[Kernel-packages] [Bug 1860681] Re: Xenial update: 4.4.211 upstream stable release

2020-01-23 Thread Connor Kuehl
The following commits were skipped as they have already been applied:

* rsi: add fix for crash during assertions  
* mm/page_alloc.c: calculate 'available' memory in a separate function 

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * hidraw: Return EPOLLOUT from hidraw_poll
+ * HID: hidraw: Fix returning EPOLLOUT from hidraw_poll
+ * HID: hidraw, uhid: Always report EPOLLOUT
+ * cfg80211/mac80211: make ieee80211_send_layer2_update a public function
+ * mac80211: Do not send Layer 2 Update frame before authorization
+ * media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
+ * p54usb: Fix race between disconnect and firmware loading
+ * ALSA: line6: Fix write on zero-sized buffer
+ * ALSA: line6: Fix memory leak at line6_init_pcm() error path
+ * xen: let alloc_xenballooned_pages() fail if not enough memory free
+ * wimax: i2400: fix memory leak
+ * wimax: i2400: Fix memory leak in i2400m_op_rfkill_sw_toggle
+ * ext4: fix use-after-free race with debug_want_extra_isize
+ * ext4: add more paranoia checking in ext4_expand_extra_isize handling
+ * dccp: Fix memleak in __feat_register_sp
+ * rtc: mt6397: fix alarm register overwrite
+ * iommu: Remove device link to group on failure
+ * gpio: Fix error message on out-of-range GPIO in lookup table
+ * hsr: reset network header when supervision frame is created
+ * cifs: Adjust indentation in smb2_open_file
+ * RDMA/srpt: Report the SCSI residual to the initiator
+ * scsi: enclosure: Fix stale device oops with hot replug
+ * scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI
+ * platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0
+ * iio: imu: adis16480: assign bias value only if operation succeeded
+ * mei: fix modalias documentation
+ * clk: samsung: exynos5420: Preserve CPU clocks configuration during 
suspend/resume
+ * compat_ioctl: handle SIOCOUTQNSD
+ * tty: serial: imx: use the sg count from dma_map_sg
+ * tty: serial: pch_uart: correct usage of dma_unmap_sg
+ * media: exynos4-is: Fix recursive locking in isp_video_release()
+ * spi: atmel: fix handling of cs_change set on non-last xfer
+ * rtlwifi: Remove unnecessary NULL check in rtl_regd_init
+ * rtc: msm6242: Fix reading of 10-hour digit
+ * rseq/selftests: Turn off timeout setting
+ * hexagon: work around compiler crash
+ * ocfs2: call journal flush to mark journal as empty after journal recovery 
when mount
+ * ALSA: seq: Fix racy access for queue timer in proc read
+ * Fix built-in early-load Intel microcode alignment
+ * block: fix an integer overflow in logical block size
+ * USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx
+ * USB: serial: opticon: fix control-message timeouts
+ * USB: serial: suppress driver bind attributes
+ * USB: serial: ch341: handle unbound port at reset_resume
+ * USB: serial: io_edgeport: add missing active-port sanity check
+ * USB: serial: quatech2: handle unbound ports
+ * scsi: mptfusion: Fix double fetch bug in ioctl
+ * usb: core: hub: Improved device recognition on remote wakeup
+ * x86/efistub: Disable paging at mixed mode entry
+ * mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio()
+ * net: stmmac: 16KB buffer must be 16 byte aligned
+ * net: stmmac: Enable 16KB buffer size
+ * USB: serial: io_edgeport: use irqsave() in USB's complete callback
+ * USB: serial: io_edgeport: handle unbound ports on URB completion
+ * USB: serial: keyspan: handle unbound ports
+ * scsi: fnic: use kernel's '%pM' format option to print MAC
+ * scsi: fnic: fix invalid stack access
+ * arm64: dts: agilex/stratix10: fix pmu interrupt numbers
+ * netfilter: fix a use-after-free in mtype_destroy()
+ * batman-adv: Fix DAT candidate selection on little endian systems
+ * macvlan: use skb_reset_mac_header() in macvlan_queue_xmit()
+ * r8152: add missing endpoint sanity check
+ * tcp: fix marked lost packets not being retransmitted
+ * net: usb: lan78xx: limit size of local TSO packets
+ * xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk
+ * cw1200: 

[Kernel-packages] [Bug 1860690] Re: Smartpqi updates for 18.04.4

2020-01-23 Thread Connor Kuehl
** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Jeff Lane (bladernr)

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1860690

Title:
  Smartpqi updates for 18.04.4

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  [Impact]
  Most Ubuntu customers prefer the simplicity of using inbox drivers over 
out-of-box drivers Microsemi provides.  To do that well, we should keep that 
inbox driver moving forward.  If we don't land the updates in 18.04.4 customers 
would be waiting until ~ August 2020 for the 18.04.5 update.

  Microsemi have asked to have them pulled into 5.3 to update the
  SmartPQI driver that we carry.

  [Fixes]
  The following patches are in 5.4 Mainline and also our Focal tree are all 
clean cherry picks into 5.3.

  391a24179423 scsi: smartpqi: bump version
  48edb8780100 scsi: smartpqi: update copyright
  63a7956ae1e8 scsi: smartpqi: add new pci ids
  9946a3987248 scsi: smartpqi: correct REGNEWD return status
  71ecc60d9ba4 scsi: smartpqi: add gigabyte controller
  530dd8a7a2b1 scsi: smartpqi: correct hang when deleting 32 lds
  2d2ad4bc724e scsi: smartpqi: add bay identifier
  6d90615f1346 scsi: smartpqi: add sysfs entries
  522bc026f013 scsi: smartpqi: add module param to hide vsep
  8bdb3b9c67c5 scsi: smartpqi: add pci ids for fiberhome controller
  5e6a9760f7da scsi: smartpqi: add module param for exposure order

  All are clean cherry-picks into Eoan/master-next from 5.4 and do not
  touch anything outside of Microsemi's smartpqi driver.

  These have been cherry picked into my branch found here:
  
https://code.launchpad.net/~bladernr/ubuntu/+source/linux/+git/eoan/+ref/1860690-smartpqi-updates-master-next

  [Testing]
  Tested by upstream

  [Regression Risk]
  Low, these are updates and bug fixes from the upstream maintainer and have 
already been tested by the upstream on Ubuntu.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860690/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1860681] [NEW] Xenial update: 4.4.211 upstream stable release

2020-01-23 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.211 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1860681

Title:
  Xenial update: 4.4.211 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.211 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860681/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1850540] Re: multi-zone raid0 corruption

2020-01-23 Thread Connor Kuehl
** Changed in: linux (Ubuntu Trusty)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1850540

Title:
  multi-zone raid0 corruption

Status in Release Notes for Ubuntu:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in mdadm package in Ubuntu:
  Fix Released
Status in linux source package in Precise:
  New
Status in mdadm source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in mdadm source package in Trusty:
  Confirmed
Status in linux source package in Xenial:
  Confirmed
Status in mdadm source package in Xenial:
  Confirmed
Status in linux source package in Bionic:
  In Progress
Status in mdadm source package in Bionic:
  Fix Committed
Status in linux source package in Disco:
  In Progress
Status in mdadm source package in Disco:
  Fix Committed
Status in linux source package in Eoan:
  In Progress
Status in mdadm source package in Eoan:
  Fix Committed
Status in linux source package in Focal:
  Confirmed
Status in mdadm source package in Focal:
  Fix Released
Status in mdadm package in Debian:
  Fix Released

Bug description:
  Bug 1849682 tracks the temporarily revert of the fix for this issue,
  while this bug tracks the re-application of that fix once we have a
  full solution.

  [Impact]
  (cut & paste from https://marc.info/?l=linux-raid=157360088014027=2)
  An unintentional RAID0 layout change was introduced in the v3.14 kernel. This 
effectively means there are 2 different layouts Linux will use to write data to 
RAID0 arrays in the wild - the “pre-3.14” way and the “3.14 and later” way. 
Mixing these layouts by writing to an array while booted on these different 
kernel versions can lead to corruption.

  Note that this only impacts RAID0 arrays that include devices of
  different sizes. If your devices are all the same size, both layouts
  are equivalent, and your array is not at risk of corruption due to
  this issue.

  Unfortunately, the kernel cannot detect which layout was used for
  writes to pre-existing arrays, and therefore requires input from the
  administrator. This input can be provided via the kernel command line
  with the raid0.default_layout= parameter, or by setting the
  default_layout module parameter when loading the raid0 module. With a
  new enough version of mdadm (>= 4.2, or equivalent distro backports),
  you can set the layout version when assembling a stopped array. For
  example:

  mdadm --stop /dev/md0
  mdadm --assemble -U layout-alternate /dev/md0 /dev/sda1 /dev/sda2
  See the mdadm manpage for more details. Once set in this manner, the layout 
will be recorded in the array and will not need to be explicitly specified in 
the future.

  (The mdadm part of this SRU is for the above support ^)

  [Test Case]
  = mdadm =
  Confirm that a multi-zone raid0 created w/ older mdadm is able to be started 
on a fixed kernel by setting a layout.
  1) Ex: w/ old kernel/mdadm:
    mdadm --create /dev/md0 --run --metadata=default \
  --level=0 --raid-devices=2 /dev/vdb1 /dev/vdc1
  2) Reboot onto fixed kernel & update mdadm
  3) sudo mdadm --stop /dev/md0 &&
     sudo mdadm --assemble -U layout-alternate \
   /dev/md0 /dev/vdb1 /dev/vdc1
  4) Confirm that the array autostarts on reboot
  5) Confirm that w/ new kernel & new mdadm, a user can create and start an 
array in a backwards-compatible fashion (i.e. w/o an explicit layout).
  6) Verify that 'mdadm --detail /dev/md0' displays the layout

  = linux =
  Similar to above, but using kernel command line options.

  [Regression Risk]
  The kernel side of things will break starting pre-existing arrays. That's 
intentional.

  The mdadm side will cause a regression in functionality where a user
  can no longer create multi-zone raid0s on kernels that do not yet have
  the raid0 layout patches. This is intentional, as such RAID arrays
  present a corruption risk.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1850540/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1858625] Re: trusty/linux: 3.13.0-176.227 -proposed tracker

2020-01-22 Thread Connor Kuehl
** Summary changed:

- trusty/linux:  -proposed tracker
+ trusty/linux: 3.13.0-176.227 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1858625

Title:
  trusty/linux: 3.13.0-176.227 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Packaging
  phase-changed: Wednesday, 22. January 2020 18:25 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
precise/linux-lts-trusty: bug 1858624
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858625/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1859865] Re: Xenial update: 4.4.210 upstream stable release

2020-01-16 Thread Connor Kuehl
The following commits were skipped as they have already been applied:

* kobject: Export kobject_get_unless_zero()
* mwifiex: fix possible heap overflow in mwifiex_process_country_ie() 

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * chardev: Avoid potential use-after-free in 'chrdev_open()'
+ * usb: chipidea: host: Disable port power only if previously enabled
+ * ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5
+ * kernel/trace: Fix do not unregister tracepoints when register 
sched_migrate_task fail
+ * tracing: Have stack tracer compile when MCOUNT_INSN_SIZE is not defined
+ * HID: Fix slab-out-of-bounds read in hid_field_extract
+ * HID: uhid: Fix returning EPOLLOUT from uhid_char_poll
+ * HID: hid-input: clear unmapped usages
+ * Input: add safety guards to input_set_keycode()
+ * drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ
+ * can: gs_usb: gs_usb_probe(): use descriptors of current altsetting
+ * can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling 
to irq mode
+ * can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing 
CAN sk_buffs
+ * staging: vt6656: set usb_set_intfdata on driver fail.
+ * USB: serial: option: add ZLP support for 0x1bc7/0x9010
+ * usb: musb: Disable pullup at init
+ * usb: musb: dma: Correct parameter passed to IRQ handler
+ * staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21
+ * tty: link tty and port before configuring it as console
+ * tty: always relink the port
+ * mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
+ * scsi: bfa: release allocated memory in case of error
+ * rtl8xxxu: prevent leaking urb
+ * USB: Fix: Don't skip endpoint descriptors with maxpacket=0
+ * netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
+ * netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
+ * drm/i915/gen9: Clear residual context state on context switch
+ * Linux 4.4.210
+ * UBUNTU: upstream stable to v4.4.210
  
-4.4.210 upstream stable release
-from git://git.kernel.org/
+    4.4.210 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1859865

Title:
  Xenial update: 4.4.210 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * chardev: Avoid potential use-after-free in 'chrdev_open()'
  * usb: chipidea: host: Disable port power only if previously enabled
  * ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5
  * kernel/trace: Fix do not unregister tracepoints when register 
sched_migrate_task fail
  * tracing: Have stack tracer compile when MCOUNT_INSN_SIZE is not defined
  * HID: Fix slab-out-of-bounds read in hid_field_extract
  * HID: uhid: Fix returning EPOLLOUT from uhid_char_poll
  * HID: hid-input: clear unmapped usages
  * Input: add safety guards to input_set_keycode()
  * drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ
  * can: gs_usb: gs_usb_probe(): use descriptors of current altsetting
  * can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling 
to irq mode
  * can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing 
CAN sk_buffs
  * staging: vt6656: set usb_set_intfdata on driver fail.
  * USB: serial: option: add ZLP support for 0x1bc7/0x9010
  * usb: musb: Disable pullup at init
  * usb: musb: dma: Correct parameter passed to IRQ handler
  * staging: 

[Kernel-packages] [Bug 1859865] [NEW] Xenial update: 4.4.210 upstream stable release

2020-01-15 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.210 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1859865

Title:
  Xenial update: 4.4.210 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.210 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859865/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1859820] Re: eoan/linux-azure: 5.3.0-1010.11 -proposed tracker

2020-01-15 Thread Connor Kuehl
** Summary changed:

- eoan/linux-azure:  -proposed tracker
+ eoan/linux-azure: 5.3.0-1010.11 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1859820

Title:
  eoan/linux-azure: 5.3.0-1010.11 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-lrm series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow stakeholder-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-azure package in Ubuntu:
  Invalid
Status in linux-azure source package in Eoan:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1859694
  packages:
lrm: linux-restricted-modules-azure
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Packaging
  phase-changed: Wednesday, 15. January 2020 18:36 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-lrm: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
bionic/linux-azure-5.3: bug 1859819
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1859820/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1859795] Re: bionic/linux-aws: 4.15.0-1058.60 -proposed tracker

2020-01-15 Thread Connor Kuehl
** Summary changed:

- bionic/linux-aws:  -proposed tracker
+ bionic/linux-aws: 4.15.0-1058.60 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1859795

Title:
  bionic/linux-aws: 4.15.0-1058.60 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-lrm series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Bionic:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1859705
  packages:
lrm: linux-restricted-modules-aws
main: linux-aws
meta: linux-meta-aws
  phase: Packaging
  phase-changed: Wednesday, 15. January 2020 17:26 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-lrm: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
  trackers:
bionic/linux-aws-fips: bug 1859801
bionic/linux-aws/aws-kernel: bug 1859794
xenial/linux-aws-hwe: bug 1859802
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1859795/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1859640] Re: Xenial update: 4.4.209 upstream stable release

2020-01-15 Thread Connor Kuehl
Note, the following commit was skipped because it has already been
applied:

* Revert "perf report: Add warning when libunwind not compiled in"

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * PM / devfreq: Don't fail devfreq_dev_release if not in list
+ * RDMA/cma: add missed unregister_pernet_subsys in init failure
+ * scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func
+ * scsi: qla2xxx: Don't call qlt_async_event twice
+ * scsi: iscsi: qla4xxx: fix double free in probe
+ * scsi: libsas: stop discovering if oob mode is disconnected
+ * usb: gadget: fix wrong endpoint desc
+ * md: raid1: check rdev before reference in raid1_sync_request func
+ * s390/cpum_sf: Adjust sampling interval to avoid hitting sample limits
+ * s390/cpum_sf: Avoid SBD overflow condition in irq handler
+ * xen/balloon: fix ballooned page accounting without hotplug enabled
+ * xfs: fix mount failure crash on invalid iclog memory access
+ * taskstats: fix data-race
+ * ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code
+ * MIPS: Avoid VDSO ABI breakage due to global register variable
+ * locks: print unsigned ino in /proc/locks
+ * dmaengine: Fix access to uninitialized dma_slave_caps
+ * compat_ioctl: block: handle Persistent Reservations
+ * gpiolib: fix up emulated open drain outputs
+ * ALSA: cs4236: fix error return comparison of an unsigned integer
+ * ftrace: Avoid potential division by zero in function profiler
+ * Bluetooth: btusb: fix PM leak in error case of setup
+ * Bluetooth: delete a stray unlock
+ * tty: serial: msm_serial: Fix lockup for sysrq and oops
+ * drm/mst: Fix MST sideband up-reply failure handling
+ * powerpc/pseries/hvconsole: Fix stack overread via udbg
+ * ath9k_htc: Modify byte order for an error message
+ * ath9k_htc: Discard undersized packets
+ * net: add annotations on hh->hh_len lockless accesses
+ * s390/smp: fix physical to logical CPU map for SMT
+ * locking/x86: Remove the unused atomic_inc_short() methd
+ * pstore/ram: Write new dumps to start of recycled zones
+ * locking/spinlock/debug: Fix various data races
+ * netfilter: ctnetlink: netns exit must wait for callbacks
+ * ARM: vexpress: Set-up shared OPP table instead of individual for each CPU
+ * netfilter: uapi: Avoid undefined left-shift in xt_sctp.h
+ * ARM: dts: am437x-gp/epos-evm: fix panel compatible
+ * powerpc: Ensure that swiotlb buffer is allocated from low memory
+ * bnx2x: Do not handle requests from VFs after parity
+ * bnx2x: Fix logic to get total no. of PFs per engine
+ * net: usb: lan78xx: Fix error message format specifier
+ * rfkill: Fix incorrect check to avoid NULL pointer dereference
+ * ASoC: wm8962: fix lambda value
+ * regulator: rn5t618: fix module aliases
+ * kconfig: don't crash on NULL expressions in expr_eq()
+ * parisc: Fix compiler warnings in debug_core.c
+ * llc2: Fix return statement of llc_stat_ev_rx_null_dsap_xid_c (and _test_c)
+ * net: stmmac: dwmac-sunxi: Allow all RGMII modes
+ * net: usb: lan78xx: fix possible skb leak
+ * pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
+ * sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY
+ * tcp: fix "old stuff" D-SACK causing SACK to be treated as D-SACK
+ * vlan: vlan_changelink() should propagate errors
+ * vlan: fix memory leak in vlan_dev_set_egress_priority
+ * vxlan: fix tos value before xmit
+ * macvlan: do not assume mac_header is set in macvlan_broadcast()
+ * USB: core: fix check for duplicate endpoints
+ * USB: serial: option: add Telit ME910G1 0x110a composition
+ * Linux 4.4.209
+ * UBUNTU: upstream stable to v4.4.209
  
-4.4.209 upstream stable release
-from git://git.kernel.org/
+    4.4.209 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1859640

Title:
  Xenial update: 4.4.209 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU 

[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-14 Thread Connor Kuehl
https://lists.ubuntu.com/archives/kernel-team/2020-January/106863.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Disco:
  In Progress
Status in linux source package in Eoan:
  In Progress

Bug description:
  [Impact]

  Discard requests can fail on a non-compliant nvme device meaning that
  prescribed maintenance use of fstrim will be unsuccessful and unused
  blocks are no longer properly disposed of.

