change from upstream 064ce6c550a06

[Test Case]

* Compile tested
* Boot tested
* Tested by Google

[Where things could go wrong]

* Low chance of regression. Isolated logic fix.

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052451

Title:
   Incorrect argument to notify_page_enc_status_changed()

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New

Bug description:
  [Impact]

  * Google requested fix to notify_page_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * Include change from upstream 064ce6c550a06

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052451/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052451] Re: Incorrect argument to notify_page_enc_status_changed()

2024-02-05 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Google requested fix to notify_page_enc_status_changed() passing
  incorrect argument.
  
  [Fix]
  
- * Include change from upstream 064ce6c550a06
+ * 27ba8c7 modified notify_page_enc_status_changed(), when it should not
+ have
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * Tested by Google
  
  [Where things could go wrong]
  
  * Low chance of regression. Isolated logic fix.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052451

Title:
   Incorrect argument to notify_page_enc_status_changed()

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New

Bug description:
  [Impact]

  * Google requested fix to notify_page_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * 27ba8c7 modified notify_page_enc_status_changed(), when it should
  not have

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052451/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052451] Re: Incorrect argument to notify_page_enc_status_changed()

2024-02-05 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052451

Title:
   Incorrect argument to notify_page_enc_status_changed()

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New

Bug description:
  [Impact]

  * Google requested fix to notify_page_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * 27ba8c7 modified notify_page_enc_status_changed(), when it should
  not have

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052451/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052469] [NEW] Provide an arm64 linux-oracle 64k kernel variant

2024-02-05 Thread John Cabaj
Public bug reported:

[Impact]

* Oracle requested 64k page size flavour.

[Fix]

* Add flavour and configs for 64k flavour

[Test Case]

* Compile tested
* Boot tested

[Where things could go wrong]

* Low chance of regression. Isolated logic fix.

[Other Info]

* SF #00377602

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Assignee: John Cabaj (john-cabaj)
 Status: In Progress

** Affects: linux-oracle (Ubuntu Mantic)
 Importance: Undecided
 Assignee: John Cabaj (john-cabaj)
 Status: In Progress

** Affects: linux-oracle (Ubuntu Noble)
 Importance: Undecided
 Assignee: John Cabaj (john-cabaj)
 Status: In Progress

** Also affects: linux-oracle (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Changed in: linux-oracle (Ubuntu Mantic)
   Status: New => In Progress

** Changed in: linux-oracle (Ubuntu Noble)
   Status: New => In Progress

** Changed in: linux-oracle (Ubuntu Mantic)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

** Changed in: linux-oracle (Ubuntu Noble)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/2052469

Title:
  Provide an arm64 linux-oracle 64k kernel variant

Status in linux-oracle package in Ubuntu:
  In Progress
Status in linux-oracle source package in Mantic:
  In Progress
Status in linux-oracle source package in Noble:
  In Progress

Bug description:
  [Impact]

  * Oracle requested 64k page size flavour.

  [Fix]

  * Add flavour and configs for 64k flavour

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00377602

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/2052469/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052451] Re: Incorrect argument to notify_page_enc_status_changed()

2024-02-05 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052451

Title:
   Incorrect argument to notify_page_enc_status_changed()

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  In Progress

Bug description:
  [Impact]

  * Google requested fix to notify_page_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * 27ba8c7 modified notify_page_enc_status_changed(), when it should
  not have

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052451/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052451] Re: Incorrect argument to notify_page_enc_status_changed()

2024-02-06 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052451

Title:
   Incorrect argument to notify_page_enc_status_changed()

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

  * Google requested fix to notify_page_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * 27ba8c7 modified notify_page_enc_status_changed(), when it should
  not have

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052451/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052576] [NEW] GCP TDX Support

2024-02-06 Thread John Cabaj
Public bug reported:

[Impact]

* Google requested TDX guest features.

[Fix]

* Add flavour and configs for 64k flavour

[Test Case]

* Compile tested
* Boot tested
* Tested by Google

[Where things could go wrong]

* Low chance of regression. Isolated logic fix.

[Other Info]

* SF #00363309

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Mantic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052576

Title:
  GCP TDX Support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Google requested TDX guest features.

  [Fix]

  * Add flavour and configs for 64k flavour

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00363309

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052576/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052576] Re: GCP TDX Support

2024-02-06 Thread John Cabaj
** Description changed:

  [Impact]
  
- * Google requested TDX guest features.
+ * Google requested TDX guest features to be added to GCP kernel.
  
  [Fix]
  
- * Add flavour and configs for 64k flavour
+ * 16 clean cherry-picks from upstream
+ * 2 backports from upstream
+ * 11 backports from Intel
+ * 1 config change to enable support
  
  [Test Case]
  
  * Compile tested
  * Boot tested
+ * Tested internally at various stages of development
  * Tested by Google
  
  [Where things could go wrong]
  
- * Low chance of regression. Isolated logic fix.
+ * Majority of patches come from upstream with minimal backporting.
+ * Some patches sourced from Intel, and differ from upstream counterparts. 
However, these patches have been extensively tested in other kernels already 
released.
  
  [Other Info]
  
  * SF #00363309

** Description changed:

  [Impact]
  
  * Google requested TDX guest features to be added to GCP kernel.
  
  [Fix]
  
- * 16 clean cherry-picks from upstream
- * 2 backports from upstream
+ * 16 clean cherry-picks, 2 backports from upstream
  * 11 backports from Intel
  * 1 config change to enable support
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * Tested internally at various stages of development
  * Tested by Google
  
  [Where things could go wrong]
  
  * Majority of patches come from upstream with minimal backporting.
  * Some patches sourced from Intel, and differ from upstream counterparts. 
However, these patches have been extensively tested in other kernels already 
released.
  
  [Other Info]
  
  * SF #00363309

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Mantic)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052576

Title:
  GCP TDX Support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Mantic:
  In Progress

Bug description:
  [Impact]

  * Google requested TDX guest features to be added to GCP kernel.

  [Fix]

  * 16 clean cherry-picks, 2 backports from upstream
  * 11 backports from Intel
  * 1 config change to enable support

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested internally at various stages of development
  * Tested by Google

  [Where things could go wrong]

  * Majority of patches come from upstream with minimal backporting.
  * Some patches sourced from Intel, and differ from upstream counterparts. 
However, these patches have been extensively tested in other kernels already 
released.

  [Other Info]

  * SF #00363309

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052576/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052576] Re: GCP TDX Support

2024-02-13 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Mantic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052576

Title:
  GCP TDX Support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Google requested TDX guest features to be added to GCP kernel.

  [Fix]

  * 16 clean cherry-picks, 2 backports from upstream
  * 11 backports from Intel
  * 1 config change to enable support

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested internally at various stages of development
  * Tested by Google

  [Where things could go wrong]

  * Majority of patches come from upstream with minimal backporting.
  * Some patches sourced from Intel, and differ from upstream counterparts. 
However, these patches have been extensively tested in other kernels already 
released.

  [Other Info]

  * SF #00363309

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052576/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052469] Re: Provide an arm64 linux-oracle 64k kernel variant

2024-02-15 Thread John Cabaj
** Changed in: linux-oracle (Ubuntu Mantic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/2052469

Title:
  Provide an arm64 linux-oracle 64k kernel variant

Status in linux-oracle package in Ubuntu:
  In Progress
Status in linux-oracle source package in Mantic:
  Fix Committed
Status in linux-oracle source package in Noble:
  In Progress

Bug description:
  [Impact]

  * Oracle requested 64k page size flavour.

  [Fix]

  * Add flavour and configs for 64k flavour

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00377602

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/2052469/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2055473] [NEW] mtu.sh net selftest fail with PMTU exception wasn't created after exceeding MTU

2024-02-29 Thread John Cabaj
Public bug reported:

19:48:21 DEBUG| [stdout] # selftests: net: pmtu.sh
19:48:21 DEBUG| [stdout] # TEST: ipv4: PMTU exceptions  
   [ OK ]
19:48:21 DEBUG| [stdout] # TEST: ipv4: PMTU exceptions - nexthop objects
   [ OK ]
19:48:22 DEBUG| [stdout] # TEST: ipv6: PMTU exceptions  
   [ OK ]
19:48:22 DEBUG| [stdout] # TEST: ipv6: PMTU exceptions - nexthop objects
   [ OK ]
19:48:23 DEBUG| [stdout] # TEST: ICMPv4 with DSCP and ECN: PMTU exceptions  
   [FAIL]
19:48:23 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU
19:48:24 DEBUG| [stdout] # TEST: ICMPv4 with DSCP and ECN: PMTU exceptions - 
nexthop objects   [FAIL]
19:48:24 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU
19:48:25 DEBUG| [stdout] # TEST: UDPv4 with DSCP and ECN: PMTU exceptions   
   [FAIL]
19:48:25 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU
19:48:25 DEBUG| [stdout] # TEST: UDPv4 with DSCP and ECN: PMTU exceptions - 
nexthop objects[FAIL]
19:48:25 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU


Logfile also attached (rt.log)

** Affects: ubuntu-kernel-tests
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Attachment added: "rt.log"
   https://bugs.launchpad.net/bugs/2055473/+attachment/5750793/+files/rt.log

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Mantic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2055473

Title:
  mtu.sh net selftest fail with PMTU exception wasn't created after
  exceeding MTU

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Mantic:
  New
Status in linux source package in Noble:
  New

Bug description:
  19:48:21 DEBUG| [stdout] # selftests: net: pmtu.sh
  19:48:21 DEBUG| [stdout] # TEST: ipv4: PMTU exceptions
 [ OK ]
  19:48:21 DEBUG| [stdout] # TEST: ipv4: PMTU exceptions - nexthop objects  
 [ OK ]
  19:48:22 DEBUG| [stdout] # TEST: ipv6: PMTU exceptions
 [ OK ]
  19:48:22 DEBUG| [stdout] # TEST: ipv6: PMTU exceptions - nexthop objects  
 [ OK ]
  19:48:23 DEBUG| [stdout] # TEST: ICMPv4 with DSCP and ECN: PMTU exceptions
 [FAIL]
  19:48:23 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU
  19:48:24 DEBUG| [stdout] # TEST: ICMPv4 with DSCP and ECN: PMTU exceptions - 
nexthop objects   [FAIL]
  19:48:24 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU
  19:48:25 DEBUG| [stdout] # TEST: UDPv4 with DSCP and ECN: PMTU exceptions 
 [FAIL]
  19:48:25 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU
  19:48:25 DEBUG| [stdout] # TEST: UDPv4 with DSCP and ECN: PMTU exceptions - 
nexthop objects[FAIL]
  19:48:25 DEBUG| [stdout] #   PMTU exception wasn't created after exceeding MTU
  

  Logfile also attached (rt.log)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2055473/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052576] Re: GCP TDX Support

2024-03-04 Thread John Cabaj
Google tested packages from build PPA.

** Tags removed: verification-needed-mantic-linux-gcp
** Tags added: verification-done-mantic-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2052576

Title:
  GCP TDX Support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Google requested TDX guest features to be added to GCP kernel.

  [Fix]

  * 16 clean cherry-picks, 2 backports from upstream
  * 11 backports from Intel
  * 1 config change to enable support

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested internally at various stages of development
  * Tested by Google

  [Where things could go wrong]

  * Majority of patches come from upstream with minimal backporting.
  * Some patches sourced from Intel, and differ from upstream counterparts. 
However, these patches have been extensively tested in other kernels already 
released.

  [Other Info]

  * SF #00363309

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2052576/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2052469] Re: Provide an arm64 linux-oracle 64k kernel variant

2024-03-04 Thread John Cabaj
All 64k packages being correctly produced from arm64.

** Tags removed: verification-needed-mantic-linux-oracle
** Tags added: verification-done-mantic-linux-oracle

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/2052469

Title:
  Provide an arm64 linux-oracle 64k kernel variant

Status in linux-oracle package in Ubuntu:
  In Progress
Status in linux-oracle-6.5 package in Ubuntu:
  Invalid
Status in linux-oracle source package in Jammy:
  Invalid
Status in linux-oracle-6.5 source package in Jammy:
  Fix Committed
Status in linux-oracle source package in Mantic:
  Fix Committed
Status in linux-oracle-6.5 source package in Mantic:
  Invalid
Status in linux-oracle source package in Noble:
  In Progress
Status in linux-oracle-6.5 source package in Noble:
  Invalid

Bug description:
  [Impact]

  * Oracle requested 64k page size flavour.

  [Fix]

  * Add flavour and configs for 64k flavour

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00377602

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/2052469/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2056616] Re: left-over ceph debugging printks

2024-03-08 Thread John Cabaj
** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2056616

Title:
  left-over ceph debugging printks

Status in linux package in Ubuntu:
  New
Status in linux source package in Noble:
  New

Bug description:
  Hello, a pal recently mentioned some debugging printk statements in
  our kernels, eg:

  evict_inodes inode d69da69b, i_count = 1, was skipped!

  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2037214 has some 
additional details.
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2041613 looks like an 
effort to remove it?

  This apparently hasn't been finished yet, and it's in the middle of a
  big run of actual real work, so it might not be super-easy to just
  yank this out, it might also justify a larger look at the surrounding
  context.

  In noble master-next:

  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/noble/commit/fs/inode.c?h=master-
  next&id=603b74b4176fdf6ab2fb83306136947296e7aeb4

  Thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2056616/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2056616] Re: left-over ceph debugging printks

2024-03-08 Thread John Cabaj
** Changed in: linux (Ubuntu Noble)
   Status: New => In Progress

** Changed in: linux (Ubuntu Noble)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2056616

Title:
  left-over ceph debugging printks

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Noble:
  In Progress

Bug description:
  Hello, a pal recently mentioned some debugging printk statements in
  our kernels, eg:

  evict_inodes inode d69da69b, i_count = 1, was skipped!

  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2037214 has some 
additional details.
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2041613 looks like an 
effort to remove it?

  This apparently hasn't been finished yet, and it's in the middle of a
  big run of actual real work, so it might not be super-easy to just
  yank this out, it might also justify a larger look at the surrounding
  context.

  In noble master-next:

  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/noble/commit/fs/inode.c?h=master-
  next&id=603b74b4176fdf6ab2fb83306136947296e7aeb4

  Thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2056616/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2058179] Re: Kernel 6.8 + zfs-2.2.2: copy_file_range Operation Not Supported

2024-04-18 Thread John Cabaj
I've tested an initial version with the upstream patch and attached the
debdiff here. Will work to get this uploaded.

** Patch added: "zfs-linux_2.2.2-0ubuntu9.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/2058179/+attachment/5767995/+files/zfs-linux_2.2.2-0ubuntu9.debdiff

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/2058179

Title:
  Kernel 6.8 + zfs-2.2.2: copy_file_range Operation Not Supported

Status in Native ZFS for Linux:
  Fix Released
Status in systemd package in Ubuntu:
  Triaged
Status in zfs-linux package in Ubuntu:
  Confirmed
Status in systemd source package in Noble:
  Triaged
Status in zfs-linux source package in Noble:
  Confirmed

Bug description:
  As per https://github.com/openzfs/zfs/issues/15930

  ZFS and kernel 6.8 seem to throw EOPNOTSUPP on calling
  copy_file_range, breaking a multitude of applications.

  Upcoming noble (24.04) appears to currently include kernel 6.8 and ZFS
  2.2.2.

  One notable issue is when running Root on ZFS: systemd-sysusers will
  always fail to create users/groups with the error "Failed to backup
  /etc/{group,passwd}: Operation not supported" due to the call to
  copy_file_range.

To manage notifications about this bug go to:
https://bugs.launchpad.net/zfs/+bug/2058179/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2058179] Re: Kernel 6.8 + zfs-2.2.2: copy_file_range Operation Not Supported

2024-04-19 Thread John Cabaj
** Changed in: zfs-linux (Ubuntu Noble)
   Status: Confirmed => In Progress

** Changed in: zfs-linux (Ubuntu Noble)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/2058179

Title:
  Kernel 6.8 + zfs-2.2.2: copy_file_range Operation Not Supported

Status in Native ZFS for Linux:
  Fix Released
Status in systemd package in Ubuntu:
  Triaged
Status in zfs-linux package in Ubuntu:
  In Progress
Status in systemd source package in Noble:
  Triaged
Status in zfs-linux source package in Noble:
  In Progress

Bug description:
  As per https://github.com/openzfs/zfs/issues/15930

  ZFS and kernel 6.8 seem to throw EOPNOTSUPP on calling
  copy_file_range, breaking a multitude of applications.

  Upcoming noble (24.04) appears to currently include kernel 6.8 and ZFS
  2.2.2.

  One notable issue is when running Root on ZFS: systemd-sysusers will
  always fail to create users/groups with the error "Failed to backup
  /etc/{group,passwd}: Operation not supported" due to the call to
  copy_file_range.

