Public bug reported:
SRU Justification
[Impact]
Microsoft has requested these commits be present in all Azure tuned
kernels:
ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page
only what's needed
a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact needed
memory for messages
5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque
pointer to vmbus_onmessage()
b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct
vmbus_channel_message_header' compiles correctly
52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages
lengths
06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for untrusted
Hyper-V values
e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize memory
to be sent to the host
fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the
hv_message in vmbus_on_msg_dpc()
e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid
use-after-free in vmbus_onoffer_rescind()
e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race
condition in vmbus_onoffer_rescind()
adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets sent
by Hyper-V out of the ring buffer
9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet size
for VSS driver to the length of the receive buffer
f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash
upon unbinding a device from uio_hv_generic driver
007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose sev_es_ghcb_hv_call()
for use by HyperV
0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in
Isolation VM
af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory
boundary in the Isolation VM.
810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest
address host visibility support
d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring
buffer visible to host in Isolation VM
faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR
registers via ghcb page
20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support
for SNP VM
f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support
for VMbus channel initiate message
9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus
ring buffer for Isolation VM
1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer
remap function for HV IVM
c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM
check in the cc_platform_has()
062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce buffer
for Isolation VM
743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM
support for storvsc driver
846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM support
for netvsc driver
2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check
around swiotlb_mem_remap()
6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize request
offers message for Isolation VM
4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix
storvsc_queuecommand() memory leak
96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for
vmbus packet header in max_pkt_size
[Test Plan]
Microsoft tested
[Where things could go wrong]
Hyper-V guests may not work correctly.
[Other Info]
SF: #00323683
** Affects: linux-azure (Ubuntu)
Importance: Undecided
Status: New
** Description changed:
SRU Justification
[Impact]
- Microsoft has requested these Azure updates:
+ Microsoft has requested these Azure commits be present in all Azure
+ tuned kernels:
- v5.17-rc2~23^2~1 96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv:
balloon: account for vmbus packet header in max_pkt_size
- v5.17-rc1~70^2 4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix
storvsc_queuecommand() memory leak
- v5.17-rc1~70^2~2 6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus:
Initialize request offers message for Isolation VM
- v5.17-rc1~70^2~4 2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add
CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
- v5.17-rc1~70^2~7 846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add
Isolation VM support for netvsc driver
- v5.17-rc1~70^2~8 743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add
Isolation VM support for storvsc driver
- v5.17-rc1~70^2~9 062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable
swiotlb bounce buffer for Isolation VM
- v5.17-rc1~70^2~10 c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add
hyperv Isolation VM check in the cc_platform_has()
- v5.17-rc1~70^2~11 1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add
swiotlb bounce buffer remap function for HV IVM
- v5.16-rc1~154^2~5 9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv:
vmbus: Initialize VMbus ring buffer for Isolation VM
- v5.16-rc1~154^2~6 f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv:
vmbus: Add SNP support for VMbus channel initiate message
- v5.16-rc1~154^2~7 20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add
ghcb hvcall support for SNP VM
- v5.16-rc1~154^2~8 faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add
Write/Read MSR registers via ghcb page
- v5.16-rc1~154^2~9 d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv:
vmbus: Mark vmbus ring buffer visible to host in Isolation VM
- v5.16-rc1~154^2~10 810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add
new hvcall guest address host visibility support
- v5.16-rc1~154^2~11 af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv:
Initialize shared memory boundary in the Isolation VM.
- v5.16-rc1~154^2~12 0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv:
Initialize GHCB page in Isolation VM
- v5.16-rc1~185^2 007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose
sev_es_ghcb_hv_call() for use by HyperV
- v5.15-rc2~37^2~2 f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus:
Fix kernel crash upon unbinding a device from uio_hv_generic driver
- v5.15-rc1~139^2 9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the
maximum packet size for VSS driver to the length of the receive buffer
- v5.14-rc1~152^2~6 adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv:
vmbus: Copy packets sent by Hyper-V out of the ring buffer
- v5.12-rc1~140^2~24 e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv:
vmbus: Resolve race condition in vmbus_onoffer_rescind()
- v5.12-rc1~140^2~25 e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv:
vmbus: Avoid use-after-free in vmbus_onoffer_rescind()
- v5.12-rc1~140^2~26 fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv:
vmbus: Copy the hv_message in vmbus_on_msg_dpc()
- v5.12-rc1~140^2~28 e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv:
vmbus: Initialize memory to be sent to the host
- v5.12-rc1~140^2~29 06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add
validation for untrusted Hyper-V values
- v5.8-rc1~169^2~24 52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check
VMBus messages lengths
- v5.8-rc1~169^2~25 b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make
sure that 'struct vmbus_channel_message_header' compiles correctly
- v5.8-rc1~169^2~26 5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid
passing opaque pointer to vmbus_onmessage()
- v5.8-rc1~169^2~27 a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv:
allocate the exact needed memory for messages
- v5.8-rc1~169^2~28 ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy
from message page only what's needed
+ ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page
only what's needed
+ a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact
needed memory for messages
+ 5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque
pointer to vmbus_onmessage()
+ b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct
vmbus_channel_message_header' compiles correctly
+ 52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages
lengths
+ 06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for
untrusted Hyper-V values
+ e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize
memory to be sent to the host
+ fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the
hv_message in vmbus_on_msg_dpc()
+ e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid
use-after-free in vmbus_onoffer_rescind()
+ e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race
condition in vmbus_onoffer_rescind()
+ adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets
sent by Hyper-V out of the ring buffer
+ 9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet
size for VSS driver to the length of the receive buffer
+ f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash
upon unbinding a device from uio_hv_generic driver
+ 007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose
sev_es_ghcb_hv_call() for use by HyperV
+ 0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in
Isolation VM
+ af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory
boundary in the Isolation VM.
