Taihsiang Ho (Canonical Cert) has performed the routine desktop certification test plan for SRU, and reports NO REGRESSIONS from the test kernel with this patch set:
------ Test release: 14.04.1 The base kernel: 3.13.0-133.182 The patch kernel: 3.13.0-133.182+nvmemsi Test platforms: Dell OptiPlex 7450 AIO (CID 201606-22472) Sky Lake Xeon E3-1200 v5/E3-1500 v5/6th Gen Core Processor PCIe Controller [8086:1901] Non-Volatile memory controller [0108]: Device [1c5c:1284] Dell Computer Corporation Precision 5510 (Code name: Berlinetta P) (CID 201612-25281) Sky Lake Xeon E3-1200 v5/E3-1500 v5/6th Gen Core Processor PCIe Controller [8086:1901] Non-Volatile memory controller [0108]: Samsung Electronics Co Ltd Device [144d:a802] (rev 01) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1720867 Title: Trusty NVMe boot fails on some systems Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: In Progress Bug description: Trusty linux (3.13) fails to boot on some NVMe-based cloud instance types. [Impact] * Ubuntu trusty images can't be used on some NVMe-based cloud instance types. * Mainline commit a522905 "NVMe: Always use MSI/MSI-x interrupts" fixes the issue; application of this to 3.13 requires a set of prerequisite patches, and a minor backport. a522905 NVMe: Always use MSI/MSI-x interrupts e32efbf NVMe: make setup work for devices that don't do INTx be577fa nvme: Use pci_enable_msi_range() and pci_enable_msix_range() 42f6142 NVMe: per-cpu io queues 4f5099a NVMe: IOCTL path RCU protect queue access 5a92e70 NVMe: RCU protected access to io queues [Test Case] * Verify that a trusty-based image can boot on the affected instance type. [Regression Potential] * This change set affects all users of the NVMe driver, so regression potential is moderate to high. Additional soak testing may be warranted before merging this patch set. * The patched NVMe driver has been exercised by Dan Streetman, and given the thumbs-up. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1720867/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

