[Bug 1909162] Re: cluster log slow request spam

2021-02-22 Thread gerald.yang
The ceph package in ussuri-proposed fixes this issue Detail steps: 1. deploy bionic+luminous 2. add cloud-archive:train 3. upgrade ceph to nautilus 4. add cloud-archive:ussuri 5. upgrade ceph to octopus 6. set osd_op_complaint_time to 0.1 for generating slow requests 7. run rados bench 8. check th

[Bug 1909162] Re: cluster log slow request spam

2021-02-22 Thread gerald.yang
The ceph package in focal-proposed fixes this issue Detail steps: 1. deploy focal+octopus 2. add focal-proposed 3. upgrade to 15.2.8-0ubuntu0.20.04.1 4. set osd_op_complaint_time to 0.1 for generating slow requests 5. run rados bench 6. check there are slow requests in OSD logs 7. check there is N

[Bug 1909162] Re: cluster log slow request spam

2021-02-22 Thread gerald.yang
In comment #15, the detail step 4 is 4. add cloud-archive:ussuri-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909162 Title: cluster log slow request spam To manage notifications about th

[Bug 1909162] Re: cluster log slow request spam

2021-02-22 Thread gerald.yang
The ceph package in groovy-proposed fixes this issue Detail steps: 1. deploy grovvy+octopus 2. add grovvy-proposed 3. upgrade to 15.2.8-0ubuntu0.20.10.1 4. set osd_op_complaint_time to 0.1 for generating slow requests 5. run rados bench 6. check there are slow requests in OSD logs 7. check there i

[Bug 1909162] Re: cluster log slow request spam

2021-03-01 Thread gerald.yang
** Changed in: cloud-archive/train Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909162 Title: cluster log slow request spam To manage notifications about t

[Bug 1910976] Re: Cherry-pick dm-crypt performance improvement patch from Linux 5.9

2021-05-16 Thread gerald.yang
** Description changed: + === SRU Justification === + [Impact] + To get better performance for dm-crypt in some cases, bypass kcryptd workqueue can reduce the overhead in context switch between workers, cherry-pick commit 39d42fa96ba1b7d2544db3f8ed5da8fb0d5cb877 from mainline kernel, and this i

[Bug 1910976] Re: Cherry-pick dm-crypt performance improvement patch from Linux 5.9

2021-05-17 Thread gerald.yang
s: New => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: linux (Ubuntu Groovy) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => gera

[Bug 1910976] Re: Cherry-pick dm-crypt performance improvement patch from Linux 5.9

2021-05-12 Thread gerald.yang
** Changed in: linux (Ubuntu) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: linux (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1909162] Re: cluster log slow request spam

2020-12-23 Thread gerald.yang
** Changed in: cloud-archive/train Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: cloud-archive/ussuri Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: ceph (Ubuntu Focal) Assignee: (unassigned) => gerald.yang (geral

[Bug 1861793] Re: [SRU] ceph 12.2.13

2020-03-02 Thread gerald.yang
Hi James, Do you have any idea when this will be released? thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861793 Title: [SRU] ceph 12.2.13 To manage notifications about this bug go to: htt

[Bug 1848481] Re: cloudimg: no iavf/i40evf module so no network available with SR-IOV enabled cloud

2019-11-19 Thread gerald.yang
** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress -- You received this bug notifi

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-11-22 Thread gerald.yang
** Also affects: ceph (Ubuntu Focal) Importance: Undecided Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Also affects: ceph (Ubuntu Eoan) Importance: Undecided Status: New ** Also affects: ceph (Ubuntu Disco) Importance: Undecided Status: New

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-12-01 Thread gerald.yang
d in: ceph (Ubuntu Focal) Assignee: gerald.yang (gerald-yang-tw) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1847544 Title: backport: S3 policy evaluated incorrectly To mana

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-12-01 Thread gerald.yang
** Changed in: cloud-archive Status: New => In Progress ** Changed in: cloud-archive Assignee: (unassigned) => gerald.yang (gerald-yang-tw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.ne

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-12-01 Thread gerald.yang
bionic patch ** Patch added: "bionic.patch" https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1847544/+attachment/5309188/+files/bionic.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/184754