+ 810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest
address host visibility support
+ d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring
buffer visible to host in Isolation VM
+ faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR
registers via ghcb page
+ 20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support
for SNP VM
+ f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support
for VMbus channel initiate message
+ 9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus
ring buffer for Isolation VM
+ 1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer
remap function for HV IVM
+ c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM
check in the cc_platform_has()
+ 062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce
buffer for Isolation VM
+ 743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM
support for storvsc driver
+ 846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM
support for netvsc driver
+ 2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check
around swiotlb_mem_remap()
+ 6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize
request offers message for Isolation VM
+ 4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix
storvsc_queuecommand() memory leak
+ 96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for
vmbus packet header in max_pkt_size
[Test Plan]
Microsoft tested
[Where things could go wrong]
Hyper-V guests may not work correctly.
[Other Info]
SF: #00323683
** Description changed:
SRU Justification
[Impact]
- Microsoft has requested these Azure commits be present in all Azure
- tuned kernels:
+ Microsoft has requested these commits be present in all Azure tuned
+ kernels:
ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page
only what's needed
a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact
needed memory for messages
5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque
pointer to vmbus_onmessage()
b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct
vmbus_channel_message_header' compiles correctly
52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages
lengths
06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for
untrusted Hyper-V values
e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize
memory to be sent to the host
fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the
hv_message in vmbus_on_msg_dpc()
e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid
use-after-free in vmbus_onoffer_rescind()
e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race
condition in vmbus_onoffer_rescind()
adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets
sent by Hyper-V out of the ring buffer
9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet
size for VSS driver to the length of the receive buffer
f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash
upon unbinding a device from uio_hv_generic driver
007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose
sev_es_ghcb_hv_call() for use by HyperV
0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in
Isolation VM
af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory
boundary in the Isolation VM.
810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest
address host visibility support
d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring
buffer visible to host in Isolation VM
faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR
registers via ghcb page
20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support
for SNP VM
f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support
for VMbus channel initiate message
9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus
ring buffer for Isolation VM
1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer
remap function for HV IVM
c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM
check in the cc_platform_has()
062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce
buffer for Isolation VM
743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM
support for storvsc driver
846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM
support for netvsc driver
2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check
around swiotlb_mem_remap()
6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize
request offers message for Isolation VM
4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix
storvsc_queuecommand() memory leak
96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for
vmbus packet header in max_pkt_size
[Test Plan]
Microsoft tested
[Where things could go wrong]
Hyper-V guests may not work correctly.
[Other Info]
SF: #00323683
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329
Title:
linux-azure: Update HV support to 5.17
Status in linux-azure package in Ubuntu:
New
Bug description:
SRU Justification
[Impact]
Microsoft has requested these commits be present in all Azure tuned
kernels:
ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page
only what's needed
a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact
needed memory for messages
5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque
pointer to vmbus_onmessage()
b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct
vmbus_channel_message_header' compiles correctly
52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages
lengths
06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for
untrusted Hyper-V values
e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize
memory to be sent to the host
fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the
hv_message in vmbus_on_msg_dpc()
e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid
use-after-free in vmbus_onoffer_rescind()
e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race
condition in vmbus_onoffer_rescind()
adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets
sent by Hyper-V out of the ring buffer
9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet
size for VSS driver to the length of the receive buffer
f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash
upon unbinding a device from uio_hv_generic driver
007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose
sev_es_ghcb_hv_call() for use by HyperV
0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in
Isolation VM
af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory
boundary in the Isolation VM.
810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest
address host visibility support
d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring
buffer visible to host in Isolation VM
faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR
registers via ghcb page
20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support
for SNP VM
f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support
for VMbus channel initiate message
9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus
ring buffer for Isolation VM
1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer
remap function for HV IVM
c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM
check in the cc_platform_has()
062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce
buffer for Isolation VM
743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM
support for storvsc driver
846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM
support for netvsc driver
2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check
around swiotlb_mem_remap()
6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize
request offers message for Isolation VM
4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix
storvsc_queuecommand() memory leak
96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for
vmbus packet header in max_pkt_size
[Test Plan]
Microsoft tested
[Where things could go wrong]
Hyper-V guests may not work correctly.
[Other Info]
SF: #00323683
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp