In order to get around this on my system I had to put "insmod lvm" into
the grub startup, but now it is happening again and "insmod lvm" is
saying "file not found".
--
SATA error after updating Kernel 2.6.31-19
https://bugs.launchpad.net/bugs/518259
You received this bug notification because you
I can successfully boot on a Lenovo W510 by removing "quiet splash" from
the command line, but this is hardly an old machine (Desktop Beta 2 ISO,
both CD-ROM and USB key).
--
Ubuntu 10.04 Alpha 3 won't boot, with (process 239): GLib-WARNING **:
getpwid_r(): failed due to unknown user id (0), on
On one system logged into Ubuntu One I see this (Lucid beta). Another
system with same pedigree does not show this, but is not logged into
Ubuntu One.
--
desktopcouch high CPU usage
https://bugs.launchpad.net/bugs/551645
You received this bug notification because you are a member of Ubuntu
Bugs,
I have Lucid (Mumble 1.2.2), I select Pulseaudio and the USB headset I
use for Skype and Mangler and Mumble goes gray and must be kill -9'd. I
had it working before in Lucid, not sure what triggers this hang.
--
client freezes when sound device is selected
https://bugs.launchpad.net/bugs/535404
Y
The similar error (freeze) I see appears to be caused by removing one
USB headset and trying another before starting mumble: mumble spins
looking for the old device. Audio setup wizard also freezes (see
535404).
PulseAudio: Starting input
alsa_input.usb-Logitech-Logitech_USB_Headset-00-Headset.an
I fixed my problem on Lucid by deleting the [pulseaudio] section from
the config file and manually adding my new USB headset. Then I could
rerun the audio setup wizard and use mumble.
By the way, if you delete the section entirely mumble will not recreate
it. Feature request: if the pulseaudio sec
Another system with 4GB of memory (Lenovo Thinkpad W510):
Jun 6 20:57:26 bigthink kernel: [4.392338] ureadahead invoked oom-killer:
gfp_mask=0xd0, order=0, oom_adj=0
Jun 6 20:57:26 bigthink kernel: [4.392342] ureadahead cpuset=/
mems_allowed=0
Jun 6 20:57:26 bigthink kernel: [4.39
Looks like the same kind of problem as
http://developer.pidgin.im/ticket/9488
** Bug watch added: Pidgin Trac #9488
http://developer.pidgin.im/ticket/9488
--
Empathy shows a network error and not connect to hotmail.
https://bugs.launchpad.net/bugs/464830
You received this bug notification be
On 10.04 LTS empathy appears to work fine with a squid caching proxy
except the Yahoo IM, which appears to suffer the same problem that
pidgin did: http://developer.pidgin.im/ticket/9488
** Bug watch added: Pidgin Trac #9488
http://developer.pidgin.im/ticket/9488
--
Does not use system proxy
Despite my escalation, this does not appear to be in 4.4.0-28.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1583357
Title:
[Hyper-V] Rebase Hyper-V to 4.6 kernel
To manage notifications about this
This is for the linux-azure kernel.
** Summary changed:
- Add infiniband support for Azure HPC
+ [Hyper-V] Add infiniband support for Azure HPC
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1701744
No log files required, kernel patch for IB on Azure. Microsoft will test
proposed kernels.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
Public bug reported:
On certain AMD platforms early in the boot without
CONFIG_EDAC_DECODE_MCE forced on instead of as a module, messages
similar to the following will be seen:
[5.581922] amd64_edac_mod: Unknown symbol amd_unregister_ecc_decoder (err 0)
[5.581954] amd64_edac_mod: Unknown
>From the log it seems pretty different from upstream because we backported
>some cool stuff:
https://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-azure/log/drivers/hv/ring_buffer.c?h=master-next
Age Commit message (Expand)
Author
2 days UBUNTU: SAUCE: vmbus: fix performance regr
Public bug reported:
Affects: Trusty, Xenial, Bionic linux-azure
Hyper-V Generation 1 virtual machines have a PIIX4 device because that's
where the IDE controllers are, but when CONFIG_I2C_PIIX4 is enabled,
users will see the following error in the boot log:
[5.139414] piix4_smbus :00:07
Public bug reported:
On Ubuntu 18.04 with the NVIDIA development repository PPA, installing
cuda-drivers I get the following error during the installation of
nvidia-390:
dpkg: error processing archive
/var/cache/apt/archives/nvidia-390_390.30-0ubuntu1_amd64.deb (--unpack):
trying to overwrite '
Public bug reported:
We are observing call traces with the -73 and -74 proposed kernels that
look like this:
[ 240.408061] INFO: task kworker/14:1:179 blocked for more than 120 seconds.
[ 240.412299] Not tainted 4.4.0-73-generic #94-Ubuntu
[ 240.415546] "echo 0 > /proc/sys/kernel/hung_ta
This appears to affect 4.4, 4.8, and 4.10
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1682561
Title:
[Hyper-V] hv: util: move waiting for release to hv_utils_transport
itself
To manage notifica
Unfortunately this is another critical issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1682561
Title:
[Hyper-V] hv: util: move waiting for release to hv_utils_transport
itself
To manage noti
Those commits are in the payload for
https://bugs.launchpad.net/ubuntu/xenial/+source/linux/+bug/1670544
which is in proposed right now.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1682561
Title:
These should all apply to 4.4, 4.8, and 4.10
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1682665
Title:
[Hyper-V] PCI passthrough fixes for 32 or more CPUs
To manage notifications about this bug
Public bug reported:
The following set of patches are needed for SR-IOV on larger VM sizes on
Hyper-V, especially with more than 32 CPUs. Some of these patches were
already pulled in as SAUCE for SR-IOV in Azure previously.
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-
next.git/comm
Public bug reported:
The following patch fixes a problem with "[PATCH] pci-hyperv: Use device
serial number as PCI domain" where some drivers were expecting a u16
instead of a u32 for PCI device serial numbers, as observed by Oops and
hangs in Azure on NC and NV GPU instances.
From: Haiyang Zhang
The patch has been submitted upstream and should apply to 4.4, 4.8, and
4.10
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1684971
Title:
Thanks! We'll verify the fix in -proposed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1682561
Title:
[Hyper-V] hv: util: move waiting for release to hv_utils_transport
itself
To manage notific
Public bug reported:
The following patch has been submitted upstream in response to
investigation of customer issues with network connections hanging under
high load.
On the consumer side, we have interrupt driven flow management of the
producer. It is sufficient to base the signalling decision o
No logs required, upstream submission.
** Changed in: linux (Ubuntu)
Status: Triaged => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556264
Title:
[Hyper-V] vmbus: Fix a bug in h
Xenial, Wily, and Vivid for now.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556264
Title:
[Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read()
To manage notifications about this bug go to:
The customers run a spectrum of kernels, but we will put Wily as the
highest priority. It is possible we will have to iterate on this patch
as well.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/155626
Thank you very much, Joe, we'll get them to test it as soon as possible.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556264
Title:
[Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read()
To ma
A few more upstream commits to make sure are present:
drivers/hv/
2d0c3b5a... "hv: utils: Invoke the poll function after handshake" (could be the
smoking gun here)
ed9ba608... "hv: vss: run only on support host versions" (I think we got this
one in another bug)
3cace4a61... "hv: utils: run polli
That's drivers/hv/hv_snapshot.c
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1470250
Title:
[Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based
Backups
To manage notifications abo
Public bug reported:
MS-SPNG section 3.3.5.1 documents an odd behavior the SPNEGO layer
needs to implement specifically for the NTLMSSP mechanism. This is
required for compatibility with Windows services.
Upstream commit:
https://github.com/krb5/krb5/commit/cb96ca52a3354e5a0ea52e12495ff375de54f9
This is needed for Ubuntu 14.04, 16.04, and 16.10.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1643708
Title:
Add SPNEGO special case for NTLMSSP+MechListMIC
To manage notifications about this bu
The test case in
https://github.com/krb5/krb5/pull/436#issuecomment-209017277 is the best
we can offer without going through the trouble of setting up OMI. We are
happy to test any preliminary builds, or -proposed, as necessary.