[Bug 1848481] Re: cloudimg: no iavf/i40evf module so no network available with SR-IOV enabled cloud

2019-10-28 Thread gerald.yang
** Also affects: livecd-rootfs (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: livecd-rootfs (Ubuntu Eoan) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Eo

[Bug 1848481] Re: cloudimg: no iavf/i40evf module so no network available with SR-IOV enabled cloud

2019-10-28 Thread gerald.yang
** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1848481 Title: cloudimg: no iavf/i40evf module so

[Bug 1848481] Re: cloudimg: no iavf/i40evf module so no network available with SR-IOV enabled cloud

2019-10-29 Thread gerald.yang
** Description changed: - For example with bionic, i40evf module is in linux-modules- - extra-4.15*-generic. However, cloudimg doesn't have linux-modules-extra - seeded: + === SRU Justification === + [Impact] + Intel's VF drivers such as igbvf and ixgbevf are already available in + generic. It mak

[Bug 1848481] Re: cloudimg: no iavf/i40evf module so no network available with SR-IOV enabled cloud

2019-10-29 Thread gerald.yang
** Changed in: linux (Ubuntu Bionic) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1848481 Title: cloudimg: no iavf/i40evf module so no network available with SR-IO

[Bug 1848481] Re: cloudimg: no iavf/i40evf module so no network available with SR-IOV enabled cloud

2019-11-03 Thread gerald.yang
** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: linux (Ubuntu Disco) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: linux (Ubuntu Disco) Status: New => In Progress ** Changed in: linux (Ub

[Bug 1909162] Re: cluster log slow request spam

2020-12-31 Thread gerald.yang
Add patch ** Patch added: "0001-Remove-logging-every-slow-request-details-to-monito.patch" https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1909162/+attachment/5448256/+files/0001-Remove-logging-every-slow-request-details-to-monito.patch ** Tags added: sts-sru-needed -- You received this

[Bug 1909162] Re: cluster log slow request spam

2021-01-06 Thread gerald.yang
focal patch ** Patch added: "focal.patch" https://bugs.launchpad.net/cloud-archive/+bug/1909162/+attachment/5449902/+files/focal.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909162 Title:

[Bug 1909162] Re: cluster log slow request spam

2021-01-06 Thread gerald.yang
groovy patch ** Patch added: "groovy.patch" https://bugs.launchpad.net/cloud-archive/+bug/1909162/+attachment/5449903/+files/groovy.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909162 Tit

[Bug 1909162] Re: cluster log slow request spam

2021-01-06 Thread gerald.yang
hirsute patch ** Patch added: "hirsute.patch" https://bugs.launchpad.net/cloud-archive/+bug/1909162/+attachment/5449904/+files/hirsute.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909162

[Bug 1909162] Re: cluster log slow request spam

2021-01-06 Thread gerald.yang
train patch ** Patch added: "train.patch" https://bugs.launchpad.net/cloud-archive/+bug/1909162/+attachment/5449905/+files/train.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909162 Title:

[Bug 1909162] Re: cluster log slow request spam

2021-01-06 Thread gerald.yang
ussuri patch ** Patch added: "ussuri.patch" https://bugs.launchpad.net/cloud-archive/+bug/1909162/+attachment/5449906/+files/ussuri.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909162 Tit

[Bug 1909162] Re: cluster log slow request spam

2021-01-18 Thread gerald.yang
Open a upstream ceph tracker for further discussion: https://tracker.ceph.com/issues/48909 ** Bug watch added: tracker.ceph.com/issues #48909 http://tracker.ceph.com/issues/48909 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. http

[Bug 1497883] Re: cat of long files breaks dropbear ssh connection

2017-05-02 Thread gerald.yang
This debdiff comes from comment #10 to fix the bug ** Patch added: "dropbear_2013.60-1ubuntu2.2.debdiff" https://bugs.launchpad.net/ubuntu/+source/dropbear/+bug/1497883/+attachment/4870747/+files/dropbear_2013.60-1ubuntu2.2.debdiff -- You received this bug notification because you are a memb

[Bug 1696162] Re: brcmfmac does not support unbinding

2017-06-16 Thread gerald.yang
Verify the new nplan_0.23~16.04.1_amd64.deb on Ubuntu Core 16 (download from xenial-proposed), Test pass. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://

[Bug 1718388] Re: Fix OpenNSL GPL bugs found by CoverityScan static analysis

2017-11-10 Thread gerald.yang
Verified linux-image-4.4.0-100-generic on AS7712, it works find, all broadcom modules are loaded and bcm0 interface is created successfully. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1718388 Title

[Bug 1647936] Re: Raspberry Pi 3: a small rainbow square on the top right of screen

2017-03-19 Thread gerald.yang
@Zygmunt So does it mean even I add a configure hook in meta/hooks/ to copy those binaries to boot partition (/boot/uboot/), there is no such interface in snapd to allow this? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. ht

[Bug 1642118] Re: Several TPM2.0 tests fail

2017-04-06 Thread gerald.yang
For the three failures, the meaning of error code: 1. test_tpm2_unseal.sh u@u-Embedded-Box-PC-3000:~/tpm2.0-tools/test/system$ tpm2_rc_decode 0x9a2 error layer hex: 0x0 identifier: TSS2_TPM_ERROR_LEVEL description: Error produced by the TPM format 1 error code hex: 0x22 identifier: TPM_R

[Bug 1634236] Re: [SRU] Dependency on snap-confine too weak

2016-10-18 Thread gerald.yang
Hello Michael, The new snapd in proposed updates the dependency of ubuntu-core-launcher, but not snap-confine, I just upgraded snapd, but the snap-confine is still the old version (1.0.38-0ubuntu0.16.04.4), only ubuntu-core-launcher is upgraded to the latest one (1.0.43-0ubuntu1~16.04.1), coul

[Bug 1634236] Re: [SRU] Dependency on snap-confine too weak

2016-10-18 Thread gerald.yang
Verified pass, the new snapd (2.16ubuntu3) depends on the right version of snap-confine (>= 1.0.43). Thanks ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https:/

[Bug 1642118] Re: Several TPM2.0 tests fail

2016-12-08 Thread gerald.yang
I tried the latest tpm2.0-tools on github, but most of tests are failed cat test_all_fail.log test_tpm2_takeownership_all.sh fail test_tpm2_nv.sh fail test_tpm2_listpcrs.sh fail test_tpm2_load.sh fail test_tpm2_loadexternal.sh fail test_tpm2_evictcontrol.sh fail test_tpm2_hmac.sh fail test_tpm2_q

[Bug 1530405] Re: NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kerneloops:814]

2016-12-12 Thread gerald.yang
I am seeing this issue too, but in my case, it seems there is something wrong in bbswitch-dkms, if I remove it manually by 'sudo rm /lib/modules/4.4.0-xx-generic/updates/dkms/bbswitch.ko' I can boot into system with both intel and nvidia mode (prime-select intel or prime- select nvidia). Since nvi

[Bug 1326257] Re: [nvidia-prime] Cannot adjust brightness in guest session and results in black screen while changing the resolution

2014-07-03 Thread gerald.yang
This package fixes backlight issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1326257 Title: [nvidia-prime] Cannot adjust brightness in guest session and results in black screen while changing

[Bug 1326257] Re: [nvidia-prime] Cannot adjust brightness in guest session and results in black screen while changing the resolution

2014-07-03 Thread gerald.yang
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1326257 Title: [nvidia-prime] Cannot adjust brightness in guest session and result

[Bug 1326257] Re: [nvidia-prime] Cannot adjust brightness in guest session and results in black screen while changing the resolution

2014-07-03 Thread gerald.yang
Tested with ubuntu-drivers-common 1:0.2.91.6 in trusty-proposed, it's fixes the backlight issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1326257 Title: [nvidia-prime] Cannot adjust brightness

[Bug 676166] Re: Unity Launcher corruption when resuming from suspend/hibernate

2014-03-11 Thread gerald.yang
** Also affects: oem-priority Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/676166 Title: Unity Launcher corruption when resuming from suspend/hibernate

[Bug 1847822] Re: CephFS authorize fails with unknown cap type

2019-12-02 Thread gerald.yang
The ceph packages in queens-proposed fixes this issue Some details on different nodes On ceph-mon node: ubuntu@juju-590627-246395-0:~$ apt-cache policy ceph ceph: Installed: 12.2.12-0ubuntu0.18.04.4 Candidate: 12.2.12-0ubuntu0.18.04.4 Version table: *** 12.2.12-0ubuntu0.18.04.4 500

[Bug 1847822] Re: CephFS authorize fails with unknown cap type

2019-12-02 Thread gerald.yang
** Tags removed: verification-done ** Tags added: verification-needed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1847822 Title: CephFS authorize fails with unknown cap type To manage notificatio

[Bug 1847822] Re: CephFS authorize fails with unknown cap type

2019-12-03 Thread gerald.yang
The ceph packages in bionic-proposed fixes this issue Some details on different nodes On ceph-mon node: ubuntu@juju-aad762-246395-1-0:~$ apt-cache policy ceph ceph: Installed: 12.2.12-0ubuntu0.18.04.4 Candidate: 12.2.12-0ubuntu0.18.04.4 Version table: *** 12.2.12-0ubuntu0.18.04.4 500

[Bug 1848481] Re: cloudimg: no iavf/i40evf module so no network available with SR-IOV enabled cloud

2019-12-04 Thread gerald.yang
The new kernel in xenial-proposed fixes this issue, i40evf is included in linux-modules kernel version: 4.4.0-171 old in xenial-update: dpkg -L linux-modules-4.4.0-170-generic | grep 'i40e' /lib/modules/4.4.0-170-generic/kernel/drivers/net/ethernet/intel/i40e /lib/modules/4.4.0-170-generic/kernel

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-11-07 Thread gerald.yang
** Changed in: ceph (Ubuntu) Assignee: Jesse Williamson (chardan) => gerald.yang (gerald-yang-tw) ** Changed in: ceph (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-11-07 Thread gerald.yang
d to luminous has been accepted: https://tracker.ceph.com/issues/39272 https://github.com/ceph/ceph/commit/a752b21f549cc83745e35324387b85b3d039dfd2 ** Tags added: sts-sru-needed ** Also affects: ceph (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: ceph (Ubuntu Bionic)

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-11-07 Thread gerald.yang
** Description changed: [Impact] If a user tries to access a non-existent bucket, it should get a 'NoSuchBucket' error message (404) But if there is such a bucket which is belonged to another user, radosgw will return 'AccessDenied' error (403) This is an incorrect error message, radosgw

[Bug 1847544] Re: backport: S3 policy evaluated incorrectly

2019-11-07 Thread gerald.yang
** Tags added: verification-needed-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1847544 Title: backport: S3 policy evaluated incorrectly To manage notifications about this bug go to: https:

[Bug 1852663] [NEW] i40e: general protection fault in i40e_config_vf_promiscuous_mode

2019-11-14 Thread gerald.yang
portance: Undecided Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Affects: linux (Ubuntu Eoan) Importance: Undecided Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New *

[Bug 1852663] Re: i40e: general protection fault in i40e_config_vf_promiscuous_mode

2019-11-14 Thread gerald.yang
** Tags added: sts -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1852663 Title: i40e: general protection fault in i40e_config_vf_promiscuous_mode To manage notifications about this bug go to: https

[Bug 2069715] Re: DRBG initialization failed on some AMD EPYC series CPU and lead to kernel panic (Focal FIPS)

2024-07-10 Thread gerald.yang
** Summary changed: - DRBG initialization failed on some AMD EPYC series CPU and lead to kernel panic + DRBG initialization failed on some AMD EPYC series CPU and lead to kernel panic (Focal FIPS) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribe

[Bug 2069715] Re: DRBG initialization failed on some AMD EPYC series CPU and lead to kernel panic (Focal FIPS)

2024-07-10 Thread gerald.yang
** Description changed: BugLink: https://bugs.launchpad.net/bugs/2069715 [Impact] Install Focal with FIPS enabled on AMD EPYC 7262 8-Core Processor, kernel panic happens during boot: [3.430477] ima: Allocated hash algorithm: sha1 [3.433358] ima: No architecture policies fo

[Bug 2073092] [NEW] net/sched: Fix conntrack use-after-free

2024-07-15 Thread gerald.yang
Undecided Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Affects: linux (Ubuntu Jammy) Importance: Undecided Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Affects: linux (Ubuntu Noble) Importance: Undecided Assignee: gerald.ya

[Bug 2073092] Re: net/sched: Fix conntrack use-after-free

2024-07-15 Thread gerald.yang
** Description changed: BugLink: https://bugs.launchpad.net/bugs/2073092 [Impact] Hit conntrack refcount use-after-free issue: refcount_t: addition on 0; use-after-free. Call Trace: ? show_regs+0x6d/0x80 ? __warn+0x89/0x160 ? refcount_warn_saturate+0x12e/0x150 ? repor

[Bug 2073092] Re: net/sched: Fix conntrack use-after-free

2024-07-15 Thread gerald.yang
** Changed in: linux (Ubuntu Oracular) Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073092 Title: net/sched: Fix conntrack use-after-free To manage notificat

[Bug 2073092] Re: net/sched: Fix conntrack use-after-free

2024-07-15 Thread gerald.yang
** Description changed: BugLink: https://bugs.launchpad.net/bugs/2073092 [Impact] Hit conntrack refcount use-after-free issue: refcount_t: addition on 0; use-after-free. Call Trace: ? show_regs+0x6d/0x80 ? __warn+0x89/0x160 ? refcount_warn_saturate+0x12e/0x150 ? repor

[Bug 2054343] Re: CVE-2023-4039: ARM64 GCC

2024-06-04 Thread gerald.yang
** Summary changed: - arm64 build of gcc-10 10.5.0-3ubuntu1 still broken (CVE-2023-4039 still open) + CVE-2023-4039: ARM64 GCC ** Also affects: gcc-11 (Ubuntu) Importance: Undecided Status: New ** Also affects: gcc-12 (Ubuntu) Importance: Undecided Status: New ** Also affect

[Bug 2054343] Re: CVE-2023-4039: ARM64 GCC

2024-06-04 Thread gerald.yang
I have organized the affected GCC version on Focal, Jammy and Noble. All GCC versions (10, 11, 12, 13) on Noble already include the fix. Could we also backport the fix to GCC versions on Jammy and Focal? At least GCC-9 is in main on Focal and GCC-11 is in main on Jammy. Thanks, Gerald -- You r

[Bug 2054343] Re: CVE-2023-4039: ARM64 GCC

2024-06-04 Thread gerald.yang
The patches can be found here (re-post from comment #3): https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64#Technical-Specifications -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https

[Bug 2054343] Re: CVE-2023-4039: ARM64 GCC

2024-06-06 Thread gerald.yang
Hi Matthias, Could you help to take a look into this backport for focal and jammy? really appreciate! Thanks, Gerald -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2054343 Title: CVE-2023-4039: ARM

[Bug 1947046] Re: EFI stub: ERROR: FIRMWARE BUG: kernel image not aligned on 64k boundary

2024-04-08 Thread gerald.yang
Hi Julian, Is there any way that we can check the grub 2.12 backport status/progress, so we can keep our customers posted? Thanks, Gerald -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1947046 Title:

[Bug 1947046] Re: EFI stub: ERROR: FIRMWARE BUG: kernel image not aligned on 64k boundary

2024-04-09 Thread gerald.yang
Hi Julian, Thank you very much for the info, I will update our customers about this -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1947046 Title: EFI stub: ERROR: FIRMWARE BUG: kernel image not alig

[Bug 2069715] Re: DRBG initialization failed on some AMD EPYC series CPU and lead to kernel panic (Focal FIPS)

2024-07-25 Thread gerald.yang
Verified on 5.4.0-1104 fips kernel on AMD EPYC 7262 machine and confirmed it fixes the issue. With 5.4.0-1104 fips kernel, it can boot successfully: ubuntu@focal:~$ sudo dmesg | grep DRBG [4.121726] random: random: DRBG (drbg_nopr_ctr_aes256) initialized! ubuntu@focal:~$ uname -a Linux focal