To manage notifications about this bug go to:
https://bugs.launchpad.net/zfs/+bug/2058179/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2070402] Re: net: mana: Add support for page sizes other than 4KB on ARM64

2024-07-30 Thread John Cabaj
** Tags removed: verification-needed-jammy-linux-azure 
verification-needed-noble-linux-azure
** Tags added: verification-done-jammy-linux-azure 
verification-done-noble-linux-azure

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2070402

Title:
  net: mana: Add support for page sizes other than 4KB on ARM64

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-azure source package in Focal:
  Invalid
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux-azure source package in Noble:
  Fix Committed
Status in linux-azure source package in Oracular:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]

  * Request from MSFT to add MANA support for page sizes other than 4KB

  [Fix]

  * Clean cherry pick from linux-next, 382d1741b5b2: "net: mana: Add support 
for page sizes other than 4KB on ARM64"
  * Uses MANA_PAGE_SIZE, which defaults to 4KB, rather than PAGE_SIZE which is 
tied to platform page size

  [Test Plan]

  * Compile tested
  * Boot tested
  * Module loaded

  [Regression potential]

  * Changes isolated, minimal regression risk
  * Functionally equivalent, simply changing the origin of defines

  [Other info]

  * SF #00388152

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2070402/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2069362] Re: Request to enable VDPA kernel config

2024-07-30 Thread John Cabaj
** Tags removed: verification-needed-noble-linux-azure
** Tags added: verification-done-noble-linux-azure

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2069362

Title:
  Request to enable VDPA kernel config

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-azure source package in Noble:
  Fix Committed
Status in linux-azure source package in Oracular:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]

  * Request from MSFT to set the following config options:

  CONFIG_VDPA=m
  CONFIG_VDPA_SIM=m
  CONFIG_VDPA_SIM_NET=m
  CONFIG_VDPA_SIM_BLOCK=m
  CONFIG_VHOST_RING=m
  CONFIG_VHOST_VDPA=m

  [Fix]

  * SAUCE patch to enable config options

  [Test Plan]

  * Compile tested
  * Boot tested
  * Microsoft tested

  [Regression potential]

  * Changes isolated, minimal regression risk
  * Configs enabled in Generic, but missing from Azure

  [Other info]

  * SF #00386379

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2069362/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2071445] Re: Ubuntu 24.04 for Azure unable to run 32bit binaries

2024-07-30 Thread John Cabaj
** Changed in: linux-azure (Ubuntu Noble)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2071445

Title:
  Ubuntu 24.04 for Azure unable to run 32bit binaries

Status in linux-azure package in Ubuntu:
  Triaged
Status in linux-signed-azure package in Ubuntu:
  Invalid
Status in linux-signed-azure-6.8 package in Ubuntu:
  Invalid
Status in linux-azure source package in Noble:
  Fix Committed

Bug description:
  [Impact]

  ## Issue details

  The configuration of the kernel in linux-image-6.8.0-1008-azure is 
incompatible with the way libc6:i386 is built.
  This leads to the error "The futex facility returned an unexpected error 
code." and application crash when trying to execute many 32bit applications in 
x86-64 machines.

  In very short the issue is the following:
  This kernel image is compiled with CONFIG_COMPAT_32BIT_TIME=n, unlike the 
vanilla Ubuntu 24.04 kernel images.
  But, the glibc / libc6:i386 distributed with Ubuntu24.04 is compiled needing 
the syscalls enabled with that option.
  i.e. **This kernel configuration is just incompatible with the provided 
glibc**

  In detail:
  glibc when built for 32bit, if not told which kernel is built for, will 
decide if the time_t value fits or not in a 32bit time_t, and do either the 32 
or 64bit syscall:
  
https://sourceware.org/git/?p=glibc.git;a=blob;f=nptl/futex-internal.c;h=0bb1dd51f66802521afd71b9246222ed0ea0d862;hb=refs/heads/release/2.39/master#l90
  calls with no deadline fit in the 32bit version, but as the kernel does not 
provide this syscall, glibc will just get  a ENOSYS, and glibc will error out 
aborting the program
  ```
  abort (abort.c:79)
  __libc_message_impl.cold (libc_fatal.c:132)
  __libc_fatal (libc_fatal.c:141)
  futex_fatal_error (futex-internal.h:87)
  __futex_abstimed_wait_common (futex-internal.c:119)
  ```
  after printing "The futex facility returned an unexpected error code.\n":
  
https://sourceware.org/git/?p=glibc.git;a=blob;f=sysdeps/nptl/futex-internal.h;h=0e87e92d15ab92f5069463719a494e97d9800431;hb=refs/heads/release/2.39/master#l87

  ## Expected behavior:

  * No crashes for 32bit applications with this kernel
  * This kernel image built with CONFIG_COMPAT_32BIT_TIME=y

  ## Aditional info:

  For reference, this is the current vanilla Ubuntu 24.04 kernel for x86_64 and 
this config:
  ```
  $ uname -a
  Linux  6.8.0-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 
15:51:52 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux
  $ grep CONFIG_COMPAT_32BIT_TIME /boot/config-$(uname -r)
  CONFIG_COMPAT_32BIT_TIME=y
  ```

  On the other hand this is the kernel config for this kernel image:
  ```
  Linux <> 6.8.0-1008-azure #8-Ubuntu SMP Fri May 17 10:44:55 UTC 2024 x86_64 
x86_64 x86_64 GNU/Linux
  # CONFIG_COMPAT_32BIT_TIME is not set
  ```

  Related github issue (the issue was found in github ubuntu 24.04 runners)
  https://github.com/actions/runner-images/issues/9977

  [Fix]

  Reenable COMPAT_32BIT_TIME

  [Test Case]

  See above.

  [Where Problems Could Occur]

  Disabling COMPAT_32BIT_TIME in Noble azure introduced a regression
  when running x86 binaries, so the fix is not expected to break
  anything (new).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2071445/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2073414] Re: Include Azure Site Recovery module in Azure kernel

2024-07-30 Thread John Cabaj
** Changed in: linux (Ubuntu Jammy)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Focal)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2073414

Title:
  Include Azure Site Recovery module in Azure kernel

Status in linux package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  Fix Committed
Status in linux-azure source package in Focal:
  In Progress
Status in linux source package in Jammy:
  Fix Committed
Status in linux-azure source package in Jammy:
  In Progress
Status in linux source package in Noble:
  Fix Committed
Status in linux-azure source package in Noble:
  In Progress
Status in linux source package in Oracular:
  New
Status in linux-azure source package in Oracular:
  In Progress

Bug description:
  [Impact]

  * Microsoft has requested the involflt DKMS module to be included in
  Azure and Generic kernels

  [Fix]

  * For Azure kernels, module will initially be included during kernel build 
via the dkms-version hooks to provide DKMS modules signed into a kernel build
  * For Generic kernels (and Azure once complete), the DKMS modules will 
ultimately be included via a linux-main-modules package, similar to 
linux-restricted-modules

  [Test Plan]

  * Compile and install involflt module
  * Microsoft tested

  [Where problems could occur]

  * Low regression risk, module separate from kernel package and
  requires separate install

  [Other info]

  * SF #00366523

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2073414/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2073414] Re: Include Azure Site Recovery module in Azure kernel

2024-07-30 Thread John Cabaj
** Changed in: linux-azure (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux-azure (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux-azure (Ubuntu Noble)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Focal)
   Status: Fix Committed => New

** Changed in: linux (Ubuntu Jammy)
   Status: Fix Committed => New

** Changed in: linux (Ubuntu Noble)
   Status: Fix Committed => New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2073414

Title:
  Include Azure Site Recovery module in Azure kernel

Status in linux package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  New
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  New
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux source package in Noble:
  New
Status in linux-azure source package in Noble:
  Fix Committed
Status in linux source package in Oracular:
  New
Status in linux-azure source package in Oracular:
  In Progress

Bug description:
  [Impact]

  * Microsoft has requested the involflt DKMS module to be included in
  Azure and Generic kernels

  [Fix]

  * For Azure kernels, module will initially be included during kernel build 
via the dkms-version hooks to provide DKMS modules signed into a kernel build
  * For Generic kernels (and Azure once complete), the DKMS modules will 
ultimately be included via a linux-main-modules package, similar to 
linux-restricted-modules

  [Test Plan]

  * Compile and install involflt module
  * Microsoft tested

  [Where problems could occur]

  * Low regression risk, module separate from kernel package and
  requires separate install

  [Other info]

  * SF #00366523

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2073414/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2076291] [NEW] kernel panic was caused by a fatal exception due to a null pointer dereference in the iptable_nat module

2024-08-07 Thread John Cabaj
Public bug reported:

[Impact]

* Microsoft has requested a patch to address a kernel panic issue

[Fix]

* Clean cherry-pick upstream commit 5830aa863981: "netfilter: iptables:
Fix null-ptr-deref in iptable_nat_table_init("

[Test Plan]

* Build and boot tested

[Where problems could occur]

* Low regression risk

[Other info]

* SF #00391736

** Affects: linux-azure (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-azure (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Summary changed:

- kernel panic was caused by a fatal exception due to a null pointer 
dereference in the iptable_nat module  Case Team (4)  Case Time Cards (5) 
Open Activities (0) Activity History (0) Files (0) Case History (10+) 
SurveyMonkey Responses (0) Emails (0) Case Status History (5) Case Reviews (0) 
Case Comments (0) Notes (0)  Tabs  Details Contacts Comments 
Files Related Knowledge Tracking Assets Account Cases  Case 
Action Plan and Engineering Notes  Action Plan  Engineering Notes  Post 
New Case Time Card  Share an update...  I've provided a test kernel   To link 
to a record, enter / then start typing the record name.  To Canonical 
Ltd. Only  Case Case Details  Time Spent (Minutes)  Solution Sent Tick 
Solution Sent Tick Status Waiting on Customer Workaround Sent Tick 
Workaround Sent Tick Most Recent Activity  All Updates Emails 
Private Answers Call Logs Text Posts Status Changes  Skip Feed View 
This Post Click to collapse post Melissa Carlson Melissa Carlson August 7, 2024 
at 1:58 PM Post To: Internal  Kernel Escalation Hi John,  Azure is 
requesting to pull in the following upstream patch to address an issue they're 
seeing on AKS: 
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/
 Based on this coming from AKS I would expect we'll want to evaluate 
pulling this in for 5.15+ but I've asked Jack to confirm.  Let us know if 
you see any concerns with pulling this patch in.  -Melissa This content is 
a preview of a link. patchwork.kernel.org  patchwork.kernel.org  
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/
 Comment Click to expand post System System August 7, 2024 at 12:39 PM Case 
Case updated View This Post Click to collapse post Melissa Carlson Melissa 
Carlson August 7, 2024 at 1:38 PM Post To: All
+ kernel panic was caused by a fatal exception due to a null pointer 
dereference in the iptable_nat module

** Also affects: linux-azure (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2076291

Title:
  kernel panic was caused by a fatal exception due to a null pointer
  dereference in the iptable_nat module

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Jammy:
  New

Bug description:
  [Impact]

  * Microsoft has requested a patch to address a kernel panic issue

  [Fix]

  * Clean cherry-pick upstream commit 5830aa863981: "netfilter:
  iptables: Fix null-ptr-deref in iptable_nat_table_init("

  [Test Plan]

  * Build and boot tested

  [Where problems could occur]

  * Low regression risk

  [Other info]

  * SF #00391736

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2076291/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2073414] Re: Include Azure Site Recovery module in Azure kernel

2024-08-08 Thread John Cabaj
** Tags removed: verification-needed-focal-linux-azure
** Tags added: verification-done-focal-linux-azure

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2073414

Title:
  Include Azure Site Recovery module in Azure kernel

Status in linux package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  New
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  New
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux source package in Noble:
  New
Status in linux-azure source package in Noble:
  Fix Committed
Status in linux source package in Oracular:
  New
Status in linux-azure source package in Oracular:
  In Progress

Bug description:
  [Impact]

  * Microsoft has requested the involflt DKMS module to be included in
  Azure and Generic kernels

  [Fix]

  * For Azure kernels, module will initially be included during kernel build 
via the dkms-version hooks to provide DKMS modules signed into a kernel build
  * For Generic kernels (and Azure once complete), the DKMS modules will 
ultimately be included via a linux-main-modules package, similar to 
linux-restricted-modules

  [Test Plan]

  * Compile and install involflt module
  * Microsoft tested

  [Where problems could occur]

  * Low regression risk, module separate from kernel package and
  requires separate install

  [Other info]

  * SF #00366523

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2073414/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2076291] Re: kernel panic was caused by a fatal exception due to a null pointer dereference in the iptable_nat module

2024-08-08 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Microsoft has requested a patch to address a kernel panic issue
+ similar to the upstream issue here -
+ 
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/
  
  [Fix]
  
  * Clean cherry-pick upstream commit 5830aa863981: "netfilter: iptables:
- Fix null-ptr-deref in iptable_nat_table_init("
+ Fix null-ptr-deref in iptable_nat_table_init()"
  
  [Test Plan]
  
  * Build and boot tested
  
  [Where problems could occur]
  
- * Low regression risk
+ * Low regression risk, mostly shifting logic
+ * Change to order of register_pernet_subsys() and xt_register_template() 
could expose some other logic being held together under race condition
  
  [Other info]
  
  * SF #00391736

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2076291

Title:
  kernel panic was caused by a fatal exception due to a null pointer
  dereference in the iptable_nat module

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Jammy:
  New

Bug description:
  [Impact]

  * Microsoft has requested a patch to address a kernel panic issue
  similar to the upstream issue here -
  
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/

  [Fix]

  * Clean cherry-pick upstream commit 5830aa863981: "netfilter:
  iptables: Fix null-ptr-deref in iptable_nat_table_init()"

  [Test Plan]

  * Build and boot tested

  [Where problems could occur]

  * Low regression risk, mostly shifting logic
  * Change to order of register_pernet_subsys() and xt_register_template() 
could expose some other logic being held together under race condition

  [Other info]

  * SF #00391736

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2076291/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2076291] Re: kernel panic was caused by a fatal exception due to a null pointer dereference in the iptable_nat module

2024-08-09 Thread John Cabaj
** Changed in: linux-azure (Ubuntu Jammy)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2076291

Title:
  kernel panic was caused by a fatal exception due to a null pointer
  dereference in the iptable_nat module

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

  * Microsoft has requested a patch to address a kernel panic issue
  similar to the upstream issue here -
  
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/

  [Fix]

  * Clean cherry-pick upstream commit 5830aa863981: "netfilter:
  iptables: Fix null-ptr-deref in iptable_nat_table_init()"

  [Test Plan]

  * Build and boot tested

  [Where problems could occur]

  * Low regression risk, mostly shifting logic
  * Change to order of register_pernet_subsys() and xt_register_template() 
could expose some other logic being held together under race condition

  [Other info]

  * SF #00391736

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2076291/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2076291] Re: kernel panic was caused by a fatal exception due to a null pointer dereference in the iptable_nat module

2024-08-13 Thread John Cabaj
** Also affects: linux-azure (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: linux-azure (Ubuntu Oracular)
   Importance: Undecided
   Status: New

** Changed in: linux-azure (Ubuntu Noble)
   Status: New => Fix Committed

** Changed in: linux-azure (Ubuntu Oracular)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2076291

Title:
  kernel panic was caused by a fatal exception due to a null pointer
  dereference in the iptable_nat module

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux-azure source package in Noble:
  Fix Committed
Status in linux-azure source package in Oracular:
  Fix Committed

Bug description:
  [Impact]

  * Microsoft has requested a patch to address a kernel panic issue
  similar to the upstream issue here -
  
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/

  [Fix]

  * Clean cherry-pick upstream commit 5830aa863981: "netfilter:
  iptables: Fix null-ptr-deref in iptable_nat_table_init()"

  [Test Plan]

  * Build and boot tested

  [Where problems could occur]

  * Low regression risk, mostly shifting logic
  * Change to order of register_pernet_subsys() and xt_register_template() 
could expose some other logic being held together under race condition

  [Other info]

  * SF #00391736

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2076291/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2077991] [NEW] Provide an arm64 linux-azure 64k kernel variant

2024-08-27 Thread John Cabaj
Public bug reported:

[Impact]

* Microsoft requested 64k page size flavour.

[Fix]

* Add flavour and configs for 64k flavour

[Test Case]

* Compile tested
* Boot tested

[Where things could go wrong]

* Low chance of regression. Isolated logic fix.

[Other Info]

* SF #00388238

** Affects: linux-azure (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-azure (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: linux-azure (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Affects: linux-azure (Ubuntu Oracular)
 Importance: Undecided
 Status: New

** Also affects: linux-azure (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: linux-azure (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-azure (Ubuntu Oracular)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2077991

Title:
   Provide an arm64 linux-azure 64k kernel variant

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Jammy:
  New
Status in linux-azure source package in Noble:
  New
Status in linux-azure source package in Oracular:
  New

Bug description:
  [Impact]

  * Microsoft requested 64k page size flavour.

  [Fix]

  * Add flavour and configs for 64k flavour

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00388238

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2077991/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2077991] Re: Provide an arm64 linux-azure 64k kernel variant

2024-08-28 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Microsoft requested 64k page size flavour.
  
  [Fix]
  
  * Add flavour and configs for 64k flavour
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  
  [Where things could go wrong]
  
- * Low chance of regression. Isolated logic fix.
+ * Low chance of regression as no logic changed.
+ * Simply adding a new flavour, easily verified by checking built packages.
  
  [Other Info]
  
  * SF #00388238

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2077991

Title:
   Provide an arm64 linux-azure 64k kernel variant

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Jammy:
  New
Status in linux-azure source package in Noble:
  New
Status in linux-azure source package in Oracular:
  New

Bug description:
  [Impact]

  * Microsoft requested 64k page size flavour.

  [Fix]

  * Add flavour and configs for 64k flavour

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression as no logic changed.
  * Simply adding a new flavour, easily verified by checking built packages.

  [Other Info]

  * SF #00388238

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2077991/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2071445] Re: Ubuntu 24.04 for Azure unable to run 32bit binaries

2024-08-28 Thread John Cabaj
** Also affects: linux-azure (Ubuntu Oracular)
   Importance: Undecided
   Status: Triaged

** Also affects: linux-signed-azure (Ubuntu Oracular)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-signed-azure-6.8 (Ubuntu Oracular)
   Importance: Undecided
   Status: Invalid

** Changed in: linux-azure (Ubuntu Oracular)
   Status: Triaged => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2071445

Title:
  Ubuntu 24.04 for Azure unable to run 32bit binaries

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-signed-azure package in Ubuntu:
  Invalid
Status in linux-signed-azure-6.8 package in Ubuntu:
  Invalid
Status in linux-azure source package in Noble:
  Fix Released
Status in linux-azure source package in Oracular:
  Fix Committed
Status in linux-signed-azure source package in Oracular:
  Invalid
Status in linux-signed-azure-6.8 source package in Oracular:
  Invalid

Bug description:
  [Impact]

  ## Issue details

  The configuration of the kernel in linux-image-6.8.0-1008-azure is 
incompatible with the way libc6:i386 is built.
  This leads to the error "The futex facility returned an unexpected error 
code." and application crash when trying to execute many 32bit applications in 
x86-64 machines.

  In very short the issue is the following:
  This kernel image is compiled with CONFIG_COMPAT_32BIT_TIME=n, unlike the 
vanilla Ubuntu 24.04 kernel images.
  But, the glibc / libc6:i386 distributed with Ubuntu24.04 is compiled needing 
the syscalls enabled with that option.
  i.e. **This kernel configuration is just incompatible with the provided 
glibc**

  In detail:
  glibc when built for 32bit, if not told which kernel is built for, will 
decide if the time_t value fits or not in a 32bit time_t, and do either the 32 
or 64bit syscall:
  
https://sourceware.org/git/?p=glibc.git;a=blob;f=nptl/futex-internal.c;h=0bb1dd51f66802521afd71b9246222ed0ea0d862;hb=refs/heads/release/2.39/master#l90
  calls with no deadline fit in the 32bit version, but as the kernel does not 
provide this syscall, glibc will just get  a ENOSYS, and glibc will error out 
aborting the program
  ```
  abort (abort.c:79)
  __libc_message_impl.cold (libc_fatal.c:132)
  __libc_fatal (libc_fatal.c:141)
  futex_fatal_error (futex-internal.h:87)
  __futex_abstimed_wait_common (futex-internal.c:119)
  ```
  after printing "The futex facility returned an unexpected error code.\n":
  
https://sourceware.org/git/?p=glibc.git;a=blob;f=sysdeps/nptl/futex-internal.h;h=0e87e92d15ab92f5069463719a494e97d9800431;hb=refs/heads/release/2.39/master#l87

  ## Expected behavior:

  * No crashes for 32bit applications with this kernel
  * This kernel image built with CONFIG_COMPAT_32BIT_TIME=y

  ## Aditional info:

  For reference, this is the current vanilla Ubuntu 24.04 kernel for x86_64 and 
this config:
  ```
  $ uname -a
  Linux  6.8.0-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 
15:51:52 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux
  $ grep CONFIG_COMPAT_32BIT_TIME /boot/config-$(uname -r)
  CONFIG_COMPAT_32BIT_TIME=y
  ```

  On the other hand this is the kernel config for this kernel image:
  ```
  Linux <> 6.8.0-1008-azure #8-Ubuntu SMP Fri May 17 10:44:55 UTC 2024 x86_64 
x86_64 x86_64 GNU/Linux
  # CONFIG_COMPAT_32BIT_TIME is not set
  ```

  Related github issue (the issue was found in github ubuntu 24.04 runners)
  https://github.com/actions/runner-images/issues/9977

  [Fix]

  Reenable COMPAT_32BIT_TIME

  [Test Case]

  See above.

  [Where Problems Could Occur]

  Disabling COMPAT_32BIT_TIME in Noble azure introduced a regression
  when running x86 binaries, so the fix is not expected to break
  anything (new).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2071445/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2078001] Re: Backport "net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response"

2024-09-03 Thread John Cabaj
** Changed in: linux-azure (Ubuntu Jammy)
   Status: New => Fix Committed

** Changed in: linux-azure (Ubuntu Noble)
   Status: New => Fix Committed

** Changed in: linux-azure (Ubuntu Oracular)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2078001

Title:
  Backport "net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc
  response"

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux-azure source package in Noble:
  Fix Committed
Status in linux-azure source package in Oracular:
  Fix Committed

Bug description:
  [Impact]

  Microsoft has requested us to backport the following bugfix, currently
  in the netdev tree:

  8af174ea863c net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response
  
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=8af174ea863c72f25ce31cee3baad8a301c0cf0f

  [Fix]

  Clean cherry-pick from the netdev tree to the
  {oracular,noble,jammy}:linux-azure trees.

  [Test plan]

  Build and boot tested.

  [Where problems could occur]

  This seems to have a low risk of regression, since it's just making
  sure to finish posting an RX workqueue event before waiting for
  completion in order to avoid a race condition with the hardware.
  However, any regressions here would likely impact users as MANA-
  related errors/timeouts.

  [Other info]

  SF #00393766

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2078001/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2076291] Re: kernel panic was caused by a fatal exception due to a null pointer dereference in the iptable_nat module

2024-09-03 Thread John Cabaj
Fix verified by Microsoft and included in this release.

** Tags removed: verification-needed-jammy-linux-azure 
verification-needed-noble-linux-azure
** Tags added: verification-done-jammy-linux-azure 
verification-done-noble-linux-azure

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2076291

Title:
  kernel panic was caused by a fatal exception due to a null pointer
  dereference in the iptable_nat module

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux-azure source package in Noble:
  Fix Committed
Status in linux-azure source package in Oracular:
  Fix Committed

Bug description:
  [Impact]

  * Microsoft has requested a patch to address a kernel panic issue
  similar to the upstream issue here -
  
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/

  [Fix]

  * Clean cherry-pick upstream commit 5830aa863981: "netfilter:
  iptables: Fix null-ptr-deref in iptable_nat_table_init()"

  [Test Plan]

  * Build and boot tested

  [Where problems could occur]

  * Low regression risk, mostly shifting logic
  * Change to order of register_pernet_subsys() and xt_register_template() 
could expose some other logic being held together under race condition

  [Other info]

  * SF #00391736

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2076291/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2077487] Re: Broken atime in 2.2.2-0ubuntu9 (noble's version)

2024-09-06 Thread John Cabaj
Updating LP bug to SRU justification format.

** Description changed:

- 2.2.2-0ubuntu9 has the 6.7 compat series, including 
https://github.com/openzfs/zfs/commit/db4fc559cc1931b9219e62aa505cd5c51a17b232, 
but does not include the fix for that commit (affects both pre-6.7 and 
post-6.7),
+ [Impact]
+ 
+ * 2.2.2-0ubuntu9 has the 6.7 compat series, including 
https://github.com/openzfs/zfs/commit/db4fc559cc1931b9219e62aa505cd5c51a17b232, 
but does not include the fix for that commit (affects both pre-6.7 and 
post-6.7),
  
https://github.com/openzfs/zfs/commit/f0bf7a247dbb030d68c7fd2b5526dd111cc775d0. 
This manifests for me on the current (6.8.0-40.40~22.04.3) 22.04 HWE kernel as 
writes to a file resetting atime back to 0 (reads still seem to work as 
expected though given that state), which of course breaks real-world things (in 
my case, I can no longer successfully run LLVM's test suite).
  
  Thanks to CONFIG_INIT_STACK_ALL_ZERO=y being the default it seems like
  this isn't a kernel memory disclosure and is instead a deterministic use
  of 0, so I don't believe this to be a blatant security vulnerability.
  This also explains the behaviour observed above.
  
  This needs fixing in noble, and then propagating back through whatever
  kernels are pulling in this version, since linux-modules vendors copies
  of the pre-built DKMS modules, with the current 6.8 HWE kernel using
  2.2.2-0ubuntu9 explicitly.
+ 
+ [Fix]
+ 
+ * Include f0bf7a247dbb: "[PATCH] Linux 6.7 compat: zfs_setattr fix atime
+ update" from upstream ZFS as quilt patch.
+ 
+ [Test Case]
+ 
+ * Build tested against Noble generic
+ * Ran autopkgktests for regressions, none encountered
+ 
+ [Where things could go wrong]
+ 
+ * Low chance of regression, isolated instantiation and logic fix.
+ * Addition of time delta check could cause issues during unexpected delay > 2 
seconds.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2077487

Title:
  Broken atime in 2.2.2-0ubuntu9 (noble's version)

Status in linux package in Ubuntu:
  Invalid
Status in linux-hwe-6.8 package in Ubuntu:
  Invalid
Status in zfs-linux package in Ubuntu:
  Fix Released
Status in linux source package in Noble:
  New
Status in linux-hwe-6.8 source package in Noble:
  Invalid
Status in zfs-linux source package in Noble:
  In Progress

Bug description:
  [Impact]

  * 2.2.2-0ubuntu9 has the 6.7 compat series, including 
https://github.com/openzfs/zfs/commit/db4fc559cc1931b9219e62aa505cd5c51a17b232, 
but does not include the fix for that commit (affects both pre-6.7 and 
post-6.7),
  
https://github.com/openzfs/zfs/commit/f0bf7a247dbb030d68c7fd2b5526dd111cc775d0. 
This manifests for me on the current (6.8.0-40.40~22.04.3) 22.04 HWE kernel as 
writes to a file resetting atime back to 0 (reads still seem to work as 
expected though given that state), which of course breaks real-world things (in 
my case, I can no longer successfully run LLVM's test suite).

  Thanks to CONFIG_INIT_STACK_ALL_ZERO=y being the default it seems like
  this isn't a kernel memory disclosure and is instead a deterministic
  use of 0, so I don't believe this to be a blatant security
  vulnerability. This also explains the behaviour observed above.

  This needs fixing in noble, and then propagating back through whatever
  kernels are pulling in this version, since linux-modules vendors
  copies of the pre-built DKMS modules, with the current 6.8 HWE kernel
  using 2.2.2-0ubuntu9 explicitly.

  [Fix]

  * Include f0bf7a247dbb: "[PATCH] Linux 6.7 compat: zfs_setattr fix
  atime update" from upstream ZFS as quilt patch.

  [Test Case]

  * Build tested against Noble generic
  * Ran autopkgktests for regressions, none encountered

  [Where things could go wrong]

  * Low chance of regression, isolated instantiation and logic fix.
  * Addition of time delta check could cause issues during unexpected delay > 2 
seconds.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2077487/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2079841] [NEW] Revert fix for "Kernel fails to enable XSAVE when running in a “v5” AMD SEV-SNP VM"

2024-09-06 Thread John Cabaj
Public bug reported:

SRU Justification

[Impact]

* LP #2069204 disabled CET Shadow Stack on SEV-SNP due to CPUID emulation bug 
not being fixed in VMs until October 2024.
* This issue is now fixed, so the patch can be reverted.

[Fix]

* Revert "UBUNTU: SAUCE: x86/hyperv: temporarily disable CET SS on SEV-
SNP due to a paravisor bug"

[Test Plan]

* Compile tested
* Boot tested
* Microsoft tested

[Regression potential]

* Reverting back to previous state, so regression very unlikely.
* Changes isolated, minimal regression risk

[Other info]

* SF #00387447

** Affects: linux-azure (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-azure (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Affects: linux-azure (Ubuntu Oracular)
 Importance: Undecided
 Status: New

** Also affects: linux-azure (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: linux-azure (Ubuntu Oracular)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2079841

Title:
  Revert fix for "Kernel fails to enable XSAVE when running in a “v5”
  AMD SEV-SNP VM"

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Noble:
  New
Status in linux-azure source package in Oracular:
  New

Bug description:
  SRU Justification

  [Impact]

  * LP #2069204 disabled CET Shadow Stack on SEV-SNP due to CPUID emulation bug 
not being fixed in VMs until October 2024.
  * This issue is now fixed, so the patch can be reverted.

  [Fix]

  * Revert "UBUNTU: SAUCE: x86/hyperv: temporarily disable CET SS on
  SEV-SNP due to a paravisor bug"

  [Test Plan]

  * Compile tested
  * Boot tested
  * Microsoft tested

  [Regression potential]

  * Reverting back to previous state, so regression very unlikely.
  * Changes isolated, minimal regression risk

  [Other info]

  * SF #00387447

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2079841/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2077487] Re: Broken atime in 2.2.2-0ubuntu9 (noble's version)

2024-09-06 Thread John Cabaj
** Description changed:

+ SRU Justification
+ 
  [Impact]
  
  * 2.2.2-0ubuntu9 has the 6.7 compat series, including 
https://github.com/openzfs/zfs/commit/db4fc559cc1931b9219e62aa505cd5c51a17b232, 
but does not include the fix for that commit (affects both pre-6.7 and 
post-6.7),
  
https://github.com/openzfs/zfs/commit/f0bf7a247dbb030d68c7fd2b5526dd111cc775d0. 
This manifests for me on the current (6.8.0-40.40~22.04.3) 22.04 HWE kernel as 
writes to a file resetting atime back to 0 (reads still seem to work as 
expected though given that state), which of course breaks real-world things (in 
my case, I can no longer successfully run LLVM's test suite).
  
  Thanks to CONFIG_INIT_STACK_ALL_ZERO=y being the default it seems like
  this isn't a kernel memory disclosure and is instead a deterministic use
  of 0, so I don't believe this to be a blatant security vulnerability.
  This also explains the behaviour observed above.
  
  This needs fixing in noble, and then propagating back through whatever
  kernels are pulling in this version, since linux-modules vendors copies
  of the pre-built DKMS modules, with the current 6.8 HWE kernel using
  2.2.2-0ubuntu9 explicitly.
  
  [Fix]
  
  * Include f0bf7a247dbb: "[PATCH] Linux 6.7 compat: zfs_setattr fix atime
  update" from upstream ZFS as quilt patch.
  
  [Test Case]
  
  * Build tested against Noble generic
  * Ran autopkgktests for regressions, none encountered
  
  [Where things could go wrong]
  
  * Low chance of regression, isolated instantiation and logic fix.
  * Addition of time delta check could cause issues during unexpected delay > 2 
seconds.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2077487

Title:
  Broken atime in 2.2.2-0ubuntu9 (noble's version)

Status in linux package in Ubuntu:
  Invalid
Status in linux-hwe-6.8 package in Ubuntu:
  Invalid
Status in zfs-linux package in Ubuntu:
  Fix Released
Status in linux source package in Noble:
  New
Status in linux-hwe-6.8 source package in Noble:
  Invalid
Status in zfs-linux source package in Noble:
  In Progress

Bug description:
  SRU Justification

  [Impact]

  * 2.2.2-0ubuntu9 has the 6.7 compat series, including 
https://github.com/openzfs/zfs/commit/db4fc559cc1931b9219e62aa505cd5c51a17b232, 
but does not include the fix for that commit (affects both pre-6.7 and 
post-6.7),
  
https://github.com/openzfs/zfs/commit/f0bf7a247dbb030d68c7fd2b5526dd111cc775d0. 
This manifests for me on the current (6.8.0-40.40~22.04.3) 22.04 HWE kernel as 
writes to a file resetting atime back to 0 (reads still seem to work as 
expected though given that state), which of course breaks real-world things (in 
my case, I can no longer successfully run LLVM's test suite).

  Thanks to CONFIG_INIT_STACK_ALL_ZERO=y being the default it seems like
  this isn't a kernel memory disclosure and is instead a deterministic
  use of 0, so I don't believe this to be a blatant security
  vulnerability. This also explains the behaviour observed above.

  This needs fixing in noble, and then propagating back through whatever
  kernels are pulling in this version, since linux-modules vendors
  copies of the pre-built DKMS modules, with the current 6.8 HWE kernel
  using 2.2.2-0ubuntu9 explicitly.

  [Fix]

  * Include f0bf7a247dbb: "[PATCH] Linux 6.7 compat: zfs_setattr fix
  atime update" from upstream ZFS as quilt patch.

  [Test Case]

  * Build tested against Noble generic
  * Ran autopkgktests for regressions, none encountered

  [Where things could go wrong]

  * Low chance of regression, isolated instantiation and logic fix.
  * Addition of time delta check could cause issues during unexpected delay > 2 
seconds.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2077487/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2079841] Re: Revert fix for "Kernel fails to enable XSAVE when running in a “v5” AMD SEV-SNP VM"

2024-09-06 Thread John Cabaj
** Description changed:

  SRU Justification
  
  [Impact]
  
  * LP #2069204 disabled CET Shadow Stack on SEV-SNP due to CPUID emulation bug 
not being fixed in VMs until October 2024.
  * This issue is now fixed, so the patch can be reverted.
  
  [Fix]
  
  * Revert "UBUNTU: SAUCE: x86/hyperv: temporarily disable CET SS on SEV-
  SNP due to a paravisor bug"
  
  [Test Plan]
  
  * Compile tested
  * Boot tested
- * Microsoft tested
  
  [Regression potential]
  
  * Reverting back to previous state, so regression very unlikely.
  * Changes isolated, minimal regression risk
  
  [Other info]
  
  * SF #00387447

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2079841

Title:
  Revert fix for "Kernel fails to enable XSAVE when running in a “v5”
  AMD SEV-SNP VM"

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Noble:
  New
Status in linux-azure source package in Oracular:
  New

Bug description:
  SRU Justification

  [Impact]

  * LP #2069204 disabled CET Shadow Stack on SEV-SNP due to CPUID emulation bug 
not being fixed in VMs until October 2024.
  * This issue is now fixed, so the patch can be reverted.

  [Fix]

  * Revert "UBUNTU: SAUCE: x86/hyperv: temporarily disable CET SS on
  SEV-SNP due to a paravisor bug"

  [Test Plan]

  * Compile tested
  * Boot tested

  [Regression potential]

  * Reverting back to previous state, so regression very unlikely.
  * Changes isolated, minimal regression risk

  [Other info]

  * SF #00387447

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2079841/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996093] Re: [RELEASE BLOCKER] Call trace during nvme storage performance test in bionic/linux-azure 4.15.0-1154

2023-01-05 Thread John Cabaj
** Changed in: linux-azure (Ubuntu Focal)
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure-4.15 in Ubuntu.
https://bugs.launchpad.net/bugs/1996093

Title:
  [RELEASE BLOCKER] Call trace during nvme storage performance test in
  bionic/linux-azure 4.15.0-1154

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure-4.15 package in Ubuntu:
  New
Status in linux-azure source package in Bionic:
  Invalid
Status in linux-azure-4.15 source package in Bionic:
  Fix Released
Status in linux-azure source package in Focal:
  Invalid
Status in linux-azure-4.15 source package in Focal:
  Invalid

Bug description:
  SRU Justification

  [Impact]

  Hypervisor only allocates interrupts to happen on a single physical
  GPU, which can lead to CPU soft locks when using PCI NVME under heavy
  load.

  [Test Case]

  Microsoft tested

  [Where things could go wrong]

  Hypervisor PCI driver may not load correctly. Patch did not apply
  cleanly and could lead to merge conflicts once the upstream patch is
  pulled in.

  [Other Info]

  SF: #00347669

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1996093/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995408] [NEW] [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

2022-11-01 Thread John Cabaj
Public bug reported:

Running fio on NVME SSD can cause CPU soft locks.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995408

Title:
  [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

Status in linux package in Ubuntu:
  New

Bug description:
  Running fio on NVME SSD can cause CPU soft locks.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1995408/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995408] Re: [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

2022-11-01 Thread John Cabaj
** Attachment added: "Logs"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1995408/+attachment/5628321/+files/820e9193-4187-4828-a77b-65cd1bb6ab7e.serialconsole.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995408

Title:
  [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Running fio on NVME SSD can cause CPU soft locks.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1995408/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995408] Re: [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

2022-11-04 Thread John Cabaj
** Description changed:

- Running fio on NVME SSD can cause CPU soft locks.
+ SRU Justification
+ 
+ [Impact]
+ 
+ Hypervisor only allocates interrupts to happen on a single physical GPU,
+ which can lead to CPU soft locks when using PCI NVME under heavy load.
+ 
+ Kinetic will get this patch via stable updates.
+ 
+ [Test Case]
+ 
+ Microsoft tested
+ 
+ [Where things could go wrong]
+ 
+ Hypervisor PCI driver may not load correctly. Patch did not apply
+ cleanly and could lead to merge conflicts once the upstream patch is
+ pulled in.
+ 
+ [Other Info]
+ 
+ SF: #00346549

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995408

Title:
  [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  SRU Justification

  [Impact]

  Hypervisor only allocates interrupts to happen on a single physical
  GPU, which can lead to CPU soft locks when using PCI NVME under heavy
  load.

  Kinetic will get this patch via stable updates.

  [Test Case]

  Microsoft tested

  [Where things could go wrong]

  Hypervisor PCI driver may not load correctly. Patch did not apply
  cleanly and could lead to merge conflicts once the upstream patch is
  pulled in.

  [Other Info]

  SF: #00346549

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1995408/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995408] Re: [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

2022-11-08 Thread John Cabaj
** Package changed: linux (Ubuntu) => linux-azure (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1995408

Title:
  [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

Status in linux-azure package in Ubuntu:
  Incomplete

Bug description:
  SRU Justification

  [Impact]

  Hypervisor only allocates interrupts to happen on a single physical
  GPU, which can lead to CPU soft locks when using PCI NVME under heavy
  load.

  Kinetic will get this patch via stable updates.

  [Test Case]

  Microsoft tested

  [Where things could go wrong]

  Hypervisor PCI driver may not load correctly. Patch did not apply
  cleanly and could lead to merge conflicts once the upstream patch is
  pulled in.

  [Other Info]

  SF: #00346549

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1995408/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995408] Re: [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

2022-11-08 Thread John Cabaj
** Changed in: linux-azure (Ubuntu)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1995408

Title:
  [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks

Status in linux-azure package in Ubuntu:
  Incomplete

Bug description:
  SRU Justification

  [Impact]

  Hypervisor only allocates interrupts to happen on a single physical
  GPU, which can lead to CPU soft locks when using PCI NVME under heavy
  load.

  Kinetic will get this patch via stable updates.

  [Test Case]

  Microsoft tested

  [Where things could go wrong]

  Hypervisor PCI driver may not load correctly. Patch did not apply
  cleanly and could lead to merge conflicts once the upstream patch is
  pulled in.

  [Other Info]

  SF: #00346549

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1995408/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996093] [NEW] [RELEASE BLOCKER] Call trace during nvme storage performance test in bionic/linux-azure 4.15.0-1154

2022-11-09 Thread John Cabaj
Public bug reported:

SRU Justification

[Impact]

Hypervisor only allocates interrupts to happen on a single physical GPU,
which can lead to CPU soft locks when using PCI NVME under heavy load.

[Test Case]

Microsoft tested

[Where things could go wrong]

Hypervisor PCI driver may not load correctly. Patch did not apply
cleanly and could lead to merge conflicts once the upstream patch is
pulled in.

[Other Info]

SF: #00347669

** Affects: linux-azure (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "KernelLogStatus[1].txt"
   
https://bugs.launchpad.net/bugs/1996093/+attachment/5630096/+files/KernelLogStatus%5B1%5D.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1996093

Title:
  [RELEASE BLOCKER] Call trace during nvme storage performance test in
  bionic/linux-azure 4.15.0-1154

Status in linux-azure package in Ubuntu:
  New

Bug description:
  SRU Justification

  [Impact]

  Hypervisor only allocates interrupts to happen on a single physical
  GPU, which can lead to CPU soft locks when using PCI NVME under heavy
  load.

  [Test Case]

  Microsoft tested

  [Where things could go wrong]

  Hypervisor PCI driver may not load correctly. Patch did not apply
  cleanly and could lead to merge conflicts once the upstream patch is
  pulled in.

  [Other Info]

  SF: #00347669

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1996093/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2035163] Re: Avoid address overwrite in kernel_connect

2023-10-06 Thread John Cabaj
** Also affects: linux-gkeop (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gke in Ubuntu.
https://bugs.launchpad.net/bugs/2035163

Title:
  Avoid address overwrite in kernel_connect

Status in linux package in Ubuntu:
  Fix Released
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-gke package in Ubuntu:
  Invalid
Status in linux-gkeop package in Ubuntu:
  New
Status in linux source package in Focal:
  Fix Committed
Status in linux-gcp source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Jammy:
  Fix Released
Status in linux-gke source package in Jammy:
  Fix Released
Status in linux-gkeop source package in Jammy:
  New
Status in linux source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Released
Status in linux-gcp source package in Mantic:
  Fix Released

Bug description:
  This fix is requested to resolve an issue with NFS-backed mounts when
  used with BPF-load-balancing:

  https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-
  next.git/commit/?id=0bdf399342c5

  
  Testing:
   - GCP has confirmed the fix works before proposing it upstream. I have 
verified basic network sanity with fix applied.

  
  Regression potenial:
   - The fix modifies kernel_connect() which can have an effect on all kinds of 
network connections. The change itself is very minor though and simply converts 
a pass-by-reference to a pass-by-value - so the risk is considered minimal.

  More information at:
  https://canonical.lightning.force.com/lightning/r/Case/5008e0HNldDAAT/view

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2035163/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039191] [NEW] Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization

2023-10-12 Thread John Cabaj
Public bug reported:

[Impact]

* Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from
  git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar

[Fix]

* Clean cherry pick from linux-next, commit 3e3255265291

[Test Case]

* Compile tested
* Boot tested
* To be tested by Google

[Where things could go wrong]

* Low chance of regression, isolated fix slightly modifying when value becomes
  available.

** Affects: linux-aws (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-aws (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: linux-aws (Ubuntu Lunar)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Lunar)
 Importance: Undecided
 Status: New

** Affects: linux-aws (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Lunar)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039191

Title:
  Kernel oops on 32-0bit kernels due to x86_cache_alignment
  initialization

Status in linux-aws package in Ubuntu:
  New
Status in linux-gcp package in Ubuntu:
  New
Status in linux-aws source package in Jammy:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-aws source package in Lunar:
  New
Status in linux-gcp source package in Lunar:
  New
Status in linux-aws source package in Mantic:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from

git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar

  [Fix]

  * Clean cherry pick from linux-next, commit 3e3255265291

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, isolated fix slightly modifying when value becomes
available.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2039191/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039191] Re: Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization

2023-10-13 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => Triaged

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: New => Triaged

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: New => Triaged

** Changed in: linux-aws (Ubuntu Lunar)
   Status: New => Triaged

** Changed in: linux-aws (Ubuntu Jammy)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2039191

Title:
  Kernel oops on 32-0bit kernels due to x86_cache_alignment
  initialization

Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-gcp package in Ubuntu:
  Triaged
Status in linux-aws source package in Jammy:
  Triaged
Status in linux-gcp source package in Jammy:
  Triaged
Status in linux-aws source package in Lunar:
  Triaged
Status in linux-gcp source package in Lunar:
  Triaged
Status in linux-aws source package in Mantic:
  In Progress
Status in linux-gcp source package in Mantic:
  Triaged

Bug description:
  [Impact]

  * Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from

git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar

  [Fix]

  * Clean cherry pick from linux-next, commit 3e3255265291

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, isolated fix slightly modifying when value becomes
available.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2039191/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039191] Re: Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization

2023-10-13 Thread John Cabaj
Removing Jammy from nominations as jammy:linux-gcp-6.2 and jammy:linux-
aws-6.2 will be getting the patch via lunar:linux-gcp and lunar:linux-
aws respectively.

** No longer affects: linux-gcp (Ubuntu Jammy)

** No longer affects: linux-aws (Ubuntu Jammy)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2039191

Title:
  Kernel oops on 32-0bit kernels due to x86_cache_alignment
  initialization

Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-gcp package in Ubuntu:
  Triaged
Status in linux-aws source package in Lunar:
  Triaged
Status in linux-gcp source package in Lunar:
  Triaged
Status in linux-aws source package in Mantic:
  In Progress
Status in linux-gcp source package in Mantic:
  Triaged

Bug description:
  [Impact]

  * Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from

git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar

  [Fix]

  * Clean cherry pick from linux-next, commit 3e3255265291

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, isolated fix slightly modifying when value becomes
available.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2039191/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2037087] Re: TCPDirect patches

2023-10-13 Thread John Cabaj
** Changed in: linux-gcp-5.15 (Ubuntu Focal)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/2037087

Title:
  TCPDirect patches

Status in linux-gcp-5.15 package in Ubuntu:
  New
Status in linux-gcp-5.15 source package in Focal:
  Fix Committed

Bug description:
  [Impact]

  * Include patches to enable TCPDirect. This is considered a v1 implementation 
while Google works to
upsteam a v2 implementation, hence the "UBUNTU: SAUCE: (no-up)" 
classification.

  [Fix]

  d1016eee0b1a ("UBUNTU: SAUCE: (no-up) UPSTREAM: tcp: derive delack_max from 
rto_min")
  10364f0d83ee ("UBUNTU: SAUCE: (no-up) gve: Add retry logic for recoverable 
adminq errors")
  403fb6f43a7c ("UBUNTU: SAUCE: (no-up) tcp: defer regular ACK while processing 
socket backlog")
  be97d51d24da ("UBUNTU: SAUCE: (no-up) gve: Enable header-split without 
gve_close/gve_open")
  499a0ec31c74 ("UBUNTU: SAUCE: (no-up) gve: fix rx issues for skb free and 
append frags")
  89b4d1e69fac ("UBUNTU: SAUCE: (no-up) net: fix silent put_cmsg() failures")
  d025ece61dab ("UBUNTU: SAUCE: (no-up) tcp: get rid of 
sysctl_tcp_adv_win_scale")
  d1380ff2f4e3 ("UBUNTU: SAUCE: (no-up) gve: Add tx watchdog to avoid race 
condition on miss path")
  a4bc2e0cd1a3 ("UBUNTU: SAUCE: (no-up) net-tcp_5k_mtu: force wscale >= 12 for 
active flows")
  bbe85e8e856c ("UBUNTU: SAUCE: (no-up) net-tcp_5k_mtu: force wscale >= 12 for 
4K MTU TCP flows")
  7d5f15f733e8 ("UBUNTU: SAUCE: (no-up) dma-buf: fix int overflow")
  22668842a913 ("UBUNTU: SAUCE: (no-up) gve: add flow steering and rss reset 
when teardown device resources")
  18e66e5d9ac4 ("UBUNTU: SAUCE: (no-up) net: create skb_frags_not_readable() 
helper")
  5d81162de488 ("UBUNTU: SAUCE: (no-up) net: add missing skb->devmem checks")
  cf0bcfdf9f87 ("UBUNTU: SAUCE: (no-up) net: remove devmem check from 
__pskb_copy_fclone()")
  9ca03b5c36c7 ("UBUNTU: SAUCE: (no-up) net: allow tcp coallapsing and 
coallescing for devmem skbs")
  030aef8b0fd2 ("UBUNTU: SAUCE: (no-up) net: skb_store_bits() should succeed on 
devmem header")
  6aaf939fb49e ("UBUNTU: SAUCE: (no-up) net: fix skb_split unnecessarily 
setting skb->devmem")
  51e12a8201a1 ("UBUNTU: SAUCE: (no-up) net: skb_copy_bits() should be able to 
copy devmem header")
  ea8a78e040f5 ("UBUNTU: SAUCE: (no-up) net: fix memory leaks due to 
skb->devmem checks")
  1fcd891606c0 ("UBUNTU: SAUCE: (no-up) net: fix snaplen for devmem packets")
  e4a4e05f4831 ("UBUNTU: SAUCE: (no-up) net: keep track and avoid access of skb 
containing dma-buf pages.")
  424871c3c564 ("UBUNTU: SAUCE: (no-up) gve: implement device memory socket 
data path")
  4f8668ee4cdb ("UBUNTU: SAUCE: (no-up) gve: implement devmem socket stats")
  abe1772b0e39 ("UBUNTU: SAUCE: (no-up) gve: add rss support")
  c08a1adb6130 ("UBUNTU: SAUCE: (no-up) gve: add flow steering support")
  ffa842923ad6 ("UBUNTU: SAUCE: (no-up) gve: Add header split support")
  940527385c4c ("UBUNTU: SAUCE: (no-up) lakitu config: enable TCP Direct 
configs")
  ebfa162318f8 ("UBUNTU: SAUCE: (no-up) tcp, cos-only: revert changes to 
skb_zerocopy_iter_stream")
  b87d0b0e659a ("UBUNTU: SAUCE: (no-up) tcp: let sendmsg() take file 
descriptors via cmsg to enable devmem Tx")
  1d523c425a8c ("UBUNTU: SAUCE: (no-up) net: add SO_DEVMEM_DONTNEED setsockopt 
to release pages")
  3e34b0936884 ("UBUNTU: SAUCE: (no-up) net: backport fixes to devmem TCP rx")
  446d7a742177 ("UBUNTU: SAUCE: (no-up) tcp: implement RX path for devmem 
sockets")
  109f2e3feb98 ("UBUNTU: SAUCE: (no-up) net: use get_file_rcu() instead of 
get_file for __netdev_rxq_alloc_page_from_dmabuf_pool")
  0d5117d4ea53 ("UBUNTU: SAUCE: (no-up) net: add netdev_rxq_alloc_page and 
skb->devmem")
  d0d273544148 ("UBUNTU: SAUCE: (no-up) dmabuf: add ioctl that binds dmabuf 
pagepool to a netdevice")
  05c81288f77b ("UBUNTU: SAUCE: (no-up) dma-buf: fix int overflow in addr 
calculation")
  46366a3326d9 ("UBUNTU: SAUCE: (no-up) dma-buf: create struct pages backing a 
dma-bu")

  [Test Case]

  * Compile tested
  * Boot tested
  * Ran ubuntu_kernel_selftests and ubuntu_performance_stress_ng test suites
  * Tested by Google

  [Other Info]

  * Bulk of patchset came from 
https://cos.googlesource.com/third_party/kernel/+log/refs/heads/tcpd/R105,
but some backports were given in SalesForce case below.
  * SF: #00359122

  [Where things could go wrong]

  * Most changes target Google gve driver specifically.
  * Some required updates to dma and network implementation to enable new API.
  * Could lead to DMA or network instabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp-5.15/+bug/2037087/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpa

[Kernel-packages] [Bug 2039720] [NEW] Intel IDPF support

2023-10-18 Thread John Cabaj
Public bug reported:

[Impact]

* Request from Google to include new Intel IDPF driver support

[Fix]

* Cherry pick commits from net-next,
b6a7eeb44a6a8b1ea2dea78b5de448d86eb0bd96

[Test Case]

* Compile tested
* Boot tested
* To be tested by Google

[Where things could go wrong]

* Low chance of regression, new driver is isolated and will be tested by
Google

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Lunar)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Lunar)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039720

Title:
  Intel IDPF support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Lunar:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Request from Google to include new Intel IDPF driver support

  [Fix]

  * Cherry pick commits from net-next,
  b6a7eeb44a6a8b1ea2dea78b5de448d86eb0bd96

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, new driver is isolated and will be tested
  by Google

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039720/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039732] [NEW] No graphic desktop environment on Google GCP instances

2023-10-18 Thread John Cabaj
Public bug reported:

[Impact]

* Google reports not being able to display graphic desktop environment.

[Fix]

* CONFIG_SYSFB_SIMPLEFB was initially enabled in
https://git.launchpad.net/~ubuntu-
kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
disabled for amd64 in https://git.launchpad.net/~ubuntu-
kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not reflected
in the GCP kernel config.

[Test Case]

* Compile tested
* Boot tested
* To be tested by Google

[Where things could go wrong]

* Low chance of regression. Simple config change that was not taken from
generic.

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039732

Title:
  No graphic desktop environment on Google GCP instances

Status in linux-gcp package in Ubuntu:
  New

Bug description:
  [Impact]

  * Google reports not being able to display graphic desktop
  environment.

  [Fix]

  * CONFIG_SYSFB_SIMPLEFB was initially enabled in
  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
  disabled for amd64 in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not
  reflected in the GCP kernel config.

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression. Simple config change that was not taken
  from generic.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039732/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039732] Re: No graphic desktop environment on Google GCP instances

2023-10-18 Thread John Cabaj
** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Lunar)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039732

Title:
  No graphic desktop environment on Google GCP instances

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Lunar:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Google reports not being able to display graphic desktop
  environment.

  [Fix]

  * CONFIG_SYSFB_SIMPLEFB was initially enabled in
  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
  disabled for amd64 in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not
  reflected in the GCP kernel config.

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression. Simple config change that was not taken
  from generic.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039732/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039720] Re: Intel IDPF support

2023-10-18 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Request from Google to include new Intel IDPF driver support
  
  [Fix]
  
  * Cherry pick commits from net-next,
  b6a7eeb44a6a8b1ea2dea78b5de448d86eb0bd96
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * To be tested by Google
  
  [Where things could go wrong]
  
  * Low chance of regression, new driver is isolated and will be tested by
  Google
+ 
+ [Other Info]
+ 
+ * SF #00368902

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039720

Title:
  Intel IDPF support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Lunar:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Request from Google to include new Intel IDPF driver support

  [Fix]

  * Cherry pick commits from net-next,
  b6a7eeb44a6a8b1ea2dea78b5de448d86eb0bd96

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, new driver is isolated and will be tested
  by Google

  [Other Info]

  * SF #00368902

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039720/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039732] Re: No graphic desktop environment on Google GCP instances

2023-10-18 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Google reports not being able to display graphic desktop environment.
  