--
You received this bug notification because you are a member of Ub
[Test Case]
create a file with some credentials:
$ echo F23:guest:guest > ~/ntlmcreds.txt
$ export NTLM_USER_FILE=~/ntlmcreds.txt
$ python
import gssapi
spnego = gssapi.raw.oids.OID.from_int_seq('1.3.6.1.5.5.2')
c = gssapi.creds.Credentials(mechs=[spnego], usage='initiate')
tname = gssapi.raw.na
Public bug reported:
In order to have the correct VF driver to support SR-IOV in Azure, the
Mellanox OFED distribution needs to be included in the kernel and the
image. Mellanox's drivers are not upstream, but they are available from
here:
https://www.mellanox.com/page/products_dyn?product_family
Public bug reported:
The following files comprise Hyper-V support in the upstream kernel:
arch/x86/kernel/cpu/mshyperv.c
arch/x86/include/asm/mshyperv.h
arch/x86/include/uapi/asm/hyperv.h
include/linux/hyperv.h
drivers/hv/channel.c
drivers/hv/channel_mgmt.c
drivers/hv/connection.c
drivers/hv/hv_ba
** Summary changed:
- Please include Mellanox OFED drivers in Azure kernel and image
+ [Hyper-V/Azure] Please include Mellanox OFED drivers in Azure kernel and image
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchp
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1650058
Title:
[Hyper-V/Azure] Please include Mellanox OFED drivers in Azure kernel
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1650059
Title:
[Hyper-V] Rebase Hyper-V in 16.04 and 16.10 to the the upstream 4.9
We'll give them a look.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1650059
Title:
[Hyper-V] Rebase Hyper-V in 16.04 and 16.10 to the the upstream 4.9
kernel
To manage notifications about this
After performance testing, it looks like we need this upstream commit:
"Drivers: hv: vmbus: Base host signaling strictly on the ring state"
http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=74198eb4a42c4a3c4fbef08fa01a291a282f7c2e
Also, we need to add the file for SR-IOV
This fix is in linux-next now:
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/drivers/hv/hv_kvp.c?h=next-20170605&id=a3ade8cc474d848676278660e65f5af1e9e094d9
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu Zesty)
Verified by Long to work. My own instance had a problem, but I think
that was with my test kernel with a different patch as it hung shutting
down not coming up.
4.4.0-75, 4.8.0-49, and 4.10.0-20 are all exhibiting the problems in the
wild and I'm getting reports. This may require a fast turnaround
In progress.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1684971
Title:
[Hyper-V][SAUCE] pci-hyperv: Use only 16 bit integer for PCI domain
To manage notifications about this bug go to:
https://b
Succeeds.
Welcome to Ubuntu 16.04.2 LTS (GNU/Linux 4.4.0-77-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support:https://ubuntu.com/advantage
Get cloud support with Ubuntu Advantage Cloud Guest:
http://www.ubuntu.c
Yes, I am requesting it. It will be submitted upstream soon (although
there's a 32 vCPU problem still being investigated). Should I open a
separate bug since the rest of the work has been committed?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Ah, we don't normally install "extra" on virtual machines, but if that's
where the mlx4 driver lives, we will change.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1650058
Title:
[Hyper-V/Azure] Ple
(lkml)
From: Jack Morgenstein
When creating EQs to handle CQ completion events for the PF
or for VFs, we create enough EQE entries to handle completions
for the max number of CQs that can use that EQ.
When SRIOV is activated, the max number of CQs a VF (or the PF) can
obtain is its CQ quota (de
The in-flight patch is now in
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1667007
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1650058
Title:
[Hyper-V/Azure] Please include Mellanox OFED d
Public bug reported:
In the course of enabling SR-IOV on Azure, discovered that the Mellanox
Driver with 16 or more vCPUs fails. Mellanox has submitted the following
patch upstream to correct this problem.
Prerequisite:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1650058
I will post the
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1667007
Title:
[Hyper-V] Mellanox VF driver does not support >16 vCPUs
To manage n
Thanks! We'll give it a try.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1667007
Title:
[Hyper-V] Mellanox VF driver does not support >16 vCPUs
To manage notifications about this bug go to:
https
Public bug reported:
This allows PCI domain numbers starts with 1, and also unique
on the same VM. So names, such as VF NIC names, that include
domain number as part of the name, can be shorter than that
based on part of bus UUID previously. The new names will also
stay same for VMs created with c
Public bug reported:
Please include bondvf.sh from kernel git tools/hv/ in /usr/sbin
commit fd7aabb062fa1a8331a786d617744de220eaf002
Author: Haiyang Zhang
Date: Fri Dec 2 15:55:38 2016 -0800
tools: hv: Enable network manager for bonding scripts on RHEL
We found network manager is nec
lts-xenial, HWE, and Azure custom.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1667531
Title:
[Hyper-V] Include bondvf in /usr/sbin for SR-IOV interface bonding
To manage notifications about this
lts-xenial, HWE, and Azure custom.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1667527
Title:
[Hyper-V] pci-hyperv: Use device serial number as PCI domain
To manage notifications about this bug g
By the way, the "operation times should match host expectation" patch in
#343 (and listed in #347) is upstream:
commit b357fd3908c1191f2f56e38aa77f2aecdae18bc8
Author: Alex Ng
Date: Sun Nov 6 13:14:11 2016 -0800
Drivers: hv: vss: Operation timeouts should match host expectation
Increa
That patch was submitted upstream under the title "[PATCH] Tools: hv:
recover after hv_vss_daemon freeze times out" but I don't see that it
was committed. I'll poke around.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
The SR-IOV test is still pending. In progress.