  [Test case]

  Run fstrim (from bug report, ran as root: fstrim -v /)

  Expected result: "/: 758.3 GiB (814159003648 bytes) trimmed" -- will
  vary depending on the blocks that are unused for your system

  Unpatched actual result: "fstrim: /: FITRIM ioctl failed: Input/output
  error"

  [Regression Potential]

  This patch only increases the size of a memory allocation and does not
  add any changes in logic for error handling or normal flow of control.
  This routine already handles the case where the memory allocation
  fails. Because of this, it is a low risk change.

  Original bug description below:
  --

  /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1

  on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen
  3400G CPU. The filesystem is ext4:

  Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18
  UTC 2019 x86_64 x86_64 x86_64 GNU/Linux

  UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0
  /dev/nvme0n1p2 on / type ext4 (rw,relatime)

  When I run fstrim -v / as root, I get the following error message at
  the command line:

  seth@elemental:~$ sudo fstrim -v /
  fstrim: /: FITRIM ioctl failed: Input/output error

  and the following kernel messages are logged:

  [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x0 flags=0x]
  [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x700 flags=0x]
  [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x680 flags=0x]
  [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x300 flags=0x]
  [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x200 flags=0x]
  [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x580 flags=0x]
  [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x100 flags=0x]
  [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x400 flags=0x]
  [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x380 flags=0x]
  [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x780 flags=0x]
  [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed
  [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x180 flags=0x]
  [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x500 flags=0x]
  [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x480 flags=0x]
  [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x280 flags=0x]
  [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x600 flags=0x]
  [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x80 flags=0x]
  [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x980 flags=0x]
  [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x900 flags=0x]
  [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x880 flags=0x]
  [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0xa00 flags=0x]
  [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 
0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0

  I have tried setting iommu passthrough on boot but this doesn’t seem
  to help:

  GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=pt avic=1”

  This is possibly related to:

  https://bugzilla.kernel.org/show_bug.cgi?id=202665
  
http://git.infradead.org/nvme.git/commitdiff/530436c45ef2e446c12538a400e465929a0b3ade?hp=400b6a7b13a3fd71cff087139ce45dd1e5fff444

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856603/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to 

[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-14 Thread Connor Kuehl
It looks like the version of this routine is Xenial is not impacted
since it hasn't received this refactor patch which constrains the
allocation to 16 bytes: 03b5929ebb20 ("nvme: rewrite discard support").
I will remove the Xenial nomination.

** Description changed:

+ [Impact]
+ 
+ Discard requests can fail on a non-compliant nvme device meaning that
+ prescribed maintenance use of fstrim will be unsuccessful and unused
+ blocks are no longer properly disposed of.
+ 
+ [Test case]
+ 
+ Run fstrim (from bug report, ran as root: fstrim -v /)
+ 
+ Expected result: "/: 758.3 GiB (814159003648 bytes) trimmed" -- will
+ vary depending on the blocks that are unused for your system
+ 
+ Unpatched actual result: "fstrim: /: FITRIM ioctl failed: Input/output
+ error"
+ 
+ [Regression Potential]
+ 
+ This patch only increases the size of a memory allocation and does not
+ add any changes in logic for error handling or normal flow of control.
+ This routine already handles the case where the memory allocation fails.
+ Because of this, it is a low risk change.
+ 
+ Original bug description below:
+ --
+ 
  /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1
  
  on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen
  3400G CPU. The filesystem is ext4:
  
  Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18 UTC
  2019 x86_64 x86_64 x86_64 GNU/Linux
  
  UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0
  /dev/nvme0n1p2 on / type ext4 (rw,relatime)
  
  When I run fstrim -v / as root, I get the following error message at the
  command line:
  
  seth@elemental:~$ sudo fstrim -v /
  fstrim: /: FITRIM ioctl failed: Input/output error
  
  and the following kernel messages are logged:
  
  [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x0 flags=0x]
  [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x700 flags=0x]
  [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x680 flags=0x]
  [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x300 flags=0x]
  [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x200 flags=0x]
  [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x580 flags=0x]
  [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x100 flags=0x]
  [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x400 flags=0x]
  [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x380 flags=0x]
  [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x780 flags=0x]
  [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed
  [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x180 flags=0x]
  [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x500 flags=0x]
  [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x480 flags=0x]
  [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x280 flags=0x]
  [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x600 flags=0x]
  [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x80 flags=0x]
  [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x980 flags=0x]
  [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x900 flags=0x]
  [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x880 flags=0x]
  [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0xa00 flags=0x]
  [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 
0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0
  
- 
- I have tried setting iommu passthrough on boot but this doesn’t seem to help:
+ I have tried setting iommu passthrough on boot but this doesn’t seem to
+ help:
  
  GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=pt avic=1”
  
  This is possibly related to:
  
  https://bugzilla.kernel.org/show_bug.cgi?id=202665
  
http://git.infradead.org/nvme.git/commitdiff/530436c45ef2e446c12538a400e465929a0b3ade?hp=400b6a7b13a3fd71cff087139ce45dd1e5fff444

** No longer affects: linux (Ubuntu Xenial)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

Status in linux package in Ubuntu:
  Invalid

[Kernel-packages] [Bug 1859640] Re: Xenial update: 4.4.209 upstream stable release

2020-01-14 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1859640

Title:
  Xenial update: 4.4.209 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.209 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859640/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1859640] [NEW] Xenial update: 4.4.209 upstream stable release

2020-01-14 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.209 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1859640

Title:
  Xenial update: 4.4.209 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.209 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859640/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1856608] Re: [Regression] usb usb2-port2: Cannot enable. Maybe the USB cable is bad?

2020-01-08 Thread Connor Kuehl
** Changed in: linux (Ubuntu Eoan)
   Status: Incomplete => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856608

Title:
  [Regression] usb usb2-port2: Cannot enable. Maybe the USB cable is
  bad?

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Bionic:
  Triaged
Status in linux source package in Disco:
  Incomplete
Status in linux source package in Eoan:
  Fix Committed
Status in linux source package in Focal:
  Incomplete

Bug description:
  This appears to be a regression between 4.15.0-70.79 and 4.15.0-72.81.

  [Impact]
  USB port unusable and boot time takes ~5 minutes longer to complete.

  Kernel emits messages like:
  usb usb2-port2: Cannot enable. Maybe the USB cable is bad?

  [Test Case]
  dmesg | grep "Cannot enable"

  [Fix]
  [Regression Risk]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856608/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1858955] [NEW] bionic/linux-raspi2: -proposed tracker

2020-01-08 Thread Connor Kuehl
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1858956
packages:
  main: linux-raspi2
  meta: linux-meta-raspi2
phase: Holding before Packaging
phase-changed: Wednesday, 08. January 2020 23:22 UTC
reason:
  prepare-package: Holding -- waiting for master bug
trackers:
  bionic/linux-raspi2/pi-kernel: bug 1858954
variant: debs

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Invalid

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-raspi2 (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-raspi2 (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.12.02-12 kernel-sru-derivative-of-1858956

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: bionic kernel-release-tracking-bug

** Also affects: linux-raspi2 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux-raspi2 (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
  

[Kernel-packages] [Bug 1858956] [NEW] bionic/linux: -proposed tracker

2020-01-08 Thread Connor Kuehl
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
packages:
  lrm: linux-restricted-modules
  main: linux
  meta: linux-meta
  signed: linux-signed
phase: Ready for Packaging
phase-changed: Wednesday, 08. January 2020 23:22 UTC
reason:
  prepare-package: Pending -- version not specified
trackers:
  bionic/linux-raspi2: bug 1858955
  bionic/linux/pc-kernel: bug 1858952
  bionic/linux/pc-lowlatency-kernel: bug 1858953
variant: debs

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Confirmed

** Affects: kernel-sru-workflow/prepare-package-lrm
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.12.02-12

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-lrm
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: bionic kernel-release-tracking-bug

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => 

[Kernel-packages] [Bug 1858943] Re: eoan/linux: 5.3.0-27.29 -proposed tracker

2020-01-08 Thread Connor Kuehl
** Summary changed:

- eoan/linux:  -proposed tracker
+ eoan/linux: 5.3.0-27.29 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1858943

Title:
  eoan/linux: 5.3.0-27.29 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-lrm series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  packages:
lrm: linux-restricted-modules
main: linux
meta: linux-meta
signed: linux-signed
  phase: Packaging
  phase-changed: Wednesday, 08. January 2020 23:06 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-lrm: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
bionic/linux-hwe: bug 1858942
eoan/linux-raspi2: bug 1858941
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858943/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1858798] Re: tools/perf fails to build after Xenial update to 4.4.208 upstream stable release

2020-01-08 Thread Connor Kuehl
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1858798

Title:
  tools/perf fails to build after Xenial update to 4.4.208 upstream
  stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  [Impact]
  xenial/linux after the update to 4.4.208 upstream stable fails to build 
tools/perf on environments that don't have libunwind installed.

  https://launchpad.net/~canonical-kernel-
  team/+archive/ubuntu/ppa/+build/18530346/+files/buildlog_ubuntu-
  xenial-powerpc.linux_4.4.0-172.201_BUILDING.txt.gz

  [...]
  builtin-report.c: In function ‘report__setup_sample_type’:
  builtin-report.c:289:6: error: ‘dwarf_callchain_users’ undeclared (first use 
in this function)
    if (dwarf_callchain_users) {
    ^
  [...]

  This is caused by the following commit from linux-4.4.y:

  commit faece3af80729763bb28449fa803d12c962571bd
  Author: Jin Yao 
  Date:   Fri Oct 11 10:21:22 2019 +0800

  perf report: Add warning when libunwind not compiled in

  [ Upstream commit 800d3f561659b5436f8c57e7c26dd1f6928b5615 ]

  [Fix]
  Revert the mentioned commit. The variable 'dwarf_callchain_users' was 
introduced by eabad8c6856f "perf unwind: Do not look just at the global 
callchain_param.record_mode" which as of now hasn't been backported to stable 
linux-4.4.y.

  [Test]
  Build the kernel on PPA for powerpc, ppc64el and s390x.

  [Regression Potential]
  Null. This commit is supposed to only add a warning and is breaking the build 
for some architectures, so reverting it will not cause any regression for the 
users.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858798/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1858594] Re: xenial/linux: 4.4.0-172.202 -proposed tracker

2020-01-08 Thread Connor Kuehl
** Summary changed:

- xenial/linux: 4.4.0-172.201 -proposed tracker
+ xenial/linux: 4.4.0-172.202 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Released => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: Fix Released => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1858594

Title:
  xenial/linux: 4.4.0-172.202 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Packaging
  phase-changed: Tuesday, 07. January 2020 22:21 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
trusty/linux-aws: bug 1858591
trusty/linux-lts-xenial: bug 1858592
xenial/linux-aws: bug 1858581
xenial/linux-cascade: bug 1858583
xenial/linux-fips: bug 1858589
xenial/linux-kvm: bug 1858584
xenial/linux-raspi2: bug 1858586
xenial/linux-snapdragon: bug 1858588
xenial/linux/caracalla-kernel: bug 1858577
xenial/linux/pc-kernel: bug 1858578
xenial/linux/stlouis-kernel: bug 1858579
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858594/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1858594] Re: xenial/linux: 4.4.0-172.201 -proposed tracker

2020-01-07 Thread Connor Kuehl
** Summary changed:

- xenial/linux:  -proposed tracker
+ xenial/linux: 4.4.0-172.201 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1858594

Title:
  xenial/linux: 4.4.0-172.201 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Packaging
  phase-changed: Tuesday, 07. January 2020 22:21 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
trusty/linux-aws: bug 1858591
trusty/linux-lts-xenial: bug 1858592
xenial/linux-aws: bug 1858581
xenial/linux-cascade: bug 1858583
xenial/linux-fips: bug 1858589
xenial/linux-kvm: bug 1858584
xenial/linux-raspi2: bug 1858586
xenial/linux-snapdragon: bug 1858588
xenial/linux/caracalla-kernel: bug 1858577
xenial/linux/pc-kernel: bug 1858578
xenial/linux/stlouis-kernel: bug 1858579
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858594/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-07 Thread Connor Kuehl
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** No longer affects: fstrim (Ubuntu)

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux (Ubuntu Disco)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

** No longer affects: fstrim (Ubuntu Xenial)

** No longer affects: fstrim (Ubuntu Bionic)

** No longer affects: fstrim (Ubuntu Disco)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Disco:
  In Progress
Status in linux source package in Eoan:
  In Progress

Bug description:
  /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1

  on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen
  3400G CPU. The filesystem is ext4:

  Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18
  UTC 2019 x86_64 x86_64 x86_64 GNU/Linux

  UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0
  /dev/nvme0n1p2 on / type ext4 (rw,relatime)

  When I run fstrim -v / as root, I get the following error message at
  the command line:

  seth@elemental:~$ sudo fstrim -v /
  fstrim: /: FITRIM ioctl failed: Input/output error

  and the following kernel messages are logged:

  [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x0 flags=0x]
  [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x700 flags=0x]
  [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x680 flags=0x]
  [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x300 flags=0x]
  [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x200 flags=0x]
  [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x580 flags=0x]
  [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x100 flags=0x]
  [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x400 flags=0x]
  [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x380 flags=0x]
  [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x780 flags=0x]
  [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed
  [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x180 flags=0x]
  [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x500 flags=0x]
  [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x480 flags=0x]
  [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x280 flags=0x]
  [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x600 flags=0x]
  [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x80 flags=0x]
  [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x980 flags=0x]
  [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x900 flags=0x]
  [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x880 flags=0x]
  [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0xa00 flags=0x]
  [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 
0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0

[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-07 Thread Connor Kuehl
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

** No longer affects: fstrim (Ubuntu Eoan)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

Status in fstrim package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1

  on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen
  3400G CPU. The filesystem is ext4:

  Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18
  UTC 2019 x86_64 x86_64 x86_64 GNU/Linux

  UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0
  /dev/nvme0n1p2 on / type ext4 (rw,relatime)

  When I run fstrim -v / as root, I get the following error message at
  the command line:

  seth@elemental:~$ sudo fstrim -v /
  fstrim: /: FITRIM ioctl failed: Input/output error

  and the following kernel messages are logged:

  [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x0 flags=0x]
  [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x700 flags=0x]
  [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x680 flags=0x]
  [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x300 flags=0x]
  [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x200 flags=0x]
  [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x580 flags=0x]
  [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x100 flags=0x]
  [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x400 flags=0x]
  [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x380 flags=0x]
  [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x780 flags=0x]
  [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed
  [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x180 flags=0x]
  [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x500 flags=0x]
  [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x480 flags=0x]
  [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x280 flags=0x]
  [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x600 flags=0x]
  [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x80 flags=0x]
  [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x980 flags=0x]
  [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x900 flags=0x]
  [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x880 flags=0x]
  [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0xa00 flags=0x]
  [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 
0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0

  
  I have tried setting iommu passthrough on boot but this doesn’t seem to help:

  GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=pt avic=1”

  This is possibly related to:

  https://bugzilla.kernel.org/show_bug.cgi?id=202665
  
http://git.infradead.org/nvme.git/commitdiff/530436c45ef2e446c12538a400e465929a0b3ade?hp=400b6a7b13a3fd71cff087139ce45dd1e5fff444

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fstrim/+bug/1856603/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1858462] Re: Xenial update: 4.4.208 upstream stable release

2020-01-06 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * btrfs: do not leak reloc root if we fail to read the fs root
+ * btrfs: handle ENOENT in btrfs_uuid_tree_iterate
+ * ALSA: hda/ca0132 - Keep power on during processing DSP response
+ * ALSA: hda/ca0132 - Avoid endless loop
+ * drm: mst: Fix query_payload ack reply struct
+ * iio: light: bh1750: Resolve compiler warning and make code more readable
+ * spi: Add call to spi_slave_abort() function when spidev driver is released
+ * staging: rtl8188eu: fix possible null dereference
+ * rtlwifi: prevent memory leak in rtl_usb_probe
+ * IB/iser: bound protection_sg size by data_sg size
+ * media: am437x-vpfe: Setting STD to current value is not an error
+ * media: i2c: ov2659: fix s_stream return value
+ * media: i2c: ov2659: Fix missing 720p register config
+ * media: ov6650: Fix stored frame format not in sync with hardware
+ * tools/power/cpupower: Fix initializer override in hsw_ext_cstates
+ * usb: renesas_usbhs: add suspend event support in gadget mode
+ * hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled
+ * regulator: max8907: Fix the usage of uninitialized variable in 
max8907_regulator_probe()
+ * media: flexcop-usb: fix NULL-ptr deref in flexcop_usb_transfer_init()
+ * samples: pktgen: fix proc_cmd command result check logic
+ * mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
+ * media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format
+ * media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence 
number
+ * media: ti-vpe: vpe: Make sure YUYV is set as default format
+ * extcon: sm5502: Reset registers during initialization
+ * x86/mm: Use the correct function type for native_set_fixmap()
+ * perf report: Add warning when libunwind not compiled in
+ * iio: adc: max1027: Reset the device at probe time
+ * Bluetooth: hci_core: fix init for HCI_USER_CHANNEL
+ * drm/gma500: fix memory disclosures due to uninitialized bytes
+ * x86/ioapic: Prevent inconsistent state when moving an interrupt
+ * arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill()
+ * libata: Ensure ata_port probe has completed before detach
+ * pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B
+ * bnx2x: Fix PF-VF communication over multi-cos queues.
+ * spi: img-spfi: fix potential double release
+ * rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt()
+ * perf probe: Fix to find range-only function instance
+ * perf probe: Fix to list probe event with correct line number
+ * perf probe: Walk function lines in lexical blocks
+ * perf probe: Fix to probe an inline function which has no entry pc
+ * perf probe: Fix to show ranges of variables in functions without entry_pc
+ * perf probe: Fix to show inlined function callsite without entry_pc
+ * perf probe: Skip overlapped location on searching variables
+ * perf probe: Return a better scope DIE if there is no best scope
+ * perf probe: Fix to show calling lines of inlined functions
+ * perf probe: Skip end-of-sequence and non statement lines
+ * perf probe: Filter out instances except for inlined subroutine and 
subprogram
+ * ath10k: fix get invalid tx rate for Mesh metric
+ * media: pvrusb2: Fix oops on tear-down when radio support is not present
+ * media: si470x-i2c: add missed operations in remove
+ * EDAC/ghes: Fix grain calculation
+ * spi: pxa2xx: Add missed security checks
+ * ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile
+ * parport: load lowlevel driver if ports not found
+ * cpufreq: Register drivers only after CPU devices have been registered
+ * x86/crash: Add a forward declaration of struct kimage
+ * spi: tegra20-slink: add missed clk_unprepare
+ * btrfs: don't prematurely free work in end_workqueue_fn()
+ * iwlwifi: check kasprintf() return value
+ * fbtft: Make sure string is NULL terminated
+ * crypto: sun4i-ss - Fix 64-bit size_t warnings on sun4i-ss-hash.c
+ * crypto: vmx - Avoid weird build failures
+ * libtraceevent: Fix memory leakage in copy_filter_type
+ * net: phy: initialise phydev speed and duplex sanely
+ * Revert "mmc: sdhci: Fix 

[Kernel-packages] [Bug 1858489] Re: Xenial update: 4.4.207 upstream stable release

2020-01-06 Thread Connor Kuehl
Note the following patches were skipped as they were already applied:   


* CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks   
* crypto: user - fix memory leak in crypto_report   

The following patch was reverted in favor of its upstream stable
version:

* KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID
(CVE-2019-19332

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * x86/apic/32: Avoid bogus LDR warnings
+ * usb: gadget: u_serial: add missing port entry locking
+ * tty: serial: msm_serial: Fix flow control
+ * x86/PCI: Avoid AMD FCH XHCI USB PME# from D0 defect
+ * serial: serial_core: Perform NULL checks for break_ctl ops
+ * serial: ifx6x60: add missed pm_runtime_disable
+ * autofs: fix a leak in autofs_expire_indirect()
+ * NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error
+ * Input: cyttsp4_core - fix use after free bug
+ * ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed()
+ * rsxx: add missed destroy_workqueue calls in remove
+ * net: ep93xx_eth: fix mismatch of request_mem_region in remove
+ * serial: core: Allow processing sysrq at port unlock time
+ * iwlwifi: mvm: Send non offchannel traffic via AP sta
+ * ARM: 8813/1: Make aligned 2-byte getuser()/putuser() atomic on ARMv6+
+ * extcon: max8997: Fix lack of path setting in USB device mode
+ * clk: rockchip: fix rk3188 sclk_smc gate data
+ * clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering
+ * dlm: fix missing idr_destroy for recover_idr
+ * MIPS: SiByte: Enable ZONE_DMA32 for LittleSur
+ * scsi: zfcp: drop default switch case which might paper over missing case
+ * pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues
+ * Staging: iio: adt7316: Fix i2c data reading, set the data field
+ * regulator: Fix return value of _set_load() stub
+ * MIPS: OCTEON: octeon-platform: fix typing
+ * math-emu/soft-fp.h: (_FP_ROUND_ZERO) cast 0 to void to fix warning
+ * rtc: max8997: Fix the returned value in case of error in 
'max8997_rtc_read_alarm()'
+ * rtc: dt-binding: abx80x: fix resistance scale
+ * ARM: dts: exynos: Use Samsung SoC specific compatible for DWC2 module
+ * dmaengine: coh901318: Fix a double-lock bug
+ * dmaengine: coh901318: Remove unused variable
+ * ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion()
+ * dma-mapping: fix return type of dma_set_max_seg_size()
+ * altera-stapl: check for a null key before strcasecmp'ing it
+ * serial: imx: fix error handling in console_setup
+ * i2c: imx: don't print error message on probe defer
+ * dlm: NULL check before kmem_cache_destroy is not needed
+ * nfsd: fix a warning in __cld_pipe_upcall()
+ * ARM: OMAP1/2: fix SoC name printing
+ * net/x25: fix called/calling length calculation in x25_parse_address_block
+ * net/x25: fix null_x25_address handling
+ * ARM: dts: mmp2: fix the gpio interrupt cell number
+ * tcp: fix off-by-one bug on aborting window-probing socket
+ * modpost: skip ELF local symbols during section mismatch check
+ * kbuild: fix single target build for external module
+ * ARM: dts: pxa: clean up USB controller nodes
+ * dlm: fix invalid cluster name warning
+ * powerpc/math-emu: Update macros from GCC
+ * MIPS: OCTEON: cvmx_pko_mem_debug8: use oldest forward compatible definition
+ * nfsd: Return EPERM, not EACCES, in some SETATTR cases
+ * mlx4: Use snprintf instead of complicated strcpy
+ * ARM: dts: sunxi: Fix PMU compatible strings
+ * sched/fair: Scale bandwidth quota and period without losing quota/period 
ratio precision
+ * fuse: verify nlink
+ * fuse: verify attributes
+ * ALSA: pcm: oss: Avoid potential buffer overflows
+ * Input: goodix - add upside-down quirk for Teclast X89 tablet
+ * CIFS: Fix SMB2 oplock break processing
+ * tty: vt: keyboard: reject invalid keycodes
+ * can: slcan: Fix use-after-free Read in slcan_open
+ * jbd2: Fix possible overflow in jbd2_log_space_left()
+ * drm/i810: Prevent underflow in ioctl
+ * KVM: x86: do not modify masked 

[Kernel-packages] [Bug 1858489] [NEW] Xenial update: 4.4.207 upstream stable release

2020-01-06 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.207 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1858489

Title:
  Xenial update: 4.4.207 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.207 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858489/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1858462] [NEW] Xenial update: 4.4.208 upstream stable release

2020-01-06 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.208 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1858462

Title:
  Xenial update: 4.4.208 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.208 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858462/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853791] Re: External microphone can't work on some dell machines with the codec alc256 or alc236

2019-12-19 Thread Connor Kuehl
Hey Hui,

Do you have access to a machine that you can use to verify that this bug
is fixed by the kernel in -proposed?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853791

Title:
  External microphone can't work on some dell machines with the codec
  alc256 or alc236

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux-oem-osp1 package in Ubuntu:
  New
Status in linux source package in Bionic:
  Fix Committed
Status in linux-oem-osp1 source package in Bionic:
  Fix Committed
Status in linux source package in Disco:
  Fix Committed
Status in linux-oem-osp1 source package in Disco:
  New
Status in linux source package in Eoan:
  Fix Committed
Status in linux-oem-osp1 source package in Eoan:
  New

Bug description:
  [Impact]
  The external microphone can't work on some dell machines with the
  codec alc256 or alc236

  [Fix]
  Need to apply the ALC255_FIXUP_DELL1_MIC_NO_PRESENCE, instead of
  adding a new pintbl in the quirk table, we use fallback table this
  time.

  [Test Case]
  tested the kernel with these patches, the external mic worked well.

  [Regression Risk]
  Low, just make the quirk applying more generic.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1853791/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1850195] Re: Update EFA driver to 1.5.0

2019-12-19 Thread Connor Kuehl
** Description changed:

- Version 1.4.1 of the EFA driver has been tagged: https://github.com/amzn
+ Version 1.5.0 of the EFA driver has been tagged: https://github.com/amzn
  /amzn-drivers/releases/tag/efa_linux_1.5.0

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1850195

Title:
  Update EFA driver to 1.5.0

Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  In Progress
Status in linux-aws source package in Bionic:
  In Progress
Status in linux-aws source package in Disco:
  In Progress
Status in linux-aws source package in Eoan:
  In Progress

Bug description:
  Version 1.5.0 of the EFA driver has been tagged:
  https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1850195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1856869] Re: Eoan update: 5.3.17 upstream stable release

2019-12-18 Thread Connor Kuehl
Please note I:

* Reverted the UBUNTU SAUCE version of "ovl: fix lookup failure on multi lower 
squashfs" in favor of the upstream stable version

   
* Reverted the UBUNTU SAUCE version of "seccomp: avoid overflow in implicit 
constant conversion" in favor of the upstream stable version

   
* Reverted the UBUNTU SAUCE version of "mfd: rk808: Fix RK818 ID template" in 
favor of the upstream stable version

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856869

Title:
  Eoan update: 5.3.17 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * usb: gadget: configfs: Fix missing spin_lock_init()
  * usb: gadget: pch_udc: fix use after free
  * Revert "nvme: Add quirk for Kingston NVME SSD running FW E8FK11.T"
  * scsi: zfcp: trace channel log even for FCP command responses
  * scsi: qla2xxx: Fix driver unload hang
  * scsi: qla2xxx: Fix memory leak when sending I/O fails
  * media: venus: remove invalid compat_ioctl32 handler
  * USB: uas: honor flag to avoid CAPACITY16
  * USB: uas: heed CAPACITY_HEURISTICS
  * USB: documentation: flags on usb-storage versus UAS
  * usb: Allow USB device to be warm reset in suspended state
  * usb: host: xhci-tegra: Correct phy enable sequence
  * binder: fix incorrect calculation for num_valid
  * staging: rtl8188eu: fix interface sanity check
  * staging: rtl8712: fix interface sanity check
  * staging: vchiq: call unregister_chrdev_region() when driver registration 
fails
  * staging: gigaset: fix general protection fault on probe
  * staging: gigaset: fix illegal free on probe errors
  * staging: gigaset: add endpoint-type sanity check
  * usb: xhci: only set D3hot for pci device
  * xhci: Fix memory leak in xhci_add_in_port()
  * xhci: fix USB3 device initiated resume race with roothub autosuspend
  * xhci: Increase STS_HALT timeout in xhci_suspend()
  * xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour.
  * xhci: make sure interrupts are restored to correct state
  * interconnect: qcom: sdm845: Walk the list safely on node removal
  * ARM: dts: pandora-common: define wl1251 as child node of mmc3
  * iio: adis16480: Add debugfs_reg_access entry
  * iio: adis16480: Fix scales factors
  * iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting
  * iio: imu: inv_mpu6050: fix temperature reporting using bad unit
  * iio: adc: ad7606: fix reading unnecessary data from device
  * iio: adc: ad7124: Enable internal reference
  * USB: atm: ueagle-atm: add missing endpoint check
  * USB: idmouse: fix interface sanity checks
  * USB: serial: io_edgeport: fix epic endpoint lookup
  * usb: roles: fix a potential use after free
  * USB: adutux: fix interface sanity check
  * usb: core: urb: fix URB structure initialization function
  * usb: mon: Fix a deadlock in usbmon between mmap and read
  * tpm: add check after commands attribs tab allocation
  * EDAC/altera: Use fast register IO for S10 IRQs
  * brcmfmac: disable PCIe interrupts before bus reset
  * mtd: spear_smi: Fix Write Burst mode
  * mtd: rawnand: Change calculating of position page containing BBM
  * virt_wifi: fix use-after-free in virt_wifi_newlink()
  * virtio-balloon: fix managed page counts when migrating pages between zones
  * usb: dwc3: pci: add ID for the Intel Comet Lake -H variant
  * usb: dwc3: gadget: Fix logical condition
  * usb: dwc3: gadget: Clear started flag for non-IOC
  * usb: dwc3: ep0: Clear started flag on completion
  * phy: renesas: rcar-gen3-usb2: Fix sysfs interface of "role"
  * usb: typec: fix use after free in typec_register_port()
  * iwlwifi: pcie: fix support for transmitting SKBs with fraglist
  * btrfs: check page->mapping when loading free space cache
  * btrfs: use refcount_inc_not_zero in kill_all_nodes
  * Btrfs: fix metadata space leak on fixup worker failure to set range as 
delalloc
  * Btrfs: fix negative subv_writers counter and data space leak after buffered 
write
  * btrfs: Avoid getting stuck during cyclic writebacks
  * btrfs: Remove btrfs_bio::flags member
  * Btrfs: send, skip backreference walking for extents with many references
  * btrfs: record all roots for rename exchange on a subvol
  * rtlwifi: rtl8192de: Fix missing 

[Kernel-packages] [Bug 1856870] Re: Eoan update: 5.3.18 upstream stable release

2019-12-18 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * inet: protect against too small mtu values.
+ * mqprio: Fix out-of-bounds access in mqprio_dump
+ * net: bridge: deny dev_set_mac_address() when unregistering
+ * net: dsa: fix flow dissection on Tx path
+ * net: ethernet: ti: cpsw: fix extra rx interrupt
+ * net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues
+ * net: thunderx: start phy before starting autonegotiation
+ * net/tls: Fix return values to avoid ENOTSUPP
+ * openvswitch: support asymmetric conntrack
+ * tcp: md5: fix potential overestimation of TCP option space
+ * tipc: fix ordering of tipc module init and exit routine
+ * net/mlx5e: Query global pause state before setting prio2buffer
+ * net: ipv6: add net argument to ip6_dst_lookup_flow
+ * net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
+ * tcp: fix rejected syncookies due to stale timestamps
+ * tcp: tighten acceptance of ACKs not matching a child socket
+ * tcp: Protect accesses to .ts_recent_stamp with {READ,WRITE}_ONCE()
+ * gre: refetch erspan header from skb->data after pskb_may_pull()
+ * Fixed updating of ethertype in function skb_mpls_pop
+ * hsr: fix a NULL pointer dereference in hsr_dev_xmit()
+ * net: Fixed updating of ethertype in skb_mpls_push()
+ * net/mlx5e: Fix TXQ indices to be sequential
+ * page_pool: do not release pool until inflight == 0.
+ * xdp: obtain the mem_id mutex before trying to remove an entry.
+ * Linux 5.3.18
+ * UBUNTU: upstream stable to v5.3.18
  
-5.3.18 upstream stable release
-from git://git.kernel.org/
+    5.3.18 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856870

Title:
  Eoan update: 5.3.18 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * inet: protect against too small mtu values.
  * mqprio: Fix out-of-bounds access in mqprio_dump
  * net: bridge: deny dev_set_mac_address() when unregistering
  * net: dsa: fix flow dissection on Tx path
  * net: ethernet: ti: cpsw: fix extra rx interrupt
  * net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues
  * net: thunderx: start phy before starting autonegotiation
  * net/tls: Fix return values to avoid ENOTSUPP
  * openvswitch: support asymmetric conntrack
  * tcp: md5: fix potential overestimation of TCP option space
  * tipc: fix ordering of tipc module init and exit routine
  * net/mlx5e: Query global pause state before setting prio2buffer
  * net: ipv6: add net argument to ip6_dst_lookup_flow
  * net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
  * tcp: fix rejected syncookies due to stale timestamps
  * tcp: tighten acceptance of ACKs not matching a child socket
  * tcp: Protect accesses to .ts_recent_stamp with {READ,WRITE}_ONCE()
  * gre: refetch erspan header from skb->data after pskb_may_pull()
  * Fixed updating of ethertype in function skb_mpls_pop
  * hsr: fix a NULL pointer dereference in hsr_dev_xmit()
  * net: Fixed updating of ethertype in skb_mpls_push()
  * net/mlx5e: Fix TXQ indices to be sequential
  * page_pool: do not release pool until inflight == 0.
  * xdp: obtain the mem_id mutex before trying to remove an entry.
  * Linux 5.3.18
  * UBUNTU: upstream stable to v5.3.18

     5.3.18 upstream stable release
     from git://git.kernel.org/

To manage notifications about this bug go to:

[Kernel-packages] [Bug 1856869] Re: Eoan update: 5.3.17 upstream stable release

2019-12-18 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel
+ * net/mlx4_en: fix mlx4 ethtool -N insertion
+ * net/mlx4_en: Fix wrong limitation for number of TX rings
+ * net: rtnetlink: prevent underflows in do_setvfinfo()
+ * net/sched: act_pedit: fix WARN() in the traffic path
+ * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key
+ * sfc: Only cancel the PPS workqueue if it exists
+ * net/mlxfw: Verify FSM error code translation doesn't exceed array size
+ * net/mlx5e: Fix set vf link state error flow
+ * net/mlx5: Fix auto group size calculation
+ * net/tls: enable sk_msg redirect to tls socket egress
+ * ipv6/route: return if there is no fib_nh_gw_family
+ * taprio: don't reject same mqprio settings
+ * net/ipv4: fix sysctl max for fib_multipath_hash_policy
+ * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6
+ * net/mlx5e: Do not use non-EXT link modes in EXT mode
+ * net/mlx5: Update the list of the PCI supported devices
+ * vhost/vsock: split packets to send using multiple buffers
+ * gpio: max77620: Fixup debounce delays
+ * gpio: bd70528: Use correct unit for debounce times
+ * tools: gpio: Correctly add make dependencies for gpio_utils
+ * fork: fix pidfd_poll()'s return type
+ * nbd:fix memory leak in nbd_get_socket()
+ * virtio_console: allocate inbufs in add_port() only if it is needed
+ * virtio_ring: fix return code on DMA mapping fails
+ * virtio_balloon: fix shrinker count
+ * Revert "fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()"
+ * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span()
+ * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node()
+ * drm/amdgpu: disable gfxoff when using register read interface
+ * drm/amdgpu: disable gfxoff on original raven
+ * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs
+ * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs
+ * drm/i915/pmu: "Frequency" is reported as accumulated cycles
+ * drm/i915/userptr: Try to acquire the page lock around set_page_dirty()
+ * Bluetooth: Fix invalid-free in bcsp_close()
+ * ath10k: restore QCA9880-AR1A (v1) detection
+ * ath10k: Fix HOST capability QMI incompatibility
+ * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe
+ * ath9k_hw: fix uninitialized variable data
+ * Revert "Bluetooth: hci_ll: set operational frequency earlier"
+ * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues"
+ * md/raid10: prevent access of uninitialized resync_pages offset
+ * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n
+ * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary
+ * x86/insn: Fix awk regexp warnings
+ * x86/speculation: Fix incorrect MDS/TAA mitigation status
+ * x86/speculation: Fix redundant MDS mitigation message
+ * nbd: prevent memory leak
+ * gve: fix dma sync bug where not all pages synced
+ * x86/stackframe/32: Repair 32-bit Xen PV
+ * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout
+ * x86/xen/32: Simplify ring check in xen_iret_crit_fixup()
+ * x86/doublefault/32: Fix stack canaries in the double fault handler
+ * x86/pti/32: Size initial_page_table correctly
+ * x86/cpu_entry_area: Add guard page for entry stack on 32bit
+ * x86/entry/32: Fix IRET exception
+ * x86/entry/32: Use %ss segment where required
+ * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL
+ * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry
+ * x86/entry/32: Fix NMI vs ESPFIX
+ * selftests/x86/mov_ss_trap: Fix the SYSENTER test
+ * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel
+ * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make 
the CPU_ENTRY_AREA_PAGES assert precise
+ * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3
+ * futex: Prevent robust futex exit race
+ * ALSA: usb-audio: Fix NULL dereference at parsing BADD
+ * nfc: port100: handle command failure cleanly
+ * media: vivid: Set 

[Kernel-packages] [Bug 1856869] [NEW] Eoan update: 5.3.17 upstream stable release

2019-12-18 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.17 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856869

Title:
  Eoan update: 5.3.17 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.17 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856869/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1856870] [NEW] Eoan update: 5.3.18 upstream stable release

2019-12-18 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.18 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856870

Title:
  Eoan update: 5.3.18 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.18 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856870/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1856359] Re: EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions")

2019-12-13 Thread Connor Kuehl
It looks like Eoan already has this commit: https://git.launchpad.net
/~canonical-kernel/ubuntu/+source/linux-
aws/+git/eoan/commit/?id=f95be3d28d891b0c0f339a504e3aa8e382bbd9a6

And Xenial and Bionic don't appear to have 0ede73bc012c ("IB/uverbs:
Extend uverbs_ioctl header with driver_id") and therefore don't need the
additional commit that wires into it.