[Bug 2073092] Re: net/sched: Fix conntrack use-after-free

2024-07-26 Thread gerald.yang
** Tags removed: verification-needed-jammy-linux-hwe-6.8 ** Tags added: verification-done-jammy-linux-hwe-6.8 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073092 Title: net/sched: Fix conntrack us

[Bug 2073092] Re: net/sched: Fix conntrack use-after-free

2024-07-29 Thread gerald.yang
** Changed in: linux-hwe-6.8 (Ubuntu Jammy) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073092 Title: net/sched: Fix conntrack

[Bug 1965723] [NEW] audit: improve audit queue handling when "audit=1" on cmdline

2022-03-20 Thread gerald.yang
Importance: Critical Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Affects: linux (Ubuntu Bionic) Importance: Critical Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Affects: linux (Ubuntu Focal) Importance: Critical Assignee: gera

[Bug 1965723] Re: audit: improve audit queue handling when "audit=1" on cmdline

2022-03-20 Thread gerald.yang
** Also affects: linux (Ubuntu Jammy) Importance: Critical Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Impish) Importance: Undecided Status

[Bug 1965723] Re: audit: improve audit queue handling when "audit=1" on cmdline

2022-03-21 Thread gerald.yang
** No longer affects: linux (Ubuntu Jammy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965723 Title: audit: improve audit queue handling when "audit=1" on cmdline To manage notifications about t

[Bug 1965723] Re: audit: improve audit queue handling when "audit=1" on cmdline

2022-03-21 Thread gerald.yang
This one has been merged in the last upstream stable patch set ** No longer affects: linux (Ubuntu Impish) ** No longer affects: linux (Ubuntu Focal) ** No longer affects: linux (Ubuntu Bionic) ** Changed in: linux (Ubuntu) Status: In Progress => Invalid -- You received this bug notifi

[Bug 1965723] Re: audit: improve audit queue handling when "audit=1" on cmdline

2022-03-28 Thread gerald.yang
the fix in Impish is still in progress here LP: #1966021 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965723 Title: audit: improve audit queue handling when "audit=1" on cmdline To manage notific

[Bug 1965723] Re: audit: improve audit queue handling when "audit=1" on cmdline

2022-03-30 Thread gerald.yang
Thanks a lot for the help Kleber -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965723 Title: audit: improve audit queue handling when "audit=1" on cmdline To manage notifications about this bug go

[Bug 1945555] Re: [SRU] accept undecodable multi-block bluefs transactions on log

2021-10-18 Thread gerald.yang
first patch ** Tags added: sts sts-sru-needed verification-needed-bionic ** Patch added: "bionic1.patch" https://bugs.launchpad.net/ubuntu/bionic/+source/ceph/+bug/194/+attachment/5533789/+files/bionic1.patch -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1945555] Re: [SRU] accept undecodable multi-block bluefs transactions on log

2021-10-18 Thread gerald.yang
second patch ** Patch added: "bionic2.patch" https://bugs.launchpad.net/ubuntu/bionic/+source/ceph/+bug/194/+attachment/5533790/+files/bionic2.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bu

[Bug 1945555] Re: [SRU] accept undecodable multi-block bluefs transactions on log

2021-10-18 Thread gerald.yang
This PR https://github.com/ceph/ceph/pull/42830 need an additional dependency (bionic1.patch) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/194 Title: [SRU] accept undecodable multi-block bluefs

[Bug 1953426] [NEW] [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-06 Thread gerald.yang
configuration, no regression potential [Additional information] from upstream: octopus backport tracker https://tracker.ceph.com/issues/51199 octopus backport PR https://github.com/ceph/ceph/pull/43310 ** Affects: ceph (Ubuntu) Importance: Undecided Assignee: gerald.yang (gerald-yang-tw

[Bug 1953426] Re: [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-06 Thread gerald.yang
second patch ** Patch added: "0002-qa-tasks-cephfs-test_sessionmap-reap-connections-imm.patch" https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1953426/+attachment/5545881/+files/0002-qa-tasks-cephfs-test_sessionmap-reap-connections-imm.patch -- You received this bug notification because

[Bug 1953426] Re: [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-06 Thread gerald.yang
first patch ** Patch added: "0001-msg-async-configurable-threshold-for-reaping-dead-co.patch" https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1953426/+attachment/5545880/+files/0001-msg-async-configurable-threshold-for-reaping-dead-co.patch -- You received this bug notification because

[Bug 1953426] Re: [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-06 Thread gerald.yang
** Changed in: ceph (Ubuntu Focal) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: ceph (Ubuntu Focal) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1953431] [NEW] [SRU] fix unsafe access in unregister_conn()

2021-12-06 Thread gerald.yang
sions [Additional information] from upstream: octopus backport tracker https://tracker.ceph.com/issues/50482 octopus backport PR https://github.com/ceph/ceph/pull/43325 ** Affects: ceph (Ubuntu) Importance: Undecided Assignee: gerald.yang (gerald-yang-tw) Status: In Progress ** Ch

[Bug 1953426] Re: [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-07 Thread gerald.yang
** Tags added: sts sts-sru-needed verification-needed-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953426 Title: [SRU] configurable threshold for reaping dead connections and add a unit te

[Bug 1953426] Re: [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-07 Thread gerald.yang
** Description changed: [Impact] add a configurable threshold for reaping dead connections and fix cephfs test case - - [Test case] + [Test plan] run ceph qa tests in: qa/tasks/cephfs/test_sessionmap.py this also verifies the configurable threshold steps to run: 1. build ceph f

[Bug 1953426] Re: [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-08 Thread gerald.yang
** Description changed: [Impact] add a configurable threshold for reaping dead connections and fix cephfs test case [Test plan] run ceph qa tests in: qa/tasks/cephfs/test_sessionmap.py this also verifies the configurable threshold steps to run: 1. build ceph from source folder

[Bug 1953431] Re: [SRU] fix unsafe access in unregister_conn()

2021-12-08 Thread gerald.yang
** Description changed: [Impact] without holding sufficient locks, accept_conn and shutdown_connections in AsyncMessenger could cause OSD processes crash - [Test case] + [Test plan] + + [Where problems could occur] + hold sufficient locks and decrement l_msgr_active_connections can avoid

[Bug 1953426] Re: [SRU] configurable threshold for reaping dead connections and add a unit test

2021-12-08 Thread gerald.yang
** Description changed: [Impact] add a configurable threshold for reaping dead connections and fix cephfs test case [Test plan] run ceph qa tests in: qa/tasks/cephfs/test_sessionmap.py this also verifies the configurable threshold steps to run: 1. build ceph from source folder

[Bug 1945555] Re: [SRU] accept undecodable multi-block bluefs transactions on log

2021-12-08 Thread gerald.yang
** Description changed: [Impact] Multi-block transaction could fail during unexpected power down in this case, it should be stop replaying this log instead of throwing unrecoverable error [Test Case] It's too difficult to simulate power outage during multi-block transaction on disk,

[Bug 1953431] Re: [SRU] fix unsafe access in unregister_conn()

2021-12-09 Thread gerald.yang
tatus: New ** Changed in: ceph (Ubuntu Focal) Status: New => In Progress ** Changed in: ceph (Ubuntu Focal) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bu

[Bug 1945555] Re: [SRU] accept undecodable multi-block bluefs transactions on log

2021-11-12 Thread gerald.yang
Update test case It's too difficult to simulate power outage during multi-block transaction on disk, so the way I test this patch is to simulate a multi-block transaction and trigger a decode error in try { auto p = bl.cbegin(); decode(t, p); seen_recs = true; } Add the fo

[Bug 1953431] Re: [SRU] fix unsafe access in unregister_conn()

2022-04-18 Thread gerald.yang
Hello @mywh The fix is merged into 15.2.16 which is currently in focal-proposed for testing if there is no regression, it will be published to focal-updates soon If you would like to run some tests to confirm the issue you are hitting has been fixed please enable focal-proposed and install 15.2.

[Bug 1965723] Re: audit: improve audit queue handling when "audit=1" on cmdline

2022-04-14 Thread gerald.yang
** Changed in: linux (Ubuntu) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965723 Title: audit: improve audit queue handling when "audit=1" on cmdline To m

[Bug 2073092] Re: net/sched: Fix conntrack use-after-free

2024-08-08 Thread gerald.yang
This patch has been verified on PS6 for few weeks ** Tags removed: verification-needed-jammy-linux verification-needed-noble-linux ** Tags added: verification-done-jammy-linux verification-done-noble-linux -- You received this bug notification because you are a member of Ubuntu Bugs, which is su

[Bug 2069715] Re: DRBG initialization failed on some AMD EPYC series CPU and lead to kernel panic (Focal FIPS)

2024-08-09 Thread gerald.yang
5.4.0-1104 fips kernel has been released to fips-updates: apt policy linux-image-5.4.0-1104-fips linux-image-5.4.0-1104-fips: Installed: 5.4.0-1104.114 Candidate: 5.4.0-1104.114 Version table: *** 5.4.0-1104.114 1001 1001 https://esm.ubuntu.com/fips-updates/ubuntu focal-updates/main

[Bug 2045322] Re: linux-image-5.4.0-1024-fips - boots to kernel panic on AMD EPYC 7262 CPU - drbg_nopr_sha512

2024-08-09 Thread gerald.yang
The fips kernel containing the fix has been released to fips-updates: 5.4.0-1104 fips kernel has been released to fips-updates: apt policy linux-image-5.4.0-1104-fips linux-image-5.4.0-1104-fips: Installed: 5.4.0-1104.114 Candidate: 5.4.0-1104.114 Version table: *** 5.4.0-1104.114 1001

[Bug 2071474] Re: fsck.xfs doesn't call xfs_repair in force mode from systemd unit during the system startup

2024-08-09 Thread gerald.yang
** Changed in: xfsprogs (Ubuntu) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: xfsprogs (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 2071474] Re: fsck.xfs doesn't call xfs_repair in force mode from systemd unit during the system startup

2024-08-15 Thread gerald.yang
I've send a patch to linux-xfs mailing list: https://marc.info/?l=linux-xfs&m=172353406613913&w=2 Once it's accepted and merge into upstream xfsprogs, I will SRU it back to ubuntu xfsprogs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubunt

[Bug 2045322] Re: linux-image-5.4.0-1024-fips - boots to kernel panic on AMD EPYC 7262 CPU - drbg_nopr_sha512

2024-06-16 Thread gerald.yang
** Changed in: linux (Ubuntu) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: linux (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.ne

[Bug 2069715] [NEW] DRBG initialization failed on some AMD EPYC series CPU and lead to kernel panic

2024-06-18 Thread gerald.yang
so reported the issue here: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2045322 https://askubuntu.com/questions/1509977/fips-kernel-panics-with-failed-to-reset-drbg-during-boot ** Affects: linux (Ubuntu) Importance: Undecided Assignee: gerald.yang (gerald-yang-tw) Status: In Pr

[Bug 2045322] Re: linux-image-5.4.0-1024-fips - boots to kernel panic on AMD EPYC 7262 CPU - drbg_nopr_sha512

2024-06-18 Thread gerald.yang
I've sent out the SRU to fix the issue: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2069715 will keep you posted -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2045322 Title: linux-image-5.

[Bug 1947046] Re: EFI stub: ERROR: FIRMWARE BUG: kernel image not aligned on 64k boundary

2024-06-18 Thread gerald.yang
Hi Julian, Just inquire about the 2.12 backport, is there anything I can update the customers? Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1947046 Title: EFI stub: ERROR: FIRMWARE BUG: k

[Bug 1945555] [NEW] [SRU] accept undecodable multi-block bluefs transactions on log

2021-09-29 Thread gerald.yang
Public bug reported: [Impact] Multi-block transaction could fail during unexpected power down in this case, it should be stop replaying this log instead of throwing unrecoverable error [Test Case] need to simulate power outage to reproduce this issue [Where problems could occur] This upstream P

[Bug 1945555] Re: [SRU] accept undecodable multi-block bluefs transactions on log

2021-09-30 Thread gerald.yang
** Changed in: ceph (Ubuntu Bionic) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: ceph (Ubuntu) Assignee: (unassigned) => gerald.yang (gerald-yang-tw) ** Changed in: ceph (Ubuntu Bionic) Status: New => In Progress ** Changed in: cep

  1   2   >