Thanks, --jrp
-Original Message-
From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of Tim
Gardner
Sent: Tuesday, September 13, 2016 08:41
To: Josh Poulson
Subject: [Bug 1616677] Re: [Hyper-V] Rebase Hyper-V to 4.7.2 (stab
SR-IOV test still pending, we're on it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1616677
Title:
[Hyper-V] Rebase Hyper-V to 4.7.2 (stable)
To manage notifications about this bug go to:
https:/
The new reports from #27 forward are likely caused by hyperv_keyboard issing
from initrd, and was fixed here:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1567107
You should upgrade and try again.
Since this bug is marked "Fix Released" it's better to open a new one if
you are
I'm acking this kernel. There are additional SR-IOV issues we are
tracking down upstream that remain.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1616677
Title:
[Hyper-V] Rebase Hyper-V to 4.7.2 (
@kamalmostafa
Basically unexplained crashes in upstream 4.8-rc5 (but not with your
test kernel)... but only related to SR-IOV. I generally only ask for
stable, tested patches in rebases, the four patches above are targeted
to SR-IOV and it's unclear if something else in the upstream is breaking
th
I see the 4.4.0-38 SRU went out. Eagerly awaiting -proposed.
Just to confirm, were the SR-IOV drivers updated in Yakkety or should I
follow up on those in a separate bug?
After Ignite we will turn up the heat on 16.10. (pun intended)
--
You received this bug notification because you are a membe
Our proposed solution is in private bug
https://bugs.launchpad.net/lansing/+bug/1695119
Do you want me to bring that over to here?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1690430
Title:
[Hype
The interaction of systemd, timesync, and unattended-upgrades is
preventing security updates. The problem is alleviated with the PTP
clock source.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676635
Applications that use jsvc can increase their thread stack space with
-Xss1280k or larger (Red Hat, for example, suggested -Xss2m which is
much larger).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/16
UDP packet loss with 8+ vCPUs can range as high as 80% when driven hard
with multi-connection runs with iperf3 and ntttcp.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1690174
Title:
[Hyper-V] hv_n
First cut doesn't boot on local hyper-v still, but I'll try in Azure
soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1690177
Title:
[Hyper-V] Rebase Hyper-V to upstream 4.11 kernel plus some che
I'm definitely seeing issues with PCI interrupts with PCI passthrough,
probably related to
pci-hyperv.c : commit 24196f0c7d4bba093dfa8074507f31509970319f : PCI: hv:
Convert hv_pci_dev.refs from atomic_t to refcount_t
pci-hyperv.c : commit 59c58ceeea9cdc6144d7b0303753e6bd26d87455 : PCI: hv
Since it requires control of the host, this cannot be done in Azure.
Control of the host is rather restricted there.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1701222
Title:
[Hyper-V] LIS daemon
The KVM tests should only be run on instance sizes that have enabled
nested virtualization, the Dv3 and Ev3 sizes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1728930
Title:
linux-azure: 4.11.0-10
Building initial module for 4.13.0-1004-azure
ERROR (dkms apport): kernel package linux-headers-4.13.0-1004-azure is not
supported
Error! Bad return status for module build on kernel: 4.13.0-1004-azure (x86_64)
Consult /var/lib/dkms/nvidia-387/387.26/build/make.log for more information.
--
You r
I've having GPU problems with this kernel that did not appear in
4.13.0-1002
Is this because KPTI changed too much in the kernel?
In file included from ./arch/x86/include/asm/cpufeature.h:4:0,
from ./arch/x86/include/asm/thread_info.h:63,
from ./include/linux/thread_info.h:37,
from ./arch/x86/inc
Public bug reported:
Description of problem:
Because of Azure provisioning of VF interfaces taking several seconds after
boot, a number of race conditions were found in testing. By putting the effect
of SR-IOV bonding into netvsc we avoid these race conditions.
Upstream commit:
https://git.kern
I have created https://bugs.launchpad.net/ubuntu/+source/linux-
azure/+bug/1708995 to fix a deadlock found upstream and fixed in
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-
next.git/commit/?id=fb84af8a4397ee664a51c2da1dd64fb3d582ee24
--
You received this bug notification because yo
Public bug reported:
This is a deadlock fix for functionality introduced with
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1708469 which
applies to lts-xenial and linux-azure
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-
next.git/commit/?id=fb84af8a4397ee664a51c2da1dd64
Another upstream fix...
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-
next.git/commit/?id=7b83f52047e8a3d551a9495b0267df5d0754c5bf
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1708469
Ti
It certainly seems to happen much more easily on GPU-based instances.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719045
Title:
[Hyper-V] Docker failures with linux-azure 4.11.0-1011
To manage n
I would test with SR-IOV as well, I'm wondering if this is related to
PCI passthrough.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719045
Title:
[Hyper-V] Docker failures with linux-azure 4.11.0-
It's interesting that telegraf is also made with golang.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719045
Title:
[Hyper-V] Docker failures with linux-azure 4.11.0-1011
To manage notifications
We will check out the kernel as soon as possible. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719045
Title:
[Hyper-V] Docker failures with linux-azure 4.11.0-1011
To manage notifications
The test kernel seems to be pretty good so far.
Here are the tests we’ve done so far in Azure
1. InfiniBand Tests – PASSING.
2. GPU Tests – PASSING.
3. GPU Tests on RDMA loaded VM (NC24r) – PASSING.
4. Docker Tests – PASSING
a. Note that, we’re using official script to ins
Yes, let's spin one into proposed with KVM enabled and these patches
reverted for SRU.
You might be interested in Vitaly's upstream submission of tracing
today we'll work that into a future PR. As far as Hypercalls go, I
can always take questions back to the team for detailed answers.
--
You
You may also not be surprised to see this in a run I did with upstream
4.14-rc2:
[ 27.274499] general protection fault: [#1] SMP
[ 27.274499] Modules linked in: mlx4_en mlx4_core devlink sb_edac
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel hv_utils pcbc hyperv_keyboard
ptp snd_pcm
Yes, I've already kicked off the call for testing with the local teams
and people experiencing the issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719045
Title:
[Hyper-V] Docker failures with
** Summary changed:
- linux-azure cifs mount error caused by missing nls_utf8.ko module
+ [Hyper-V] linux-azure cifs mount error caused by missing nls_utf8.ko module
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
Yes, let's add nls_utf8.ko to the regular kernel package.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719624
Title:
[Hyper-V] linux-azure cifs mount error caused by missing nls_utf8.ko
module
Early results from @Chris
The proposed kernel looks good from our BVT testing on Hyper-V.
Besides the BVT, @Ionut also has done the following scenarios:
- Compiled go v1.6 and telegraf v1.2 from sources
- Compiled go v.18.3 and telegraf v1.5 from sources.
Both series worked fine, with
Public bug reported:
These two patches are needed for hvsock in linux-azure, and are on their
way upstream as well:
[PATCH] Revert "vmbus: destroy a hv_sock device only after the
RESCIND_OFFER is received"
https://github.com/dcui/linux/commit/c15d7f606f813b8d1f1ce02979929fd875da228b.patch
[PATC
Later results also look good. IB, BVT, Deployment, Perf, GPU, LTP,
kdump, Docker, and Telegraf tests all passed. Please publish to updates.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719045
Title:
Azure and on-prem Hyper-V results are good. IB, BVT, Deployment, Perf,
GPU, LTP, kdump, Docker, and Telegraf tests all passed. Please publish
to updates.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
Public bug reported:
New pull request against the master-next branch
(709d133bc3132eac96e455b9c94b8c5b78479393, Ubuntu-azure-4.11.0-1006.6) of
https://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-azure/log/?h=master-next:
https://github.com/dcui/linux/compare/709d133bc3132eac96e455b9
This module is needed for HPC on IB/RDMA in Azure, so we'd like to avoid
installing extras.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1711408
Title:
linux-azure: Please move the rdma_ucm driver
Public bug reported:
Because the linux-azure kernel is based on 4.11, kexec on 16.04 gives the
following error:
kdump-tools[1436]: ELF core (kcore) parse failed
Perhaps the artful kexec-tools should be backported?
** Affects: linux-azure (Ubuntu)
Importance: Undecided
Status: Conf
Public bug reported:
rdma_ucm is in the 4.11 kernel, but has to be modprobed up to be used.
It should autoload on HPC images.
** Affects: linux-azure (Ubuntu)
Importance: Undecided
Status: Confirmed
** Changed in: linux-azure (Ubuntu)
Status: New => Confirmed
--
You receiv
Option #2 makes the most sense.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1712915
Title:
[Hyper-V] linux-azure: rdma_ucm should autoload on HPC images
To manage notifications about this bug go
Public bug reported:
Currently the maximum size of SMB2/3 header is set incorrectly which
leads to hanging of directory listing operations on encrypted SMB3
connections. Fix this by setting the maximum size to 170 bytes that
is calculated as RFC1002 length field size (4) + transform header
size (5
1 - 100 of 801 matches
Mail list logo