** Changed in: linux-aws (Ubuntu Eoan)
   Status: In Progress => Invalid

** Changed in: linux-aws (Ubuntu Bionic)
   Status: In Progress => Invalid

** Changed in: linux-aws (Ubuntu Xenial)
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1856359

Title:
  EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related
  definitions")

Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  Invalid
Status in linux-aws source package in Bionic:
  Invalid
Status in linux-aws source package in Disco:
  In Progress
Status in linux-aws source package in Eoan:
  Invalid

Bug description:
  For kernels that contain: 0ede73bc012c ("IB/uverbs: Extend
  uverbs_ioctl header with driver_id"), then the EFA driver should be
  integrated for enumeration with: f95be3d28d89 ("RDMA: Add EFA related
  definitions")

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1856359/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1856359] [NEW] EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions")

2019-12-13 Thread Connor Kuehl
Public bug reported:

For kernels that contain: 0ede73bc012c ("IB/uverbs: Extend uverbs_ioctl
header with driver_id"), then the EFA driver should be integrated for
enumeration with: f95be3d28d89 ("RDMA: Add EFA related definitions")

** Affects: linux-aws (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-aws (Ubuntu Xenial)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Affects: linux-aws (Ubuntu Bionic)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Affects: linux-aws (Ubuntu Disco)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Affects: linux-aws (Ubuntu Eoan)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Also affects: linux-aws (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: linux-aws (Ubuntu)
   Status: In Progress => Invalid

** Changed in: linux-aws (Ubuntu)
   Importance: Medium => Undecided

** Changed in: linux-aws (Ubuntu)
 Assignee: Connor Kuehl (connork) => (unassigned)

** Changed in: linux-aws (Ubuntu Xenial)
     Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Bionic)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Disco)
     Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux-aws (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux-aws (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux-aws (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1856359

Title:
  EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related
  definitions")

Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  In Progress
Status in linux-aws source package in Bionic:
  In Progress
Status in linux-aws source package in Disco:
  In Progress
Status in linux-aws source package in Eoan:
  In Progress

Bug description:
  For kernels that contain: 0ede73bc012c ("IB/uverbs: Extend
  uverbs_ioctl header with driver_id"), then the EFA driver should be
  integrated for enumeration with: f95be3d28d89 ("RDMA: Add EFA related
  definitions")

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1856359/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1856334] Re: Eoan update: 5.3.16 upstream stable release

2019-12-13 Thread Connor Kuehl
Note:   

* The UBUNTU SAUCE version of "ALSA: hda: Add Cometlake-S PCI ID" was reverted  
  in favor of its upstream stable version.  

* "x86/PCI: Avoid AMD FCH XHCI USB PME# from D0 defect" was already applied.
   

* The UBUNTU SAUCE version of "ALSA: hda/realtek - Dell headphone has noise on 
unmute for ALC236"
  was reverted in favor of its upstream stable version. 

* "crypto: user - fix memory leak in crypto_reportstat" was already applied.


* "Fix an error message in raid0_make_request()" addresses a WARN statement that
  does not exist and was skipped.

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * rsi: release skb if rsi_prepare_beacon fails
+ * arm64: tegra: Fix 'active-low' warning for Jetson TX1 regulator
+ * perf scripts python: exported-sql-viewer.py: Fix use of TRUE with SQLite
+ * sparc64: implement ioremap_uc
+ * lp: fix sparc64 LPSETTIMEOUT ioctl
+ * time: Zero the upper 32-bits in __kernel_timespec on 32-bit
+ * usb: gadget: u_serial: add missing port entry locking
+ * tty: serial: fsl_lpuart: use the sg count from dma_map_sg
+ * tty: serial: msm_serial: Fix flow control
+ * serial: pl011: Fix DMA ->flush_buffer()
+ * serial: serial_core: Perform NULL checks for break_ctl ops
+ * serial: stm32: fix clearing interrupt error flags
+ * serial: ifx6x60: add missed pm_runtime_disable
+ * aio: Fix io_pgetevents() struct __compat_aio_sigset layout
+ * autofs: fix a leak in autofs_expire_indirect()
+ * MIPS: SGI-IP27: fix exception handler replication
+ * RDMA/hns: Correct the value of HNS_ROCE_HEM_CHUNK_LEN
+ * RDMA/hns: Correct the value of srq_desc_size
+ * iwlwifi: pcie: don't consider IV len in A-MSDU
+ * cgroup: don't put ERR_PTR() into fc->root
+ * exportfs_decode_fh(): negative pinned may become positive without the 
parent locked
+ * audit_get_nd(): don't unlock parent too early
+ * ecryptfs: fix unlink and rmdir in face of underlying fs modifications
+ * Revert "UBUNTU: SAUCE: ALSA: hda: Add Cometlake-S PCI ID"
+ * ALSA: hda: Add Cometlake-S PCI ID
+ * NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error
+ * xfrm: release device reference for invalid state
+ * block: check bi_size overflow before merge
+ * Input: cyttsp4_core - fix use after free bug
+ * sched/core: Avoid spurious lock dependencies
+ * sched/pelt: Fix update of blocked PELT ordering
+ * perf/core: Consistently fail fork on allocation failures
+ * ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed()
+ * x86/resctrl: Fix potential lockdep warning
+ * drm/sun4i: tcon: Set min division of TCON0_DCLK to 1.
+ * selftests: kvm: fix build with glibc >= 2.30
+ * rbd: silence bogus uninitialized warning in rbd_object_map_update_finish()
+ * rsxx: add missed destroy_workqueue calls in remove
+ * ravb: implement MTU change while device is up
+ * net: hns3: reallocate SSU' buffer size when pfc_en changes
+ * net: hns3: fix ETS bandwidth validation bug
+ * afs: Fix race in commit bulk status fetch
+ * net: ep93xx_eth: fix mismatch of request_mem_region in remove
+ * i2c: core: fix use after free in of_i2c_notify
+ * io_uring: transform send/recvmsg() -ERESTARTSYS to -EINTR
+ * fuse: verify nlink
+ * fuse: verify attributes
+ * io_uring: ensure req->submit is copied when req is deferred
+ * SUNRPC: Avoid RPC delays when exiting suspend
+ * ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC
+ * ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop
+ * Revert "UBUNTU: SAUCE: ALSA: hda/realtek - Dell headphone has noise on 
unmute for ALC236"
+ * ALSA: 

[Kernel-packages] [Bug 1856334] [NEW] Eoan update: 5.3.16 upstream stable release

2019-12-13 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.16 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856334

Title:
  Eoan update: 5.3.16 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.16 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856334/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1850195] Re: Update EFA driver to 1.5.0

2019-12-12 Thread Connor Kuehl
** Summary changed:

- Update EFA driver to 1.4.1
+ Update EFA driver to 1.5.0

** Description changed:

  Version 1.4.1 of the EFA driver has been tagged: https://github.com/amzn
- /amzn-drivers/releases/tag/efa_linux_1.4.1
+ /amzn-drivers/releases/tag/efa_linux_1.5.0

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1850195

Title:
  Update EFA driver to 1.5.0

Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  In Progress
Status in linux-aws source package in Bionic:
  In Progress
Status in linux-aws source package in Disco:
  In Progress
Status in linux-aws source package in Eoan:
  In Progress

Bug description:
  Version 1.4.1 of the EFA driver has been tagged:
  https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1850195/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1855313] Re: Xenial update: 4.4.206 upstream stable release

2019-12-05 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * ASoC: compress: fix unsigned integer overflow check
+ * ASoC: kirkwood: fix external clock probe defer
+ * clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume
+ * reset: fix reset_control_ops kerneldoc comment
+ * can: peak_usb: report bus recovery as well
+ * can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open
+ * scripts/gdb: fix debugging modules compiled with hot/cold partitioning
+ * block: drbd: remove a stray unlock in __drbd_send_protocol()
+ * scsi: lpfc: Fix dif and first burst use in write commands
+ * ARM: debug-imx: only define DEBUG_IMX_UART_PORT if needed
+ * ARM: dts: imx53-voipac-dmm-668: Fix memory node duplication
+ * parisc: Fix serio address output
+ * parisc: Fix HP SDC hpa address output
+ * arm64: smp: Handle errors reported by the firmware
+ * PM / AVS: SmartReflex: NULL check before some freeing functions is not 
needed
+ * ARM: ks8695: fix section mismatch warning
+ * ACPI / LPSS: Ignore acpi_device_fix_up_power() return value
+ * crypto: user - support incremental algorithm dumps
+ * mwifiex: fix potential NULL dereference and use after free
+ * mwifiex: debugfs: correct histogram spacing, formatting
+ * rtl818x: fix potential use after free
+ * xfs: require both realtime inodes to mount
+ * ubi: Put MTD device after it is not used
+ * ubi: Do not drop UBI device reference before using
+ * microblaze: adjust the help to the real behavior
+ * microblaze: move "... is ready" messages to arch/microblaze/Makefile
+ * gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB
+ * VSOCK: bind to random port for VMADDR_PORT_ANY
+ * btrfs: only track ref_heads in delayed_ref_updates
+ * xen/pciback: Check dev_data before using it
+ * KVM: s390: unregister debug feature on failing arch init
+ * pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration
+ * pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10
+ * HID: doc: fix wrong data structure reference for UHID_OUTPUT
+ * gfs2: take jdata unstuff into account in do_grow
+ * xfs: Align compat attrlist_by_handle with native implementation.
+ * IB/qib: Fix an error code in qib_sdma_verbs_send()
+ * powerpc/book3s/32: fix number of bats in p/v_block_mapped()
+ * powerpc/xmon: fix dump_segments()
+ * drivers/regulator: fix a missing check of return value
+ * serial: max310x: Fix tx_empty() callback
+ * openrisc: Fix broken paths to arch/or32
+ * RDMA/srp: Propagate ib_post_send() failures to the SCSI mid-layer
+ * scsi: qla2xxx: deadlock by configfs_depend_item
+ * scsi: csiostor: fix incorrect dma device in case of vport
+ * ath6kl: Only use match sets when firmware supports it
+ * ath6kl: Fix off by one error in scan completion
+ * powerpc/prom: fix early DEBUG messages
+ * powerpc/mm: Make NULL pointer deferences explicit on bad page faults.
+ * powerpc/44x/bamboo: Fix PCI range
+ * drbd: reject attach of unsuitable uuids even if connected
+ * drbd: fix print_st_err()'s prototype to match the definition
+ * regulator: tps65910: fix a missing check of return value
+ * net/net_namespace: Check the return value of register_pernet_subsys()
+ * um: Make GCOV depend on !KCOV
+ * net: stmicro: fix a missing check of clk_prepare
+ * atl1e: checking the status of atl1e_write_phy_reg
+ * tipc: fix a missing check of genlmsg_put
+ * ocfs2: clear journal dirty flag after shutdown journal
+ * lib/genalloc.c: use vzalloc_node() to allocate the bitmap
+ * lib/genalloc.c: include vmalloc.h
+ * mtd: Check add_mtd_device() ret code
+ * tipc: fix memory leak in tipc_nl_compat_publ_dump
+ * net/core/neighbour: tell kmemleak about hash tables
+ * net/core/neighbour: fix kmemleak minimal reference count for hash tables
+ * sfc: suppress duplicate nvmem partition types in efx_ef10_mtd_probe
+ * decnet: fix DN_IFREQ_SIZE
+ * tipc: fix skb may be leaky in tipc_link_input
+ * sfc: initialise found bitmap in efx_ef10_mtd_probe
+ * net: fix possible overflow in __sk_mem_raise_allocated()
+ * net: dev: Use unsigned integer as an argument to left-shift
+ * scsi: 

[Kernel-packages] [Bug 1855313] Re: Xenial update: 4.4.206 upstream stable release

2019-12-05 Thread Connor Kuehl
Note that the following commit was skipped as it has already been
applied:

* "powerpc/pseries/dlpar: Fix a missing check in
dlpar_parse_cc_property()"

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1855313

Title:
  Xenial update: 4.4.206 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.206 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855313/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1855306] Re: Eoan update: 5.3.15 upstream stable release

2019-12-05 Thread Connor Kuehl
Note that the following patch was skipped as it's already been applied:

 * "xfrm: Fix memleak on xfrm state destroy"

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * io_uring: async workers should inherit the user creds
+ * net: separate out the msghdr copy from ___sys_{send,recv}msg()
+ * net: disallow ancillary data for __sys_{send,recv}msg_file()
+ * XArray: Fix xas_next() with a single entry at 0
+ * clk: meson: gxbb: let sar_adc_clk_div set the parent clock rate
+ * clk: at91: sam9x60: fix programmable clock
+ * thunderbolt: Read DP IN adapter first two dwords in one go
+ * thunderbolt: Fix lockdep circular locking depedency warning
+ * clocksource/drivers/mediatek: Fix error handling
+ * soundwire: intel: fix intel_register_dai PDI offsets and numbers
+ * ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX
+ * ASoC: compress: fix unsigned integer overflow check
+ * reset: Fix memory leak in reset_control_array_put()
+ * clk: samsung: exynos5433: Fix error paths
+ * clk: samsung: exynos542x: Move G3D subsystem clocks to its sub-CMU
+ * ASoC: kirkwood: fix external clock probe defer
+ * ASoC: kirkwood: fix device remove ordering
+ * arm64: dts: ls1028a: fix a compatible issue
+ * clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume
+ * pinctrl: cherryview: Allocate IRQ chip dynamic
+ * ARM: dts: imx6qdl-sabreauto: Fix storm of accelerometer interrupts
+ * soc: imx: gpc: fix initialiser format
+ * reset: fix reset_control_ops kerneldoc comment
+ * arm64: dts: imx8mm: fix compatible string for sdma
+ * ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data
+ * ASoC: ti: sdma-pcm: Add back the flags parameter for non standard dma names
+ * ASoC: rockchip: rockchip_max98090: Enable SHDN to fix headset detection
+ * clk: at91: avoid sleeping early
+ * clk: sunxi: Fix operator precedence in sunxi_divs_clk_setup
+ * clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18
+ * ARM: dts: sun8i-a83t-tbs-a711: Fix WiFi resume from suspend
+ * bpf: Allow narrow loads of bpf_sysctl fields with offset > 0
+ * samples/bpf: fix build by setting HAVE_ATTR_TEST to zero
+ * bpf: Change size to u64 for bpf_map_{area_alloc, charge_init}()
+ * powerpc/bpf: Fix tail call implementation
+ * idr: Fix idr_get_next_ul race with idr_remove
+ * idr: Fix integer overflow in idr_for_each_entry
+ * idr: Fix idr_alloc_u32 on 32-bit systems
+ * x86/resctrl: Prevent NULL pointer dereference when reading mondata
+ * arm64: dts: zii-ultra: fix ARM regulator GPIO handle
+ * fbdev: c2p: Fix link failure on non-inlining
+ * ASoC: hdac_hda: fix race in device removal
+ * clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call
+ * clk: ti: clkctrl: Fix failed to enable error with double udelay timeout
+ * net: fec: add missed clk_disable_unprepare in remove
+ * netfilter: ipset: Fix nla_policies to fully support NL_VALIDATE_STRICT
+ * bridge: ebtables: don't crash when using dnat target in output chains
+ * netfilter: nf_tables: bogus EOPNOTSUPP on basechain update
+ * netfilter: nf_tables_offload: skip EBUSY on chain update
+ * stacktrace: Don't skip first entry on noncurrent tasks
+ * can: peak_usb: report bus recovery as well
+ * can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open
+ * can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb 
mem leak
+ * can: rx-offload: can_rx_offload_offload_one(): do not increase the 
skb_queue beyond skb_queue_len_max
+ * can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on 
queue overflow or OOM
+ * can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate 
error value in case of errors
+ * can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error
+ * can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error
+ * can: flexcan: increase error counters if skb enqueueing via 
can_rx_offload_queue_sorted() fails
+ * x86/tsc: Respect tsc command line paraemeter for clocksource_tsc_early
+ * perf scripting engines: Iterate on tep event arrays directly
+ * can: mcp251x: 

[Kernel-packages] [Bug 1855313] [NEW] Xenial update: 4.4.206 upstream stable release

2019-12-05 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.206 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1855313

Title:
  Xenial update: 4.4.206 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.206 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855313/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1855306] [NEW] Eoan update: 5.3.15 upstream stable release

2019-12-05 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.15 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1855306

Title:
  Eoan update: 5.3.15 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.15 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855306/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854744] Re: eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker

2019-12-04 Thread Connor Kuehl
** Summary changed:

- eoan/linux-raspi2:  -proposed tracker
+ eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1854744

Title:
  eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-raspi2 package in Ubuntu:
  Invalid
Status in linux-raspi2 source package in Eoan:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854762
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Packaging
  phase-changed: Thursday, 05. December 2019 00:31 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
  trackers:
eoan/linux-raspi2/pi-kernel: bug 1854743
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854744/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854746] Re: eoan/linux-aws: 5.3.0-1009.10 -proposed tracker

2019-12-04 Thread Connor Kuehl
** Summary changed:

- eoan/linux-aws:  -proposed tracker
+ eoan/linux-aws: 5.3.0-1009.10 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1854746

Title:
  eoan/linux-aws: 5.3.0-1009.10 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-lrm series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Eoan:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854762
  packages:
lrm: linux-restricted-modules-aws
main: linux-aws
meta: linux-meta-aws
  phase: Packaging
  phase-changed: Wednesday, 04. December 2019 23:11 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-lrm: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
  trackers:
bionic/linux-aws-5.3: bug 1854745
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854746/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854857] Re: Xenial update: 4.4.205 upstream stable release

2019-12-04 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+  *Revert "sock: Reset dst when changing sk_mark via setsockopt"
+  *Linux 4.4.205
+  *UBUNTU: upstream stable to v4.4.205
  
-4.4.205 upstream stable release
-from git://git.kernel.org/
+    4.4.205 upstream stable release
+    from git://git.kernel.org/

** Description changed:

  SRU Justification
  
  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:
  
-  *Revert "sock: Reset dst when changing sk_mark via setsockopt"
-  *Linux 4.4.205
-  *UBUNTU: upstream stable to v4.4.205
+  * Revert "sock: Reset dst when changing sk_mark via setsockopt"
+  * Linux 4.4.205
+  * UBUNTU: upstream stable to v4.4.205
  
     4.4.205 upstream stable release
     from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854857

Title:
  Xenial update: 4.4.205 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

   * Revert "sock: Reset dst when changing sk_mark via setsockopt"
   * Linux 4.4.205
   * UBUNTU: upstream stable to v4.4.205

     4.4.205 upstream stable release
     from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854857/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854855] Re: Xenial update: 4.4.204 upstream stable release

2019-12-04 Thread Connor Kuehl
Please note the following commits were skipped since they are already
applied:

* platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from 
asus_nb_wmi
130,132d128
* powerpc/64s: support nospectre_v2 cmdline option
* powerpc/book3s64: Fix link stack flush on context switch
* KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * net/mlx4_en: fix mlx4 ethtool -N insertion
+ * sfc: Only cancel the PPS workqueue if it exists
+ * net/sched: act_pedit: fix WARN() in the traffic path
+ * net: rtnetlink: prevent underflows in do_setvfinfo()
+ * Revert "fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()"
+ * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node()
+ * asus-wmi: Create quirk for airplane_mode LED
+ * asus-wmi: Add quirk_no_rfkill_wapf4 for the Asus X456UF
+ * asus-wmi: Add quirk_no_rfkill for the Asus N552VW
+ * asus-wmi: Add quirk_no_rfkill for the Asus U303LB
+ * asus-wmi: Add quirk_no_rfkill for the Asus Z550MA
+ * platform/x86: asus-wmi: Filter buggy scan codes on ASUS Q500A
+ * platform/x86: asus-wmi: fix asus ux303ub brightness issue
+ * platform/x86: asus-wmi: Set specified XUSB2PR value for X550LB
+ * asus-wmi: provide access to ALS control
+ * platform/x86: asus-wmi: try to set als by default
+ * platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ
+ * platform/x86: asus-wmi: add SERIO_I8042 dependency
+ * mwifiex: Fix NL80211_TX_POWER_LIMITED
+ * ALSA: isight: fix leak of reference to firewire unit in error path of 
.probe callback
+ * printk: fix integer overflow in setup_log_buf()
+ * gfs2: Fix marking bitmaps non-full
+ * synclink_gt(): fix compat_ioctl()
+ * powerpc: Fix signedness bug in update_flash_db()
+ * powerpc/eeh: Fix use of EEH_PE_KEEP on wrong field
+ * brcmsmac: AP mode: update beacon when TIM changes
+ * spi: sh-msiof: fix deferred probing
+ * mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail
+ * btrfs: handle error of get_old_root
+ * gsmi: Fix bug in append_to_eventlog sysfs handler
+ * misc: mic: fix a DMA pool free failure
+ * amiflop: clean up on errors during setup
+ * scsi: ips: fix missing break in switch
+ * KVM/x86: Fix invvpid and invept register operand size in 64-bit mode
+ * scsi: isci: Use proper enumerated type in atapi_d2h_reg_frame_handler
+ * scsi: isci: Change sci_controller_start_task's return type to sci_status
+ * scsi: iscsi_tcp: Explicitly cast param in iscsi_sw_tcp_host_get_param
+ * clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk
+ * scsi: dc395x: fix dma API usage in srb_done
+ * scsi: dc395x: fix DMA API usage in sg_update_list
+ * net: fix warning in af_unix
+ * kprobes, x86/ptrace.h: Make regs_get_kernel_stack_nth() not fault on bad 
stack
+ * ALSA: i2c/cs8427: Fix int to char conversion
+ * macintosh/windfarm_smu_sat: Fix debug output
+ * USB: misc: appledisplay: fix backlight update_status return code
+ * SUNRPC: Fix a compile warning for cmpxchg64()
+ * atm: zatm: Fix empty body Clang warnings
+ * s390/perf: Return error when debug_register fails
+ * spi: omap2-mcspi: Set FIFO DMA trigger level to word length
+ * sparc: Fix parport build warnings.
+ * ceph: fix dentry leak in ceph_readdir_prepopulate
+ * rtc: s35390a: Change buf's type to u8 in s35390a_init
+ * mISDN: Fix type of switch control variable in ctrl_teimanager
+ * qlcnic: fix a return in qlcnic_dcb_get_capability()
+ * mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values
+ * mfd: max8997: Enale irq-wakeup unconditionally
+ * selftests/ftrace: Fix to test kprobe $comm arg only if available
+ * thermal: rcar_thermal: Prevent hardware access during system suspend
+ * sparc64: Rework xchg() definition to avoid warnings.
+ * fs/ocfs2/dlm/dlmdebug.c: fix a sleep-in-atomic-context bug in 
dlm_print_one_mle()
+ * mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock
+ * um: Make line/tty semantics use true write IRQ
+ * linux/bitmap.h: handle constant zero-size bitmaps correctly
+ * linux/bitmap.h: fix type 

[Kernel-packages] [Bug 1854861] Re: Eoan update: 5.3.14 upstream stable release

2019-12-04 Thread Connor Kuehl
Note the following patches were skipped since they were already applied:

* powerpc/64s: support nospectre_v2 cmdline option
* powerpc/book3s64: Fix link stack flush on context switch
* KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854861

Title:
  Eoan update: 5.3.14 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel
  * net/mlx4_en: fix mlx4 ethtool -N insertion
  * net/mlx4_en: Fix wrong limitation for number of TX rings
  * net: rtnetlink: prevent underflows in do_setvfinfo()
  * net/sched: act_pedit: fix WARN() in the traffic path
  * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key
  * sfc: Only cancel the PPS workqueue if it exists
  * net/mlxfw: Verify FSM error code translation doesn't exceed array size
  * net/mlx5e: Fix set vf link state error flow
  * net/mlx5: Fix auto group size calculation
  * net/tls: enable sk_msg redirect to tls socket egress
  * ipv6/route: return if there is no fib_nh_gw_family
  * taprio: don't reject same mqprio settings
  * net/ipv4: fix sysctl max for fib_multipath_hash_policy
  * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6
  * net/mlx5e: Do not use non-EXT link modes in EXT mode
  * net/mlx5: Update the list of the PCI supported devices
  * vhost/vsock: split packets to send using multiple buffers
  * gpio: max77620: Fixup debounce delays
  * gpio: bd70528: Use correct unit for debounce times
  * tools: gpio: Correctly add make dependencies for gpio_utils
  * fork: fix pidfd_poll()'s return type
  * nbd:fix memory leak in nbd_get_socket()
  * virtio_console: allocate inbufs in add_port() only if it is needed
  * virtio_ring: fix return code on DMA mapping fails
  * virtio_balloon: fix shrinker count
  * Revert "fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()"
  * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span()
  * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node()
  * drm/amdgpu: disable gfxoff when using register read interface
  * drm/amdgpu: disable gfxoff on original raven
  * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs
  * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs
  * drm/i915/pmu: "Frequency" is reported as accumulated cycles
  * drm/i915/userptr: Try to acquire the page lock around set_page_dirty()
  * Bluetooth: Fix invalid-free in bcsp_close()
  * ath10k: restore QCA9880-AR1A (v1) detection
  * ath10k: Fix HOST capability QMI incompatibility
  * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe
  * ath9k_hw: fix uninitialized variable data
  * Revert "Bluetooth: hci_ll: set operational frequency earlier"
  * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues"
  * md/raid10: prevent access of uninitialized resync_pages offset
  * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n
  * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary
  * x86/insn: Fix awk regexp warnings
  * x86/speculation: Fix incorrect MDS/TAA mitigation status
  * x86/speculation: Fix redundant MDS mitigation message
  * nbd: prevent memory leak
  * gve: fix dma sync bug where not all pages synced
  * x86/stackframe/32: Repair 32-bit Xen PV
  * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout
  * x86/xen/32: Simplify ring check in xen_iret_crit_fixup()
  * x86/doublefault/32: Fix stack canaries in the double fault handler
  * x86/pti/32: Size initial_page_table correctly
  * x86/cpu_entry_area: Add guard page for entry stack on 32bit
  * x86/entry/32: Fix IRET exception
  * x86/entry/32: Use %ss segment where required
  * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL
  * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry
  * x86/entry/32: Fix NMI vs ESPFIX
  * selftests/x86/mov_ss_trap: Fix the SYSENTER test
  * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel
  * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make 
the CPU_ENTRY_AREA_PAGES assert precise
  * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3
  * futex: Prevent robust futex exit race
  * ALSA: usb-audio: Fix NULL 

[Kernel-packages] [Bug 1854861] Re: Eoan update: 5.3.14 upstream stable release

2019-12-04 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel
+ * net/mlx4_en: fix mlx4 ethtool -N insertion
+ * net/mlx4_en: Fix wrong limitation for number of TX rings
+ * net: rtnetlink: prevent underflows in do_setvfinfo()
+ * net/sched: act_pedit: fix WARN() in the traffic path
+ * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key
+ * sfc: Only cancel the PPS workqueue if it exists
+ * net/mlxfw: Verify FSM error code translation doesn't exceed array size
+ * net/mlx5e: Fix set vf link state error flow
+ * net/mlx5: Fix auto group size calculation
+ * net/tls: enable sk_msg redirect to tls socket egress
+ * ipv6/route: return if there is no fib_nh_gw_family
+ * taprio: don't reject same mqprio settings
+ * net/ipv4: fix sysctl max for fib_multipath_hash_policy
+ * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6
+ * net/mlx5e: Do not use non-EXT link modes in EXT mode
+ * net/mlx5: Update the list of the PCI supported devices
+ * vhost/vsock: split packets to send using multiple buffers
+ * gpio: max77620: Fixup debounce delays
+ * gpio: bd70528: Use correct unit for debounce times
+ * tools: gpio: Correctly add make dependencies for gpio_utils
+ * fork: fix pidfd_poll()'s return type
+ * nbd:fix memory leak in nbd_get_socket()
+ * virtio_console: allocate inbufs in add_port() only if it is needed
+ * virtio_ring: fix return code on DMA mapping fails
+ * virtio_balloon: fix shrinker count
+ * Revert "fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()"
+ * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span()
+ * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node()
+ * drm/amdgpu: disable gfxoff when using register read interface
+ * drm/amdgpu: disable gfxoff on original raven
+ * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs
+ * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs
+ * drm/i915/pmu: "Frequency" is reported as accumulated cycles
+ * drm/i915/userptr: Try to acquire the page lock around set_page_dirty()
+ * Bluetooth: Fix invalid-free in bcsp_close()
+ * ath10k: restore QCA9880-AR1A (v1) detection
+ * ath10k: Fix HOST capability QMI incompatibility
+ * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe
+ * ath9k_hw: fix uninitialized variable data
+ * Revert "Bluetooth: hci_ll: set operational frequency earlier"
+ * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues"
+ * md/raid10: prevent access of uninitialized resync_pages offset
+ * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n
+ * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary
+ * x86/insn: Fix awk regexp warnings
+ * x86/speculation: Fix incorrect MDS/TAA mitigation status
+ * x86/speculation: Fix redundant MDS mitigation message
+ * nbd: prevent memory leak
+ * gve: fix dma sync bug where not all pages synced
+ * x86/stackframe/32: Repair 32-bit Xen PV
+ * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout
+ * x86/xen/32: Simplify ring check in xen_iret_crit_fixup()
+ * x86/doublefault/32: Fix stack canaries in the double fault handler
+ * x86/pti/32: Size initial_page_table correctly
+ * x86/cpu_entry_area: Add guard page for entry stack on 32bit
+ * x86/entry/32: Fix IRET exception
+ * x86/entry/32: Use %ss segment where required
+ * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL
+ * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry
+ * x86/entry/32: Fix NMI vs ESPFIX
+ * selftests/x86/mov_ss_trap: Fix the SYSENTER test
+ * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel
+ * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make 
the CPU_ENTRY_AREA_PAGES assert precise
+ * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3
+ * futex: Prevent robust futex exit race
+ * ALSA: usb-audio: Fix NULL dereference at parsing BADD
+ * nfc: port100: handle command failure cleanly
+ * media: vivid: Set 

[Kernel-packages] [Bug 1854774] Re: bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker

2019-12-04 Thread Connor Kuehl
** Summary changed:

- bionic/linux-gcp:  -proposed tracker
+ bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1854774

Title:
  bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-lrm series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux-gcp source package in Bionic:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854777
  packages:
lrm: linux-restricted-modules-gcp
main: linux-gcp
meta: linux-meta-gcp
signed: linux-signed-gcp
  phase: Packaging
  phase-changed: Wednesday, 04. December 2019 16:21 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-lrm: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
bionic/linux-gcp/gcp-kernel: bug 1854773
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854774/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854809] Re: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854809

Title:
  bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Invalid

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854819
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Packaging
  phase-changed: Tuesday, 03. December 2019 22:02 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854809/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854809] Re: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- bionic/linux-fips:  -proposed tracker
+ bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854809

Title:
  bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Invalid

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854819
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Packaging
  phase-changed: Tuesday, 03. December 2019 22:02 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854809/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854777] Re: disco/linux-gcp: 5.0.0-1027.28 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- disco/linux-gcp:  -proposed tracker
+ disco/linux-gcp: 5.0.0-1027.28 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1854777

Title:
  disco/linux-gcp: 5.0.0-1027.28 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux-gcp source package in Disco:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854788
  packages:
main: linux-gcp
meta: linux-meta-gcp
signed: linux-signed-gcp
  phase: Packaging
  phase-changed: Tuesday, 03. December 2019 21:16 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
bionic/linux-gcp: bug 1854774
bionic/linux-gke-5.0: bug 1854776
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854777/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854781] Re: disco/linux-oracle: 5.0.0-1009.14 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- disco/linux-oracle:  -proposed tracker
+ disco/linux-oracle: 5.0.0-1009.14 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1854781

Title:
  disco/linux-oracle: 5.0.0-1009.14 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-oracle package in Ubuntu:
  Invalid
Status in linux-oracle source package in Disco:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854788
  packages:
main: linux-oracle
meta: linux-meta-oracle
signed: linux-signed-oracle
  phase: Packaging
  phase-changed: Tuesday, 03. December 2019 18:16 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
bionic/linux-oracle-5.0: bug 1854779
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854781/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854816] Re: xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- xenial/linux-gcp:  -proposed tracker
+ xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1854816

Title:
  xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux-gcp source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854819
  packages:
main: linux-gcp
meta: linux-meta-gcp
signed: linux-signed-gcp
  phase: Packaging
  phase-changed: Tuesday, 03. December 2019 17:56 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
xenial/linux-gcp/gcp-kernel: bug 1854814
xenial/linux-gcp/gke-kernel: bug 1854815
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854816/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854778] Re: disco/linux-kvm: 5.0.0-1024.26 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- disco/linux-kvm:  -proposed tracker
+ disco/linux-kvm: 5.0.0-1024.26 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1854778

Title:
  disco/linux-kvm: 5.0.0-1024.26 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-kvm package in Ubuntu:
  Invalid
Status in linux-kvm source package in Disco:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1854788
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Packaging
  phase-changed: Tuesday, 03. December 2019 16:56 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854778/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854835] Re: xenial/linux: 4.4.0-171.200 -proposed tracker

2019-12-02 Thread Connor Kuehl
** Summary changed:

- xenial/linux:  -proposed tracker
+ xenial/linux: 4.4.0-171.200 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854835

Title:
  xenial/linux: 4.4.0-171.200 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Packaging
  phase-changed: Monday, 02. December 2019 21:26 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
trusty/linux-aws: bug 1854833
trusty/linux-lts-xenial: bug 1854834
xenial/linux-aws: bug 1854824
xenial/linux-cascade: bug 1854825
xenial/linux-fips: bug 1854832
xenial/linux-kvm: bug 1854826
xenial/linux-raspi2: bug 1854829
xenial/linux-snapdragon: bug 1854831
xenial/linux/caracalla-kernel: bug 1854820
xenial/linux/pc-kernel: bug 1854821
xenial/linux/stlouis-kernel: bug 1854822
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854835/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854861] [NEW] Eoan update: 5.3.14 upstream stable release

2019-12-02 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.14 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854861

Title:
  Eoan update: 5.3.14 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.14 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854861/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854857] [NEW] Xenial update: 4.4.205 upstream stable release

2019-12-02 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.205 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854857

Title:
  Xenial update: 4.4.205 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.205 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854857/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1854855] [NEW] Xenial update: 4.4.204 upstream stable release

2019-12-02 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.204 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854855

Title:
  Xenial update: 4.4.204 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.204 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854855/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853881] Re: Xenial update: 4.4.203 upstream stable release

2019-11-25 Thread Connor Kuehl
The following patch required offset adjustments:

x86/atomic: Fix smp_mb__{before,after}_atomic() 
- the changes to smp_mb__before_atomic and smp_mb__after_atomic had to be 
manually placed

The following patches were skipped since they have already been applied:

apparmor: fix uninitialized lsm_audit member
- Skipped as an equivalent patch has already been applied and it looks invasive 
to shape it into the stable version

apparmor: fix update the mtime of the profile file on replacement   
- Skipped as an equivalent patch has already been applied and it would be quite 
invasive to revert

apparmor: fix module parameters can be changed after policy is locked   
- Skipped as an equivalent patch has already been applied and it would be too 
invasive to revert and apply this.


** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * slip: Fix memory leak in slip_open error path
+ * ax88172a: fix information leak on short answers
+ * ALSA: usb-audio: Fix missing error check at mixer resolution test
+ * ALSA: usb-audio: not submit urb for stopped endpoint
+ * Input: ff-memless - kill timer in destroy()
+ * ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable
+ * ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either
+ * iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros
+ * mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm()
+ * mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup()
+ * mmc: sdhci-of-at91: fix quirk2 overwrite
+ * iio: dac: mcp4922: fix error handling in mcp4922_write_raw
+ * ALSA: pcm: signedness bug in snd_pcm_plug_alloc()
+ * ARM: dts: at91/trivial: Fix USART1 definition for at91sam9g45
+ * ALSA: seq: Do error checks at creating system ports
+ * gfs2: Don't set GFS2_RDF_UPTODATE when the lvb is updated
+ * ASoC: dpcm: Properly initialise hw->rate_max
+ * MIPS: BCM47XX: Enable USB power on Netgear WNDR3400v3
+ * ARM: dts: exynos: Fix sound in Snow-rev5 Chromebook
+ * i40e: use correct length for strncpy
+ * i40e: hold the rtnl lock on clearing interrupt scheme
+ * i40e: Prevent deleting MAC address from VF when set by PF
+ * ARM: dts: pxa: fix power i2c base address
+ * rtl8187: Fix warning generated when strncpy() destination length matches 
the sixe argument
+ * net: lan78xx: Bail out if lan78xx_get_endpoints fails
+ * ASoC: sgtl5000: avoid division by zero if lo_vag is zero
+ * ath10k: wmi: disable softirq's while calling ieee80211_rx
+ * mips: txx9: fix iounmap related issue
+ * of: make PowerMac cache node search conditional on CONFIG_PPC_PMAC
+ * ARM: dts: omap3-gta04: give spi_lcd node a label so that we can overwrite 
in other DTS files
+ * ARM: dts: omap3-gta04: tvout: enable as display1 alias
+ * ARM: dts: omap3-gta04: make NAND partitions compatible with recent U-Boot
+ * ARM: dts: omap3-gta04: keep vpll2 always on
+ * dmaengine: dma-jz4780: Further residue status fix
+ * signal: Always ignore SIGKILL and SIGSTOP sent to the global init
+ * signal: Properly deliver SIGILL from uprobes
+ * signal: Properly deliver SIGSEGV from x86 uprobes
+ * scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir()
+ * ARM: imx6: register pm_power_off handler if "fsl,pmic-stby-poweroff" is set
+ * scsi: pm80xx: Corrected dma_unmap_sg() parameter
+ * scsi: pm80xx: Fixed system hang issue during kexec boot
+ * kprobes: Don't call BUG_ON() if there is a kprobe in use on free list
+ * nvmem: core: return error code instead of NULL from nvmem_device_get
+ * media: fix: media: pci: meye: validate offset to avoid arbitrary access
+ * ALSA: intel8x0m: Register irq handler after register initializations
+ * pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map()
+ * llc: avoid blocking in 

[Kernel-packages] [Bug 1853882] Re: Eoan update: 5.3.13 upstream stable release

2019-11-25 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
+ * block, bfq: deschedule empty bfq_queues not referred by any process
+ * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
+ * mm/memory_hotplug: fix updating the node span
+ * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
+ * fbdev: Ditch fb_edid_add_monspecs
+ * Linux 5.3.13
+ * UBUNTU: upstream stable to v5.3.13
  
-5.3.13 upstream stable release
-from git://git.kernel.org/
+    5.3.13 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853882

Title:
  Eoan update: 5.3.13 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
  * block, bfq: deschedule empty bfq_queues not referred by any process
  * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
  * mm/memory_hotplug: fix updating the node span
  * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
  * fbdev: Ditch fb_edid_add_monspecs
  * Linux 5.3.13
  * UBUNTU: upstream stable to v5.3.13

     5.3.13 upstream stable release
     from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853881] [NEW] Xenial update: 4.4.203 upstream stable release

2019-11-25 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.203 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853881

Title:
  Xenial update: 4.4.203 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.203 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853881/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853882] [NEW] Eoan update: 5.3.13 upstream stable release

2019-11-25 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.13 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853882

Title:
  Eoan update: 5.3.13 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.13 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853475] Re: Eoan update: 5.3.12 upstream stable release

2019-11-21 Thread Connor Kuehl
Note: the sauce version of "x86/intel: Disable HPET on Intel Coffe Lake
platforms" was reverted in favor of the upstream stable variant:
"x86/quirks: Disable HPET on Intel Coffe Lake platforms"

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * scsi: core: Handle drivers which set sg_tablesize to zero
+ * ax88172a: fix information leak on short answers
+ * devlink: disallow reload operation during device cleanup
+ * ipmr: Fix skb headroom in ipmr_get_route().
+ * mlxsw: core: Enable devlink reload only on probe
+ * net: gemini: add missed free_netdev
+ * net/smc: fix fastopen for non-blocking connect()
+ * net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules
+ * slip: Fix memory leak in slip_open error path
+ * tcp: remove redundant new line from tcp_event_sk_skb
+ * dpaa2-eth: free already allocated channels on probe defer
+ * devlink: Add method for time-stamp on reporter's dump
+ * net/smc: fix refcount non-blocking connect() -part 2
+ * ALSA: usb-audio: Fix missing error check at mixer resolution test
+ * ALSA: usb-audio: not submit urb for stopped endpoint
+ * ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk()
+ * ALSA: usb-audio: Fix incorrect size check for processing/extension units
+ * Btrfs: fix log context list corruption after rename exchange operation
+ * cgroup: freezer: call cgroup_enter_frozen() with preemption disabled in 
ptrace_stop()
+ * Input: ff-memless - kill timer in destroy()
+ * Input: synaptics-rmi4 - fix video buffer size
+ * Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver
+ * Input: synaptics-rmi4 - do not consume more data than we have (F11, F12)
+ * Input: synaptics-rmi4 - clear IRQ enables for F54
+ * Input: synaptics-rmi4 - destroy F54 poller workqueue when removing
+ * KVM: MMU: Do not treat ZONE_DEVICE pages as being reserved
+ * IB/hfi1: Ensure r_tid_ack is valid before building TID RDMA ACK packet
+ * IB/hfi1: Calculate flow weight based on QP MTU for TID RDMA
+ * IB/hfi1: TID RDMA WRITE should not return IB_WC_RNR_RETRY_EXC_ERR
+ * IB/hfi1: Ensure full Gen3 speed in a Gen4 system
+ * IB/hfi1: Use a common pad buffer for 9B and 16B packets
+ * i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present
+ * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: x86/intel: Disable HPET on Intel 
Coffe Lake platforms"
+ * x86/quirks: Disable HPET on Intel Coffe Lake platforms
+ * ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable
+ * ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either
+ * io_uring: ensure registered buffer import returns the IO length
+ * drm/i915: update rawclk also on resume
+ * Revert "drm/i915/ehl: Update MOCS table for EHL"
+ * ntp/y2038: Remove incorrect time_t truncation
+ * net: ethernet: dwmac-sun8i: Use the correct function in exit path
+ * iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros
+ * mm: mempolicy: fix the wrong return value and potential pages leak of mbind
+ * mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm()
+ * mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup()
+ * mm: slub: really fix slab walking for init_on_free
+ * mm/memory_hotplug: fix try_offline_node()
+ * mm/page_io.c: do not free shared swap slots
+ * mmc: sdhci-of-at91: fix quirk2 overwrite
+ * slcan: Fix memory leak in error path
+ * Linux 5.3.12
+ * UBUNTU: upstream stable to v5.3.12
  
-5.3.12 upstream stable release
-from git://git.kernel.org/
+    5.3.12 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853475

Title:
  Eoan update: 5.3.12 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
    

[Kernel-packages] [Bug 1853475] Re: Eoan update: 5.3.12 upstream stable release

2019-11-21 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853475

Title:
  Eoan update: 5.3.12 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.12 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853475/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853475] [NEW] Eoan update: 5.3.12 upstream stable release

2019-11-21 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.12 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Eoan)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853475

Title:
  Eoan update: 5.3.12 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Eoan:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.12 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853475/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762835] Re: Conflicting mmc modules built in

2019-11-20 Thread Connor Kuehl
** Changed in: linux-raspi2 (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Changed in: linux-raspi2 (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux-raspi2 (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux-raspi2 (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Disco)
 Assignee: (unassigned) => Juerg Haefliger (juergh)

** Changed in: linux-raspi2 (Ubuntu Eoan)
 Assignee: (unassigned) => Juerg Haefliger (juergh)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1762835

Title:
  Conflicting mmc modules built in

Status in linux-raspi2 package in Ubuntu:
  Confirmed
Status in linux-raspi2 source package in Bionic:
  In Progress
Status in linux-raspi2 source package in Disco:
  In Progress
Status in linux-raspi2 source package in Eoan:
  In Progress

Bug description:
  SRU Justification

  [Impact]

  The Bionic Linux-raspi2 kernel has both the upstream and downstream pi
  mmc modules enabled.  Running the latest server image users can see
  this error in dmesg:

  Error: Driver 'sdhost-bcm2835' is already registered, aborting...

  Due to this error the pi server image is failing a testcase on the iso
  tracker.

  It is also not clear to users what mmc modules are in use.

  The attached patch removes the upstream mmc modules from the kernel
  config.

  [Test Case]

  The bug can be reproduced by running the latest bionic 'classic'
  raspberrypi server image - http://cdimage.ubuntu.com/ubuntu-server
  /daily-preinstalled/current/bionic-preinstalled-server-
  armhf+raspi2.img.xz

  Inspect the dmesg and observe the error.

  To check this is fixed, once the patched kernel has been installed,
  reboot, inspect the dmesg again and the error should be gone.

  [Regression potential]

  This should be low.  This config is the default used by raspbian and
  recommended by the pi foundation, and is therefore well tested.

  The patch changes the mmc modules, so if things go wrong the pi may
  not boot or the wifi on the pi3 may not work.

  I've built the kernel with the patch and everything still works.

  [Other Info]

  I think it is important to get this change in before the server images
  are released.

  Note the pi3 wifi doesn't work out-of-the-box, there is a missing
  brcmfmac43430-sdio.txt file.

  ---

  Original description:

  Linux-raspi2 has both the upstream and downstream pi mmc modules
  enabled.  In dmesg I get this error:

  Error: Driver 'sdhost-bcm2835' is already registered, aborting...

  I asked on the Raspberry Pi forums [1] about this and PhilE (Raspberry
  Pi engineer) answered:

  "For general guidance, in the Raspberry Pi kernels we use the
  bcm2835-sdhost driver for the SD card or EMMC interface and
  bcm2835-mmc for SDIO to the WiFi chip. Upstream uses bcm2835 for SD
  and sdhci-iproc for SDIO."

  I'm not entirely sure what the config used in raspbian is, but I think
  it is this:

  #
  # MMC/SD/SDIO Host Controller Drivers
  #
  CONFIG_MMC_BCM2835_MMC=y
  CONFIG_MMC_BCM2835_DMA=y
  CONFIG_MMC_BCM2835_PIO_DMA_BARRIER=2
  CONFIG_MMC_BCM2835_SDHOST=y
  # CONFIG_MMC_DEBUG is not set
  # CONFIG_MMC_ARMMMCI is not set
  CONFIG_MMC_SDHCI=y
  CONFIG_MMC_SDHCI_PLTFM=y
  # CONFIG_MMC_SDHCI_OF_ARASAN is not set
  # CONFIG_MMC_SDHCI_OF_AT91 is not set
  # CONFIG_MMC_SDHCI_CADENCE is not set
  # CONFIG_MMC_SDHCI_F_SDH30 is not set
  # CONFIG_MMC_SDHCI_IPROC is not set
  CONFIG_MMC_SPI=m
  # CONFIG_MMC_DW is not set
  # CONFIG_MMC_VUB300 is not set
  # CONFIG_MMC_USHC is not set
  # CONFIG_MMC_USDHI6ROL0 is not set
  # CONFIG_MMC_BCM2835 is not set
  # CONFIG_MMC_MTK is not set
  # CONFIG_MMC_SDHCI_XENON is not set
  # CONFIG_MEMSTICK is not set
  CONFIG_NEW_LEDS=y
  CONFIG_LEDS_CLASS=y
  # CONFIG_LEDS_CLASS_FLASH is not set
  # CONFIG_LEDS_BRIGHTNESS_HW_CHANGED is not set

  I'll run apport to collect the Ubuntu configs and dmesg logs etc.

  [1] https://www.raspberrypi.org/forums/viewtopic.php?f=71=210225

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-raspi2/+bug/1762835/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852220] Re: eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker

2019-11-20 Thread Connor Kuehl
** Summary changed:

- eoan/linux-raspi2:  -proposed tracker
+ eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1852220

Title:
  eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-raspi2 package in Ubuntu:
  Invalid
Status in linux-raspi2 source package in Eoan:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852232
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Packaging
  phase-changed: Wednesday, 20. November 2019 17:16 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
  trackers:
eoan/linux-raspi2/pi-kernel: bug 1852219
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852220/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853177] Re: Xenial update: 4.4.202 upstream stable release

2019-11-19 Thread Connor Kuehl
Please note that the following commits from this upstream Linux stable
update were dropped in favor of the UBUNTU SAUCE equivalents:

* KVM: Introduce kvm_get_arch_capabilities()
* KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts
* kvm: x86: IA32_ARCH_CAPABILITIES is always supported
* KVM: x86: use Intel speculation bugs and features as derived in generic x86 
code
* x86/msr: Add the IA32_TSX_CTRL MSR
* x86/cpu: Add a helper function x86_read_arch_cap_msr()
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default
* x86/speculation/taa: Add mitigation for TSX Async Abort
* x86/speculation/taa: Add sysfs reporting for TSX Async Abort
* kvm/x86: Export MDS_NO=0 to guests when TSX is enabled
* x86/tsx: Add "auto" option to the tsx= cmdline parameter
* x86/speculation/taa: Add documentation for TSX Async Abort
* x86/tsx: Add config options to set tsx=on|off|auto
* x86/bugs: Add ITLB_MULTIHIT bug infrastructure

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853177

Title:
  Xenial update: 4.4.202 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * kvm: mmu: Don't read PDPTEs when paging is not enabled
  * MIPS: BCM63XX: fix switch core reset on BCM6368
  * powerpc/Makefile: Use cflags-y/aflags-y for setting endian options
  * powerpc: Fix compiling a BE kernel with a powerpc64le toolchain
  * powerpc/boot: Request no dynamic linker for boot wrapper
  * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
  * Linux 4.4.202
  * UBUNTU: upstream stable to v4.4.202

     4.4.202 upstream stable release
     from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853177] Re: Xenial update: 4.4.202 upstream stable release

2019-11-19 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * kvm: mmu: Don't read PDPTEs when paging is not enabled
+ * MIPS: BCM63XX: fix switch core reset on BCM6368
+ * powerpc/Makefile: Use cflags-y/aflags-y for setting endian options
+ * powerpc: Fix compiling a BE kernel with a powerpc64le toolchain
+ * powerpc/boot: Request no dynamic linker for boot wrapper
+ * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
+ * Linux 4.4.202
+ * UBUNTU: upstream stable to v4.4.202
  
-4.4.202 upstream stable release
-from git://git.kernel.org/
+    4.4.202 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853177

Title:
  Xenial update: 4.4.202 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * kvm: mmu: Don't read PDPTEs when paging is not enabled
  * MIPS: BCM63XX: fix switch core reset on BCM6368
  * powerpc/Makefile: Use cflags-y/aflags-y for setting endian options
  * powerpc: Fix compiling a BE kernel with a powerpc64le toolchain
  * powerpc/boot: Request no dynamic linker for boot wrapper
  * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
  * Linux 4.4.202
  * UBUNTU: upstream stable to v4.4.202

     4.4.202 upstream stable release
     from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-19 Thread Connor Kuehl
Also of note:

* ("perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus
precise RIP validity") modified a routine that was expected to be in
"arch/x86/kernel/cpu/perf_event_amd_ibs.c" but was found in
"arch/x86/events/amd/ibs.c"

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * CDC-NCM: handle incomplete transfer of MTU
  * net: fix data-race in neigh_event_send()
  * NFC: fdp: fix incorrect free object
  * NFC: st21nfca: fix double free
  * qede: fix NULL pointer deref in __qede_remove()
  * nfc: netlink: fix double device reference drop
  * ALSA: bebob: fix to detect configured source of sampling clock for 
Focusrite Saffire Pro i/o series
  * ALSA: hda/ca0132 - Fix possible workqueue stall
  * mm, vmstat: hide /proc/pagetypeinfo from normal users
  * dump_stack: avoid the livelock of the dump_lock
  * perf tools: Fix time sorting
  * drm/radeon: fix si_enable_smc_cac() failed issue
  * ceph: fix use-after-free in __ceph_remove_cap()
  * iio: imu: adis16480: make sure provided frequency is positive
  * netfilter: nf_tables: Align nft_expr private data to 64-bit
  * netfilter: ipset: Fix an error code in ip_set_sockfn_get()
  * can: usb_8dev: fix use-after-free on disconnect
  * can: c_can: c_can_poll(): only read status register after status IRQ
  * can: peak_usb: fix a potential out-of-sync while decoding packets
  * can: gs_usb: gs_can_open(): prevent memory leak
  * can: peak_usb: fix slab info leak
  * drivers: usb: usbip: Add missing break statement to switch
  * configfs: fix a deadlock in configfs_symlink()
  * PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30
  * scsi: qla2xxx: fixup incorrect usage of host_byte
  * scsi: lpfc: Honor module parameter lpfc_use_adisc
  * ipvs: move old_secure_tcp into struct netns_ipvs
  * bonding: fix unexpected IFF_BONDING bit unset
  * usb: fsl: Check memory resource before releasing it
  * usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode.
  * usb: gadget: composite: Fix possible double free memory bug
  * usb: gadget: configfs: fix concurrent issue between composite APIs
  * perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise 
RIP validity
  * USB: Skip endpoints with 0 maxpacket length
  * scsi: qla2xxx: stop timer in shutdown path
  * net: hisilicon: Fix "Trying to free already-free IRQ"
  * NFSv4: Don't allow a cached open with a revoked delegation
  * igb: Fix constant media auto sense switching when no cable is connected
  * e1000: fix memory leaks
  * can: flexcan: disable completely the ECC mechanism
  * mm/filemap.c: don't initiate writeback if mapping has no dirty pages
  * cgroup,writeback: don't switch wbs immediately on dead wbs if the memcg is 
dead
  * net: prevent load/store tearing on sk->sk_stamp
  * Linux 4.4.201
  * UBUNTU: upstream stable to v4.4.201

     4.4.201 upstream stable release
     from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853177] [NEW] Xenial update: 4.4.202 upstream stable release

2019-11-19 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.202 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853177

Title:
  Xenial update: 4.4.202 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.202 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-19 Thread Connor Kuehl
The following patches were NOT applied from this upstream stable update
in favor of their UBUNTU SAUCE equivalents:

* drm/i915/gtt: Add read only pages to gen8_pte_encode
* drm/i915/gtt: Read-only pages for insert_entries on bdw+
* drm/i915/gtt: Disable read-only support under GVT
* drm/i915: Rename gen7 cmdparser tables
* drm/i915: Disable Secure Batches for gen6+
* drm/i915: Remove Master tables from cmdparser
* drm/i915: Add support for mandatory cmdparsing
* drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
* drm/i915: Allow parsing of unsized batches
* drm/i915: Add gen9 BCS cmdparsing
* drm/i915/cmdparser: Add support for backward jumps
* drm/i915/cmdparser: Ignore Length operands during command matching
* drm/i915: Lower RM timeout to avoid DSI hard hangs
* drm/i915/gen8+: Add RC6 CTX corruption WA
* drm/i915/cmdparser: Fix jump whitelist clearing

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * CDC-NCM: handle incomplete transfer of MTU
  * net: fix data-race in neigh_event_send()
  * NFC: fdp: fix incorrect free object
  * NFC: st21nfca: fix double free
  * qede: fix NULL pointer deref in __qede_remove()
  * nfc: netlink: fix double device reference drop
  * ALSA: bebob: fix to detect configured source of sampling clock for 
Focusrite Saffire Pro i/o series
  * ALSA: hda/ca0132 - Fix possible workqueue stall
  * mm, vmstat: hide /proc/pagetypeinfo from normal users
  * dump_stack: avoid the livelock of the dump_lock
  * perf tools: Fix time sorting
  * drm/radeon: fix si_enable_smc_cac() failed issue
  * ceph: fix use-after-free in __ceph_remove_cap()
  * iio: imu: adis16480: make sure provided frequency is positive
  * netfilter: nf_tables: Align nft_expr private data to 64-bit
  * netfilter: ipset: Fix an error code in ip_set_sockfn_get()
  * can: usb_8dev: fix use-after-free on disconnect
  * can: c_can: c_can_poll(): only read status register after status IRQ
  * can: peak_usb: fix a potential out-of-sync while decoding packets
  * can: gs_usb: gs_can_open(): prevent memory leak
  * can: peak_usb: fix slab info leak
  * drivers: usb: usbip: Add missing break statement to switch
  * configfs: fix a deadlock in configfs_symlink()
  * PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30
  * scsi: qla2xxx: fixup incorrect usage of host_byte
  * scsi: lpfc: Honor module parameter lpfc_use_adisc
  * ipvs: move old_secure_tcp into struct netns_ipvs
  * bonding: fix unexpected IFF_BONDING bit unset
  * usb: fsl: Check memory resource before releasing it
  * usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode.
  * usb: gadget: composite: Fix possible double free memory bug
  * usb: gadget: configfs: fix concurrent issue between composite APIs
  * perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise 
RIP validity
  * USB: Skip endpoints with 0 maxpacket length
  * scsi: qla2xxx: stop timer in shutdown path
  * net: hisilicon: Fix "Trying to free already-free IRQ"
  * NFSv4: Don't allow a cached open with a revoked delegation
  * igb: Fix constant media auto sense switching when no cable is connected
  * e1000: fix memory leaks
  * can: flexcan: disable completely the ECC mechanism
  * mm/filemap.c: don't initiate writeback if mapping has no dirty pages
  * cgroup,writeback: don't switch wbs immediately on dead wbs if the memcg is 
dead
  * net: prevent load/store tearing on sk->sk_stamp
  * Linux 4.4.201
  * UBUNTU: upstream stable to v4.4.201

     4.4.201 upstream stable release
     from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-19 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * CDC-NCM: handle incomplete transfer of MTU
+ * net: fix data-race in neigh_event_send()
+ * NFC: fdp: fix incorrect free object
+ * NFC: st21nfca: fix double free
+ * qede: fix NULL pointer deref in __qede_remove()
+ * nfc: netlink: fix double device reference drop
+ * ALSA: bebob: fix to detect configured source of sampling clock for 
Focusrite Saffire Pro i/o series
+ * ALSA: hda/ca0132 - Fix possible workqueue stall
+ * mm, vmstat: hide /proc/pagetypeinfo from normal users
+ * dump_stack: avoid the livelock of the dump_lock
+ * perf tools: Fix time sorting
+ * drm/radeon: fix si_enable_smc_cac() failed issue
+ * ceph: fix use-after-free in __ceph_remove_cap()
+ * iio: imu: adis16480: make sure provided frequency is positive
+ * netfilter: nf_tables: Align nft_expr private data to 64-bit
+ * netfilter: ipset: Fix an error code in ip_set_sockfn_get()
+ * can: usb_8dev: fix use-after-free on disconnect
+ * can: c_can: c_can_poll(): only read status register after status IRQ
+ * can: peak_usb: fix a potential out-of-sync while decoding packets
+ * can: gs_usb: gs_can_open(): prevent memory leak
+ * can: peak_usb: fix slab info leak
+ * drivers: usb: usbip: Add missing break statement to switch
+ * configfs: fix a deadlock in configfs_symlink()
+ * PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30
+ * scsi: qla2xxx: fixup incorrect usage of host_byte
+ * scsi: lpfc: Honor module parameter lpfc_use_adisc
+ * ipvs: move old_secure_tcp into struct netns_ipvs
+ * bonding: fix unexpected IFF_BONDING bit unset
+ * usb: fsl: Check memory resource before releasing it
+ * usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode.
+ * usb: gadget: composite: Fix possible double free memory bug
+ * usb: gadget: configfs: fix concurrent issue between composite APIs
+ * perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise 
RIP validity
+ * USB: Skip endpoints with 0 maxpacket length
+ * scsi: qla2xxx: stop timer in shutdown path
+ * net: hisilicon: Fix "Trying to free already-free IRQ"
+ * NFSv4: Don't allow a cached open with a revoked delegation
+ * igb: Fix constant media auto sense switching when no cable is connected
+ * e1000: fix memory leaks
+ * can: flexcan: disable completely the ECC mechanism
+ * mm/filemap.c: don't initiate writeback if mapping has no dirty pages
+ * cgroup,writeback: don't switch wbs immediately on dead wbs if the memcg is 
dead
+ * net: prevent load/store tearing on sk->sk_stamp
+ * Linux 4.4.201
+ * UBUNTU: upstream stable to v4.4.201
  
-4.4.201 upstream stable release
-from git://git.kernel.org/
+    4.4.201 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * CDC-NCM: handle incomplete transfer of MTU
  * net: fix data-race in neigh_event_send()
  * NFC: fdp: fix incorrect free object
  * NFC: st21nfca: fix double free
  * qede: fix NULL pointer deref in __qede_remove()
  * nfc: netlink: fix double device reference drop
  * ALSA: bebob: fix to detect configured source of sampling clock for 
Focusrite Saffire Pro i/o series
  * ALSA: hda/ca0132 - Fix possible workqueue stall
  * mm, vmstat: hide /proc/pagetypeinfo from normal users
  * dump_stack: avoid the livelock of the dump_lock
  * perf 

[Kernel-packages] [Bug 1852338] Re: Eoan update: 5.3.11 upstream stable release

2019-11-18 Thread Connor Kuehl
Please note that the following SAUCE patches were reverted:

* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: x86: mmu: Recovery of shattered NX 
large pages"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: Add helper function for creating 
VM worker threads"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: mmu: ITLB_MULTIHIT mitigation"
* UBUNTU: SAUCE: Revert "kvm: x86, powerpc: do not allow clearing largepages 
debugfs entry"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: cpu/speculation: Uninline and export 
CPU mitigations helpers"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: x86: Add ITLB_MULTIHIT bug 
infrastructure"
* UBUNTU: SAUCE: Revert "x86/tsx: Add config options to set tsx=on|off|auto"
* UBUNTU: SAUCE: Revert "x86/speculation/taa: Add documentation for TSX Async 
Abort"
* UBUNTU: SAUCE: Revert "x86/tsx: Add "auto" option to the tsx= cmdline 
parameter"
* UBUNTU: SAUCE: Revert "kvm/x86: Export MDS_NO=0 to guests when TSX is enabled"
* UBUNTU: SAUCE: Revert "x86/speculation/taa: Add sysfs reporting for TSX Async 
Abort"
* UBUNTU: SAUCE: Revert "x86/speculation/taa: Add mitigation for TSX Async 
Abort"
* UBUNTU: SAUCE: Revert "x86/cpu: Add a "tsx=" cmdline option with TSX disabled 
by default"
* UBUNTU: SAUCE: Revert "x86/cpu: Add a helper function x86_read_arch_cap_msr()"
* UBUNTU: SAUCE: Revert "x86/msr: Add the IA32_TSX_CTRL MSR"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Fix jump whitelist 
clearing"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/gen8+: Add RC6 CTX corruption 
WA"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Lower RM timeout to avoid DSI 
hard hangs"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Ignore Length 
operands during command matching"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Add support for 
backward jumps"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Use explicit goto 
for error paths"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Add gen9 BCS cmdparsing"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Allow parsing of unsized 
batches"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Support ro ppgtt mapped 
cmdparser shadow buffers"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Add support for mandatory 
cmdparsing"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Remove Master tables from 
cmdparser"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Disable Secure Batches for 
gen6+"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Rename gen7 cmdparser tables"

In favor of their upstream stable versions:

* drm/i915: Rename gen7 cmdparser tables
* drm/i915: Disable Secure Batches for gen6+
* drm/i915: Remove Master tables from cmdparser
* drm/i915: Add support for mandatory cmdparsing
* drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
* drm/i915: Allow parsing of unsized batches
* drm/i915: Add gen9 BCS cmdparsing
* drm/i915/cmdparser: Use explicit goto for error paths
* drm/i915/cmdparser: Add support for backward jumps
* drm/i915/cmdparser: Ignore Length operands during command matching
* drm/i915: Lower RM timeout to avoid DSI hard hangs
* drm/i915/gen8+: Add RC6 CTX corruption WA
* drm/i915/cmdparser: Fix jump whitelist clearing
* x86/msr: Add the IA32_TSX_CTRL MSR
* x86/cpu: Add a helper function x86_read_arch_cap_msr()
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default
* x86/speculation/taa: Add mitigation for TSX Async Abort
* x86/speculation/taa: Add sysfs reporting for TSX Async Abort
* kvm/x86: Export MDS_NO=0 to guests when TSX is enabled
* x86/tsx: Add "auto" option to the tsx= cmdline parameter
* x86/speculation/taa: Add documentation for TSX Async Abort
* x86/tsx: Add config options to set tsx=on|off|auto
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
* x86/bugs: Add ITLB_MULTIHIT bug infrastructure
* x86/cpu: Add Tremont to the cpu vulnerability whitelist
* cpu/speculation: Uninline and export CPU mitigations helpers
* Documentation: Add ITLB_MULTIHIT documentation
* kvm: x86, powerpc: do not allow clearing largepages debugfs entry
* kvm: mmu: ITLB_MULTIHIT mitigation
* kvm: Add helper function for creating VM worker threads
* kvm: x86: mmu: Recovery of shattered NX large pages

** Description changed:

- 
- SRU Justification
- 
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
- 
-5.3.11 upstream stable release
-from git://git.kernel.org/
+ SRU Justification
+ 
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably 

[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-18 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.201 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852338] Re: Eoan update: 5.3.11 upstream stable release

2019-11-18 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852338

Title:
  Eoan update: 5.3.11 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.3.11 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852338/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852236] Re: disco/linux-aws: 5.0.0-1022.25 -proposed tracker

2019-11-15 Thread Connor Kuehl
** Summary changed:

- disco/linux-aws:  -proposed tracker
+ disco/linux-aws: 5.0.0-1022.25 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1852236

Title:
  disco/linux-aws: 5.0.0-1022.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Disco:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852253
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Packaging
  phase-changed: Friday, 15. November 2019 16:00 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
  trackers:
bionic/linux-aws-5.0: bug 1852235
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852236/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852304] Re: trusty/linux-aws: 4.4.0-1059.63 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- trusty/linux-aws:  -proposed tracker
+ trusty/linux-aws: 4.4.0-1059.63 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1852304

Title:
  trusty/linux-aws: 4.4.0-1059.63 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Trusty:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852306
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 13:32 UTC
  reason:
prepare-package: Pending -- version not specified
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852304/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852303] Re: xenial/linux-fips: 4.4.0-1026.31 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- xenial/linux-fips:  -proposed tracker
+ xenial/linux-fips: 4.4.0-1026.31 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852303

Title:
  xenial/linux-fips: 4.4.0-1026.31 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Invalid

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852306
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 13:31 UTC
  reason:
prepare-package: Pending -- version not specified
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852303/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852278] Re: bionic/linux-fips: 4.15.0-1021.24 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- bionic/linux-fips:  -proposed tracker
+ bionic/linux-fips: 4.15.0-1021.24 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852278

Title:
  bionic/linux-fips: 4.15.0-1021.24 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Invalid

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852289
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 10:31 UTC
  reason:
prepare-package: Pending -- version not specified
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852278/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852249] Re: disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- disco/linux-snapdragon:  -proposed tracker
+ disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-snapdragon in Ubuntu.
https://bugs.launchpad.net/bugs/1852249

Title:
  disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-snapdragon package in Ubuntu:
  Invalid
Status in linux-snapdragon source package in Disco:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852253
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 09:12 UTC
  reason:
prepare-package: Pending -- version not specified
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852249/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852296] Re: xenial/linux-aws: 4.4.0-1099.110 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- xenial/linux-aws:  -proposed tracker
+ xenial/linux-aws: 4.4.0-1099.110 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1852296

Title:
  xenial/linux-aws: 4.4.0-1099.110 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852306
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 13:30 UTC
  reason:
prepare-package: Pending -- version not specified
  trackers:
xenial/linux-aws/aws-kernel: bug 1852295
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852296/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852228] Re: eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- eoan/linux-kvm:  -proposed tracker
+ eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1852228

Title:
  eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-kvm package in Ubuntu:
  Invalid
Status in linux-kvm source package in Eoan:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852232
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 13:29 UTC
  reason:
prepare-package: Pending -- version not specified
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852228/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852298] Re: xenial/linux-kvm: 4.4.0-1063.70 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- xenial/linux-kvm:  -proposed tracker
+ xenial/linux-kvm: 4.4.0-1063.70 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1852298

Title:
  xenial/linux-kvm: 4.4.0-1063.70 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-kvm package in Ubuntu:
  Invalid
Status in linux-kvm source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852306
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 13:31 UTC
  reason:
prepare-package: Pending -- version not specified
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852298/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852262] Re: bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- bionic/linux-raspi2:  -proposed tracker
+ bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1852262

Title:
  bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-raspi2 package in Ubuntu:
  Invalid
Status in linux-raspi2 source package in Bionic:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852289
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 10:42 UTC
  reason:
prepare-package: Pending -- version not specified
  trackers:
bionic/linux-raspi2/pi-kernel: bug 1852261
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852262/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852264] Re: bionic/linux-snapdragon: 4.15.0-1068.75 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- bionic/linux-snapdragon:  -proposed tracker
+ bionic/linux-snapdragon: 4.15.0-1068.75 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-snapdragon in Ubuntu.
https://bugs.launchpad.net/bugs/1852264

Title:
  bionic/linux-snapdragon: 4.15.0-1068.75 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-snapdragon package in Ubuntu:
  Invalid
Status in linux-snapdragon source package in Bionic:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852289
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
  phase: Packaging
  phase-changed: Thursday, 14. November 2019 17:54 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
  trackers:
bionic/linux-snapdragon/dragonboard-kernel: bug 1852263
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852264/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852233] Re: disco/linux-raspi2: 5.0.0-1023.24 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- disco/linux-raspi2:  -proposed tracker
+ disco/linux-raspi2: 5.0.0-1023.24 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1852233

Title:
  disco/linux-raspi2: 5.0.0-1023.24 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-raspi2 package in Ubuntu:
  Invalid
Status in linux-raspi2 source package in Disco:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1852253
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Ready for Packaging
  phase-changed: Thursday, 14. November 2019 09:10 UTC
  reason:
prepare-package: Pending -- version not specified
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852233/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1844021] Re: Suspend stopped working from 4.4.0-157 onwards

2019-11-14 Thread Connor Kuehl
** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1844021

Title:
  Suspend stopped working from 4.4.0-157 onwards

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Disco:
  Fix Committed

Bug description:
  Since upgrading the kernel above 4.4.0-154, starting with 4.4.0-157,
  suspend does not work for me anymore. Never had such an issue in the
  last 6 years.

  This is the relevant output when suspend fails:
  [  328.25] PM: Suspending system (mem)
  [  328.288902] Suspending console(s) (use no_console_suspend to debug)
  [  328.289118] wlp1s0: deauthenticating from xx:xx:xx:xx:xx:xx by local 
choice (Reason: 3=DEAUTH_LEAVING)
  [  328.289209] sd 1:0:0:0: [sdb] Synchronizing SCSI cache
  [  328.289570] sd 0:0:0:0: [sda] Synchronizing SCSI cache
  [  328.289600] sd 0:0:0:0: [sda] Stopping disk
  [  328.291700] sd 1:0:0:0: [sdb] Stopping disk
  [  328.312413] xhci_hcd :03:00.0: WARN: xHC save state timeout
  [  328.312456] suspend_common(): xhci_pci_suspend+0x0/0x70 returns -110
  [  328.312461] pci_pm_suspend(): hcd_pci_suspend+0x0/0x30 returns -110
  [  328.312465] dpm_run_callback(): pci_pm_suspend+0x0/0x150 returns -110
  [  328.312483] PM: Device :03:00.0 failed to suspend async: error -110
  [  328.848109] PM: Some devices failed to suspend, or early wake event 
detected

  This is my relevant lspci -v output:

  03:00.0 USB controller: ASMedia Technology Inc. ASM1042 SuperSpeed USB Host 
Controller (prog-if 30 [XHCI])
   Subsystem: Samsung Electronics Co Ltd ASM1042 SuperSpeed USB Host Controller
   Flags: bus master, fast devsel, latency 0, IRQ 16
   Memory at f050 (64-bit, non-prefetchable) [size=32K]
   Capabilities: 
   Kernel driver in use: xhci_hcd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1844021/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819968] Re: Colour banding in Lenovo G50-80 laptop display (i915)

2019-11-14 Thread Connor Kuehl
** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1819968

Title:
  Colour banding in Lenovo G50-80 laptop display (i915)

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Eoan:
  Fix Committed

Bug description:
  Colour bandind is visible everywhere in the system. I believe it's not
  a hardware problem, since booting with 'nomodeset' works as expected
  and the previously installed Ubuntu 14.04 also worked.

  I tried installing kernel 4.18.0-16.17 from ppa:canonical-kernel-
  team/ppa but the problem remained.

  There were already similar bugs,
  https://bugs.launchpad.net/bugs/1749420 ,
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1794387 and
  https://bugs.launchpad.net/bugs/1788308, but the fixes provided for
  those bugs did not work for my specific monitor.

  cat /proc/version_signature
  Ubuntu 4.15.0-46.49-generic 4.15.18

  sudo lspci -vnvn
  00:00.0 Host bridge [0600]: Intel Corporation Haswell-ULT DRAM Controller 
[8086:0a04] (rev 0b)
   Subsystem: Lenovo Haswell-ULT DRAM Controller [17aa:390b]
   Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
   Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- 
   Kernel driver in use: hsw_uncore

  00:02.0 VGA compatible controller [0300]: Intel Corporation Haswell-ULT 
Integrated Graphics Controller [8086:0a16] (rev 0b) (prog-if 00 [VGA 
controller])
   Subsystem: Lenovo Haswell-ULT Integrated Graphics Controller [17aa:390b]
   Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
   Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819968/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1845810] Re: [XPS 13 9360, Realtek ALC3246, Black Headphone Out, Front] High noise floor

2019-11-14 Thread Connor Kuehl
** Changed in: linux (Ubuntu Bionic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1845810

Title:
  [XPS 13 9360, Realtek ALC3246, Black Headphone Out, Front] High noise
  floor

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  Since linux-image-4.15.0-60-generic 4.15.0-60.67, the background noise
  in my headphones has increased to unreasonable levels. In linux-
  image-4.15.0-58-generic 4.15.0-58.64 and previous kernels the noise
  was present but at a bearable level, which I had always assumed was a
  hardware design issue. Now, with the increased noise floor, the
  headphone socket is essentially unusable.

  This is a regression in a stable release (Bionic). The problem
  consistently reproduces as follows:

  OK: linux-image-4.15.0-58-generic 4.15.0-58.64
  BAD: linux-image-4.15.0-60-generic4.15.0-60.67
  BAD: linux-image-4.15.0-62-generic4.15.0-62.69
  BAD: linux-image-4.15.0-64-generic4.15.0-64.73

  Steps to reproduce:

  Hardware: Dell XPS 9360 (shipped with Ubuntu). I'm using a manually
  reinstalled Ubuntu Bionic, not the OEM installation. Mostly everything
  is on defaults.

  1. Boot with no headphones connected
  2. Log in
  3. Plug the headphones in

  Expected: normal noise level
  Actual: very high noise level. Playback does work correctly but the SnR is 
terrible.

  The "Select Audio Device" prompt appears, but the noise problem is
  present before I make a selection. If I select Headphones or Headset
  (I'm using a headset) then the noise remains after a brief (~0.5s)
  interruption. If I select Microphone then the noise goes, but then the
  audio comes through the speakers and not the headset as required.

  I have tried messing with alsamixer but haven't found anything to
  explain or reduce the noise. Switching to a previous kernel fixes the
  problem immediately with no settings change required.

  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: alsa-base 1.0.25+dfsg-0ubuntu5
  ProcVersionSignature: Ubuntu 4.15.0-64.73-generic 4.15.18
  Uname: Linux 4.15.0-64-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7.7
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  robie  2126 F pulseaudio
robie  3648 F alsamixer
  CurrentDesktop: ubuntu:GNOME
  Date: Sat Sep 28 23:51:05 2019
  InstallationDate: Installed on 2017-05-11 (870 days ago)
  InstallationMedia: Ubuntu 17.10 "Artful Aardvark" - Alpha amd64 (20170507)
  PackageArchitecture: all
  SourcePackage: alsa-driver
  Symptom: audio
  Symptom_AlsaPlaybackTest: ALSA playback test through plughw:PCH successful
  Symptom_Card: Built-in Audio - HDA Intel PCH
  Symptom_Jack: Black Headphone Out, Front
  Symptom_PulsePlaybackTest: PulseAudio playback test successful
  Symptom_Type: High background noise, or volume is too low
  Title: [XPS 13 9360, Realtek ALC3246, Black Headphone Out, Front] Background 
noise or low volume
  UpgradeStatus: Upgraded to bionic on 2018-07-28 (427 days ago)
  dmi.bios.date: 03/14/2019
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 2.11.0
  dmi.board.name: 00GCYR
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr2.11.0:bd03/14/2019:svnDellInc.:pnXPS139360:pvr:rvnDellInc.:rn00GCYR:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.family: XPS
  dmi.product.name: XPS 13 9360
  dmi.sys.vendor: Dell Inc.
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.7
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  robie  2329 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.04
  HibernationDevice: RESUME=UUID=ae23a431-2f44-4c12-992a-a0da8186bfcc
  InstallationDate: Installed on 2017-05-11 (871 days ago)
  InstallationMedia: Ubuntu 17.10 "Artful Aardvark" - Alpha amd64 (20170507)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 0bda:568b Realtek Semiconductor Corp. 
   Bus 001 Device 002: ID 0cf3:e300 Atheros Communications, Inc. 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. XPS 13 9360
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.15.0-64-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1
  ProcVersionSignature: Ubuntu 4.15.0-64.73-generic 4.15.18
  RelatedPackageVersions:
   linux-restricted-modules-4.15.0-64-generic N/A
   linux-backports-modules-4.15.0-64-generic  N/A
   linux-firmware 1.173.9
  Tags:  bionic
  Uname: Linux 4.15.0-64-generic x86_64
  UpgradeStatus: Upgraded to bionic on 2018-07-28 (428 days ago)
  UserGroups: 

[Kernel-packages] [Bug 1654448] Re: Dell XPS 13 9350/9360 headphone audio hiss

2019-11-14 Thread Connor Kuehl
** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1654448

Title:
  Dell XPS 13 9350/9360 headphone audio hiss

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  === SRU Justification ===
  [Impact]
  XPS 13 9350/9360 has unbearlbe headphone noise after recent kernel
  updates.

  [Fix]
  Lock Headphone Mic Boost level to 1 as an workaround to solve the issue.

  [Test]
  Plug a headphone to audio jack, the noise is really bad.
  After applying the patch the noise is gone.

  [Regression Potenial]
  Low. This change only targets to 2 systems, so it has limited impact.

  === Original Bug Report ===
  Pertaining to 16.04 on a dell XPS 13 9360

  ii  alsa-base 1.0.25+dfsg-0ubuntu5

  Advanced Linux Sound Architecture Driver Version k4.4.0-57-generic.

  When headphones are plugged in, there is a clearly audible hiss (white
  noise). This is present as soon as the headphones are plugged in,
  whether 'headphones' or 'headset' are selected from the pop-up box.

  Using alsamixer to debug the issue reveals that it is related to
  "Headphone Mic Boost" - the default setting is: dB gain 0.00, 0.00. If
  this is changed to:

  10.00, 10.00 (one notch up) the hiss disappears.
  20.00, 20.00 cause a louder hiss and
  30.00, 30.00 causes an even louder hiss with high frequency audio artifacts.

  When the headphones are removed and plugged back in the Headphone Mic
  Boost setting returns to dB gain 0 and the problem also returns.

  This (problem and workaround) has been reported in the wild:
  https://news.ycombinator.com/item?id=13050843 and
  
https://www.reddit.com/r/Dell/comments/4j1zz4/headphones_have_static_noise_with_ubuntu_1604_on/
  for example

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1654448/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1844021] Re: Suspend stopped working from 4.4.0-157 onwards

2019-11-14 Thread Connor Kuehl
** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Disco)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1844021

Title:
  Suspend stopped working from 4.4.0-157 onwards

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Disco:
  Fix Committed

Bug description:
  Since upgrading the kernel above 4.4.0-154, starting with 4.4.0-157,
  suspend does not work for me anymore. Never had such an issue in the
  last 6 years.

  This is the relevant output when suspend fails:
  [  328.25] PM: Suspending system (mem)
  [  328.288902] Suspending console(s) (use no_console_suspend to debug)
  [  328.289118] wlp1s0: deauthenticating from xx:xx:xx:xx:xx:xx by local 
choice (Reason: 3=DEAUTH_LEAVING)
  [  328.289209] sd 1:0:0:0: [sdb] Synchronizing SCSI cache
  [  328.289570] sd 0:0:0:0: [sda] Synchronizing SCSI cache
  [  328.289600] sd 0:0:0:0: [sda] Stopping disk
  [  328.291700] sd 1:0:0:0: [sdb] Stopping disk
  [  328.312413] xhci_hcd :03:00.0: WARN: xHC save state timeout
  [  328.312456] suspend_common(): xhci_pci_suspend+0x0/0x70 returns -110
  [  328.312461] pci_pm_suspend(): hcd_pci_suspend+0x0/0x30 returns -110
  [  328.312465] dpm_run_callback(): pci_pm_suspend+0x0/0x150 returns -110
  [  328.312483] PM: Device :03:00.0 failed to suspend async: error -110
  [  328.848109] PM: Some devices failed to suspend, or early wake event 
detected

  This is my relevant lspci -v output:

  03:00.0 USB controller: ASMedia Technology Inc. ASM1042 SuperSpeed USB Host 
Controller (prog-if 30 [XHCI])
   Subsystem: Samsung Electronics Co Ltd ASM1042 SuperSpeed USB Host Controller
   Flags: bus master, fast devsel, latency 0, IRQ 16
   Memory at f050 (64-bit, non-prefetchable) [size=32K]
   Capabilities: 
   Kernel driver in use: xhci_hcd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1844021/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1819968] Re: Colour banding in Lenovo G50-80 laptop display (i915)

2019-11-14 Thread Connor Kuehl
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Fix Committed

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Eoan)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1819968

Title:
  Colour banding in Lenovo G50-80 laptop display (i915)

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Eoan:
  Fix Committed

Bug description:
  Colour bandind is visible everywhere in the system. I believe it's not
  a hardware problem, since booting with 'nomodeset' works as expected
  and the previously installed Ubuntu 14.04 also worked.

  I tried installing kernel 4.18.0-16.17 from ppa:canonical-kernel-
  team/ppa but the problem remained.

  There were already similar bugs,
  https://bugs.launchpad.net/bugs/1749420 ,
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1794387 and
  https://bugs.launchpad.net/bugs/1788308, but the fixes provided for
  those bugs did not work for my specific monitor.

  cat /proc/version_signature
  Ubuntu 4.15.0-46.49-generic 4.15.18

  sudo lspci -vnvn
  00:00.0 Host bridge [0600]: Intel Corporation Haswell-ULT DRAM Controller 
[8086:0a04] (rev 0b)
   Subsystem: Lenovo Haswell-ULT DRAM Controller [17aa:390b]
   Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
   Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- 
   Kernel driver in use: hsw_uncore

  00:02.0 VGA compatible controller [0300]: Intel Corporation Haswell-ULT 
Integrated Graphics Controller [8086:0a16] (rev 0b) (prog-if 00 [VGA 
controller])
   Subsystem: Lenovo Haswell-ULT Integrated Graphics Controller [17aa:390b]
   Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
   Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819968/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1851549] Re: Xenial update: 4.4.199 upstream stable release

2019-11-14 Thread Connor Kuehl
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851549

Title:
  Xenial update: 4.4.199 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

  * scsi: ufs: skip shutdown if hba is not powered
  * scsi: megaraid: disable device when probe failed after enabled device
  * scsi: qla2xxx: Fix unbound sleep in fcport delete path.
  * ARM: OMAP2+: Fix missing reset done flag for am3 and am43
  * ARM: dts: am4372: Set memory bandwidth limit for DISPC
  * nl80211: fix null pointer dereference
  * mips: Loongson: Fix the link time qualifier of 'serial_exit()'
  * net: hisilicon: Fix usage of uninitialized variable in function 
mdio_sc_cfg_reg_write()
  * namespace: fix namespace.pl script to support relative paths
  * loop: Add LOOP_SET_DIRECT_IO to compat ioctl
  * net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3
  * net: bcmgenet: Set phydev->dev_flags only for internal PHYs
  * sctp: change sctp_prot .no_autobind with true
  * net: avoid potential infinite loop in tc_ctl_action()
  * ipv4: Return -ENETUNREACH if we can't create route but saddr is valid
  * memfd: Fix locking when tagging pins
  * USB: legousbtower: fix memleak on disconnect
  * usb: udc: lpc32xx: fix bad bit shift operation
  * USB: serial: ti_usb_3410_5052: fix port-close races
  * USB: ldusb: fix memleak on disconnect
  * USB: usblp: fix use-after-free on disconnect
  * USB: ldusb: fix read info leaks
  * scsi: core: try to get module before removing device
  * ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting
  * cfg80211: wext: avoid copying malformed SSIDs
  * mac80211: Reject malformed SSID elements
  * drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50
  * scsi: zfcp: fix reaction on bit error threshold notification
  * mm/slub: fix a deadlock in show_slab_objects()
  * xtensa: drop EXPORT_SYMBOL for outs*/ins*
  * parisc: Fix vmap memory leak in ioremap()/iounmap()
  * CIFS: avoid using MID 0x
  * btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group()
  * memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()'
  * cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown
  * xen/netback: fix error path of xenvif_connect_data()
  * PCI: PM: Fix pci_power_up()
  * net: sched: Fix memory exposure from short TCA_U32_SEL
  * RDMA/cxgb4: Do not dma memory off of the stack
  * Linux 4.4.198
  * UBUNTU: upstream stable to v4.4.198
  * dm snapshot: use mutex instead of rw_semaphore
  * dm snapshot: introduce account_start_copy() and account_end_copy()
  * dm snapshot: rework COW throttling to fix deadlock
  * dm: Use kzalloc for all structs with embedded biosets/mempools
  * sc16is7xx: Fix for "Unexpected interrupt: 8"
  * x86/cpu: Add Atom Tremont (Jacobsville)
  * scripts/setlocalversion: Improve -dirty check with git-status 
--no-optional-locks
  * usb: handle warm-reset port requests on hub resume
  * exec: load_script: Do not exec truncated interpreter path
  * iio: fix center temperature of bmc150-accel-core
  * perf map: Fix overlapped map handling
  * RDMA/iwcm: Fix a lock inversion issue
  * fs: cifs: mute -Wunused-const-variable message
  * serial: mctrl_gpio: Check for NULL pointer
  * efi/cper: Fix endianness of PCIe class code
  * efi/x86: Do not clean dummy variable in kexec path
  * fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()
  * fs: ocfs2: fix a possible null-pointer dereference in 
ocfs2_info_scan_inode_alloc()
  * MIPS: fw: sni: Fix out of bounds init of o32 stack
  * NFSv4: Fix leak of clp->cl_acceptor string
  * tracing: Initialize iter->seq after zeroing in tracing_read_pipe()
  * USB: legousbtower: fix a signedness bug in tower_probe()
  * thunderbolt: Use 32-bit writes when writing ring producer/consumer
  * fuse: flush dirty data/metadata before non-truncate setattr
  * fuse: truncate pending writes on O_TRUNC
  * ALSA: bebob: Fix prototype of helper function to return negative value
  * UAS: Revert commit 3ae62a42090f ("UAS: fix alignment of scatter/gather 
segments")
  * USB: gadget: Reject endpoints with 0 maxpacket value
  * USB: ldusb: fix ring-buffer locking
  * USB: ldusb: fix control-message timeout
  * USB: serial: whiteheat: fix potential slab corruption
  * USB: 

[Kernel-packages] [Bug 1812618] Re: psock_snd from net test in ubuntu_kernel_selftests failed on C

2019-11-13 Thread Connor Kuehl
Cosmic has gone EOL.

** Changed in: linux (Ubuntu Cosmic)
   Status: New => Won't Fix

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: ubuntu-kernel-tests
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1812618

Title:
  psock_snd from net test in ubuntu_kernel_selftests failed on C

Status in ubuntu-kernel-tests:
  Invalid
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Cosmic:
  Won't Fix

Bug description:
  This test will fail with Resource temporarily unavailable

  $ sudo ./psock_snd.sh 
  dgram
  tx: 128
  rx: 142
  ./psock_snd: recv: Resource temporarily unavailable

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-13-generic 4.18.0-13.14
  ProcVersionSignature: User Name 4.18.0-13.14-generic 4.18.17
  Uname: Linux 4.18.0-13-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Jan 21 07:41 seq
   crw-rw 1 root audio 116, 33 Jan 21 07:41 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  Date: Mon Jan 21 07:49:29 2019
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  Lsusb: Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  MachineType: QEMU Standard PC (i440FX + PIIX, 1996)
  PciMultimedia:
   
  ProcFB: 0 cirrusdrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.18.0-13-generic 
root=UUID=2a4b0342-a2dd-4feb-b3e2-9644ca1c4a60 ro console=ttyS0,115200n8
  RelatedPackageVersions:
   linux-restricted-modules-4.18.0-13-generic N/A
   linux-backports-modules-4.18.0-13-generic  N/A
   linux-firmware 1.175.1
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/01/2014
  dmi.bios.vendor: SeaBIOS
  dmi.bios.version: Ubuntu-1.8.2-1ubuntu1
  dmi.chassis.type: 1
  dmi.chassis.vendor: QEMU
  dmi.chassis.version: pc-i440fx-xenial
  dmi.modalias: 
dmi:bvnSeaBIOS:bvrUbuntu-1.8.2-1ubuntu1:bd04/01/2014:svnQEMU:pnStandardPC(i440FX+PIIX,1996):pvrpc-i440fx-xenial:cvnQEMU:ct1:cvrpc-i440fx-xenial:
  dmi.product.name: Standard PC (i440FX + PIIX, 1996)
  dmi.product.version: pc-i440fx-xenial
  dmi.sys.vendor: QEMU

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812618/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852232] Re: eoan/linux: 5.3.0-24.26 -proposed tracker

2019-11-13 Thread Connor Kuehl
** Summary changed:

- eoan/linux:  -proposed tracker
+ eoan/linux: 5.3.0-24.26 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852232

Title:
  eoan/linux: 5.3.0-24.26 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-lrm series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Eoan:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  packages:
lrm: linux-restricted-modules
main: linux
meta: linux-meta
signed: linux-signed
  phase: Packaging
  phase-changed: Wednesday, 13. November 2019 22:26 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-lrm: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
bionic/linux-hwe-edge: bug 1852231
eoan/linux-aws: bug 1852223
eoan/linux-azure: bug 1852225
eoan/linux-gcp: bug 1852227
eoan/linux-kvm: bug 1852228
eoan/linux-oracle: bug 1852230
eoan/linux-raspi2: bug 1852220
eoan/linux/pc-kernel: bug 1852217
eoan/linux/pc-lowlatency-kernel: bug 1852218
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852232/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852253] Re: disco/linux: 5.0.0-37.40 -proposed tracker

2019-11-13 Thread Connor Kuehl
** Summary changed:

- disco/linux:  -proposed tracker
+ disco/linux: 5.0.0-37.40 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852253

Title:
  disco/linux: 5.0.0-37.40 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-lrm series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow prepare-package-signed series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Disco:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  packages:
lrm: linux-restricted-modules
main: linux
meta: linux-meta
signed: linux-signed
  phase: Packaging
  phase-changed: Wednesday, 13. November 2019 19:36 UTC
  reason:
prepare-package: Pending -- package not yet uploaded
prepare-package-lrm: Pending -- package not yet uploaded
prepare-package-meta: Pending -- package not yet uploaded
prepare-package-signed: Pending -- package not yet uploaded
  trackers:
bionic/linux-bluefield: bug 1852252
bionic/linux-hwe: bug 1852250
bionic/linux-oem-osp1: bug 1852251
disco/linux-aws: bug 1852236
disco/linux-azure: bug 1852239
disco/linux-gcp: bug 1852244
disco/linux-kvm: bug 1852245
disco/linux-oracle: bug 1852248
disco/linux-raspi2: bug 1852233
disco/linux-snapdragon: bug 1852249
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852253/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   3   4   >