  [Fix]
  
  * CONFIG_SYSFB_SIMPLEFB was initially enabled in
  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
  disabled for amd64 in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not reflected
  in the GCP kernel config.
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * To be tested by Google
  
  [Where things could go wrong]
  
  * Low chance of regression. Simple config change that was not taken from
  generic.
+ 
+ [Other Info]
+ 
+ * SF #00366439

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039732

Title:
  No graphic desktop environment on Google GCP instances

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Lunar:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Google reports not being able to display graphic desktop
  environment.

  [Fix]

  * CONFIG_SYSFB_SIMPLEFB was initially enabled in
  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
  disabled for amd64 in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not
  reflected in the GCP kernel config.

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression. Simple config change that was not taken
  from generic.

  [Other Info]

  * SF #00366439

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039732/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2037316] Re: SEV_SNP failure to init

2023-10-18 Thread John Cabaj
Tested the kernel from lunar proposed (6.2.0-1018-gcp) on GCP n2d
instances. The image boots with sev enabled:

john_cabaj@john-cabaj-sev-snp2:~$ sudo dmesg | grep -i sev
[0.303257] Memory Encryption Features active: AMD SEV

** Tags removed: verification-needed-lunar-linux-gcp
** Tags added: verification-done-lunar-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2037316

Title:
  SEV_SNP failure to init

Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-aws source package in Jammy:
  Invalid
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-aws source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-aws source package in Mantic:
  Fix Released
Status in linux-gcp source package in Mantic:
  Fix Released

Bug description:
  [Impact]

  * Kernel fails to boot on SEV-SNP instances when compiled with GCC
  12.3.0

  [Fix]

  *
  https://lore.kernel.org/lkml/20230912002703.3924521-1-acdun...@google.com/

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Patches relatively isolated and maintain similar checking
  functionality, just earlier in boot. Likely a low chance of
  regression.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2037316/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039732] Re: No graphic desktop environment on Google GCP instances

2023-10-19 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Jammy)
   Importance: Undecided => High

** Changed in: linux-gcp (Ubuntu Lunar)
   Importance: Undecided => High

** Changed in: linux-gcp (Ubuntu Mantic)
   Importance: Undecided => High

** Changed in: linux-gcp (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

** Changed in: linux-gcp (Ubuntu Lunar)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

** Changed in: linux-gcp (Ubuntu Mantic)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039732

Title:
  No graphic desktop environment on Google GCP instances

Status in linux-gcp package in Ubuntu:
  In Progress
Status in linux-gcp source package in Jammy:
  In Progress
Status in linux-gcp source package in Lunar:
  In Progress
Status in linux-gcp source package in Mantic:
  In Progress

Bug description:
  [Impact]

  * Google reports not being able to display graphic desktop
  environment.

  [Fix]

  * CONFIG_SYSFB_SIMPLEFB was initially enabled in
  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
  disabled for amd64 in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not
  reflected in the GCP kernel config.

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression. Simple config change that was not taken
  from generic.

  [Other Info]

  * SF #00366439

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039732/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039191] Re: Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization

2023-10-20 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Mantic)
   Status: Triaged => Fix Committed

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: Triaged => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2039191

Title:
  Kernel oops on 32-0bit kernels due to x86_cache_alignment
  initialization

Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-gcp package in Ubuntu:
  Fix Committed
Status in linux-aws source package in Lunar:
  Triaged
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-aws source package in Mantic:
  In Progress
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from

git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar

  [Fix]

  * Clean cherry pick from linux-next, commit 3e3255265291

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, isolated fix slightly modifying when value becomes
available.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2039191/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039732] Re: No graphic desktop environment on Google GCP instances

2023-10-24 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039732

Title:
  No graphic desktop environment on Google GCP instances

Status in linux-gcp package in Ubuntu:
  In Progress
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Google reports not being able to display graphic desktop
  environment.

  [Fix]

  * CONFIG_SYSFB_SIMPLEFB was initially enabled in
  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
  disabled for amd64 in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not
  reflected in the GCP kernel config.

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression. Simple config change that was not taken
  from generic.

  [Other Info]

  * SF #00366439

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039732/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2028740] Re: Fix AMD gpu hang when screen off/on

2023-10-24 Thread John Cabaj
This is still seen on generic jammy:hwe-6.2.

Log attached was from machine still up, just with display off.

** Attachment added: "sleep.log"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2028740/+attachment/5713061/+files/sleep.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.1 in Ubuntu.
https://bugs.launchpad.net/bugs/2028740

Title:
  Fix AMD gpu hang when screen off/on

Status in HWE Next:
  Fix Released
Status in OEM Priority Project:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-6.1 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Invalid
Status in linux-oem-6.1 source package in Jammy:
  Fix Released
Status in linux source package in Lunar:
  Fix Released
Status in linux-oem-6.1 source package in Lunar:
  Invalid

Bug description:
  [Impact]
  AMD GPU hang when screen off/on.
  error log:
  kernel: [drm:dc_dmub_srv_wait_idle [amdgpu]] *ERROR* Error waiting for DMUB 
idle: status=3

  [Fix]
  Keep a PHY active when detecting DP signal + DPMS active.

  [Test]
  Tested on 3 AMD platforms, GPU works fine.

  [Where problems could occur]
  Low risk, the fix is in v6.4-rc1.

  Generic Jammy kernel doesn't need this commit because of no support of
  AMD Phoenix GPU.
  SRU for Lunar/oem-6.1 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/2028740/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040337] [NEW] Incorrect argument from SEV live-migration fix

2023-10-24 Thread John Cabaj
Public bug reported:

[Impact]

* Google requested fix to notify_range_enc_status_changed() passing
incorrect argument.

[Fix]

* Upstream ac3f9c9f1b37 introduced change to
notify_range_enc_status_changed() to accept page size instead of number
of pages, but function was not updated. Updating to send correct
argument.

[Test Case]

* Compile tested
* Boot tested
* Tested by Google

[Where things could go wrong]

* Low chance of regression. Isolated logic fix.

[Other Info]

* SF #00367134

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Focal)
 Importance: High
 Assignee: John Cabaj (john-cabaj)
 Status: In Progress

** Affects: linux-gcp (Ubuntu Jammy)
 Importance: High
 Assignee: John Cabaj (john-cabaj)
 Status: In Progress

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux-gcp (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Focal)
   Importance: Undecided => High

** Changed in: linux-gcp (Ubuntu Jammy)
   Importance: Undecided => High

** Changed in: linux-gcp (Ubuntu Focal)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

** Changed in: linux-gcp (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040337

Title:
  Incorrect argument from SEV live-migration fix

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  In Progress
Status in linux-gcp source package in Jammy:
  In Progress

Bug description:
  [Impact]

  * Google requested fix to notify_range_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * Upstream ac3f9c9f1b37 introduced change to
  notify_range_enc_status_changed() to accept page size instead of
  number of pages, but function was not updated. Updating to send
  correct argument.

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00367134

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040337/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040337] Re: Incorrect argument from SEV live-migration fix

2023-10-24 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Google requested fix to notify_range_enc_status_changed() passing
  incorrect argument.
  
  [Fix]
  
- * Upstream ac3f9c9f1b37 introduced change to
- notify_range_enc_status_changed() to accept page size instead of number
- of pages, but function was not updated. Updating to send correct
- argument.
+ * Upstream ac3f9c9f1b37 introduced change to 
notify_range_enc_status_changed() to accept page size instead of number of 
pages, but function was not updated. Updating to send correct argument. 
Upstream implementation changed with TDX
+ support, and is unaffected, so no plans to upstream.
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * Tested by Google
  
  [Where things could go wrong]
  
  * Low chance of regression. Isolated logic fix.
  
  [Other Info]
  
  * SF #00367134

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040337

Title:
  Incorrect argument from SEV live-migration fix

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  In Progress
Status in linux-gcp source package in Jammy:
  In Progress

Bug description:
  [Impact]

  * Google requested fix to notify_range_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * Upstream ac3f9c9f1b37 introduced change to 
notify_range_enc_status_changed() to accept page size instead of number of 
pages, but function was not updated. Updating to send correct argument. 
Upstream implementation changed with TDX
  support, and is unaffected, so no plans to upstream.

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00367134

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040337/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040522] [NEW] gVNIC DQO-QPL feature

2023-10-25 Thread John Cabaj
Public bug reported:

[Impact]

* Google requested inclusion of gVNIC DQO-QPL feature.

[Fix]

* All cherry-picks from upstream

[Test Case]

* Compile tested
* Boot tested
* Tested by Google

[Where things could go wrong]

* Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers. 
* All changes upstream as of v6.6.

[Other Info]

* SF #00366697

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Lunar)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Lunar)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Mantic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040522

Title:
  gVNIC DQO-QPL feature

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Lunar:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Google requested inclusion of gVNIC DQO-QPL feature.

  [Fix]

  * All cherry-picks from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers. 
  * All changes upstream as of v6.6.

  [Other Info]

  * SF #00366697

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040522/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039191] Re: Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization

2023-10-27 Thread John Cabaj
Verified to boot successfully. 32-bit machines otherwise not used on
GCP, anyway.

** Tags removed: verification-needed-mantic-linux-gcp
** Tags added: verification-done-mantic-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039191

Title:
  Kernel oops on 32-0bit kernels due to x86_cache_alignment
  initialization

Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-gcp package in Ubuntu:
  Fix Committed
Status in linux-aws source package in Lunar:
  Triaged
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-aws source package in Mantic:
  In Progress
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from

git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar

  [Fix]

  * Clean cherry pick from linux-next, commit 3e3255265291

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, isolated fix slightly modifying when value becomes
available.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2039191/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040337] Re: Incorrect argument from SEV live-migration fix

2023-10-27 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040337

Title:
  Incorrect argument from SEV live-migration fix

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  Fix Committed
Status in linux-gcp source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

  * Google requested fix to notify_range_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * Upstream ac3f9c9f1b37 introduced change to 
notify_range_enc_status_changed() to accept page size instead of number of 
pages, but function was not updated. Updating to send correct argument. 
Upstream implementation changed with TDX
  support, and is unaffected, so no plans to upstream.

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00367134

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040337/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2003374] Re: Undefined Behavior Sanitizer (UBSAN) causes failure to match symbols

2023-03-09 Thread John Cabaj
Adding Jammy package to affected so UBSAN can be re-enabled once kpatch
is patched.

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu Kinetic)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2003374

Title:
  Undefined Behavior Sanitizer (UBSAN) causes failure to match symbols

Status in dh-kpatches:
  Unknown
Status in Ubuntu on IBM z Systems:
  In Progress
Status in kpatch package in Ubuntu:
  In Progress
Status in linux package in Ubuntu:
  New
Status in kpatch source package in Jammy:
  In Progress
Status in linux source package in Jammy:
  New
Status in kpatch source package in Kinetic:
  New

Bug description:
  [ Impact ]

   * When UBSAN is enabled in an s390x kernel configuration, kpatch-
  build can fail to find matching symbols in the vmlinux symbol table
  (see attached example_livepatch.patch). This was discovered in both
  Jammy 5.15 and Kinetic 5.19 kernels, where UBSAN was first enabled
  (releases up to Focal did not enable UBSAN). See attached kpatch-build
  console output (output.log) and kpatch-build log (build.log).

  * Disabling UBAAN in s390x kernel configurations resolved the issue
  for both Jammy 5.15 and Kinetic 5.19. Possibly this could be fixed in
  kpatch/kpatch-build to continue to enable UBSAN while still allowing
  Livepatch functionality.

  [ Test Plan ]

   * Use kpatch-build testcases to build and load a fs/proc/meminfo.c
  Livepatch on s390x kernel (see attached example_livepatch.patch). This
  should be successful.

  [ Where problems could occur ]

   * A fix in kpatch/kpatch-build to properly handle UBSAN objects
  shouldn't yield any regressions. If UBSAN is disabled to ultimately
  get past this issue, it could lead to undefined behavior not being
  caught.

To manage notifications about this bug go to:
https://bugs.launchpad.net/dh-kpatches/+bug/2003374/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1639924] Re: Kernel livepatch support for for s390x

2023-03-30 Thread John Cabaj
Additional required patch was identified
(https://github.com/dynup/kpatch/commit/324a43714b1227b5688e22966a5ee4414c8861d1)
due to ftrace graph livepatch transition issue
(https://github.com/SUSE/qa_test_klp/issues/17).

Patch submitted and tested - pending mailing list review.

** Bug watch added: github.com/SUSE/qa_test_klp/issues #17
   https://github.com/SUSE/qa_test_klp/issues/17

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1639924

Title:
  Kernel livepatch support for for s390x

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in gcc-11 package in Ubuntu:
  Fix Released
Status in kpatch package in Ubuntu:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in gcc-11 source package in Jammy:
  Fix Released
Status in kpatch source package in Jammy:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in gcc-11 source package in Kinetic:
  Fix Released
Status in kpatch source package in Kinetic:
  Invalid
Status in linux source package in Kinetic:
  Fix Released

Bug description:
  [ Impact ]

   * kpatch upstream has gained support for more architectures which we
  would like to enable on LTS release. Since building livepatches using
  the kpatch tooling makes the most sense on LTS kernels.

   * This SRU is to enable s390x builds of kpatch on kinetic & jammy.

   * Separately linux kernel patches for s390x will also be backported
  to the GA kernel, whilst hwe-5.19 kernel already has all bugfixes to
  support livepatches.

  [ Test Plan ]

   * Attempt to run and load sample integration livepatches from the
  kpatch integration source code, against v5.15 & v5.19 kernels. These
  should succeed on:

   - amd64 jammy v5.15
   - amd64 & s390x jammy v5.19
   - amd64 & s390x kinetic v5.19

  [ Where problems could occur ]

   * The newly generated livepatches produced by this kpatch may have
  different content (more or less sections/sybmols/relocations/etc), but
  remain compatible with all prior kernels and tool-chains.

   * This is a fairly large upstream update to the tooling.

   * One command line option to kpatch-build is no longer supported
  '-e', instead long form command line option must be used '--oot-
  module'. And '--ott-module-src' becomes mandatory in such cases,
  previously '--sourcedire' was required.

  Additional command line options added '--oot-module-src, -R|--non-
  replace'.

  '--skip-gcc-check' is still supported but prints warnings, it is
  deprecated in favour of '--skip-compiler-check'.

  kpatch-cc utility is added, which is a toolchain wrapper.

  Thus adjustments might be needed to scripts used to invoke and create
  kpatch modules.

   * Majority of non-test/non-doc changes are to do with:
     - add support for s390x and 32bit powerpc
     - add support for newer kernels and compilers (support & bugfixes to 
various sections and symbols)
     - more strict checking and bugfixes w.r.t. livepatch generation
     - refactoring and better build support for cross-compiled modules, 
compilation for various linux distributions, and code cleanups.

  * Some of the fixes from these new upstream releases have already been
  cherry-picked in the kpatch, but others might soon be needed on x84,
  i.e. to support gcc-12 built kernels.

  $ git log  --no-merges  --oneline v0.8.0..v0.9.7 -- kmod/ kpatch-
  build/ > shortlog.txt

  d46fea98ef kpatch-build: strengthen conditions for changed sections
  9fac261ed0 kpatch-build: rela section could disappear after patched
  fe45029b4d kpatch-build: fix KBUILD_MODNAME for OOT modules
  8cc0fedefb kpatch-build: use err.h instead of error.h for musl support
  07433e98c0 kpatch-cc: fix stripping of source tree prefix
  33368a88cd create-diff-object: add support for .return_sites section (x86)
  e921c557f9 macros: tweak syscall patching macros
  a1171b112e create-diff-object: Create missing section symbol
  0308d52bcd kpatch/s390: Enable kpatch build support
  b0330ab18e kpatch/s390: Add additional bundled symbols.
  eb4a85f778 kpatch/s390: Add exclusion lists
  f0d00a9290 kpatch/s390: Add initial support for kpatch
  10002f5aa6 kpatch/s390: Add gcc prerequisite flags for kpatch
  c6d0b5450b lookup: fix symtab parsing
  52863dace0 create-diff-object: fix endianness in 
kpatch_no_sibling_calls_ppc64le()
  017015a725 create-diff-object: make kpatch_check_relocations() more precise
  f0e3da336c create-diff-object: fix string extraction
  86d5208b46 create-diff-object: error on symbol conversion failure
  325bccd89d create-diff-object: skip conversion for sections which never have 
symbols
  8508abd3b1 create-diff-object: allow converstion of empty symbols
  8d5a628bde create-diff-object: add extra check for symbol conversion edge case
  01427d50a1 create-diff-object: move addend math to a new function
  bec6488af6 create-diff-object: add rela_insn() error check
  6b1895a6b7 create-diff-obj

[Kernel-packages] [Bug 2013603] [NEW] Kernel livepatch ftrace graph fix

2023-03-31 Thread John Cabaj
Public bug reported:

[Impact]
* Additional patch required to support Livepatch for s390x
* Fixes Livepatch transition issues when using ftrace graph tracing

[Test Case]
* Compile test
* Boot test
* Test a Livepatch (patch to /proc/meminfo module)
* Test Livepatch from ftrace graphed function (via 
https://github.com/SUSE/qa_test_klp/, klp_tc_10.sh)

[Where things could go wrong]
* Functionality already exists upstream, once kernel is boot and Livepatch 
tested - should have no regressions

[Other info]
* Additional required patch was identified 
(https://github.com/dynup/kpatch/commit/324a43714b1227b5688e22966a5ee4414c8861d1)
 due to ftrace graph livepatch transition issue 
(https://github.com/SUSE/qa_test_klp/issues/17).

** Affects: ubuntu-z-systems
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: In Progress

** Affects: linux (Ubuntu Jammy)
 Importance: Undecided
 Status: In Progress

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2013603

Title:
  Kernel livepatch ftrace graph fix

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Jammy:
  In Progress

Bug description:
  [Impact]
  * Additional patch required to support Livepatch for s390x
  * Fixes Livepatch transition issues when using ftrace graph tracing

  [Test Case]
  * Compile test
  * Boot test
  * Test a Livepatch (patch to /proc/meminfo module)
  * Test Livepatch from ftrace graphed function (via 
https://github.com/SUSE/qa_test_klp/, klp_tc_10.sh)

  [Where things could go wrong]
  * Functionality already exists upstream, once kernel is boot and Livepatch 
tested - should have no regressions

  [Other info]
  * Additional required patch was identified 
(https://github.com/dynup/kpatch/commit/324a43714b1227b5688e22966a5ee4414c8861d1)
 due to ftrace graph livepatch transition issue 
(https://github.com/SUSE/qa_test_klp/issues/17).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2013603/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2015097] [NEW] Kernel crash during Mellanox performance testing

2023-04-03 Thread John Cabaj
Public bug reported:

[Impact]

* When performance testing using Mellanox driver, an early decrement
within an if condition rather than as a result of an if condition is
causing null pointer crashes.

[Fix]

* Clean cherry-pick from upstream
(https://lore.kernel.org/netdev/20220503044209.622171-10-sae...@nvidia.com/)

[Test Case]

* Compile test
* Boot test
* Performance test

[Where things could go wrong]

* Regression risk is low, localized fix, purely fixes incorrect logic

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: In Progress

** Affects: linux (Ubuntu Jammy)
 Importance: Undecided
 Assignee: John Cabaj (john-cabaj)
 Status: In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2015097

Title:
  Kernel crash during Mellanox performance testing

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Jammy:
  In Progress

Bug description:
  [Impact]

  * When performance testing using Mellanox driver, an early decrement
  within an if condition rather than as a result of an if condition is
  causing null pointer crashes.

  [Fix]

  * Clean cherry-pick from upstream
  (https://lore.kernel.org/netdev/20220503044209.622171-10-sae...@nvidia.com/)

  [Test Case]

  * Compile test
  * Boot test
  * Performance test

  [Where things could go wrong]

  * Regression risk is low, localized fix, purely fixes incorrect logic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2015097/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2015097] Re: Kernel crash during Mellanox performance testing

2023-04-03 Thread John Cabaj
** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux (Ubuntu)
   Status: Incomplete => In Progress

** Changed in: linux (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

** Description changed:

  [Impact]
  
  * When performance testing using Mellanox driver, an early decrement
  within an if condition rather than as a result of an if condition is
  causing null pointer crashes.
  
  [Fix]
  
  * Clean cherry-pick from upstream
  (https://lore.kernel.org/netdev/20220503044209.622171-10-sae...@nvidia.com/)
  
  [Test Case]
  
  * Compile test
  * Boot test
- * IBM performance test
+ * Performance test
  
  [Where things could go wrong]
  
  * Regression risk is low, localized fix, purely fixes incorrect logic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2015097

Title:
  Kernel crash during Mellanox performance testing

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Jammy:
  In Progress

Bug description:
  [Impact]

  * When performance testing using Mellanox driver, an early decrement
  within an if condition rather than as a result of an if condition is
  causing null pointer crashes.

  [Fix]

  * Clean cherry-pick from upstream
  (https://lore.kernel.org/netdev/20220503044209.622171-10-sae...@nvidia.com/)

  [Test Case]

  * Compile test
  * Boot test
  * Performance test

  [Where things could go wrong]

  * Regression risk is low, localized fix, purely fixes incorrect logic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2015097/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2013603] Re: Kernel livepatch ftrace graph fix

2023-04-03 Thread John Cabaj
** Changed in: linux (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2013603

Title:
  Kernel livepatch ftrace graph fix

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress

Bug description:
  [Impact]
  * Additional patch required to support Livepatch for s390x
  * Fixes Livepatch transition issues when using ftrace graph tracing

  [Test Case]
  * Compile test
  * Boot test
  * Test a Livepatch (patch to /proc/meminfo module)
  * Test Livepatch from ftrace graphed function (via 
https://github.com/SUSE/qa_test_klp/, klp_tc_10.sh)

  [Where things could go wrong]
  * Functionality already exists upstream, once kernel is boot and Livepatch 
tested - should have no regressions

  [Other info]
  * Additional required patch was identified 
(https://github.com/dynup/kpatch/commit/324a43714b1227b5688e22966a5ee4414c8861d1)
 due to ftrace graph livepatch transition issue 
(https://github.com/SUSE/qa_test_klp/issues/17).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2013603/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2035163] Re: Avoid address overwrite in kernel_connect

2023-09-19 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Focal)
   Status: New => Fix Committed

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => Fix Committed

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: New => Fix Committed

** Changed in: linux-gke (Ubuntu Jammy)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2035163

Title:
  Avoid address overwrite in kernel_connect

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gke package in Ubuntu:
  Invalid
Status in linux-gcp source package in Focal:
  Fix Committed
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gke source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Mantic:
  New

Bug description:
  This fix is requested to resolve an issue with NFS-backed mounts when
  used with BPF-load-balancing:

  https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-
  next.git/commit/?id=0bdf399342c5

  
  Testing:
   - GCP has confirmed the fix works before proposing it upstream. I have 
verified basic network sanity with fix applied.

  
  Regression potenial:
   - The fix modifies kernel_connect() which can have an effect on all kinds of 
network connections. The change itself is very minor though and simply converts 
a pass-by-reference to a pass-by-value - so the risk is considered minimal.

  More information at:
  https://canonical.lightning.force.com/lightning/r/Case/5008e0HNldDAAT/view

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2035163/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2034894] Re: Fix requested for SEV live-migration

2023-09-19 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2034894

Title:
  Fix requested for SEV live-migration

Status in linux-gcp package in Ubuntu:
  Fix Committed
Status in linux-gcp source package in Focal:
  Fix Committed
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  The following upstream fix is requested to resolve issues with SEV
  live-migration:

  
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=ac3f9c9f1b37edaa7d1a9b908bc79d843955a1a2

  More details in:

  https://canonical.lightning.force.com/lightning/r/Case/5008e0HNdQ8AAL/view

  Testing:
   - Boot-tested each of f/gcp, j/gcp and l/gcp
   - GCP has tested each of them as well and reported that the live-migration 
issue under SEV gets resolved.


  Regression potential:
   - The change affects arch/x86/kernel/kvm.c so KVM on x86 can be impacted. It 
is a minimalistic change though, and regression risk is considered low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2034894/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2037087] [NEW] TCPDirect patches

2023-09-22 Thread John Cabaj
Public bug reported:

[Impact]

* Include patches to enable TCPDirect. This is considered a v1 implementation 
while Google works to
  upsteam a v2 implementation, hence the "UBUNTU: SAUCE: (no-up)" 
classification.

[Fix]

d1016eee0b1a ("UBUNTU: SAUCE: (no-up) UPSTREAM: tcp: derive delack_max from 
rto_min")
10364f0d83ee ("UBUNTU: SAUCE: (no-up) gve: Add retry logic for recoverable 
adminq errors")
403fb6f43a7c ("UBUNTU: SAUCE: (no-up) tcp: defer regular ACK while processing 
socket backlog")
be97d51d24da ("UBUNTU: SAUCE: (no-up) gve: Enable header-split without 
gve_close/gve_open")
499a0ec31c74 ("UBUNTU: SAUCE: (no-up) gve: fix rx issues for skb free and 
append frags")
89b4d1e69fac ("UBUNTU: SAUCE: (no-up) net: fix silent put_cmsg() failures")
d025ece61dab ("UBUNTU: SAUCE: (no-up) tcp: get rid of sysctl_tcp_adv_win_scale")
d1380ff2f4e3 ("UBUNTU: SAUCE: (no-up) gve: Add tx watchdog to avoid race 
condition on miss path")
a4bc2e0cd1a3 ("UBUNTU: SAUCE: (no-up) net-tcp_5k_mtu: force wscale >= 12 for 
active flows")
bbe85e8e856c ("UBUNTU: SAUCE: (no-up) net-tcp_5k_mtu: force wscale >= 12 for 4K 
MTU TCP flows")
7d5f15f733e8 ("UBUNTU: SAUCE: (no-up) dma-buf: fix int overflow")
22668842a913 ("UBUNTU: SAUCE: (no-up) gve: add flow steering and rss reset when 
teardown device resources")
18e66e5d9ac4 ("UBUNTU: SAUCE: (no-up) net: create skb_frags_not_readable() 
helper")
5d81162de488 ("UBUNTU: SAUCE: (no-up) net: add missing skb->devmem checks")
cf0bcfdf9f87 ("UBUNTU: SAUCE: (no-up) net: remove devmem check from 
__pskb_copy_fclone()")
9ca03b5c36c7 ("UBUNTU: SAUCE: (no-up) net: allow tcp coallapsing and 
coallescing for devmem skbs")
030aef8b0fd2 ("UBUNTU: SAUCE: (no-up) net: skb_store_bits() should succeed on 
devmem header")
6aaf939fb49e ("UBUNTU: SAUCE: (no-up) net: fix skb_split unnecessarily setting 
skb->devmem")
51e12a8201a1 ("UBUNTU: SAUCE: (no-up) net: skb_copy_bits() should be able to 
copy devmem header")
ea8a78e040f5 ("UBUNTU: SAUCE: (no-up) net: fix memory leaks due to skb->devmem 
checks")
1fcd891606c0 ("UBUNTU: SAUCE: (no-up) net: fix snaplen for devmem packets")
e4a4e05f4831 ("UBUNTU: SAUCE: (no-up) net: keep track and avoid access of skb 
containing dma-buf pages.")
424871c3c564 ("UBUNTU: SAUCE: (no-up) gve: implement device memory socket data 
path")
4f8668ee4cdb ("UBUNTU: SAUCE: (no-up) gve: implement devmem socket stats")
abe1772b0e39 ("UBUNTU: SAUCE: (no-up) gve: add rss support")
c08a1adb6130 ("UBUNTU: SAUCE: (no-up) gve: add flow steering support")
ffa842923ad6 ("UBUNTU: SAUCE: (no-up) gve: Add header split support")
940527385c4c ("UBUNTU: SAUCE: (no-up) lakitu config: enable TCP Direct configs")
ebfa162318f8 ("UBUNTU: SAUCE: (no-up) tcp, cos-only: revert changes to 
skb_zerocopy_iter_stream")
b87d0b0e659a ("UBUNTU: SAUCE: (no-up) tcp: let sendmsg() take file descriptors 
via cmsg to enable devmem Tx")
1d523c425a8c ("UBUNTU: SAUCE: (no-up) net: add SO_DEVMEM_DONTNEED setsockopt to 
release pages")
3e34b0936884 ("UBUNTU: SAUCE: (no-up) net: backport fixes to devmem TCP rx")
446d7a742177 ("UBUNTU: SAUCE: (no-up) tcp: implement RX path for devmem 
sockets")
109f2e3feb98 ("UBUNTU: SAUCE: (no-up) net: use get_file_rcu() instead of 
get_file for __netdev_rxq_alloc_page_from_dmabuf_pool")
0d5117d4ea53 ("UBUNTU: SAUCE: (no-up) net: add netdev_rxq_alloc_page and 
skb->devmem")
d0d273544148 ("UBUNTU: SAUCE: (no-up) dmabuf: add ioctl that binds dmabuf 
pagepool to a netdevice")
05c81288f77b ("UBUNTU: SAUCE: (no-up) dma-buf: fix int overflow in addr 
calculation")
46366a3326d9 ("UBUNTU: SAUCE: (no-up) dma-buf: create struct pages backing a 
dma-bu")

[Test Case]

* Compile tested
* Boot tested
* Ran ubuntu_kernel_selftests and ubuntu_performance_stress_ng test suites
* Tested by Google

[Other Info]

* Bulk of patchset came from 
https://cos.googlesource.com/third_party/kernel/+log/refs/heads/tcpd/R105,
  but some backports were given in SalesForce case below.
* SF: #00359122

[Where things could go wrong]

* Most changes target Google gve driver specifically.
* Some required updates to dma and network implementation to enable new API.
* Could lead to DMA or network instabilities

** Affects: linux-gcp-5.15 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp-5.15 (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp-5.15 (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/2037087

Title:
  TCPDirect patches

Status in linux-gcp-5.15 package in Ubuntu:
  New
Status in linux-gcp-5.15 source package in Focal:
  New

Bug description:
  [Impact]

  * Include patches to enable TCPDirect. This is considered a v1 implementation 
while Google works to
upsteam a v2 implementation, hence the "UBUNTU: SAUCE: (no-up)" 
classification.

  [Fix]

  d1016eee0b1a ("UBUNTU: SAUCE: 

[Kernel-packages] [Bug 2037316] [NEW] SEV_SNP failure to init

2023-09-25 Thread John Cabaj
Public bug reported:

[Impact]

* Kernel fails to boot on SEV-SNP instances when compiled with GCC
12.3.0

[Fix]

*
https://lore.kernel.org/lkml/20230912002703.3924521-1-acdun...@google.com/

[Test Case]

* Compile tested
* Boot tested
* Tested by Google

[Where things could go wrong]

* Patches relatively isolated and maintain similar checking
functionality, just earlier in boot. Likely a low chance of regression.

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Lunar)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Lunar)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Mantic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2037316

Title:
  SEV_SNP failure to init

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Lunar:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Kernel fails to boot on SEV-SNP instances when compiled with GCC
  12.3.0

  [Fix]

  *
  https://lore.kernel.org/lkml/20230912002703.3924521-1-acdun...@google.com/

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Patches relatively isolated and maintain similar checking
  functionality, just earlier in boot. Likely a low chance of
  regression.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2037316/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2037316] Re: SEV_SNP failure to init

2023-09-25 Thread John Cabaj
Patches submitted to mantic:linux-gcp and lunar:linux-gcp for 2023.10.02
SRU cycle. jammy:linux-gcp-6.2 will get changes from lunar:linux-gcp
during aforementioned SRU cycle.

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => Fix Committed

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: New => Fix Committed

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2037316

Title:
  SEV_SNP failure to init

Status in linux-gcp package in Ubuntu:
  Fix Committed
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Kernel fails to boot on SEV-SNP instances when compiled with GCC
  12.3.0

  [Fix]

  *
  https://lore.kernel.org/lkml/20230912002703.3924521-1-acdun...@google.com/

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Patches relatively isolated and maintain similar checking
  functionality, just earlier in boot. Likely a low chance of
  regression.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2037316/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2035163] Re: Avoid address overwrite in kernel_connect

2023-10-02 Thread John Cabaj
Fix was tested by Google, and the relevant patch is in all releases of
linux-gcp and linux-gke affected.

** Changed in: linux-gcp (Ubuntu Focal)
   Status: Fix Committed => Fix Released

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: Fix Committed => Fix Released

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: Fix Committed => Fix Released

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: New => Fix Released

** Changed in: linux-gke (Ubuntu Jammy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2035163

Title:
  Avoid address overwrite in kernel_connect

Status in linux package in Ubuntu:
  Invalid
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-gke package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed
Status in linux-gcp source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Jammy:
  Fix Released
Status in linux-gke source package in Jammy:
  Fix Released
Status in linux source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Released
Status in linux-gcp source package in Mantic:
  Fix Released

Bug description:
  This fix is requested to resolve an issue with NFS-backed mounts when
  used with BPF-load-balancing:

  https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-
  next.git/commit/?id=0bdf399342c5

  
  Testing:
   - GCP has confirmed the fix works before proposing it upstream. I have 
verified basic network sanity with fix applied.

  
  Regression potenial:
   - The fix modifies kernel_connect() which can have an effect on all kinds of 
network connections. The change itself is very minor though and simply converts 
a pass-by-reference to a pass-by-value - so the risk is considered minimal.

  More information at:
  https://canonical.lightning.force.com/lightning/r/Case/5008e0HNldDAAT/view

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2035163/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2034894] Re: Fix requested for SEV live-migration

2023-10-02 Thread John Cabaj
Fix was tested by Google, and the relevant patch is in all releases of
linux-gcp affected.

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: Fix Committed => Fix Released

** Changed in: linux-gcp (Ubuntu Focal)
   Status: Fix Committed => Fix Released

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: Fix Committed => Fix Released

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2034894

Title:
  Fix requested for SEV live-migration

Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-gcp source package in Focal:
  Fix Released
Status in linux-gcp source package in Jammy:
  Fix Released
Status in linux-gcp source package in Lunar:
  Fix Released
Status in linux-gcp source package in Mantic:
  Fix Released

Bug description:
  The following upstream fix is requested to resolve issues with SEV
  live-migration:

  
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=ac3f9c9f1b37edaa7d1a9b908bc79d843955a1a2

  More details in:

  https://canonical.lightning.force.com/lightning/r/Case/5008e0HNdQ8AAL/view

  Testing:
   - Boot-tested each of f/gcp, j/gcp and l/gcp
   - GCP has tested each of them as well and reported that the live-migration 
issue under SEV gets resolved.


  Regression potential:
   - The change affects arch/x86/kernel/kvm.c so KVM on x86 can be impacted. It 
is a minimalistic change though, and regression risk is considered low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2034894/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2015097] Re: Kernel crash during Mellanox performance testing

2023-05-10 Thread John Cabaj
Tested with 5.15.0-72.79:

[ Test Case ]
* Boot testing passed
* IBM tested functionality indirectly through derivative IBM kernel that got 
same patch


** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2015097

Title:
  Kernel crash during Mellanox performance testing

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

  * When performance testing using Mellanox driver, an early decrement
  within an if condition rather than as a result of an if condition is
  causing null pointer crashes.

  [Fix]

  * Clean cherry-pick from upstream 
(https://lore.kernel.org/netdev/20220503044209.622171-10-sae...@nvidia.com/)
  * Change landed v5.19 upstream, Kinetic onward not affected

  [Test Case]

  * Compile test
  * Boot test
  * Performance test

  [Where things could go wrong]

  * Regression risk is low, localized fix, purely fixes incorrect logic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2015097/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040522] Re: gVNIC DQO-QPL feature

2024-01-12 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Focal)
   Status: New => Won't Fix

** Changed in: linux-gcp (Ubuntu Lunar)
   Status: New => Won't Fix

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: New => In Progress

** Description changed:

  [Impact]
  
  * Google requested inclusion of gVNIC DQO-QPL feature.
  
  [Fix]
  
  * All cherry-picks from upstream
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * Tested by Google
  
  [Where things could go wrong]
  
- * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers. 
+ * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers.
  * All changes upstream as of v6.6.
  
  [Other Info]
  
  * SF #00366697

** Description changed:

  [Impact]
  
  * Google requested inclusion of gVNIC DQO-QPL feature.
  
  [Fix]
  
- * All cherry-picks from upstream
+ * Mantic: all clean cherry-picks from upstream
+ * Jammy: 22 clean cherry-picks, 8 backports from upstream
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * Tested by Google
  
  [Where things could go wrong]
  
  * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers.
  * All changes upstream as of v6.6.
  
  [Other Info]
  
  * SF #00366697

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040522

Title:
  gVNIC DQO-QPL feature

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  Won't Fix
Status in linux-gcp source package in Jammy:
  In Progress
Status in linux-gcp source package in Lunar:
  Won't Fix
Status in linux-gcp source package in Mantic:
  In Progress

Bug description:
  [Impact]

  * Google requested inclusion of gVNIC DQO-QPL feature.

  [Fix]

  * Mantic: all clean cherry-picks from upstream
  * Jammy: 22 clean cherry-picks, 8 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers.
  * All changes upstream as of v6.6.

  [Other Info]

  * SF #00366697

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040522/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040522] Re: gVNIC DQO-QPL feature

2024-01-12 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

** Changed in: linux-gcp (Ubuntu Mantic)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040522

Title:
  gVNIC DQO-QPL feature

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  Won't Fix
Status in linux-gcp source package in Jammy:
  In Progress
Status in linux-gcp source package in Lunar:
  Won't Fix
Status in linux-gcp source package in Mantic:
  In Progress

Bug description:
  [Impact]

  * Google requested inclusion of gVNIC DQO-QPL feature.

  [Fix]

  * Mantic: all clean cherry-picks from upstream
  * Jammy: 22 clean cherry-picks, 8 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers.
  * All changes upstream as of v6.6.

  [Other Info]

  * SF #00366697

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040522/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039720] Re: Intel IDPF support

2024-01-18 Thread John Cabaj
** No longer affects: linux-gcp (Ubuntu Focal)

** No longer affects: linux-gcp (Ubuntu Lunar)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039720

Title:
  Intel IDPF support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Request from Google to include new Intel IDPF driver support

  [Fix]

  * Cherry pick commits from net-next,
  b6a7eeb44a6a8b1ea2dea78b5de448d86eb0bd96

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, new driver is isolated and will be tested
  by Google

  [Other Info]

  * SF #00368902

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039720/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039720] Re: Intel IDPF support

2024-01-18 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Request from Google to include new Intel IDPF driver support
  
  [Fix]
  
- * Cherry pick commits from net-next,
- b6a7eeb44a6a8b1ea2dea78b5de448d86eb0bd96
+ * Mantic - 24 clean cherry-picks, 1 backport from upstream
+ * Jammy - 11 clean cherry-picks, 7 backports from upstream
  
  [Test Case]
  
  * Compile tested
  * Boot tested
- * To be tested by Google
+ * Tested internally and by Google using neper 
(https://github.com/google/neper)
+ * Networking is functional and throughput is as expected
  
  [Where things could go wrong]
  
- * Low chance of regression, new driver is isolated and will be tested by
- Google
+ * Low chance of regression, changes have been upstream since 6.6 kernel
+ * Bulk of changes in IDPF driver
+ * Other changes to network drivers largely adding #include directives
  
  [Other Info]
  
  * SF #00368902

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039720

Title:
  Intel IDPF support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  New
Status in linux-gcp source package in Mantic:
  New

Bug description:
  [Impact]

  * Request from Google to include new Intel IDPF driver support

  [Fix]

  * Mantic - 24 clean cherry-picks, 1 backport from upstream
  * Jammy - 11 clean cherry-picks, 7 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested internally and by Google using neper 
(https://github.com/google/neper)
  * Networking is functional and throughput is as expected

  [Where things could go wrong]

  * Low chance of regression, changes have been upstream since 6.6 kernel
  * Bulk of changes in IDPF driver
  * Other changes to network drivers largely adding #include directives

  [Other Info]

  * SF #00368902

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039720/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039720] Re: Intel IDPF support

2024-01-18 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

** Changed in: linux-gcp (Ubuntu Mantic)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039720

Title:
  Intel IDPF support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  In Progress
Status in linux-gcp source package in Mantic:
  In Progress

Bug description:
  [Impact]

  * Request from Google to include new Intel IDPF driver support

  [Fix]

  * Mantic - 24 clean cherry-picks, 1 backport from upstream
  * Jammy - 11 clean cherry-picks, 7 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested internally and by Google using neper 
(https://github.com/google/neper)
  * Networking is functional and throughput is as expected

  [Where things could go wrong]

  * Low chance of regression, changes have been upstream since 6.6 kernel
  * Bulk of changes in IDPF driver
  * Other changes to network drivers largely adding #include directives

  [Other Info]

  * SF #00368902

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039720/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2049922] [NEW] PCI ATS quirk patch needed for IDPF

2024-01-19 Thread John Cabaj
Public bug reported:

[Impact]

* Request from Google to include Intel patches for IDPF support if used from 
out-of-tree module to
  prevent system instability

[Fix]

* Upstream
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v6.7&id=a18615b1cfc04f00548c60eb9a77e0ce56e848fd

[Test Case]

* Compile test
* Boot test
* Test on non-IDPF instance

[Where things could go wrong]

* Low chance of regression, changes very isolated

[Other Info]

* SF #00376470

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2049922

Title:
  PCI ATS quirk patch needed for IDPF

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Bionic:
  New
Status in linux-gcp source package in Focal:
  New

Bug description:
  [Impact]

  * Request from Google to include Intel patches for IDPF support if used from 
out-of-tree module to
prevent system instability

  [Fix]

  * Upstream
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v6.7&id=a18615b1cfc04f00548c60eb9a77e0ce56e848fd

  [Test Case]

  * Compile test
  * Boot test
  * Test on non-IDPF instance

  [Where things could go wrong]

  * Low chance of regression, changes very isolated

  [Other Info]

  * SF #00376470

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2049922/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040522] Re: gVNIC DQO-QPL feature

2024-01-24 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040522

Title:
  gVNIC DQO-QPL feature

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  Won't Fix
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Won't Fix
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Google requested inclusion of gVNIC DQO-QPL feature.

  [Fix]

  * Mantic: all clean cherry-picks from upstream
  * Jammy: 22 clean cherry-picks, 8 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers.
  * All changes upstream as of v6.6.

  [Other Info]

  * SF #00366697

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040522/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039720] Re: Intel IDPF support

2024-01-24 Thread John Cabaj
** Changed in: linux-gcp (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Mantic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039720

Title:
  Intel IDPF support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Request from Google to include new Intel IDPF driver support

  [Fix]

  * Mantic - 24 clean cherry-picks, 1 backport from upstream
  * Jammy - 11 clean cherry-picks, 7 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested internally and by Google using neper 
(https://github.com/google/neper)
  * Networking is functional and throughput is as expected

  [Where things could go wrong]

  * Low chance of regression, changes have been upstream since 6.6 kernel
  * Bulk of changes in IDPF driver
  * Other changes to network drivers largely adding #include directives

  [Other Info]

  * SF #00368902

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039720/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2046184] Re: [arm64] Increase max CPU count to 512

2024-02-01 Thread John Cabaj
** Changed in: linux-oracle (Ubuntu Jammy)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/2046184

Title:
  [arm64] Increase max CPU count to 512

Status in linux-oracle package in Ubuntu:
  In Progress
Status in linux-oracle source package in Jammy:
  Fix Released
Status in linux-oracle source package in Mantic:
  Fix Released
Status in linux-oracle source package in Noble:
  In Progress

Bug description:
  [Impact]

  * Request to accommodate new shape with 320 CPUs, greater than current
  max value of 256.

  [Fix]

  * Update CONFIG_NR_CPUS from 256 to 512 for arm64 arch.

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression. Simple config change.

  [Other Info]

  * Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as it's compressed.
  * SF #00375112

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/2046184/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040522] Re: gVNIC DQO-QPL feature

2024-02-02 Thread John Cabaj
Verified by Google as part of SF#00366697.

** Tags removed: verification-needed-jammy-linux-gcp 
verification-needed-mantic-linux-gcp
** Tags added: verification-done-jammy-linux-gcp 
verification-done-mantic-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040522

Title:
  gVNIC DQO-QPL feature

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  Won't Fix
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Won't Fix
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Google requested inclusion of gVNIC DQO-QPL feature.

  [Fix]

  * Mantic: all clean cherry-picks from upstream
  * Jammy: 22 clean cherry-picks, 8 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Almost all changes isolated to Google Ethernet 
drivers.
  * All changes upstream as of v6.6.

  [Other Info]

  * SF #00366697

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040522/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039720] Re: Intel IDPF support

2024-02-02 Thread John Cabaj
Verified by Google as part of SF#00368902 as well as internally on GCE
instance.

** Tags removed: verification-needed-jammy-linux-gcp 
verification-needed-mantic-linux-gcp
** Tags added: verification-done-jammy-linux-gcp 
verification-done-mantic-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039720

Title:
  Intel IDPF support

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Request from Google to include new Intel IDPF driver support

  [Fix]

  * Mantic - 24 clean cherry-picks, 1 backport from upstream
  * Jammy - 11 clean cherry-picks, 7 backports from upstream

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested internally and by Google using neper 
(https://github.com/google/neper)
  * Networking is functional and throughput is as expected

  [Where things could go wrong]

  * Low chance of regression, changes have been upstream since 6.6 kernel
  * Bulk of changes in IDPF driver
  * Other changes to network drivers largely adding #include directives

  [Other Info]

  * SF #00368902

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039720/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2042564] Re: Performance regression in the 5.15 Ubuntu 20.04 kernel compared to 5.4 Ubuntu 20.04 kernel

2023-11-03 Thread John Cabaj
I'm currently bisecting the releases and kernels, using releases between
5.4 and 5.15 on an LXD VM. Releases 5.4 through 5.13 exhibit similar
speeds, with 5.15 showing a drop-off. The numbers aren't quite the same
as above, but that's likely due to setup:

5.4: 744MiB/s average
5.11: 785MiB/s average
5.13: 711MiB/s average
5.15: 602MiB/s average

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2042564

Title:
  Performance regression in the 5.15 Ubuntu 20.04 kernel compared to 5.4
  Ubuntu 20.04 kernel

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  New

Bug description:
  We in the Canonical Public Cloud team have received report from our
  colleagues in Google regarding a potential performance regression with
  the 5.15 kernel vs the 5.4 kernel on ubuntu 20.04. Their test were
  performed using the linux-gkeop and linux-gkeop-5.15 kernels.

  I have verified with the generic Ubuntu 20.04 5.4 linux-generic and
  the Ubuntu 20.04 5.15 linux-generic-hwe-20.04 kernels.

  The tests were run using `fio`

  fio commands:

  * 4k initwrite: `fio --ioengine=libaio --blocksize=4k --readwrite=write 
--filesize=40G --end_fsync=1 --iodepth=128 --direct=1 --group_reporting 
--numjobs=8 --name=fiojob1 --filename=/dev/sdc`
  * 4k overwrite: `fio --ioengine=libaio --blocksize=4k --readwrite=write 
--filesize=40G --end_fsync=1 --iodepth=128 --direct=1 --group_reporting 
--numjobs=8 --name=fiojob1 --filename=/dev/sdc`

  
  My reproducer was to launch an Ubuntu 20.04 cloud image locally with qemu the 
results are below:

  Using 5.4 kernel

  ```
  ubuntu@cloudimg:~$ uname --kernel-release
  5.4.0-164-generic

  ubuntu@cloudimg:~$ sudo fio --ioengine=libaio --blocksize=4k 
--readwrite=write --filesize=40G --end_fsync=1 --iodepth=128 --direct=1 
--group_reporting --numjobs=8 --name=fiojob1 --filename=/dev/sda
  fiojob1: (g=0): rw=write, bs=(R) 4096B-4096B, (W) 4096B-4096B, (T) 
4096B-4096B, ioengine=libaio, iodepth=128
  ...
  fio-3.16
  Starting 8 processes
  Jobs: 8 (f=8): [W(8)][99.6%][w=925MiB/s][w=237k IOPS][eta 00m:01s] 
  fiojob1: (groupid=0, jobs=8): err= 0: pid=2443: Thu Nov  2 09:15:22 2023
write: IOPS=317k, BW=1237MiB/s (1297MB/s)(320GiB/264837msec); 0 zone resets
  slat (nsec): min=628, max=37820k, avg=7207.71, stdev=101058.61
  clat (nsec): min=457, max=56099k, avg=340.45, stdev=1707823.38
   lat (usec): min=23, max=56100, avg=3229.78, stdev=1705.80
  clat percentiles (usec):
   |  1.00th=[  775],  5.00th=[ 1352], 10.00th=[ 1647], 20.00th=[ 2024],
   | 30.00th=[ 2343], 40.00th=[ 2638], 50.00th=[ 2933], 60.00th=[ 3261],
   | 70.00th=[ 3654], 80.00th=[ 4146], 90.00th=[ 5014], 95.00th=[ 5932],
   | 99.00th=[ 8979], 99.50th=[10945], 99.90th=[18220], 99.95th=[22676],
   | 99.99th=[32113]
 bw (  MiB/s): min=  524, max= 1665, per=100.00%, avg=1237.72, stdev=20.42, 
samples=4232
 iops: min=134308, max=426326, avg=316855.16, stdev=5227.36, 
samples=4232
lat (nsec)   : 500=0.01%, 750=0.01%, 1000=0.01%
lat (usec)   : 4=0.01%, 10=0.01%, 20=0.01%, 50=0.01%, 100=0.01%
lat (usec)   : 250=0.05%, 500=0.54%, 750=0.37%, 1000=0.93%
lat (msec)   : 2=17.40%, 4=58.02%, 10=22.01%, 20=0.60%, 50=0.07%
lat (msec)   : 100=0.01%
cpu  : usr=3.29%, sys=7.45%, ctx=1262621, majf=0, minf=103
IO depths: 1=0.1%, 2=0.1%, 4=0.1%, 8=0.1%, 16=0.1%, 32=0.1%, >=64=100.0%
   submit: 0=0.0%, 4=100.0%, 8=0.0%, 16=0.0%, 32=0.0%, 64=0.0%, 
>=64=0.0%
   complete  : 0=0.0%, 4=100.0%, 8=0.0%, 16=0.0%, 32=0.0%, 64=0.0%, 
>=64=0.1%
   issued rwts: total=0,83886080,0,8 short=0,0,0,0 dropped=0,0,0,0
   latency   : target=0, window=0, percentile=100.00%, depth=128

  Run status group 0 (all jobs):
WRITE: bw=1237MiB/s (1297MB/s), 1237MiB/s-1237MiB/s (1297MB/s-1297MB/s), 
io=320GiB (344GB), run=264837-264837msec

  Disk stats (read/write):
sda: ios=36/32868891, merge=0/50979424, ticks=5/27498602, in_queue=1183124, 
util=100.00%
  ```

  
  After upgrading to linux-generic-hwe-20.04 kernel and rebooting

  ```
  ubuntu@cloudimg:~$ uname --kernel-release
  5.15.0-88-generic

  ubuntu@cloudimg:~$ sudo fio --ioengine=libaio --blocksize=4k 
--readwrite=write --filesize=40G --end_fsync=1 --iodepth=128 --direct=1 
--group_reporting --numjobs=8 --name=fiojob1 --filename=/dev/sda
  fiojob1: (g=0): rw=write, bs=(R) 4096B-4096B, (W) 4096B-4096B, (T) 
4096B-4096B, ioengine=libaio, iodepth=128
  ...
  fio-3.16
  Starting 8 processes
  Jobs: 1 (f=1): [_(7),W(1)][100.0%][w=410MiB/s][w=105k IOPS][eta 00m:00s]
  fiojob1: (groupid=0, jobs=8): err= 0: pid=1438: Thu Nov  2 09:46:49 2023
write: IOPS=155k, BW=605MiB/s (634MB/s)(320GiB/541949msec); 0 zone resets
  slat (nsec): min=660, max=325426k, avg=10351.04, stdev=232438.50
  clat (nsec): min=1100, max=782743k, avg=6595008.67, stdev=6290570.04
   lat 

[Kernel-packages] [Bug 2039732] Re: No graphic desktop environment on Google GCP instances

2023-11-15 Thread John Cabaj
Verified all configuration changes are in latest release.

** Tags removed: verification-needed-jammy-linux-gcp 
verification-needed-lunar-linux-gcp verification-needed-mantic-linux-gcp
** Tags added: verification-done-jammy-linux-gcp 
verification-done-lunar-linux-gcp verification-done-mantic-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039732

Title:
  No graphic desktop environment on Google GCP instances

Status in linux-gcp package in Ubuntu:
  In Progress
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Mantic:
  Fix Committed

Bug description:
  [Impact]

  * Google reports not being able to display graphic desktop
  environment.

  [Fix]

  * CONFIG_SYSFB_SIMPLEFB was initially enabled in
  https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=0bf2a2472f71a3001a8a9a0849b6bed7e7069a7b. It was subsequently
  disabled for amd64 in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/jammy/commit/?h=master-
  next&id=40b0ce0833309133453c3dbc19753f62084c0a7a. This was not
  reflected in the GCP kernel config.

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression. Simple config change that was not taken
  from generic.

  [Other Info]

  * SF #00366439

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2039732/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2040337] Re: Incorrect argument from SEV live-migration fix

2023-11-17 Thread John Cabaj
Verified requisite change is in focal and jammy releases. Full suite of
boot test and regression tests will suffice for verification.

** Tags removed: verification-needed-focal-linux-gcp 
verification-needed-jammy-linux-gcp
** Tags added: verification-done-focal-linux-gcp 
verification-done-jammy-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2040337

Title:
  Incorrect argument from SEV live-migration fix

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  Fix Committed
Status in linux-gcp source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

  * Google requested fix to notify_range_enc_status_changed() passing
  incorrect argument.

  [Fix]

  * Upstream ac3f9c9f1b37 introduced change to 
notify_range_enc_status_changed() to accept page size instead of number of 
pages, but function was not updated. Updating to send correct argument. 
Upstream implementation changed with TDX
  support, and is unaffected, so no plans to upstream.

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Low chance of regression. Isolated logic fix.

  [Other Info]

  * SF #00367134

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2040337/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2039191] Re: Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization

2023-11-18 Thread John Cabaj
Verified to boot successfully. 32-bit machines otherwise not used on
GCP, anyway.

** Tags removed: verification-needed-lunar-linux-gcp
** Tags added: verification-done-lunar-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2039191

Title:
  Kernel oops on 32-0bit kernels due to x86_cache_alignment
  initialization

Status in linux-aws package in Ubuntu:
  In Progress
Status in linux-gcp package in Ubuntu:
  Fix Committed
Status in linux-aws source package in Lunar:
  Triaged
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-aws source package in Mantic:
  In Progress
Status in linux-gcp source package in Mantic:
  Fix Released

Bug description:
  [Impact]

  * Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from

git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar

  [Fix]

  * Clean cherry pick from linux-next, commit 3e3255265291

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression, isolated fix slightly modifying when value becomes
available.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2039191/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2044192] [NEW] Patches needed for AmpereOne (arm64)

2023-11-21 Thread John Cabaj
Public bug reported:

[Impact]

* Google requested patches for AmpereOne machine t ype

[Fix]

* Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 5.15 
and Focal 5.4 for now
* Cherry-picks from upstream

0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on CVAL 
programming")
41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the TVAL 
programming interface")
012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer to the 
core code")
8b82c4f883a7 ("clocksource/drivers/arm_arch_timer: Move MMIO timer programming 
over to CVAL")
72f47a3f0ea4 ("clocksource/drivers/arm_arch_timer: Fix MMIO base address vs 
callback ordering issue")
ac9ef4f24cb2 ("clocksource/drivers/arm_arch_timer: Move drop _tval from erratum 
function names")
a38b71b0833e ("clocksource/drivers/arm_arch_timer: Move system register timer 
programming over to CVAL")
1e8d929231cf ("clocksource/drivers/arm_arch_timer: Extend write side of timer 
register accessors to u64")
d72689988d67 ("clocksource/drivers/arm_arch_timer: Drop CNT*_TVAL read 
accessors")
4775bc63f880 ("clocksource/arm_arch_timer: Add build-time guards for unhandled 
register accesses")

[Test Case]

* Compile tested
* Boot tested
* To be tested by Google

[Where things could go wrong]

* Low chance of regression. Changes isolated to to timers.

[Other Info]

* SF #00372821

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: linux-gcp (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Description changed:

  [Impact]
  
  * Google requested patches for AmpereOne machine t ype
  
  [Fix]
  
+ * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 and Focal 5.4 for now
  * Cherry-picks from upstream
  
  0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the 
TVAL programming interface")
  012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
  30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer to 
the core code")
  8b82c4f883a7 ("clocksource/drivers/arm_arch_timer: Move MMIO timer 
programming over to CVAL")
  72f47a3f0ea4 ("clocksource/drivers/arm_arch_timer: Fix MMIO base address vs 
callback ordering issue")
  ac9ef4f24cb2 ("clocksource/drivers/arm_arch_timer: Move drop _tval from 
erratum function names")
  a38b71b0833e ("clocksource/drivers/arm_arch_timer: Move system register timer 
programming over to CVAL")
  1e8d929231cf ("clocksource/drivers/arm_arch_timer: Extend write side of timer 
register accessors to u64")
  d72689988d67 ("clocksource/drivers/arm_arch_timer: Drop CNT*_TVAL read 
accessors")
  4775bc63f880 ("clocksource/arm_arch_timer: Add build-time guards for 
unhandled register accesses")
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * To be tested by Google
  
  [Where things could go wrong]
  
  * Low chance of regression. Changes isolated to to timers.
  
  [Other Info]
  
  * SF #00372821

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2044192

Title:
  Patches needed for AmpereOne (arm64)

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  New
Status in linux-gcp source package in Jammy:
  New

Bug description:
  [Impact]

  * Google requested patches for AmpereOne machine t ype

  [Fix]

  * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 and Focal 5.4 for now
  * Cherry-picks from upstream

  0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_

[Kernel-packages] [Bug 2044192] Re: Patches needed for AmpereOne (arm64)

2023-11-29 Thread John Cabaj
** Description changed:

  [Impact]
  
- * Google requested patches for AmpereOne machine t ype
+ * Google requested patches for AmpereOne machine type
  
  [Fix]
  
  * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 and Focal 5.4 for now
  * Cherry-picks from upstream
  
  0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the 
TVAL programming interface")
  012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
  30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer to 
the core code")
  8b82c4f883a7 ("clocksource/drivers/arm_arch_timer: Move MMIO timer 
programming over to CVAL")
  72f47a3f0ea4 ("clocksource/drivers/arm_arch_timer: Fix MMIO base address vs 
callback ordering issue")
  ac9ef4f24cb2 ("clocksource/drivers/arm_arch_timer: Move drop _tval from 
erratum function names")
  a38b71b0833e ("clocksource/drivers/arm_arch_timer: Move system register timer 
programming over to CVAL")
  1e8d929231cf ("clocksource/drivers/arm_arch_timer: Extend write side of timer 
register accessors to u64")
  d72689988d67 ("clocksource/drivers/arm_arch_timer: Drop CNT*_TVAL read 
accessors")
  4775bc63f880 ("clocksource/arm_arch_timer: Add build-time guards for 
unhandled register accesses")
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * To be tested by Google
  
  [Where things could go wrong]
  
  * Low chance of regression. Changes isolated to to timers.
  
  [Other Info]
  
  * SF #00372821

** Description changed:

  [Impact]
  
  * Google requested patches for AmpereOne machine type
  
  [Fix]
  
  * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 and Focal 5.4 for now
  * Cherry-picks from upstream
  
  0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the 
TVAL programming interface")
  012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
  30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer to 
the core code")
  8b82c4f883a7 ("clocksource/drivers/arm_arch_timer: Move MMIO timer 
programming over to CVAL")
  72f47a3f0ea4 ("clocksource/drivers/arm_arch_timer: Fix MMIO base address vs 
callback ordering issue")
  ac9ef4f24cb2 ("clocksource/drivers/arm_arch_timer: Move drop _tval from 
erratum function names")
  a38b71b0833e ("clocksource/drivers/arm_arch_timer: Move system register timer 
programming over to CVAL")
  1e8d929231cf ("clocksource/drivers/arm_arch_timer: Extend write side of timer 
register accessors to u64")
  d72689988d67 ("clocksource/drivers/arm_arch_timer: Drop CNT*_TVAL read 
accessors")
  4775bc63f880 ("clocksource/arm_arch_timer: Add build-time guards for 
unhandled register accesses")
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  * To be tested by Google
  
  [Where things could go wrong]
  
- * Low chance of regression. Changes isolated to to timers.
+ * Low chance of regression. Changes isolated to ARM timers.
  
  [Other Info]
  
  * SF #00372821

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2044192

Title:
  Patches needed for AmpereOne (arm64)

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Focal:
  New
Status in linux-gcp source package in Jammy:
  New

Bug description:
  [Impact]

  * Google requested patches for AmpereOne machine type

  [Fix]

  * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 and Focal 5.4 for now
  * Cherry-picks from upstream

  0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the 
TVAL programming interface")
  012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
  30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer t

[Kernel-packages] [Bug 2044192] Re: Patches needed for AmpereOne (arm64)

2023-11-30 Thread John Cabaj
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu Focal)

** Changed in: linux-gcp (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
 Assignee: (unassigned) => John Cabaj (john-cabaj)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2044192

Title:
  Patches needed for AmpereOne (arm64)

Status in linux package in Ubuntu:
  New
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-gcp source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  In Progress
Status in linux-gcp source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

  * Google requested patches for AmpereOne machine type

  [Fix]

  * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 and Focal 5.4 for now
  * Cherry-picks from upstream

  0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the 
TVAL programming interface")
  012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
  30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer to 
the core code")
  8b82c4f883a7 ("clocksource/drivers/arm_arch_timer: Move MMIO timer 
programming over to CVAL")
  72f47a3f0ea4 ("clocksource/drivers/arm_arch_timer: Fix MMIO base address vs 
callback ordering issue")
  ac9ef4f24cb2 ("clocksource/drivers/arm_arch_timer: Move drop _tval from 
erratum function names")
  a38b71b0833e ("clocksource/drivers/arm_arch_timer: Move system register timer 
programming over to CVAL")
  1e8d929231cf ("clocksource/drivers/arm_arch_timer: Extend write side of timer 
register accessors to u64")
  d72689988d67 ("clocksource/drivers/arm_arch_timer: Drop CNT*_TVAL read 
accessors")
  4775bc63f880 ("clocksource/arm_arch_timer: Add build-time guards for 
unhandled register accesses")

  [Test Case]

  * Compile tested
  * Boot tested
  * To be tested by Google

  [Where things could go wrong]

  * Low chance of regression. Changes isolated to ARM timers.

  [Other Info]

  * SF #00372821

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2044192/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2044192] Re: Patches needed for AmpereOne (arm64)

2023-11-30 Thread John Cabaj
** Description changed:

  [Impact]
  
  * Google requested patches for AmpereOne machine type
  
  [Fix]
  
- * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 and Focal 5.4 for now
+ * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 GCP and Focal 5.4 GCP for now
+ * Also submitting to Jammy 5.15 generic
  * Cherry-picks from upstream
  
- 0e5d5ae837c8 ("arm64: Add AMPERE1 to the Spectre-BHB affected list")
  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the 
TVAL programming interface")
  012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
  30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer to 
the core code")
  8b82c4f883a7 ("clocksource/drivers/arm_arch_timer: Move MMIO timer 
programming over to CVAL")
  72f47a3f0ea4 ("clocksource/drivers/arm_arch_timer: Fix MMIO base address vs 
callback ordering issue")
  ac9ef4f24cb2 ("clocksource/drivers/arm_arch_timer: Move drop _tval from 
erratum function names")
  a38b71b0833e ("clocksource/drivers/arm_arch_timer: Move system register timer 
programming over to CVAL")
  1e8d929231cf ("clocksource/drivers/arm_arch_timer: Extend write side of timer 
register accessors to u64")
  d72689988d67 ("clocksource/drivers/arm_arch_timer: Drop CNT*_TVAL read 
accessors")
  4775bc63f880 ("clocksource/arm_arch_timer: Add build-time guards for 
unhandled register accesses")
  
  [Test Case]
  
  * Compile tested
- * Boot tested
- * To be tested by Google
+ * Boot tested on GCP AmpereOne instance
  
  [Where things could go wrong]
  
  * Low chance of regression. Changes isolated to ARM timers.
  
  [Other Info]
  
  * SF #00372821

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2044192

Title:
  Patches needed for AmpereOne (arm64)

Status in linux package in Ubuntu:
  New
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-gcp source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  In Progress
Status in linux-gcp source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

  * Google requested patches for AmpereOne machine type

  [Fix]

  * Changes already in Mantic, will be in Jammy 6.5 kernel, targeting Jammy 
5.15 GCP and Focal 5.4 GCP for now
  * Also submitting to Jammy 5.15 generic
  * Cherry-picks from upstream

  db26f8f2da92 ("clocksource/drivers/arch_arm_timer: Move workaround 
synchronisation around")
  c1153d52c414 ("clocksource/drivers/arm_arch_timer: Fix masking for high freq 
counters")
  ec8f7f3342c8 ("clocksource/drivers/arm_arch_timer: Drop unnecessary ISB on 
CVAL programming")
  41f8d02a6a55 ("clocksource/drivers/arm_arch_timer: Remove any trace of the 
TVAL programming interface")
  012f18850452 ("clocksource/drivers/arm_arch_timer: Work around broken CVAL 
implementations")
  30aa08da35e0 ("clocksource/drivers/arm_arch_timer: Advertise 56bit timer to 
the core code")
  8b82c4f883a7 ("clocksource/drivers/arm_arch_timer: Move MMIO timer 
programming over to CVAL")
  72f47a3f0ea4 ("clocksource/drivers/arm_arch_timer: Fix MMIO base address vs 
callback ordering issue")
  ac9ef4f24cb2 ("clocksource/drivers/arm_arch_timer: Move drop _tval from 
erratum function names")
  a38b71b0833e ("clocksource/drivers/arm_arch_timer: Move system register timer 
programming over to CVAL")
  1e8d929231cf ("clocksource/drivers/arm_arch_timer: Extend write side of timer 
register accessors to u64")
  d72689988d67 ("clocksource/drivers/arm_arch_timer: Drop CNT*_TVAL read 
accessors")
  4775bc63f880 ("clocksource/arm_arch_timer: Add build-time guards for 
unhandled register accesses")

  [Test Case]

  * Compile tested
  * Boot tested on GCP AmpereOne instance

  [Where things could go wrong]

  * Low chance of regression. Changes isolated to ARM timers.

  [Other Info]

  * SF #00372821

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2044192/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2046184] [NEW] [arm64] Increase max CPU count to 512

2023-12-11 Thread John Cabaj
Public bug reported:

[Impact]

* Request to accommodate new shape with 320 CPUs, greater than current
max value of 256.

[Fix]

* Update CONFIG_NR_CPUS from 256 to 512 for arm64 arch.

[Test Case]

* Compile tested
* Boot tested

[Where things could go wrong]

* Low chance of regression. Simple config change.

[Other Info]

* Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as it's compressed.
* SF #00375112

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Mantic)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Also affects: linux-oracle (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Description changed:

  [Impact]
  
  * Request to accommodate new shape with 320 CPUs, greater than current
  max value of 256.
  
  [Fix]
  
- * Update CONFIG_NR_CPUS from 256 to 512
+ * Update CONFIG_NR_CPUS from 256 to 512 for arm64 arch.
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  
  [Where things could go wrong]
  
  * Low chance of regression. Simple config change.
  
  [Other Info]
  
  * Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as its compressed.
  * SF #00366439

** Description changed:

  [Impact]
  
  * Request to accommodate new shape with 320 CPUs, greater than current
  max value of 256.
  
  [Fix]
  
  * Update CONFIG_NR_CPUS from 256 to 512 for arm64 arch.
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  
  [Where things could go wrong]
  
  * Low chance of regression. Simple config change.
  
  [Other Info]
  
  * Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as its compressed.
- * SF #00366439
+ * SF #00375112

** Description changed:

  [Impact]
  
  * Request to accommodate new shape with 320 CPUs, greater than current
  max value of 256.
  
  [Fix]
  
  * Update CONFIG_NR_CPUS from 256 to 512 for arm64 arch.
  
  [Test Case]
  
  * Compile tested
  * Boot tested
  
  [Where things could go wrong]
  
  * Low chance of regression. Simple config change.
  
  [Other Info]
  
- * Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as its compressed.
+ * Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as it's compressed.
  * SF #00375112

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/2046184

Title:
  [arm64] Increase max CPU count to 512

Status in linux-oracle package in Ubuntu:
  New
Status in linux-oracle source package in Mantic:
  New
Status in linux-oracle source package in Noble:
  New

Bug description:
  [Impact]

  * Request to accommodate new shape with 320 CPUs, greater than current
  max value of 256.

  [Fix]

  * Update CONFIG_NR_CPUS from 256 to 512 for arm64 arch.

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression. Simple config change.

  [Other Info]

  * Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as it's compressed.
  * SF #00375112

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/2046184/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2046184] Re: [arm64] Increase max CPU count to 512

2023-12-12 Thread John Cabaj
Lunar will be EOL and Jammy now has the 6.5 kernel, so not including
Lunar.

** Also affects: linux-oracle (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux-oracle (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux-oracle (Ubuntu Noble)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/2046184

Title:
  [arm64] Increase max CPU count to 512

Status in linux-oracle package in Ubuntu:
  In Progress
Status in linux-oracle source package in Jammy:
  In Progress
Status in linux-oracle source package in Mantic:
  In Progress
Status in linux-oracle source package in Noble:
  In Progress

Bug description:
  [Impact]

  * Request to accommodate new shape with 320 CPUs, greater than current
  max value of 256.

  [Fix]

  * Update CONFIG_NR_CPUS from 256 to 512 for arm64 arch.

  [Test Case]

  * Compile tested
  * Boot tested

  [Where things could go wrong]

  * Low chance of regression. Simple config change.

  [Other Info]

  * Change proposed in Debian unstable 
(https://salsa.debian.org/kernel-team/linux/-/merge_requests/937?commit_id=8dfba66465dbf4c3c8ef8998065805b852b34e22#fc973071e6f4da49be1ec7a17e00635dd41dcaf1),
 but was denied due to additional kernel size. This shouldn't affect Ubuntu 
kernel so much as it's compressed.
  * SF #00375112

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/2046184/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2076291] Re: kernel panic was caused by a fatal exception due to a null pointer dereference in the iptable_nat module

2024-09-10 Thread John Cabaj
** Tags removed: verification-needed-jammy-linux-azure-6.8
** Tags added: verification-done-jammy-linux-azure-6.8

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2076291

Title:
  kernel panic was caused by a fatal exception due to a null pointer
  dereference in the iptable_nat module

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux-azure source package in Noble:
  Fix Released
Status in linux-azure source package in Oracular:
  Fix Committed

Bug description:
  [Impact]

  * Microsoft has requested a patch to address a kernel panic issue
  similar to the upstream issue here -
  
https://patchwork.kernel.org/project/netdevbpf/patch/20240731213046.6194-2-pa...@netfilter.org/

  [Fix]

  * Clean cherry-pick upstream commit 5830aa863981: "netfilter:
  iptables: Fix null-ptr-deref in iptable_nat_table_init()"

  [Test Plan]

  * Build and boot tested

  [Where problems could occur]

  * Low regression risk, mostly shifting logic
  * Change to order of register_pernet_subsys() and xt_register_template() 
could expose some other logic being held together under race condition

  [Other info]

  * SF #00391736

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2076291/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp