[Kernel-packages] [Bug 1860681] Re: Xenial update: 4.4.211 upstream stable release
The following commits were skipped as they have already been applied: * rsi: add fix for crash during assertions * mm/page_alloc.c: calculate 'available' memory in a separate function ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * hidraw: Return EPOLLOUT from hidraw_poll + * HID: hidraw: Fix returning EPOLLOUT from hidraw_poll + * HID: hidraw, uhid: Always report EPOLLOUT + * cfg80211/mac80211: make ieee80211_send_layer2_update a public function + * mac80211: Do not send Layer 2 Update frame before authorization + * media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap + * p54usb: Fix race between disconnect and firmware loading + * ALSA: line6: Fix write on zero-sized buffer + * ALSA: line6: Fix memory leak at line6_init_pcm() error path + * xen: let alloc_xenballooned_pages() fail if not enough memory free + * wimax: i2400: fix memory leak + * wimax: i2400: Fix memory leak in i2400m_op_rfkill_sw_toggle + * ext4: fix use-after-free race with debug_want_extra_isize + * ext4: add more paranoia checking in ext4_expand_extra_isize handling + * dccp: Fix memleak in __feat_register_sp + * rtc: mt6397: fix alarm register overwrite + * iommu: Remove device link to group on failure + * gpio: Fix error message on out-of-range GPIO in lookup table + * hsr: reset network header when supervision frame is created + * cifs: Adjust indentation in smb2_open_file + * RDMA/srpt: Report the SCSI residual to the initiator + * scsi: enclosure: Fix stale device oops with hot replug + * scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI + * platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 + * iio: imu: adis16480: assign bias value only if operation succeeded + * mei: fix modalias documentation + * clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume + * compat_ioctl: handle SIOCOUTQNSD + * tty: serial: imx: use the sg count from dma_map_sg + * tty: serial: pch_uart: correct usage of dma_unmap_sg + * media: exynos4-is: Fix recursive locking in isp_video_release() + * spi: atmel: fix handling of cs_change set on non-last xfer + * rtlwifi: Remove unnecessary NULL check in rtl_regd_init + * rtc: msm6242: Fix reading of 10-hour digit + * rseq/selftests: Turn off timeout setting + * hexagon: work around compiler crash + * ocfs2: call journal flush to mark journal as empty after journal recovery when mount + * ALSA: seq: Fix racy access for queue timer in proc read + * Fix built-in early-load Intel microcode alignment + * block: fix an integer overflow in logical block size + * USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx + * USB: serial: opticon: fix control-message timeouts + * USB: serial: suppress driver bind attributes + * USB: serial: ch341: handle unbound port at reset_resume + * USB: serial: io_edgeport: add missing active-port sanity check + * USB: serial: quatech2: handle unbound ports + * scsi: mptfusion: Fix double fetch bug in ioctl + * usb: core: hub: Improved device recognition on remote wakeup + * x86/efistub: Disable paging at mixed mode entry + * mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() + * net: stmmac: 16KB buffer must be 16 byte aligned + * net: stmmac: Enable 16KB buffer size + * USB: serial: io_edgeport: use irqsave() in USB's complete callback + * USB: serial: io_edgeport: handle unbound ports on URB completion + * USB: serial: keyspan: handle unbound ports + * scsi: fnic: use kernel's '%pM' format option to print MAC + * scsi: fnic: fix invalid stack access + * arm64: dts: agilex/stratix10: fix pmu interrupt numbers + * netfilter: fix a use-after-free in mtype_destroy() + * batman-adv: Fix DAT candidate selection on little endian systems + * macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() + * r8152: add missing endpoint sanity check + * tcp: fix marked lost packets not being retransmitted + * net: usb: lan78xx: limit size of local TSO packets + * xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk + * cw1200:
[Kernel-packages] [Bug 1860690] Re: Smartpqi updates for 18.04.4
** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Jeff Lane (bladernr) ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Status: Confirmed => In Progress ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1860690 Title: Smartpqi updates for 18.04.4 Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: [Impact] Most Ubuntu customers prefer the simplicity of using inbox drivers over out-of-box drivers Microsemi provides. To do that well, we should keep that inbox driver moving forward. If we don't land the updates in 18.04.4 customers would be waiting until ~ August 2020 for the 18.04.5 update. Microsemi have asked to have them pulled into 5.3 to update the SmartPQI driver that we carry. [Fixes] The following patches are in 5.4 Mainline and also our Focal tree are all clean cherry picks into 5.3. 391a24179423 scsi: smartpqi: bump version 48edb8780100 scsi: smartpqi: update copyright 63a7956ae1e8 scsi: smartpqi: add new pci ids 9946a3987248 scsi: smartpqi: correct REGNEWD return status 71ecc60d9ba4 scsi: smartpqi: add gigabyte controller 530dd8a7a2b1 scsi: smartpqi: correct hang when deleting 32 lds 2d2ad4bc724e scsi: smartpqi: add bay identifier 6d90615f1346 scsi: smartpqi: add sysfs entries 522bc026f013 scsi: smartpqi: add module param to hide vsep 8bdb3b9c67c5 scsi: smartpqi: add pci ids for fiberhome controller 5e6a9760f7da scsi: smartpqi: add module param for exposure order All are clean cherry-picks into Eoan/master-next from 5.4 and do not touch anything outside of Microsemi's smartpqi driver. These have been cherry picked into my branch found here: https://code.launchpad.net/~bladernr/ubuntu/+source/linux/+git/eoan/+ref/1860690-smartpqi-updates-master-next [Testing] Tested by upstream [Regression Risk] Low, these are updates and bug fixes from the upstream maintainer and have already been tested by the upstream on Ubuntu. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860690/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1860681] [NEW] Xenial update: 4.4.211 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.211 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1860681 Title: Xenial update: 4.4.211 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.211 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860681/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1850540] Re: multi-zone raid0 corruption
** Changed in: linux (Ubuntu Trusty) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1850540 Title: multi-zone raid0 corruption Status in Release Notes for Ubuntu: New Status in linux package in Ubuntu: Confirmed Status in mdadm package in Ubuntu: Fix Released Status in linux source package in Precise: New Status in mdadm source package in Precise: New Status in linux source package in Trusty: Fix Committed Status in mdadm source package in Trusty: Confirmed Status in linux source package in Xenial: Confirmed Status in mdadm source package in Xenial: Confirmed Status in linux source package in Bionic: In Progress Status in mdadm source package in Bionic: Fix Committed Status in linux source package in Disco: In Progress Status in mdadm source package in Disco: Fix Committed Status in linux source package in Eoan: In Progress Status in mdadm source package in Eoan: Fix Committed Status in linux source package in Focal: Confirmed Status in mdadm source package in Focal: Fix Released Status in mdadm package in Debian: Fix Released Bug description: Bug 1849682 tracks the temporarily revert of the fix for this issue, while this bug tracks the re-application of that fix once we have a full solution. [Impact] (cut & paste from https://marc.info/?l=linux-raid=157360088014027=2) An unintentional RAID0 layout change was introduced in the v3.14 kernel. This effectively means there are 2 different layouts Linux will use to write data to RAID0 arrays in the wild - the “pre-3.14” way and the “3.14 and later” way. Mixing these layouts by writing to an array while booted on these different kernel versions can lead to corruption. Note that this only impacts RAID0 arrays that include devices of different sizes. If your devices are all the same size, both layouts are equivalent, and your array is not at risk of corruption due to this issue. Unfortunately, the kernel cannot detect which layout was used for writes to pre-existing arrays, and therefore requires input from the administrator. This input can be provided via the kernel command line with the raid0.default_layout= parameter, or by setting the default_layout module parameter when loading the raid0 module. With a new enough version of mdadm (>= 4.2, or equivalent distro backports), you can set the layout version when assembling a stopped array. For example: mdadm --stop /dev/md0 mdadm --assemble -U layout-alternate /dev/md0 /dev/sda1 /dev/sda2 See the mdadm manpage for more details. Once set in this manner, the layout will be recorded in the array and will not need to be explicitly specified in the future. (The mdadm part of this SRU is for the above support ^) [Test Case] = mdadm = Confirm that a multi-zone raid0 created w/ older mdadm is able to be started on a fixed kernel by setting a layout. 1) Ex: w/ old kernel/mdadm: mdadm --create /dev/md0 --run --metadata=default \ --level=0 --raid-devices=2 /dev/vdb1 /dev/vdc1 2) Reboot onto fixed kernel & update mdadm 3) sudo mdadm --stop /dev/md0 && sudo mdadm --assemble -U layout-alternate \ /dev/md0 /dev/vdb1 /dev/vdc1 4) Confirm that the array autostarts on reboot 5) Confirm that w/ new kernel & new mdadm, a user can create and start an array in a backwards-compatible fashion (i.e. w/o an explicit layout). 6) Verify that 'mdadm --detail /dev/md0' displays the layout = linux = Similar to above, but using kernel command line options. [Regression Risk] The kernel side of things will break starting pre-existing arrays. That's intentional. The mdadm side will cause a regression in functionality where a user can no longer create multi-zone raid0s on kernels that do not yet have the raid0 layout patches. This is intentional, as such RAID arrays present a corruption risk. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-release-notes/+bug/1850540/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1858625] Re: trusty/linux: 3.13.0-176.227 -proposed tracker
** Summary changed: - trusty/linux: -proposed tracker + trusty/linux: 3.13.0-176.227 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1858625 Title: trusty/linux: 3.13.0-176.227 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Wednesday, 22. January 2020 18:25 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: precise/linux-lts-trusty: bug 1858624 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858625/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1859865] Re: Xenial update: 4.4.210 upstream stable release
The following commits were skipped as they have already been applied: * kobject: Export kobject_get_unless_zero() * mwifiex: fix possible heap overflow in mwifiex_process_country_ie() ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * chardev: Avoid potential use-after-free in 'chrdev_open()' + * usb: chipidea: host: Disable port power only if previously enabled + * ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 + * kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail + * tracing: Have stack tracer compile when MCOUNT_INSN_SIZE is not defined + * HID: Fix slab-out-of-bounds read in hid_field_extract + * HID: uhid: Fix returning EPOLLOUT from uhid_char_poll + * HID: hid-input: clear unmapped usages + * Input: add safety guards to input_set_keycode() + * drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ + * can: gs_usb: gs_usb_probe(): use descriptors of current altsetting + * can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode + * can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs + * staging: vt6656: set usb_set_intfdata on driver fail. + * USB: serial: option: add ZLP support for 0x1bc7/0x9010 + * usb: musb: Disable pullup at init + * usb: musb: dma: Correct parameter passed to IRQ handler + * staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 + * tty: link tty and port before configuring it as console + * tty: always relink the port + * mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf + * scsi: bfa: release allocated memory in case of error + * rtl8xxxu: prevent leaking urb + * USB: Fix: Don't skip endpoint descriptors with maxpacket=0 + * netfilter: arp_tables: init netns pointer in xt_tgchk_param struct + * netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present + * drm/i915/gen9: Clear residual context state on context switch + * Linux 4.4.210 + * UBUNTU: upstream stable to v4.4.210 -4.4.210 upstream stable release -from git://git.kernel.org/ + 4.4.210 upstream stable release + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859865 Title: Xenial update: 4.4.210 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * chardev: Avoid potential use-after-free in 'chrdev_open()' * usb: chipidea: host: Disable port power only if previously enabled * ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 * kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail * tracing: Have stack tracer compile when MCOUNT_INSN_SIZE is not defined * HID: Fix slab-out-of-bounds read in hid_field_extract * HID: uhid: Fix returning EPOLLOUT from uhid_char_poll * HID: hid-input: clear unmapped usages * Input: add safety guards to input_set_keycode() * drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ * can: gs_usb: gs_usb_probe(): use descriptors of current altsetting * can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode * can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs * staging: vt6656: set usb_set_intfdata on driver fail. * USB: serial: option: add ZLP support for 0x1bc7/0x9010 * usb: musb: Disable pullup at init * usb: musb: dma: Correct parameter passed to IRQ handler * staging:
[Kernel-packages] [Bug 1859865] [NEW] Xenial update: 4.4.210 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.210 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859865 Title: Xenial update: 4.4.210 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.210 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859865/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1859820] Re: eoan/linux-azure: 5.3.0-1010.11 -proposed tracker
** Summary changed: - eoan/linux-azure: -proposed tracker + eoan/linux-azure: 5.3.0-1010.11 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-azure in Ubuntu. https://bugs.launchpad.net/bugs/1859820 Title: eoan/linux-azure: 5.3.0-1010.11 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-lrm series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow stakeholder-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-azure package in Ubuntu: Invalid Status in linux-azure source package in Eoan: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1859694 packages: lrm: linux-restricted-modules-azure main: linux-azure meta: linux-meta-azure signed: linux-signed-azure phase: Packaging phase-changed: Wednesday, 15. January 2020 18:36 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-lrm: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: bionic/linux-azure-5.3: bug 1859819 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1859820/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1859795] Re: bionic/linux-aws: 4.15.0-1058.60 -proposed tracker
** Summary changed: - bionic/linux-aws: -proposed tracker + bionic/linux-aws: 4.15.0-1058.60 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1859795 Title: bionic/linux-aws: 4.15.0-1058.60 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-lrm series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Bionic: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1859705 packages: lrm: linux-restricted-modules-aws main: linux-aws meta: linux-meta-aws phase: Packaging phase-changed: Wednesday, 15. January 2020 17:26 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-lrm: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded trackers: bionic/linux-aws-fips: bug 1859801 bionic/linux-aws/aws-kernel: bug 1859794 xenial/linux-aws-hwe: bug 1859802 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1859795/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1859640] Re: Xenial update: 4.4.209 upstream stable release
Note, the following commit was skipped because it has already been applied: * Revert "perf report: Add warning when libunwind not compiled in" ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * PM / devfreq: Don't fail devfreq_dev_release if not in list + * RDMA/cma: add missed unregister_pernet_subsys in init failure + * scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func + * scsi: qla2xxx: Don't call qlt_async_event twice + * scsi: iscsi: qla4xxx: fix double free in probe + * scsi: libsas: stop discovering if oob mode is disconnected + * usb: gadget: fix wrong endpoint desc + * md: raid1: check rdev before reference in raid1_sync_request func + * s390/cpum_sf: Adjust sampling interval to avoid hitting sample limits + * s390/cpum_sf: Avoid SBD overflow condition in irq handler + * xen/balloon: fix ballooned page accounting without hotplug enabled + * xfs: fix mount failure crash on invalid iclog memory access + * taskstats: fix data-race + * ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code + * MIPS: Avoid VDSO ABI breakage due to global register variable + * locks: print unsigned ino in /proc/locks + * dmaengine: Fix access to uninitialized dma_slave_caps + * compat_ioctl: block: handle Persistent Reservations + * gpiolib: fix up emulated open drain outputs + * ALSA: cs4236: fix error return comparison of an unsigned integer + * ftrace: Avoid potential division by zero in function profiler + * Bluetooth: btusb: fix PM leak in error case of setup + * Bluetooth: delete a stray unlock + * tty: serial: msm_serial: Fix lockup for sysrq and oops + * drm/mst: Fix MST sideband up-reply failure handling + * powerpc/pseries/hvconsole: Fix stack overread via udbg + * ath9k_htc: Modify byte order for an error message + * ath9k_htc: Discard undersized packets + * net: add annotations on hh->hh_len lockless accesses + * s390/smp: fix physical to logical CPU map for SMT + * locking/x86: Remove the unused atomic_inc_short() methd + * pstore/ram: Write new dumps to start of recycled zones + * locking/spinlock/debug: Fix various data races + * netfilter: ctnetlink: netns exit must wait for callbacks + * ARM: vexpress: Set-up shared OPP table instead of individual for each CPU + * netfilter: uapi: Avoid undefined left-shift in xt_sctp.h + * ARM: dts: am437x-gp/epos-evm: fix panel compatible + * powerpc: Ensure that swiotlb buffer is allocated from low memory + * bnx2x: Do not handle requests from VFs after parity + * bnx2x: Fix logic to get total no. of PFs per engine + * net: usb: lan78xx: Fix error message format specifier + * rfkill: Fix incorrect check to avoid NULL pointer dereference + * ASoC: wm8962: fix lambda value + * regulator: rn5t618: fix module aliases + * kconfig: don't crash on NULL expressions in expr_eq() + * parisc: Fix compiler warnings in debug_core.c + * llc2: Fix return statement of llc_stat_ev_rx_null_dsap_xid_c (and _test_c) + * net: stmmac: dwmac-sunxi: Allow all RGMII modes + * net: usb: lan78xx: fix possible skb leak + * pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM + * sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY + * tcp: fix "old stuff" D-SACK causing SACK to be treated as D-SACK + * vlan: vlan_changelink() should propagate errors + * vlan: fix memory leak in vlan_dev_set_egress_priority + * vxlan: fix tos value before xmit + * macvlan: do not assume mac_header is set in macvlan_broadcast() + * USB: core: fix check for duplicate endpoints + * USB: serial: option: add Telit ME910G1 0x110a composition + * Linux 4.4.209 + * UBUNTU: upstream stable to v4.4.209 -4.4.209 upstream stable release -from git://git.kernel.org/ + 4.4.209 upstream stable release + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859640 Title: Xenial update: 4.4.209 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU
[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages
https://lists.ubuntu.com/archives/kernel-team/2020-January/106863.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856603 Title: fstrim on nvme / AMD CPU fails and produces kernel error messages Status in linux package in Ubuntu: Invalid Status in linux source package in Bionic: In Progress Status in linux source package in Disco: In Progress Status in linux source package in Eoan: In Progress Bug description: [Impact] Discard requests can fail on a non-compliant nvme device meaning that prescribed maintenance use of fstrim will be unsuccessful and unused blocks are no longer properly disposed of. [Test case] Run fstrim (from bug report, ran as root: fstrim -v /) Expected result: "/: 758.3 GiB (814159003648 bytes) trimmed" -- will vary depending on the blocks that are unused for your system Unpatched actual result: "fstrim: /: FITRIM ioctl failed: Input/output error" [Regression Potential] This patch only increases the size of a memory allocation and does not add any changes in logic for error handling or normal flow of control. This routine already handles the case where the memory allocation fails. Because of this, it is a low risk change. Original bug description below: -- /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1 on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen 3400G CPU. The filesystem is ext4: Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0 /dev/nvme0n1p2 on / type ext4 (rw,relatime) When I run fstrim -v / as root, I get the following error message at the command line: seth@elemental:~$ sudo fstrim -v / fstrim: /: FITRIM ioctl failed: Input/output error and the following kernel messages are logged: [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x0 flags=0x] [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x700 flags=0x] [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x680 flags=0x] [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x300 flags=0x] [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x200 flags=0x] [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x580 flags=0x] [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x100 flags=0x] [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x400 flags=0x] [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x380 flags=0x] [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x780 flags=0x] [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x180 flags=0x] [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x500 flags=0x] [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x480 flags=0x] [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x280 flags=0x] [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x600 flags=0x] [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x80 flags=0x] [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x980 flags=0x] [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x900 flags=0x] [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x880 flags=0x] [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0xa00 flags=0x] [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0 I have tried setting iommu passthrough on boot but this doesn’t seem to help: GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=pt avic=1” This is possibly related to: https://bugzilla.kernel.org/show_bug.cgi?id=202665 http://git.infradead.org/nvme.git/commitdiff/530436c45ef2e446c12538a400e465929a0b3ade?hp=400b6a7b13a3fd71cff087139ce45dd1e5fff444 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856603/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to
[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages
It looks like the version of this routine is Xenial is not impacted since it hasn't received this refactor patch which constrains the allocation to 16 bytes: 03b5929ebb20 ("nvme: rewrite discard support"). I will remove the Xenial nomination. ** Description changed: + [Impact] + + Discard requests can fail on a non-compliant nvme device meaning that + prescribed maintenance use of fstrim will be unsuccessful and unused + blocks are no longer properly disposed of. + + [Test case] + + Run fstrim (from bug report, ran as root: fstrim -v /) + + Expected result: "/: 758.3 GiB (814159003648 bytes) trimmed" -- will + vary depending on the blocks that are unused for your system + + Unpatched actual result: "fstrim: /: FITRIM ioctl failed: Input/output + error" + + [Regression Potential] + + This patch only increases the size of a memory allocation and does not + add any changes in logic for error handling or normal flow of control. + This routine already handles the case where the memory allocation fails. + Because of this, it is a low risk change. + + Original bug description below: + -- + /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1 on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen 3400G CPU. The filesystem is ext4: Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0 /dev/nvme0n1p2 on / type ext4 (rw,relatime) When I run fstrim -v / as root, I get the following error message at the command line: seth@elemental:~$ sudo fstrim -v / fstrim: /: FITRIM ioctl failed: Input/output error and the following kernel messages are logged: [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x0 flags=0x] [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x700 flags=0x] [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x680 flags=0x] [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x300 flags=0x] [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x200 flags=0x] [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x580 flags=0x] [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x100 flags=0x] [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x400 flags=0x] [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x380 flags=0x] [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x780 flags=0x] [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x180 flags=0x] [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x500 flags=0x] [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x480 flags=0x] [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x280 flags=0x] [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x600 flags=0x] [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x80 flags=0x] [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x980 flags=0x] [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x900 flags=0x] [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x880 flags=0x] [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0xa00 flags=0x] [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0 - - I have tried setting iommu passthrough on boot but this doesn’t seem to help: + I have tried setting iommu passthrough on boot but this doesn’t seem to + help: GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=pt avic=1” This is possibly related to: https://bugzilla.kernel.org/show_bug.cgi?id=202665 http://git.infradead.org/nvme.git/commitdiff/530436c45ef2e446c12538a400e465929a0b3ade?hp=400b6a7b13a3fd71cff087139ce45dd1e5fff444 ** No longer affects: linux (Ubuntu Xenial) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856603 Title: fstrim on nvme / AMD CPU fails and produces kernel error messages Status in linux package in Ubuntu: Invalid
[Kernel-packages] [Bug 1859640] Re: Xenial update: 4.4.209 upstream stable release
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859640 Title: Xenial update: 4.4.209 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.209 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859640/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1859640] [NEW] Xenial update: 4.4.209 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.209 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859640 Title: Xenial update: 4.4.209 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.209 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859640/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1856608] Re: [Regression] usb usb2-port2: Cannot enable. Maybe the USB cable is bad?
** Changed in: linux (Ubuntu Eoan) Status: Incomplete => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856608 Title: [Regression] usb usb2-port2: Cannot enable. Maybe the USB cable is bad? Status in linux package in Ubuntu: Incomplete Status in linux source package in Bionic: Triaged Status in linux source package in Disco: Incomplete Status in linux source package in Eoan: Fix Committed Status in linux source package in Focal: Incomplete Bug description: This appears to be a regression between 4.15.0-70.79 and 4.15.0-72.81. [Impact] USB port unusable and boot time takes ~5 minutes longer to complete. Kernel emits messages like: usb usb2-port2: Cannot enable. Maybe the USB cable is bad? [Test Case] dmesg | grep "Cannot enable" [Fix] [Regression Risk] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856608/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1858955] [NEW] bionic/linux-raspi2: -proposed tracker
Public bug reported: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1858956 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Holding before Packaging phase-changed: Wednesday, 08. January 2020 23:22 UTC reason: prepare-package: Holding -- waiting for master bug trackers: bionic/linux-raspi2/pi-kernel: bug 1858954 variant: debs ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-raspi2 (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-raspi2 (Ubuntu Bionic) Importance: Medium Status: Confirmed ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2019.12.02-12 kernel-sru-derivative-of-1858956 ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Tags added: bionic kernel-release-tracking-bug ** Also affects: linux-raspi2 (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux-raspi2 (Ubuntu Bionic) Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru) ** Changed in: kernel-sru-workflow/promote-to-security
[Kernel-packages] [Bug 1858956] [NEW] bionic/linux: -proposed tracker
Public bug reported: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: lrm: linux-restricted-modules main: linux meta: linux-meta signed: linux-signed phase: Ready for Packaging phase-changed: Wednesday, 08. January 2020 23:22 UTC reason: prepare-package: Pending -- version not specified trackers: bionic/linux-raspi2: bug 1858955 bionic/linux/pc-kernel: bug 1858952 bionic/linux/pc-lowlatency-kernel: bug 1858953 variant: debs ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-lrm Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Bionic) Importance: Medium Status: Confirmed ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2019.12.02-12 ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-lrm Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Tags added: bionic kernel-release-tracking-bug ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Bionic) Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) =>
[Kernel-packages] [Bug 1858943] Re: eoan/linux: 5.3.0-27.29 -proposed tracker
** Summary changed: - eoan/linux: -proposed tracker + eoan/linux: 5.3.0-27.29 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1858943 Title: eoan/linux: 5.3.0-27.29 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-lrm series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: lrm: linux-restricted-modules main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Wednesday, 08. January 2020 23:06 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-lrm: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: bionic/linux-hwe: bug 1858942 eoan/linux-raspi2: bug 1858941 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858943/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1858798] Re: tools/perf fails to build after Xenial update to 4.4.208 upstream stable release
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1858798 Title: tools/perf fails to build after Xenial update to 4.4.208 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Committed Bug description: [Impact] xenial/linux after the update to 4.4.208 upstream stable fails to build tools/perf on environments that don't have libunwind installed. https://launchpad.net/~canonical-kernel- team/+archive/ubuntu/ppa/+build/18530346/+files/buildlog_ubuntu- xenial-powerpc.linux_4.4.0-172.201_BUILDING.txt.gz [...] builtin-report.c: In function ‘report__setup_sample_type’: builtin-report.c:289:6: error: ‘dwarf_callchain_users’ undeclared (first use in this function) if (dwarf_callchain_users) { ^ [...] This is caused by the following commit from linux-4.4.y: commit faece3af80729763bb28449fa803d12c962571bd Author: Jin Yao Date: Fri Oct 11 10:21:22 2019 +0800 perf report: Add warning when libunwind not compiled in [ Upstream commit 800d3f561659b5436f8c57e7c26dd1f6928b5615 ] [Fix] Revert the mentioned commit. The variable 'dwarf_callchain_users' was introduced by eabad8c6856f "perf unwind: Do not look just at the global callchain_param.record_mode" which as of now hasn't been backported to stable linux-4.4.y. [Test] Build the kernel on PPA for powerpc, ppc64el and s390x. [Regression Potential] Null. This commit is supposed to only add a warning and is breaking the build for some architectures, so reverting it will not cause any regression for the users. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858798/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1858594] Re: xenial/linux: 4.4.0-172.202 -proposed tracker
** Summary changed: - xenial/linux: 4.4.0-172.201 -proposed tracker + xenial/linux: 4.4.0-172.202 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Fix Committed => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Released => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Status: Fix Released => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1858594 Title: xenial/linux: 4.4.0-172.202 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Tuesday, 07. January 2020 22:21 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: trusty/linux-aws: bug 1858591 trusty/linux-lts-xenial: bug 1858592 xenial/linux-aws: bug 1858581 xenial/linux-cascade: bug 1858583 xenial/linux-fips: bug 1858589 xenial/linux-kvm: bug 1858584 xenial/linux-raspi2: bug 1858586 xenial/linux-snapdragon: bug 1858588 xenial/linux/caracalla-kernel: bug 1858577 xenial/linux/pc-kernel: bug 1858578 xenial/linux/stlouis-kernel: bug 1858579 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858594/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1858594] Re: xenial/linux: 4.4.0-172.201 -proposed tracker
** Summary changed: - xenial/linux: -proposed tracker + xenial/linux: 4.4.0-172.201 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1858594 Title: xenial/linux: 4.4.0-172.201 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Tuesday, 07. January 2020 22:21 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: trusty/linux-aws: bug 1858591 trusty/linux-lts-xenial: bug 1858592 xenial/linux-aws: bug 1858581 xenial/linux-cascade: bug 1858583 xenial/linux-fips: bug 1858589 xenial/linux-kvm: bug 1858584 xenial/linux-raspi2: bug 1858586 xenial/linux-snapdragon: bug 1858588 xenial/linux/caracalla-kernel: bug 1858577 xenial/linux/pc-kernel: bug 1858578 xenial/linux/stlouis-kernel: bug 1858579 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858594/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages
** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: fstrim (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Disco) Importance: Undecided Status: New ** Also affects: fstrim (Ubuntu Disco) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: fstrim (Ubuntu Bionic) Importance: Undecided Status: New ** No longer affects: fstrim (Ubuntu) ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubuntu Disco) Status: New => In Progress ** Changed in: linux (Ubuntu Disco) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Bionic) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Connor Kuehl (connork) ** Changed in: linux (Ubuntu Disco) Assignee: (unassigned) => Connor Kuehl (connork) ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) ** No longer affects: fstrim (Ubuntu Xenial) ** No longer affects: fstrim (Ubuntu Bionic) ** No longer affects: fstrim (Ubuntu Disco) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856603 Title: fstrim on nvme / AMD CPU fails and produces kernel error messages Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Status in linux source package in Bionic: In Progress Status in linux source package in Disco: In Progress Status in linux source package in Eoan: In Progress Bug description: /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1 on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen 3400G CPU. The filesystem is ext4: Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0 /dev/nvme0n1p2 on / type ext4 (rw,relatime) When I run fstrim -v / as root, I get the following error message at the command line: seth@elemental:~$ sudo fstrim -v / fstrim: /: FITRIM ioctl failed: Input/output error and the following kernel messages are logged: [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x0 flags=0x] [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x700 flags=0x] [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x680 flags=0x] [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x300 flags=0x] [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x200 flags=0x] [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x580 flags=0x] [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x100 flags=0x] [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x400 flags=0x] [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x380 flags=0x] [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x780 flags=0x] [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x180 flags=0x] [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x500 flags=0x] [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x480 flags=0x] [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x280 flags=0x] [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x600 flags=0x] [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x80 flags=0x] [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x980 flags=0x] [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x900 flags=0x] [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x880 flags=0x] [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0xa00 flags=0x] [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0
[Kernel-packages] [Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages
** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Also affects: fstrim (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: New => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) ** No longer affects: fstrim (Ubuntu Eoan) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856603 Title: fstrim on nvme / AMD CPU fails and produces kernel error messages Status in fstrim package in Ubuntu: New Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1 on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen 3400G CPU. The filesystem is ext4: Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0 /dev/nvme0n1p2 on / type ext4 (rw,relatime) When I run fstrim -v / as root, I get the following error message at the command line: seth@elemental:~$ sudo fstrim -v / fstrim: /: FITRIM ioctl failed: Input/output error and the following kernel messages are logged: [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x0 flags=0x] [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x700 flags=0x] [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x680 flags=0x] [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x300 flags=0x] [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x200 flags=0x] [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x580 flags=0x] [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x100 flags=0x] [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x400 flags=0x] [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x380 flags=0x] [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x address=0x780 flags=0x] [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x180 flags=0x] [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x500 flags=0x] [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x480 flags=0x] [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x280 flags=0x] [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x600 flags=0x] [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x80 flags=0x] [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x980 flags=0x] [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x900 flags=0x] [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0x880 flags=0x] [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x address=0xa00 flags=0x] [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0 I have tried setting iommu passthrough on boot but this doesn’t seem to help: GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=pt avic=1” This is possibly related to: https://bugzilla.kernel.org/show_bug.cgi?id=202665 http://git.infradead.org/nvme.git/commitdiff/530436c45ef2e446c12538a400e465929a0b3ade?hp=400b6a7b13a3fd71cff087139ce45dd1e5fff444 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/fstrim/+bug/1856603/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1858462] Re: Xenial update: 4.4.208 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * btrfs: do not leak reloc root if we fail to read the fs root + * btrfs: handle ENOENT in btrfs_uuid_tree_iterate + * ALSA: hda/ca0132 - Keep power on during processing DSP response + * ALSA: hda/ca0132 - Avoid endless loop + * drm: mst: Fix query_payload ack reply struct + * iio: light: bh1750: Resolve compiler warning and make code more readable + * spi: Add call to spi_slave_abort() function when spidev driver is released + * staging: rtl8188eu: fix possible null dereference + * rtlwifi: prevent memory leak in rtl_usb_probe + * IB/iser: bound protection_sg size by data_sg size + * media: am437x-vpfe: Setting STD to current value is not an error + * media: i2c: ov2659: fix s_stream return value + * media: i2c: ov2659: Fix missing 720p register config + * media: ov6650: Fix stored frame format not in sync with hardware + * tools/power/cpupower: Fix initializer override in hsw_ext_cstates + * usb: renesas_usbhs: add suspend event support in gadget mode + * hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled + * regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() + * media: flexcop-usb: fix NULL-ptr deref in flexcop_usb_transfer_init() + * samples: pktgen: fix proc_cmd command result check logic + * mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring + * media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format + * media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number + * media: ti-vpe: vpe: Make sure YUYV is set as default format + * extcon: sm5502: Reset registers during initialization + * x86/mm: Use the correct function type for native_set_fixmap() + * perf report: Add warning when libunwind not compiled in + * iio: adc: max1027: Reset the device at probe time + * Bluetooth: hci_core: fix init for HCI_USER_CHANNEL + * drm/gma500: fix memory disclosures due to uninitialized bytes + * x86/ioapic: Prevent inconsistent state when moving an interrupt + * arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() + * libata: Ensure ata_port probe has completed before detach + * pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B + * bnx2x: Fix PF-VF communication over multi-cos queues. + * spi: img-spfi: fix potential double release + * rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() + * perf probe: Fix to find range-only function instance + * perf probe: Fix to list probe event with correct line number + * perf probe: Walk function lines in lexical blocks + * perf probe: Fix to probe an inline function which has no entry pc + * perf probe: Fix to show ranges of variables in functions without entry_pc + * perf probe: Fix to show inlined function callsite without entry_pc + * perf probe: Skip overlapped location on searching variables + * perf probe: Return a better scope DIE if there is no best scope + * perf probe: Fix to show calling lines of inlined functions + * perf probe: Skip end-of-sequence and non statement lines + * perf probe: Filter out instances except for inlined subroutine and subprogram + * ath10k: fix get invalid tx rate for Mesh metric + * media: pvrusb2: Fix oops on tear-down when radio support is not present + * media: si470x-i2c: add missed operations in remove + * EDAC/ghes: Fix grain calculation + * spi: pxa2xx: Add missed security checks + * ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile + * parport: load lowlevel driver if ports not found + * cpufreq: Register drivers only after CPU devices have been registered + * x86/crash: Add a forward declaration of struct kimage + * spi: tegra20-slink: add missed clk_unprepare + * btrfs: don't prematurely free work in end_workqueue_fn() + * iwlwifi: check kasprintf() return value + * fbtft: Make sure string is NULL terminated + * crypto: sun4i-ss - Fix 64-bit size_t warnings on sun4i-ss-hash.c + * crypto: vmx - Avoid weird build failures + * libtraceevent: Fix memory leakage in copy_filter_type + * net: phy: initialise phydev speed and duplex sanely + * Revert "mmc: sdhci: Fix
[Kernel-packages] [Bug 1858489] Re: Xenial update: 4.4.207 upstream stable release
Note the following patches were skipped as they were already applied: * CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks * crypto: user - fix memory leak in crypto_report The following patch was reverted in favor of its upstream stable version: * KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332 ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * x86/apic/32: Avoid bogus LDR warnings + * usb: gadget: u_serial: add missing port entry locking + * tty: serial: msm_serial: Fix flow control + * x86/PCI: Avoid AMD FCH XHCI USB PME# from D0 defect + * serial: serial_core: Perform NULL checks for break_ctl ops + * serial: ifx6x60: add missed pm_runtime_disable + * autofs: fix a leak in autofs_expire_indirect() + * NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error + * Input: cyttsp4_core - fix use after free bug + * ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() + * rsxx: add missed destroy_workqueue calls in remove + * net: ep93xx_eth: fix mismatch of request_mem_region in remove + * serial: core: Allow processing sysrq at port unlock time + * iwlwifi: mvm: Send non offchannel traffic via AP sta + * ARM: 8813/1: Make aligned 2-byte getuser()/putuser() atomic on ARMv6+ + * extcon: max8997: Fix lack of path setting in USB device mode + * clk: rockchip: fix rk3188 sclk_smc gate data + * clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering + * dlm: fix missing idr_destroy for recover_idr + * MIPS: SiByte: Enable ZONE_DMA32 for LittleSur + * scsi: zfcp: drop default switch case which might paper over missing case + * pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues + * Staging: iio: adt7316: Fix i2c data reading, set the data field + * regulator: Fix return value of _set_load() stub + * MIPS: OCTEON: octeon-platform: fix typing + * math-emu/soft-fp.h: (_FP_ROUND_ZERO) cast 0 to void to fix warning + * rtc: max8997: Fix the returned value in case of error in 'max8997_rtc_read_alarm()' + * rtc: dt-binding: abx80x: fix resistance scale + * ARM: dts: exynos: Use Samsung SoC specific compatible for DWC2 module + * dmaengine: coh901318: Fix a double-lock bug + * dmaengine: coh901318: Remove unused variable + * ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() + * dma-mapping: fix return type of dma_set_max_seg_size() + * altera-stapl: check for a null key before strcasecmp'ing it + * serial: imx: fix error handling in console_setup + * i2c: imx: don't print error message on probe defer + * dlm: NULL check before kmem_cache_destroy is not needed + * nfsd: fix a warning in __cld_pipe_upcall() + * ARM: OMAP1/2: fix SoC name printing + * net/x25: fix called/calling length calculation in x25_parse_address_block + * net/x25: fix null_x25_address handling + * ARM: dts: mmp2: fix the gpio interrupt cell number + * tcp: fix off-by-one bug on aborting window-probing socket + * modpost: skip ELF local symbols during section mismatch check + * kbuild: fix single target build for external module + * ARM: dts: pxa: clean up USB controller nodes + * dlm: fix invalid cluster name warning + * powerpc/math-emu: Update macros from GCC + * MIPS: OCTEON: cvmx_pko_mem_debug8: use oldest forward compatible definition + * nfsd: Return EPERM, not EACCES, in some SETATTR cases + * mlx4: Use snprintf instead of complicated strcpy + * ARM: dts: sunxi: Fix PMU compatible strings + * sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision + * fuse: verify nlink + * fuse: verify attributes + * ALSA: pcm: oss: Avoid potential buffer overflows + * Input: goodix - add upside-down quirk for Teclast X89 tablet + * CIFS: Fix SMB2 oplock break processing + * tty: vt: keyboard: reject invalid keycodes + * can: slcan: Fix use-after-free Read in slcan_open + * jbd2: Fix possible overflow in jbd2_log_space_left() + * drm/i810: Prevent underflow in ioctl + * KVM: x86: do not modify masked
[Kernel-packages] [Bug 1858489] [NEW] Xenial update: 4.4.207 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.207 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1858489 Title: Xenial update: 4.4.207 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.207 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858489/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1858462] [NEW] Xenial update: 4.4.208 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.208 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1858462 Title: Xenial update: 4.4.208 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.208 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858462/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853791] Re: External microphone can't work on some dell machines with the codec alc256 or alc236
Hey Hui, Do you have access to a machine that you can use to verify that this bug is fixed by the kernel in -proposed? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853791 Title: External microphone can't work on some dell machines with the codec alc256 or alc236 Status in HWE Next: New Status in linux package in Ubuntu: Incomplete Status in linux-oem-osp1 package in Ubuntu: New Status in linux source package in Bionic: Fix Committed Status in linux-oem-osp1 source package in Bionic: Fix Committed Status in linux source package in Disco: Fix Committed Status in linux-oem-osp1 source package in Disco: New Status in linux source package in Eoan: Fix Committed Status in linux-oem-osp1 source package in Eoan: New Bug description: [Impact] The external microphone can't work on some dell machines with the codec alc256 or alc236 [Fix] Need to apply the ALC255_FIXUP_DELL1_MIC_NO_PRESENCE, instead of adding a new pintbl in the quirk table, we use fallback table this time. [Test Case] tested the kernel with these patches, the external mic worked well. [Regression Risk] Low, just make the quirk applying more generic. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1853791/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1850195] Re: Update EFA driver to 1.5.0
** Description changed: - Version 1.4.1 of the EFA driver has been tagged: https://github.com/amzn + Version 1.5.0 of the EFA driver has been tagged: https://github.com/amzn /amzn-drivers/releases/tag/efa_linux_1.5.0 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1850195 Title: Update EFA driver to 1.5.0 Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Xenial: In Progress Status in linux-aws source package in Bionic: In Progress Status in linux-aws source package in Disco: In Progress Status in linux-aws source package in Eoan: In Progress Bug description: Version 1.5.0 of the EFA driver has been tagged: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1850195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1856869] Re: Eoan update: 5.3.17 upstream stable release
Please note I: * Reverted the UBUNTU SAUCE version of "ovl: fix lookup failure on multi lower squashfs" in favor of the upstream stable version * Reverted the UBUNTU SAUCE version of "seccomp: avoid overflow in implicit constant conversion" in favor of the upstream stable version * Reverted the UBUNTU SAUCE version of "mfd: rk808: Fix RK818 ID template" in favor of the upstream stable version -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856869 Title: Eoan update: 5.3.17 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * usb: gadget: configfs: Fix missing spin_lock_init() * usb: gadget: pch_udc: fix use after free * Revert "nvme: Add quirk for Kingston NVME SSD running FW E8FK11.T" * scsi: zfcp: trace channel log even for FCP command responses * scsi: qla2xxx: Fix driver unload hang * scsi: qla2xxx: Fix memory leak when sending I/O fails * media: venus: remove invalid compat_ioctl32 handler * USB: uas: honor flag to avoid CAPACITY16 * USB: uas: heed CAPACITY_HEURISTICS * USB: documentation: flags on usb-storage versus UAS * usb: Allow USB device to be warm reset in suspended state * usb: host: xhci-tegra: Correct phy enable sequence * binder: fix incorrect calculation for num_valid * staging: rtl8188eu: fix interface sanity check * staging: rtl8712: fix interface sanity check * staging: vchiq: call unregister_chrdev_region() when driver registration fails * staging: gigaset: fix general protection fault on probe * staging: gigaset: fix illegal free on probe errors * staging: gigaset: add endpoint-type sanity check * usb: xhci: only set D3hot for pci device * xhci: Fix memory leak in xhci_add_in_port() * xhci: fix USB3 device initiated resume race with roothub autosuspend * xhci: Increase STS_HALT timeout in xhci_suspend() * xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour. * xhci: make sure interrupts are restored to correct state * interconnect: qcom: sdm845: Walk the list safely on node removal * ARM: dts: pandora-common: define wl1251 as child node of mmc3 * iio: adis16480: Add debugfs_reg_access entry * iio: adis16480: Fix scales factors * iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting * iio: imu: inv_mpu6050: fix temperature reporting using bad unit * iio: adc: ad7606: fix reading unnecessary data from device * iio: adc: ad7124: Enable internal reference * USB: atm: ueagle-atm: add missing endpoint check * USB: idmouse: fix interface sanity checks * USB: serial: io_edgeport: fix epic endpoint lookup * usb: roles: fix a potential use after free * USB: adutux: fix interface sanity check * usb: core: urb: fix URB structure initialization function * usb: mon: Fix a deadlock in usbmon between mmap and read * tpm: add check after commands attribs tab allocation * EDAC/altera: Use fast register IO for S10 IRQs * brcmfmac: disable PCIe interrupts before bus reset * mtd: spear_smi: Fix Write Burst mode * mtd: rawnand: Change calculating of position page containing BBM * virt_wifi: fix use-after-free in virt_wifi_newlink() * virtio-balloon: fix managed page counts when migrating pages between zones * usb: dwc3: pci: add ID for the Intel Comet Lake -H variant * usb: dwc3: gadget: Fix logical condition * usb: dwc3: gadget: Clear started flag for non-IOC * usb: dwc3: ep0: Clear started flag on completion * phy: renesas: rcar-gen3-usb2: Fix sysfs interface of "role" * usb: typec: fix use after free in typec_register_port() * iwlwifi: pcie: fix support for transmitting SKBs with fraglist * btrfs: check page->mapping when loading free space cache * btrfs: use refcount_inc_not_zero in kill_all_nodes * Btrfs: fix metadata space leak on fixup worker failure to set range as delalloc * Btrfs: fix negative subv_writers counter and data space leak after buffered write * btrfs: Avoid getting stuck during cyclic writebacks * btrfs: Remove btrfs_bio::flags member * Btrfs: send, skip backreference walking for extents with many references * btrfs: record all roots for rename exchange on a subvol * rtlwifi: rtl8192de: Fix missing
[Kernel-packages] [Bug 1856870] Re: Eoan update: 5.3.18 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * inet: protect against too small mtu values. + * mqprio: Fix out-of-bounds access in mqprio_dump + * net: bridge: deny dev_set_mac_address() when unregistering + * net: dsa: fix flow dissection on Tx path + * net: ethernet: ti: cpsw: fix extra rx interrupt + * net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues + * net: thunderx: start phy before starting autonegotiation + * net/tls: Fix return values to avoid ENOTSUPP + * openvswitch: support asymmetric conntrack + * tcp: md5: fix potential overestimation of TCP option space + * tipc: fix ordering of tipc module init and exit routine + * net/mlx5e: Query global pause state before setting prio2buffer + * net: ipv6: add net argument to ip6_dst_lookup_flow + * net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup + * tcp: fix rejected syncookies due to stale timestamps + * tcp: tighten acceptance of ACKs not matching a child socket + * tcp: Protect accesses to .ts_recent_stamp with {READ,WRITE}_ONCE() + * gre: refetch erspan header from skb->data after pskb_may_pull() + * Fixed updating of ethertype in function skb_mpls_pop + * hsr: fix a NULL pointer dereference in hsr_dev_xmit() + * net: Fixed updating of ethertype in skb_mpls_push() + * net/mlx5e: Fix TXQ indices to be sequential + * page_pool: do not release pool until inflight == 0. + * xdp: obtain the mem_id mutex before trying to remove an entry. + * Linux 5.3.18 + * UBUNTU: upstream stable to v5.3.18 -5.3.18 upstream stable release -from git://git.kernel.org/ + 5.3.18 upstream stable release + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856870 Title: Eoan update: 5.3.18 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * inet: protect against too small mtu values. * mqprio: Fix out-of-bounds access in mqprio_dump * net: bridge: deny dev_set_mac_address() when unregistering * net: dsa: fix flow dissection on Tx path * net: ethernet: ti: cpsw: fix extra rx interrupt * net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues * net: thunderx: start phy before starting autonegotiation * net/tls: Fix return values to avoid ENOTSUPP * openvswitch: support asymmetric conntrack * tcp: md5: fix potential overestimation of TCP option space * tipc: fix ordering of tipc module init and exit routine * net/mlx5e: Query global pause state before setting prio2buffer * net: ipv6: add net argument to ip6_dst_lookup_flow * net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup * tcp: fix rejected syncookies due to stale timestamps * tcp: tighten acceptance of ACKs not matching a child socket * tcp: Protect accesses to .ts_recent_stamp with {READ,WRITE}_ONCE() * gre: refetch erspan header from skb->data after pskb_may_pull() * Fixed updating of ethertype in function skb_mpls_pop * hsr: fix a NULL pointer dereference in hsr_dev_xmit() * net: Fixed updating of ethertype in skb_mpls_push() * net/mlx5e: Fix TXQ indices to be sequential * page_pool: do not release pool until inflight == 0. * xdp: obtain the mem_id mutex before trying to remove an entry. * Linux 5.3.18 * UBUNTU: upstream stable to v5.3.18 5.3.18 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to:
[Kernel-packages] [Bug 1856869] Re: Eoan update: 5.3.17 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel + * net/mlx4_en: fix mlx4 ethtool -N insertion + * net/mlx4_en: Fix wrong limitation for number of TX rings + * net: rtnetlink: prevent underflows in do_setvfinfo() + * net/sched: act_pedit: fix WARN() in the traffic path + * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key + * sfc: Only cancel the PPS workqueue if it exists + * net/mlxfw: Verify FSM error code translation doesn't exceed array size + * net/mlx5e: Fix set vf link state error flow + * net/mlx5: Fix auto group size calculation + * net/tls: enable sk_msg redirect to tls socket egress + * ipv6/route: return if there is no fib_nh_gw_family + * taprio: don't reject same mqprio settings + * net/ipv4: fix sysctl max for fib_multipath_hash_policy + * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6 + * net/mlx5e: Do not use non-EXT link modes in EXT mode + * net/mlx5: Update the list of the PCI supported devices + * vhost/vsock: split packets to send using multiple buffers + * gpio: max77620: Fixup debounce delays + * gpio: bd70528: Use correct unit for debounce times + * tools: gpio: Correctly add make dependencies for gpio_utils + * fork: fix pidfd_poll()'s return type + * nbd:fix memory leak in nbd_get_socket() + * virtio_console: allocate inbufs in add_port() only if it is needed + * virtio_ring: fix return code on DMA mapping fails + * virtio_balloon: fix shrinker count + * Revert "fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry()" + * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span() + * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node() + * drm/amdgpu: disable gfxoff when using register read interface + * drm/amdgpu: disable gfxoff on original raven + * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs + * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs + * drm/i915/pmu: "Frequency" is reported as accumulated cycles + * drm/i915/userptr: Try to acquire the page lock around set_page_dirty() + * Bluetooth: Fix invalid-free in bcsp_close() + * ath10k: restore QCA9880-AR1A (v1) detection + * ath10k: Fix HOST capability QMI incompatibility + * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe + * ath9k_hw: fix uninitialized variable data + * Revert "Bluetooth: hci_ll: set operational frequency earlier" + * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues" + * md/raid10: prevent access of uninitialized resync_pages offset + * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n + * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary + * x86/insn: Fix awk regexp warnings + * x86/speculation: Fix incorrect MDS/TAA mitigation status + * x86/speculation: Fix redundant MDS mitigation message + * nbd: prevent memory leak + * gve: fix dma sync bug where not all pages synced + * x86/stackframe/32: Repair 32-bit Xen PV + * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout + * x86/xen/32: Simplify ring check in xen_iret_crit_fixup() + * x86/doublefault/32: Fix stack canaries in the double fault handler + * x86/pti/32: Size initial_page_table correctly + * x86/cpu_entry_area: Add guard page for entry stack on 32bit + * x86/entry/32: Fix IRET exception + * x86/entry/32: Use %ss segment where required + * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL + * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry + * x86/entry/32: Fix NMI vs ESPFIX + * selftests/x86/mov_ss_trap: Fix the SYSENTER test + * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel + * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise + * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3 + * futex: Prevent robust futex exit race + * ALSA: usb-audio: Fix NULL dereference at parsing BADD + * nfc: port100: handle command failure cleanly + * media: vivid: Set
[Kernel-packages] [Bug 1856869] [NEW] Eoan update: 5.3.17 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.17 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Eoan) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856869 Title: Eoan update: 5.3.17 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.17 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856869/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1856870] [NEW] Eoan update: 5.3.18 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.18 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Eoan) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856870 Title: Eoan update: 5.3.18 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.18 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856870/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1856359] Re: EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions")
It looks like Eoan already has this commit: https://git.launchpad.net /~canonical-kernel/ubuntu/+source/linux- aws/+git/eoan/commit/?id=f95be3d28d891b0c0f339a504e3aa8e382bbd9a6 And Xenial and Bionic don't appear to have 0ede73bc012c ("IB/uverbs: Extend uverbs_ioctl header with driver_id") and therefore don't need the additional commit that wires into it. ** Changed in: linux-aws (Ubuntu Eoan) Status: In Progress => Invalid ** Changed in: linux-aws (Ubuntu Bionic) Status: In Progress => Invalid ** Changed in: linux-aws (Ubuntu Xenial) Status: In Progress => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1856359 Title: EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions") Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Xenial: Invalid Status in linux-aws source package in Bionic: Invalid Status in linux-aws source package in Disco: In Progress Status in linux-aws source package in Eoan: Invalid Bug description: For kernels that contain: 0ede73bc012c ("IB/uverbs: Extend uverbs_ioctl header with driver_id"), then the EFA driver should be integrated for enumeration with: f95be3d28d89 ("RDMA: Add EFA related definitions") To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1856359/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1856359] [NEW] EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions")
Public bug reported: For kernels that contain: 0ede73bc012c ("IB/uverbs: Extend uverbs_ioctl header with driver_id"), then the EFA driver should be integrated for enumeration with: f95be3d28d89 ("RDMA: Add EFA related definitions") ** Affects: linux-aws (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-aws (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Affects: linux-aws (Ubuntu Bionic) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Affects: linux-aws (Ubuntu Disco) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Affects: linux-aws (Ubuntu Eoan) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Also affects: linux-aws (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux-aws (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-aws (Ubuntu Eoan) Importance: Undecided Status: New ** Also affects: linux-aws (Ubuntu Disco) Importance: Undecided Status: New ** Changed in: linux-aws (Ubuntu) Status: In Progress => Invalid ** Changed in: linux-aws (Ubuntu) Importance: Medium => Undecided ** Changed in: linux-aws (Ubuntu) Assignee: Connor Kuehl (connork) => (unassigned) ** Changed in: linux-aws (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) ** Changed in: linux-aws (Ubuntu Bionic) Assignee: (unassigned) => Connor Kuehl (connork) ** Changed in: linux-aws (Ubuntu Disco) Assignee: (unassigned) => Connor Kuehl (connork) ** Changed in: linux-aws (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) ** Changed in: linux-aws (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-aws (Ubuntu Bionic) Importance: Undecided => Medium ** Changed in: linux-aws (Ubuntu Disco) Importance: Undecided => Medium ** Changed in: linux-aws (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux-aws (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux-aws (Ubuntu Disco) Status: New => In Progress ** Changed in: linux-aws (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux-aws (Ubuntu Xenial) Status: New => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1856359 Title: EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions") Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Xenial: In Progress Status in linux-aws source package in Bionic: In Progress Status in linux-aws source package in Disco: In Progress Status in linux-aws source package in Eoan: In Progress Bug description: For kernels that contain: 0ede73bc012c ("IB/uverbs: Extend uverbs_ioctl header with driver_id"), then the EFA driver should be integrated for enumeration with: f95be3d28d89 ("RDMA: Add EFA related definitions") To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1856359/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1856334] Re: Eoan update: 5.3.16 upstream stable release
Note: * The UBUNTU SAUCE version of "ALSA: hda: Add Cometlake-S PCI ID" was reverted in favor of its upstream stable version. * "x86/PCI: Avoid AMD FCH XHCI USB PME# from D0 defect" was already applied. * The UBUNTU SAUCE version of "ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236" was reverted in favor of its upstream stable version. * "crypto: user - fix memory leak in crypto_reportstat" was already applied. * "Fix an error message in raid0_make_request()" addresses a WARN statement that does not exist and was skipped. ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * rsi: release skb if rsi_prepare_beacon fails + * arm64: tegra: Fix 'active-low' warning for Jetson TX1 regulator + * perf scripts python: exported-sql-viewer.py: Fix use of TRUE with SQLite + * sparc64: implement ioremap_uc + * lp: fix sparc64 LPSETTIMEOUT ioctl + * time: Zero the upper 32-bits in __kernel_timespec on 32-bit + * usb: gadget: u_serial: add missing port entry locking + * tty: serial: fsl_lpuart: use the sg count from dma_map_sg + * tty: serial: msm_serial: Fix flow control + * serial: pl011: Fix DMA ->flush_buffer() + * serial: serial_core: Perform NULL checks for break_ctl ops + * serial: stm32: fix clearing interrupt error flags + * serial: ifx6x60: add missed pm_runtime_disable + * aio: Fix io_pgetevents() struct __compat_aio_sigset layout + * autofs: fix a leak in autofs_expire_indirect() + * MIPS: SGI-IP27: fix exception handler replication + * RDMA/hns: Correct the value of HNS_ROCE_HEM_CHUNK_LEN + * RDMA/hns: Correct the value of srq_desc_size + * iwlwifi: pcie: don't consider IV len in A-MSDU + * cgroup: don't put ERR_PTR() into fc->root + * exportfs_decode_fh(): negative pinned may become positive without the parent locked + * audit_get_nd(): don't unlock parent too early + * ecryptfs: fix unlink and rmdir in face of underlying fs modifications + * Revert "UBUNTU: SAUCE: ALSA: hda: Add Cometlake-S PCI ID" + * ALSA: hda: Add Cometlake-S PCI ID + * NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error + * xfrm: release device reference for invalid state + * block: check bi_size overflow before merge + * Input: cyttsp4_core - fix use after free bug + * sched/core: Avoid spurious lock dependencies + * sched/pelt: Fix update of blocked PELT ordering + * perf/core: Consistently fail fork on allocation failures + * ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() + * x86/resctrl: Fix potential lockdep warning + * drm/sun4i: tcon: Set min division of TCON0_DCLK to 1. + * selftests: kvm: fix build with glibc >= 2.30 + * rbd: silence bogus uninitialized warning in rbd_object_map_update_finish() + * rsxx: add missed destroy_workqueue calls in remove + * ravb: implement MTU change while device is up + * net: hns3: reallocate SSU' buffer size when pfc_en changes + * net: hns3: fix ETS bandwidth validation bug + * afs: Fix race in commit bulk status fetch + * net: ep93xx_eth: fix mismatch of request_mem_region in remove + * i2c: core: fix use after free in of_i2c_notify + * io_uring: transform send/recvmsg() -ERESTARTSYS to -EINTR + * fuse: verify nlink + * fuse: verify attributes + * io_uring: ensure req->submit is copied when req is deferred + * SUNRPC: Avoid RPC delays when exiting suspend + * ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC + * ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop + * Revert "UBUNTU: SAUCE: ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236" + * ALSA:
[Kernel-packages] [Bug 1856334] [NEW] Eoan update: 5.3.16 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.16 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Eoan) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1856334 Title: Eoan update: 5.3.16 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.16 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856334/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1850195] Re: Update EFA driver to 1.5.0
** Summary changed: - Update EFA driver to 1.4.1 + Update EFA driver to 1.5.0 ** Description changed: Version 1.4.1 of the EFA driver has been tagged: https://github.com/amzn - /amzn-drivers/releases/tag/efa_linux_1.4.1 + /amzn-drivers/releases/tag/efa_linux_1.5.0 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1850195 Title: Update EFA driver to 1.5.0 Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Xenial: In Progress Status in linux-aws source package in Bionic: In Progress Status in linux-aws source package in Disco: In Progress Status in linux-aws source package in Eoan: In Progress Bug description: Version 1.4.1 of the EFA driver has been tagged: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1850195/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1855313] Re: Xenial update: 4.4.206 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * ASoC: compress: fix unsigned integer overflow check + * ASoC: kirkwood: fix external clock probe defer + * clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume + * reset: fix reset_control_ops kerneldoc comment + * can: peak_usb: report bus recovery as well + * can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open + * scripts/gdb: fix debugging modules compiled with hot/cold partitioning + * block: drbd: remove a stray unlock in __drbd_send_protocol() + * scsi: lpfc: Fix dif and first burst use in write commands + * ARM: debug-imx: only define DEBUG_IMX_UART_PORT if needed + * ARM: dts: imx53-voipac-dmm-668: Fix memory node duplication + * parisc: Fix serio address output + * parisc: Fix HP SDC hpa address output + * arm64: smp: Handle errors reported by the firmware + * PM / AVS: SmartReflex: NULL check before some freeing functions is not needed + * ARM: ks8695: fix section mismatch warning + * ACPI / LPSS: Ignore acpi_device_fix_up_power() return value + * crypto: user - support incremental algorithm dumps + * mwifiex: fix potential NULL dereference and use after free + * mwifiex: debugfs: correct histogram spacing, formatting + * rtl818x: fix potential use after free + * xfs: require both realtime inodes to mount + * ubi: Put MTD device after it is not used + * ubi: Do not drop UBI device reference before using + * microblaze: adjust the help to the real behavior + * microblaze: move "... is ready" messages to arch/microblaze/Makefile + * gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB + * VSOCK: bind to random port for VMADDR_PORT_ANY + * btrfs: only track ref_heads in delayed_ref_updates + * xen/pciback: Check dev_data before using it + * KVM: s390: unregister debug feature on failing arch init + * pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration + * pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 + * HID: doc: fix wrong data structure reference for UHID_OUTPUT + * gfs2: take jdata unstuff into account in do_grow + * xfs: Align compat attrlist_by_handle with native implementation. + * IB/qib: Fix an error code in qib_sdma_verbs_send() + * powerpc/book3s/32: fix number of bats in p/v_block_mapped() + * powerpc/xmon: fix dump_segments() + * drivers/regulator: fix a missing check of return value + * serial: max310x: Fix tx_empty() callback + * openrisc: Fix broken paths to arch/or32 + * RDMA/srp: Propagate ib_post_send() failures to the SCSI mid-layer + * scsi: qla2xxx: deadlock by configfs_depend_item + * scsi: csiostor: fix incorrect dma device in case of vport + * ath6kl: Only use match sets when firmware supports it + * ath6kl: Fix off by one error in scan completion + * powerpc/prom: fix early DEBUG messages + * powerpc/mm: Make NULL pointer deferences explicit on bad page faults. + * powerpc/44x/bamboo: Fix PCI range + * drbd: reject attach of unsuitable uuids even if connected + * drbd: fix print_st_err()'s prototype to match the definition + * regulator: tps65910: fix a missing check of return value + * net/net_namespace: Check the return value of register_pernet_subsys() + * um: Make GCOV depend on !KCOV + * net: stmicro: fix a missing check of clk_prepare + * atl1e: checking the status of atl1e_write_phy_reg + * tipc: fix a missing check of genlmsg_put + * ocfs2: clear journal dirty flag after shutdown journal + * lib/genalloc.c: use vzalloc_node() to allocate the bitmap + * lib/genalloc.c: include vmalloc.h + * mtd: Check add_mtd_device() ret code + * tipc: fix memory leak in tipc_nl_compat_publ_dump + * net/core/neighbour: tell kmemleak about hash tables + * net/core/neighbour: fix kmemleak minimal reference count for hash tables + * sfc: suppress duplicate nvmem partition types in efx_ef10_mtd_probe + * decnet: fix DN_IFREQ_SIZE + * tipc: fix skb may be leaky in tipc_link_input + * sfc: initialise found bitmap in efx_ef10_mtd_probe + * net: fix possible overflow in __sk_mem_raise_allocated() + * net: dev: Use unsigned integer as an argument to left-shift + * scsi:
[Kernel-packages] [Bug 1855313] Re: Xenial update: 4.4.206 upstream stable release
Note that the following commit was skipped as it has already been applied: * "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1855313 Title: Xenial update: 4.4.206 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.206 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855313/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1855306] Re: Eoan update: 5.3.15 upstream stable release
Note that the following patch was skipped as it's already been applied: * "xfrm: Fix memleak on xfrm state destroy" ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * io_uring: async workers should inherit the user creds + * net: separate out the msghdr copy from ___sys_{send,recv}msg() + * net: disallow ancillary data for __sys_{send,recv}msg_file() + * XArray: Fix xas_next() with a single entry at 0 + * clk: meson: gxbb: let sar_adc_clk_div set the parent clock rate + * clk: at91: sam9x60: fix programmable clock + * thunderbolt: Read DP IN adapter first two dwords in one go + * thunderbolt: Fix lockdep circular locking depedency warning + * clocksource/drivers/mediatek: Fix error handling + * soundwire: intel: fix intel_register_dai PDI offsets and numbers + * ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX + * ASoC: compress: fix unsigned integer overflow check + * reset: Fix memory leak in reset_control_array_put() + * clk: samsung: exynos5433: Fix error paths + * clk: samsung: exynos542x: Move G3D subsystem clocks to its sub-CMU + * ASoC: kirkwood: fix external clock probe defer + * ASoC: kirkwood: fix device remove ordering + * arm64: dts: ls1028a: fix a compatible issue + * clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume + * pinctrl: cherryview: Allocate IRQ chip dynamic + * ARM: dts: imx6qdl-sabreauto: Fix storm of accelerometer interrupts + * soc: imx: gpc: fix initialiser format + * reset: fix reset_control_ops kerneldoc comment + * arm64: dts: imx8mm: fix compatible string for sdma + * ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data + * ASoC: ti: sdma-pcm: Add back the flags parameter for non standard dma names + * ASoC: rockchip: rockchip_max98090: Enable SHDN to fix headset detection + * clk: at91: avoid sleeping early + * clk: sunxi: Fix operator precedence in sunxi_divs_clk_setup + * clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 + * ARM: dts: sun8i-a83t-tbs-a711: Fix WiFi resume from suspend + * bpf: Allow narrow loads of bpf_sysctl fields with offset > 0 + * samples/bpf: fix build by setting HAVE_ATTR_TEST to zero + * bpf: Change size to u64 for bpf_map_{area_alloc, charge_init}() + * powerpc/bpf: Fix tail call implementation + * idr: Fix idr_get_next_ul race with idr_remove + * idr: Fix integer overflow in idr_for_each_entry + * idr: Fix idr_alloc_u32 on 32-bit systems + * x86/resctrl: Prevent NULL pointer dereference when reading mondata + * arm64: dts: zii-ultra: fix ARM regulator GPIO handle + * fbdev: c2p: Fix link failure on non-inlining + * ASoC: hdac_hda: fix race in device removal + * clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call + * clk: ti: clkctrl: Fix failed to enable error with double udelay timeout + * net: fec: add missed clk_disable_unprepare in remove + * netfilter: ipset: Fix nla_policies to fully support NL_VALIDATE_STRICT + * bridge: ebtables: don't crash when using dnat target in output chains + * netfilter: nf_tables: bogus EOPNOTSUPP on basechain update + * netfilter: nf_tables_offload: skip EBUSY on chain update + * stacktrace: Don't skip first entry on noncurrent tasks + * can: peak_usb: report bus recovery as well + * can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open + * can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak + * can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max + * can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM + * can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors + * can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error + * can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error + * can: flexcan: increase error counters if skb enqueueing via can_rx_offload_queue_sorted() fails + * x86/tsc: Respect tsc command line paraemeter for clocksource_tsc_early + * perf scripting engines: Iterate on tep event arrays directly + * can: mcp251x:
[Kernel-packages] [Bug 1855313] [NEW] Xenial update: 4.4.206 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.206 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1855313 Title: Xenial update: 4.4.206 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.206 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855313/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1855306] [NEW] Eoan update: 5.3.15 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.15 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Eoan) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1855306 Title: Eoan update: 5.3.15 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.15 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855306/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854744] Re: eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker
** Summary changed: - eoan/linux-raspi2: -proposed tracker + eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-raspi2 in Ubuntu. https://bugs.launchpad.net/bugs/1854744 Title: eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-raspi2 package in Ubuntu: Invalid Status in linux-raspi2 source package in Eoan: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854762 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Packaging phase-changed: Thursday, 05. December 2019 00:31 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded trackers: eoan/linux-raspi2/pi-kernel: bug 1854743 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854744/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854746] Re: eoan/linux-aws: 5.3.0-1009.10 -proposed tracker
** Summary changed: - eoan/linux-aws: -proposed tracker + eoan/linux-aws: 5.3.0-1009.10 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1854746 Title: eoan/linux-aws: 5.3.0-1009.10 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-lrm series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Eoan: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854762 packages: lrm: linux-restricted-modules-aws main: linux-aws meta: linux-meta-aws phase: Packaging phase-changed: Wednesday, 04. December 2019 23:11 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-lrm: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded trackers: bionic/linux-aws-5.3: bug 1854745 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854746/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854857] Re: Xenial update: 4.4.205 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + *Revert "sock: Reset dst when changing sk_mark via setsockopt" + *Linux 4.4.205 + *UBUNTU: upstream stable to v4.4.205 -4.4.205 upstream stable release -from git://git.kernel.org/ + 4.4.205 upstream stable release + from git://git.kernel.org/ ** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: - *Revert "sock: Reset dst when changing sk_mark via setsockopt" - *Linux 4.4.205 - *UBUNTU: upstream stable to v4.4.205 + * Revert "sock: Reset dst when changing sk_mark via setsockopt" + * Linux 4.4.205 + * UBUNTU: upstream stable to v4.4.205 4.4.205 upstream stable release from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854857 Title: Xenial update: 4.4.205 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * Revert "sock: Reset dst when changing sk_mark via setsockopt" * Linux 4.4.205 * UBUNTU: upstream stable to v4.4.205 4.4.205 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854857/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854855] Re: Xenial update: 4.4.204 upstream stable release
Please note the following commits were skipped since they are already applied: * platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi 130,132d128 * powerpc/64s: support nospectre_v2 cmdline option * powerpc/book3s64: Fix link stack flush on context switch * KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * net/mlx4_en: fix mlx4 ethtool -N insertion + * sfc: Only cancel the PPS workqueue if it exists + * net/sched: act_pedit: fix WARN() in the traffic path + * net: rtnetlink: prevent underflows in do_setvfinfo() + * Revert "fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry()" + * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node() + * asus-wmi: Create quirk for airplane_mode LED + * asus-wmi: Add quirk_no_rfkill_wapf4 for the Asus X456UF + * asus-wmi: Add quirk_no_rfkill for the Asus N552VW + * asus-wmi: Add quirk_no_rfkill for the Asus U303LB + * asus-wmi: Add quirk_no_rfkill for the Asus Z550MA + * platform/x86: asus-wmi: Filter buggy scan codes on ASUS Q500A + * platform/x86: asus-wmi: fix asus ux303ub brightness issue + * platform/x86: asus-wmi: Set specified XUSB2PR value for X550LB + * asus-wmi: provide access to ALS control + * platform/x86: asus-wmi: try to set als by default + * platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ + * platform/x86: asus-wmi: add SERIO_I8042 dependency + * mwifiex: Fix NL80211_TX_POWER_LIMITED + * ALSA: isight: fix leak of reference to firewire unit in error path of .probe callback + * printk: fix integer overflow in setup_log_buf() + * gfs2: Fix marking bitmaps non-full + * synclink_gt(): fix compat_ioctl() + * powerpc: Fix signedness bug in update_flash_db() + * powerpc/eeh: Fix use of EEH_PE_KEEP on wrong field + * brcmsmac: AP mode: update beacon when TIM changes + * spi: sh-msiof: fix deferred probing + * mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail + * btrfs: handle error of get_old_root + * gsmi: Fix bug in append_to_eventlog sysfs handler + * misc: mic: fix a DMA pool free failure + * amiflop: clean up on errors during setup + * scsi: ips: fix missing break in switch + * KVM/x86: Fix invvpid and invept register operand size in 64-bit mode + * scsi: isci: Use proper enumerated type in atapi_d2h_reg_frame_handler + * scsi: isci: Change sci_controller_start_task's return type to sci_status + * scsi: iscsi_tcp: Explicitly cast param in iscsi_sw_tcp_host_get_param + * clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk + * scsi: dc395x: fix dma API usage in srb_done + * scsi: dc395x: fix DMA API usage in sg_update_list + * net: fix warning in af_unix + * kprobes, x86/ptrace.h: Make regs_get_kernel_stack_nth() not fault on bad stack + * ALSA: i2c/cs8427: Fix int to char conversion + * macintosh/windfarm_smu_sat: Fix debug output + * USB: misc: appledisplay: fix backlight update_status return code + * SUNRPC: Fix a compile warning for cmpxchg64() + * atm: zatm: Fix empty body Clang warnings + * s390/perf: Return error when debug_register fails + * spi: omap2-mcspi: Set FIFO DMA trigger level to word length + * sparc: Fix parport build warnings. + * ceph: fix dentry leak in ceph_readdir_prepopulate + * rtc: s35390a: Change buf's type to u8 in s35390a_init + * mISDN: Fix type of switch control variable in ctrl_teimanager + * qlcnic: fix a return in qlcnic_dcb_get_capability() + * mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values + * mfd: max8997: Enale irq-wakeup unconditionally + * selftests/ftrace: Fix to test kprobe $comm arg only if available + * thermal: rcar_thermal: Prevent hardware access during system suspend + * sparc64: Rework xchg() definition to avoid warnings. + * fs/ocfs2/dlm/dlmdebug.c: fix a sleep-in-atomic-context bug in dlm_print_one_mle() + * mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock + * um: Make line/tty semantics use true write IRQ + * linux/bitmap.h: handle constant zero-size bitmaps correctly + * linux/bitmap.h: fix type
[Kernel-packages] [Bug 1854861] Re: Eoan update: 5.3.14 upstream stable release
Note the following patches were skipped since they were already applied: * powerpc/64s: support nospectre_v2 cmdline option * powerpc/book3s64: Fix link stack flush on context switch * KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854861 Title: Eoan update: 5.3.14 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel * net/mlx4_en: fix mlx4 ethtool -N insertion * net/mlx4_en: Fix wrong limitation for number of TX rings * net: rtnetlink: prevent underflows in do_setvfinfo() * net/sched: act_pedit: fix WARN() in the traffic path * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key * sfc: Only cancel the PPS workqueue if it exists * net/mlxfw: Verify FSM error code translation doesn't exceed array size * net/mlx5e: Fix set vf link state error flow * net/mlx5: Fix auto group size calculation * net/tls: enable sk_msg redirect to tls socket egress * ipv6/route: return if there is no fib_nh_gw_family * taprio: don't reject same mqprio settings * net/ipv4: fix sysctl max for fib_multipath_hash_policy * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6 * net/mlx5e: Do not use non-EXT link modes in EXT mode * net/mlx5: Update the list of the PCI supported devices * vhost/vsock: split packets to send using multiple buffers * gpio: max77620: Fixup debounce delays * gpio: bd70528: Use correct unit for debounce times * tools: gpio: Correctly add make dependencies for gpio_utils * fork: fix pidfd_poll()'s return type * nbd:fix memory leak in nbd_get_socket() * virtio_console: allocate inbufs in add_port() only if it is needed * virtio_ring: fix return code on DMA mapping fails * virtio_balloon: fix shrinker count * Revert "fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry()" * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span() * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node() * drm/amdgpu: disable gfxoff when using register read interface * drm/amdgpu: disable gfxoff on original raven * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs * drm/i915/pmu: "Frequency" is reported as accumulated cycles * drm/i915/userptr: Try to acquire the page lock around set_page_dirty() * Bluetooth: Fix invalid-free in bcsp_close() * ath10k: restore QCA9880-AR1A (v1) detection * ath10k: Fix HOST capability QMI incompatibility * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe * ath9k_hw: fix uninitialized variable data * Revert "Bluetooth: hci_ll: set operational frequency earlier" * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues" * md/raid10: prevent access of uninitialized resync_pages offset * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary * x86/insn: Fix awk regexp warnings * x86/speculation: Fix incorrect MDS/TAA mitigation status * x86/speculation: Fix redundant MDS mitigation message * nbd: prevent memory leak * gve: fix dma sync bug where not all pages synced * x86/stackframe/32: Repair 32-bit Xen PV * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout * x86/xen/32: Simplify ring check in xen_iret_crit_fixup() * x86/doublefault/32: Fix stack canaries in the double fault handler * x86/pti/32: Size initial_page_table correctly * x86/cpu_entry_area: Add guard page for entry stack on 32bit * x86/entry/32: Fix IRET exception * x86/entry/32: Use %ss segment where required * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry * x86/entry/32: Fix NMI vs ESPFIX * selftests/x86/mov_ss_trap: Fix the SYSENTER test * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3 * futex: Prevent robust futex exit race * ALSA: usb-audio: Fix NULL
[Kernel-packages] [Bug 1854861] Re: Eoan update: 5.3.14 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel + * net/mlx4_en: fix mlx4 ethtool -N insertion + * net/mlx4_en: Fix wrong limitation for number of TX rings + * net: rtnetlink: prevent underflows in do_setvfinfo() + * net/sched: act_pedit: fix WARN() in the traffic path + * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key + * sfc: Only cancel the PPS workqueue if it exists + * net/mlxfw: Verify FSM error code translation doesn't exceed array size + * net/mlx5e: Fix set vf link state error flow + * net/mlx5: Fix auto group size calculation + * net/tls: enable sk_msg redirect to tls socket egress + * ipv6/route: return if there is no fib_nh_gw_family + * taprio: don't reject same mqprio settings + * net/ipv4: fix sysctl max for fib_multipath_hash_policy + * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6 + * net/mlx5e: Do not use non-EXT link modes in EXT mode + * net/mlx5: Update the list of the PCI supported devices + * vhost/vsock: split packets to send using multiple buffers + * gpio: max77620: Fixup debounce delays + * gpio: bd70528: Use correct unit for debounce times + * tools: gpio: Correctly add make dependencies for gpio_utils + * fork: fix pidfd_poll()'s return type + * nbd:fix memory leak in nbd_get_socket() + * virtio_console: allocate inbufs in add_port() only if it is needed + * virtio_ring: fix return code on DMA mapping fails + * virtio_balloon: fix shrinker count + * Revert "fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry()" + * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span() + * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node() + * drm/amdgpu: disable gfxoff when using register read interface + * drm/amdgpu: disable gfxoff on original raven + * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs + * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs + * drm/i915/pmu: "Frequency" is reported as accumulated cycles + * drm/i915/userptr: Try to acquire the page lock around set_page_dirty() + * Bluetooth: Fix invalid-free in bcsp_close() + * ath10k: restore QCA9880-AR1A (v1) detection + * ath10k: Fix HOST capability QMI incompatibility + * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe + * ath9k_hw: fix uninitialized variable data + * Revert "Bluetooth: hci_ll: set operational frequency earlier" + * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues" + * md/raid10: prevent access of uninitialized resync_pages offset + * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n + * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary + * x86/insn: Fix awk regexp warnings + * x86/speculation: Fix incorrect MDS/TAA mitigation status + * x86/speculation: Fix redundant MDS mitigation message + * nbd: prevent memory leak + * gve: fix dma sync bug where not all pages synced + * x86/stackframe/32: Repair 32-bit Xen PV + * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout + * x86/xen/32: Simplify ring check in xen_iret_crit_fixup() + * x86/doublefault/32: Fix stack canaries in the double fault handler + * x86/pti/32: Size initial_page_table correctly + * x86/cpu_entry_area: Add guard page for entry stack on 32bit + * x86/entry/32: Fix IRET exception + * x86/entry/32: Use %ss segment where required + * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL + * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry + * x86/entry/32: Fix NMI vs ESPFIX + * selftests/x86/mov_ss_trap: Fix the SYSENTER test + * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel + * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise + * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3 + * futex: Prevent robust futex exit race + * ALSA: usb-audio: Fix NULL dereference at parsing BADD + * nfc: port100: handle command failure cleanly + * media: vivid: Set
[Kernel-packages] [Bug 1854774] Re: bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker
** Summary changed: - bionic/linux-gcp: -proposed tracker + bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/1854774 Title: bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-lrm series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-gcp package in Ubuntu: Invalid Status in linux-gcp source package in Bionic: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854777 packages: lrm: linux-restricted-modules-gcp main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Packaging phase-changed: Wednesday, 04. December 2019 16:21 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-lrm: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: bionic/linux-gcp/gcp-kernel: bug 1854773 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854774/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854809] Re: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854809 Title: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Bionic: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854819 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Packaging phase-changed: Tuesday, 03. December 2019 22:02 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854809/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854809] Re: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker
** Summary changed: - bionic/linux-fips: -proposed tracker + bionic/linux-fips: 4.15.0-1022.25 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854809 Title: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Bionic: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854819 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Packaging phase-changed: Tuesday, 03. December 2019 22:02 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854809/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854777] Re: disco/linux-gcp: 5.0.0-1027.28 -proposed tracker
** Summary changed: - disco/linux-gcp: -proposed tracker + disco/linux-gcp: 5.0.0-1027.28 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/1854777 Title: disco/linux-gcp: 5.0.0-1027.28 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-gcp package in Ubuntu: Invalid Status in linux-gcp source package in Disco: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854788 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Packaging phase-changed: Tuesday, 03. December 2019 21:16 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: bionic/linux-gcp: bug 1854774 bionic/linux-gke-5.0: bug 1854776 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854777/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854781] Re: disco/linux-oracle: 5.0.0-1009.14 -proposed tracker
** Summary changed: - disco/linux-oracle: -proposed tracker + disco/linux-oracle: 5.0.0-1009.14 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oracle in Ubuntu. https://bugs.launchpad.net/bugs/1854781 Title: disco/linux-oracle: 5.0.0-1009.14 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-oracle package in Ubuntu: Invalid Status in linux-oracle source package in Disco: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854788 packages: main: linux-oracle meta: linux-meta-oracle signed: linux-signed-oracle phase: Packaging phase-changed: Tuesday, 03. December 2019 18:16 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: bionic/linux-oracle-5.0: bug 1854779 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854781/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854816] Re: xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker
** Summary changed: - xenial/linux-gcp: -proposed tracker + xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/1854816 Title: xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-gcp package in Ubuntu: Invalid Status in linux-gcp source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854819 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Packaging phase-changed: Tuesday, 03. December 2019 17:56 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: xenial/linux-gcp/gcp-kernel: bug 1854814 xenial/linux-gcp/gke-kernel: bug 1854815 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854816/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854778] Re: disco/linux-kvm: 5.0.0-1024.26 -proposed tracker
** Summary changed: - disco/linux-kvm: -proposed tracker + disco/linux-kvm: 5.0.0-1024.26 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1854778 Title: disco/linux-kvm: 5.0.0-1024.26 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-kvm package in Ubuntu: Invalid Status in linux-kvm source package in Disco: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1854788 packages: main: linux-kvm meta: linux-meta-kvm phase: Packaging phase-changed: Tuesday, 03. December 2019 16:56 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854778/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854835] Re: xenial/linux: 4.4.0-171.200 -proposed tracker
** Summary changed: - xenial/linux: -proposed tracker + xenial/linux: 4.4.0-171.200 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854835 Title: xenial/linux: 4.4.0-171.200 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Monday, 02. December 2019 21:26 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: trusty/linux-aws: bug 1854833 trusty/linux-lts-xenial: bug 1854834 xenial/linux-aws: bug 1854824 xenial/linux-cascade: bug 1854825 xenial/linux-fips: bug 1854832 xenial/linux-kvm: bug 1854826 xenial/linux-raspi2: bug 1854829 xenial/linux-snapdragon: bug 1854831 xenial/linux/caracalla-kernel: bug 1854820 xenial/linux/pc-kernel: bug 1854821 xenial/linux/stlouis-kernel: bug 1854822 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854835/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854861] [NEW] Eoan update: 5.3.14 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.14 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Eoan) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854861 Title: Eoan update: 5.3.14 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.14 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854861/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854857] [NEW] Xenial update: 4.4.205 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.205 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854857 Title: Xenial update: 4.4.205 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.205 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854857/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1854855] [NEW] Xenial update: 4.4.204 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.204 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1854855 Title: Xenial update: 4.4.204 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.204 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854855/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853881] Re: Xenial update: 4.4.203 upstream stable release
The following patch required offset adjustments: x86/atomic: Fix smp_mb__{before,after}_atomic() - the changes to smp_mb__before_atomic and smp_mb__after_atomic had to be manually placed The following patches were skipped since they have already been applied: apparmor: fix uninitialized lsm_audit member - Skipped as an equivalent patch has already been applied and it looks invasive to shape it into the stable version apparmor: fix update the mtime of the profile file on replacement - Skipped as an equivalent patch has already been applied and it would be quite invasive to revert apparmor: fix module parameters can be changed after policy is locked - Skipped as an equivalent patch has already been applied and it would be too invasive to revert and apply this. ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * slip: Fix memory leak in slip_open error path + * ax88172a: fix information leak on short answers + * ALSA: usb-audio: Fix missing error check at mixer resolution test + * ALSA: usb-audio: not submit urb for stopped endpoint + * Input: ff-memless - kill timer in destroy() + * ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable + * ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either + * iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros + * mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() + * mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() + * mmc: sdhci-of-at91: fix quirk2 overwrite + * iio: dac: mcp4922: fix error handling in mcp4922_write_raw + * ALSA: pcm: signedness bug in snd_pcm_plug_alloc() + * ARM: dts: at91/trivial: Fix USART1 definition for at91sam9g45 + * ALSA: seq: Do error checks at creating system ports + * gfs2: Don't set GFS2_RDF_UPTODATE when the lvb is updated + * ASoC: dpcm: Properly initialise hw->rate_max + * MIPS: BCM47XX: Enable USB power on Netgear WNDR3400v3 + * ARM: dts: exynos: Fix sound in Snow-rev5 Chromebook + * i40e: use correct length for strncpy + * i40e: hold the rtnl lock on clearing interrupt scheme + * i40e: Prevent deleting MAC address from VF when set by PF + * ARM: dts: pxa: fix power i2c base address + * rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument + * net: lan78xx: Bail out if lan78xx_get_endpoints fails + * ASoC: sgtl5000: avoid division by zero if lo_vag is zero + * ath10k: wmi: disable softirq's while calling ieee80211_rx + * mips: txx9: fix iounmap related issue + * of: make PowerMac cache node search conditional on CONFIG_PPC_PMAC + * ARM: dts: omap3-gta04: give spi_lcd node a label so that we can overwrite in other DTS files + * ARM: dts: omap3-gta04: tvout: enable as display1 alias + * ARM: dts: omap3-gta04: make NAND partitions compatible with recent U-Boot + * ARM: dts: omap3-gta04: keep vpll2 always on + * dmaengine: dma-jz4780: Further residue status fix + * signal: Always ignore SIGKILL and SIGSTOP sent to the global init + * signal: Properly deliver SIGILL from uprobes + * signal: Properly deliver SIGSEGV from x86 uprobes + * scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() + * ARM: imx6: register pm_power_off handler if "fsl,pmic-stby-poweroff" is set + * scsi: pm80xx: Corrected dma_unmap_sg() parameter + * scsi: pm80xx: Fixed system hang issue during kexec boot + * kprobes: Don't call BUG_ON() if there is a kprobe in use on free list + * nvmem: core: return error code instead of NULL from nvmem_device_get + * media: fix: media: pci: meye: validate offset to avoid arbitrary access + * ALSA: intel8x0m: Register irq handler after register initializations + * pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() + * llc: avoid blocking in
[Kernel-packages] [Bug 1853882] Re: Eoan update: 5.3.13 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() + * block, bfq: deschedule empty bfq_queues not referred by any process + * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span() + * mm/memory_hotplug: fix updating the node span + * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault + * fbdev: Ditch fb_edid_add_monspecs + * Linux 5.3.13 + * UBUNTU: upstream stable to v5.3.13 -5.3.13 upstream stable release -from git://git.kernel.org/ + 5.3.13 upstream stable release + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853882 Title: Eoan update: 5.3.13 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() * block, bfq: deschedule empty bfq_queues not referred by any process * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span() * mm/memory_hotplug: fix updating the node span * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault * fbdev: Ditch fb_edid_add_monspecs * Linux 5.3.13 * UBUNTU: upstream stable to v5.3.13 5.3.13 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853881] [NEW] Xenial update: 4.4.203 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.203 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853881 Title: Xenial update: 4.4.203 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.203 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853881/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853882] [NEW] Eoan update: 5.3.13 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.13 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Eoan) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853882 Title: Eoan update: 5.3.13 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.13 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853475] Re: Eoan update: 5.3.12 upstream stable release
Note: the sauce version of "x86/intel: Disable HPET on Intel Coffe Lake platforms" was reverted in favor of the upstream stable variant: "x86/quirks: Disable HPET on Intel Coffe Lake platforms" ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * scsi: core: Handle drivers which set sg_tablesize to zero + * ax88172a: fix information leak on short answers + * devlink: disallow reload operation during device cleanup + * ipmr: Fix skb headroom in ipmr_get_route(). + * mlxsw: core: Enable devlink reload only on probe + * net: gemini: add missed free_netdev + * net/smc: fix fastopen for non-blocking connect() + * net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules + * slip: Fix memory leak in slip_open error path + * tcp: remove redundant new line from tcp_event_sk_skb + * dpaa2-eth: free already allocated channels on probe defer + * devlink: Add method for time-stamp on reporter's dump + * net/smc: fix refcount non-blocking connect() -part 2 + * ALSA: usb-audio: Fix missing error check at mixer resolution test + * ALSA: usb-audio: not submit urb for stopped endpoint + * ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() + * ALSA: usb-audio: Fix incorrect size check for processing/extension units + * Btrfs: fix log context list corruption after rename exchange operation + * cgroup: freezer: call cgroup_enter_frozen() with preemption disabled in ptrace_stop() + * Input: ff-memless - kill timer in destroy() + * Input: synaptics-rmi4 - fix video buffer size + * Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver + * Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) + * Input: synaptics-rmi4 - clear IRQ enables for F54 + * Input: synaptics-rmi4 - destroy F54 poller workqueue when removing + * KVM: MMU: Do not treat ZONE_DEVICE pages as being reserved + * IB/hfi1: Ensure r_tid_ack is valid before building TID RDMA ACK packet + * IB/hfi1: Calculate flow weight based on QP MTU for TID RDMA + * IB/hfi1: TID RDMA WRITE should not return IB_WC_RNR_RETRY_EXC_ERR + * IB/hfi1: Ensure full Gen3 speed in a Gen4 system + * IB/hfi1: Use a common pad buffer for 9B and 16B packets + * i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present + * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: x86/intel: Disable HPET on Intel Coffe Lake platforms" + * x86/quirks: Disable HPET on Intel Coffe Lake platforms + * ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable + * ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either + * io_uring: ensure registered buffer import returns the IO length + * drm/i915: update rawclk also on resume + * Revert "drm/i915/ehl: Update MOCS table for EHL" + * ntp/y2038: Remove incorrect time_t truncation + * net: ethernet: dwmac-sun8i: Use the correct function in exit path + * iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros + * mm: mempolicy: fix the wrong return value and potential pages leak of mbind + * mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm() + * mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup() + * mm: slub: really fix slab walking for init_on_free + * mm/memory_hotplug: fix try_offline_node() + * mm/page_io.c: do not free shared swap slots + * mmc: sdhci-of-at91: fix quirk2 overwrite + * slcan: Fix memory leak in error path + * Linux 5.3.12 + * UBUNTU: upstream stable to v5.3.12 -5.3.12 upstream stable release -from git://git.kernel.org/ + 5.3.12 upstream stable release + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853475 Title: Eoan update: 5.3.12 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to
[Kernel-packages] [Bug 1853475] Re: Eoan update: 5.3.12 upstream stable release
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853475 Title: Eoan update: 5.3.12 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.12 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853475/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853475] [NEW] Eoan update: 5.3.12 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.12 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853475 Title: Eoan update: 5.3.12 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Eoan: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.12 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853475/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1762835] Re: Conflicting mmc modules built in
** Changed in: linux-raspi2 (Ubuntu Bionic) Status: Confirmed => In Progress ** Changed in: linux-raspi2 (Ubuntu Disco) Status: New => In Progress ** Changed in: linux-raspi2 (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux-raspi2 (Ubuntu Bionic) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Disco) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Disco) Assignee: (unassigned) => Juerg Haefliger (juergh) ** Changed in: linux-raspi2 (Ubuntu Eoan) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-raspi2 in Ubuntu. https://bugs.launchpad.net/bugs/1762835 Title: Conflicting mmc modules built in Status in linux-raspi2 package in Ubuntu: Confirmed Status in linux-raspi2 source package in Bionic: In Progress Status in linux-raspi2 source package in Disco: In Progress Status in linux-raspi2 source package in Eoan: In Progress Bug description: SRU Justification [Impact] The Bionic Linux-raspi2 kernel has both the upstream and downstream pi mmc modules enabled. Running the latest server image users can see this error in dmesg: Error: Driver 'sdhost-bcm2835' is already registered, aborting... Due to this error the pi server image is failing a testcase on the iso tracker. It is also not clear to users what mmc modules are in use. The attached patch removes the upstream mmc modules from the kernel config. [Test Case] The bug can be reproduced by running the latest bionic 'classic' raspberrypi server image - http://cdimage.ubuntu.com/ubuntu-server /daily-preinstalled/current/bionic-preinstalled-server- armhf+raspi2.img.xz Inspect the dmesg and observe the error. To check this is fixed, once the patched kernel has been installed, reboot, inspect the dmesg again and the error should be gone. [Regression potential] This should be low. This config is the default used by raspbian and recommended by the pi foundation, and is therefore well tested. The patch changes the mmc modules, so if things go wrong the pi may not boot or the wifi on the pi3 may not work. I've built the kernel with the patch and everything still works. [Other Info] I think it is important to get this change in before the server images are released. Note the pi3 wifi doesn't work out-of-the-box, there is a missing brcmfmac43430-sdio.txt file. --- Original description: Linux-raspi2 has both the upstream and downstream pi mmc modules enabled. In dmesg I get this error: Error: Driver 'sdhost-bcm2835' is already registered, aborting... I asked on the Raspberry Pi forums [1] about this and PhilE (Raspberry Pi engineer) answered: "For general guidance, in the Raspberry Pi kernels we use the bcm2835-sdhost driver for the SD card or EMMC interface and bcm2835-mmc for SDIO to the WiFi chip. Upstream uses bcm2835 for SD and sdhci-iproc for SDIO." I'm not entirely sure what the config used in raspbian is, but I think it is this: # # MMC/SD/SDIO Host Controller Drivers # CONFIG_MMC_BCM2835_MMC=y CONFIG_MMC_BCM2835_DMA=y CONFIG_MMC_BCM2835_PIO_DMA_BARRIER=2 CONFIG_MMC_BCM2835_SDHOST=y # CONFIG_MMC_DEBUG is not set # CONFIG_MMC_ARMMMCI is not set CONFIG_MMC_SDHCI=y CONFIG_MMC_SDHCI_PLTFM=y # CONFIG_MMC_SDHCI_OF_ARASAN is not set # CONFIG_MMC_SDHCI_OF_AT91 is not set # CONFIG_MMC_SDHCI_CADENCE is not set # CONFIG_MMC_SDHCI_F_SDH30 is not set # CONFIG_MMC_SDHCI_IPROC is not set CONFIG_MMC_SPI=m # CONFIG_MMC_DW is not set # CONFIG_MMC_VUB300 is not set # CONFIG_MMC_USHC is not set # CONFIG_MMC_USDHI6ROL0 is not set # CONFIG_MMC_BCM2835 is not set # CONFIG_MMC_MTK is not set # CONFIG_MMC_SDHCI_XENON is not set # CONFIG_MEMSTICK is not set CONFIG_NEW_LEDS=y CONFIG_LEDS_CLASS=y # CONFIG_LEDS_CLASS_FLASH is not set # CONFIG_LEDS_BRIGHTNESS_HW_CHANGED is not set I'll run apport to collect the Ubuntu configs and dmesg logs etc. [1] https://www.raspberrypi.org/forums/viewtopic.php?f=71=210225 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-raspi2/+bug/1762835/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852220] Re: eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker
** Summary changed: - eoan/linux-raspi2: -proposed tracker + eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-raspi2 in Ubuntu. https://bugs.launchpad.net/bugs/1852220 Title: eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-raspi2 package in Ubuntu: Invalid Status in linux-raspi2 source package in Eoan: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852232 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Packaging phase-changed: Wednesday, 20. November 2019 17:16 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded trackers: eoan/linux-raspi2/pi-kernel: bug 1852219 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852220/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853177] Re: Xenial update: 4.4.202 upstream stable release
Please note that the following commits from this upstream Linux stable update were dropped in favor of the UBUNTU SAUCE equivalents: * KVM: Introduce kvm_get_arch_capabilities() * KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts * kvm: x86: IA32_ARCH_CAPABILITIES is always supported * KVM: x86: use Intel speculation bugs and features as derived in generic x86 code * x86/msr: Add the IA32_TSX_CTRL MSR * x86/cpu: Add a helper function x86_read_arch_cap_msr() * x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default * x86/speculation/taa: Add mitigation for TSX Async Abort * x86/speculation/taa: Add sysfs reporting for TSX Async Abort * kvm/x86: Export MDS_NO=0 to guests when TSX is enabled * x86/tsx: Add "auto" option to the tsx= cmdline parameter * x86/speculation/taa: Add documentation for TSX Async Abort * x86/tsx: Add config options to set tsx=on|off|auto * x86/bugs: Add ITLB_MULTIHIT bug infrastructure -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853177 Title: Xenial update: 4.4.202 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * kvm: mmu: Don't read PDPTEs when paging is not enabled * MIPS: BCM63XX: fix switch core reset on BCM6368 * powerpc/Makefile: Use cflags-y/aflags-y for setting endian options * powerpc: Fix compiling a BE kernel with a powerpc64le toolchain * powerpc/boot: Request no dynamic linker for boot wrapper * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs * Linux 4.4.202 * UBUNTU: upstream stable to v4.4.202 4.4.202 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853177] Re: Xenial update: 4.4.202 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * kvm: mmu: Don't read PDPTEs when paging is not enabled + * MIPS: BCM63XX: fix switch core reset on BCM6368 + * powerpc/Makefile: Use cflags-y/aflags-y for setting endian options + * powerpc: Fix compiling a BE kernel with a powerpc64le toolchain + * powerpc/boot: Request no dynamic linker for boot wrapper + * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs + * Linux 4.4.202 + * UBUNTU: upstream stable to v4.4.202 -4.4.202 upstream stable release -from git://git.kernel.org/ + 4.4.202 upstream stable release + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853177 Title: Xenial update: 4.4.202 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * kvm: mmu: Don't read PDPTEs when paging is not enabled * MIPS: BCM63XX: fix switch core reset on BCM6368 * powerpc/Makefile: Use cflags-y/aflags-y for setting endian options * powerpc: Fix compiling a BE kernel with a powerpc64le toolchain * powerpc/boot: Request no dynamic linker for boot wrapper * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs * Linux 4.4.202 * UBUNTU: upstream stable to v4.4.202 4.4.202 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release
Also of note: * ("perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity") modified a routine that was expected to be in "arch/x86/kernel/cpu/perf_event_amd_ibs.c" but was found in "arch/x86/events/amd/ibs.c" -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852335 Title: Xenial update: 4.4.201 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * CDC-NCM: handle incomplete transfer of MTU * net: fix data-race in neigh_event_send() * NFC: fdp: fix incorrect free object * NFC: st21nfca: fix double free * qede: fix NULL pointer deref in __qede_remove() * nfc: netlink: fix double device reference drop * ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series * ALSA: hda/ca0132 - Fix possible workqueue stall * mm, vmstat: hide /proc/pagetypeinfo from normal users * dump_stack: avoid the livelock of the dump_lock * perf tools: Fix time sorting * drm/radeon: fix si_enable_smc_cac() failed issue * ceph: fix use-after-free in __ceph_remove_cap() * iio: imu: adis16480: make sure provided frequency is positive * netfilter: nf_tables: Align nft_expr private data to 64-bit * netfilter: ipset: Fix an error code in ip_set_sockfn_get() * can: usb_8dev: fix use-after-free on disconnect * can: c_can: c_can_poll(): only read status register after status IRQ * can: peak_usb: fix a potential out-of-sync while decoding packets * can: gs_usb: gs_can_open(): prevent memory leak * can: peak_usb: fix slab info leak * drivers: usb: usbip: Add missing break statement to switch * configfs: fix a deadlock in configfs_symlink() * PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 * scsi: qla2xxx: fixup incorrect usage of host_byte * scsi: lpfc: Honor module parameter lpfc_use_adisc * ipvs: move old_secure_tcp into struct netns_ipvs * bonding: fix unexpected IFF_BONDING bit unset * usb: fsl: Check memory resource before releasing it * usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode. * usb: gadget: composite: Fix possible double free memory bug * usb: gadget: configfs: fix concurrent issue between composite APIs * perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity * USB: Skip endpoints with 0 maxpacket length * scsi: qla2xxx: stop timer in shutdown path * net: hisilicon: Fix "Trying to free already-free IRQ" * NFSv4: Don't allow a cached open with a revoked delegation * igb: Fix constant media auto sense switching when no cable is connected * e1000: fix memory leaks * can: flexcan: disable completely the ECC mechanism * mm/filemap.c: don't initiate writeback if mapping has no dirty pages * cgroup,writeback: don't switch wbs immediately on dead wbs if the memcg is dead * net: prevent load/store tearing on sk->sk_stamp * Linux 4.4.201 * UBUNTU: upstream stable to v4.4.201 4.4.201 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853177] [NEW] Xenial update: 4.4.202 upstream stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.202 upstream stable release from git://git.kernel.org/ ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Connor Kuehl (connork) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853177 Title: Xenial update: 4.4.202 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.202 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release
The following patches were NOT applied from this upstream stable update in favor of their UBUNTU SAUCE equivalents: * drm/i915/gtt: Add read only pages to gen8_pte_encode * drm/i915/gtt: Read-only pages for insert_entries on bdw+ * drm/i915/gtt: Disable read-only support under GVT * drm/i915: Rename gen7 cmdparser tables * drm/i915: Disable Secure Batches for gen6+ * drm/i915: Remove Master tables from cmdparser * drm/i915: Add support for mandatory cmdparsing * drm/i915: Support ro ppgtt mapped cmdparser shadow buffers * drm/i915: Allow parsing of unsized batches * drm/i915: Add gen9 BCS cmdparsing * drm/i915/cmdparser: Add support for backward jumps * drm/i915/cmdparser: Ignore Length operands during command matching * drm/i915: Lower RM timeout to avoid DSI hard hangs * drm/i915/gen8+: Add RC6 CTX corruption WA * drm/i915/cmdparser: Fix jump whitelist clearing -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852335 Title: Xenial update: 4.4.201 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * CDC-NCM: handle incomplete transfer of MTU * net: fix data-race in neigh_event_send() * NFC: fdp: fix incorrect free object * NFC: st21nfca: fix double free * qede: fix NULL pointer deref in __qede_remove() * nfc: netlink: fix double device reference drop * ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series * ALSA: hda/ca0132 - Fix possible workqueue stall * mm, vmstat: hide /proc/pagetypeinfo from normal users * dump_stack: avoid the livelock of the dump_lock * perf tools: Fix time sorting * drm/radeon: fix si_enable_smc_cac() failed issue * ceph: fix use-after-free in __ceph_remove_cap() * iio: imu: adis16480: make sure provided frequency is positive * netfilter: nf_tables: Align nft_expr private data to 64-bit * netfilter: ipset: Fix an error code in ip_set_sockfn_get() * can: usb_8dev: fix use-after-free on disconnect * can: c_can: c_can_poll(): only read status register after status IRQ * can: peak_usb: fix a potential out-of-sync while decoding packets * can: gs_usb: gs_can_open(): prevent memory leak * can: peak_usb: fix slab info leak * drivers: usb: usbip: Add missing break statement to switch * configfs: fix a deadlock in configfs_symlink() * PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 * scsi: qla2xxx: fixup incorrect usage of host_byte * scsi: lpfc: Honor module parameter lpfc_use_adisc * ipvs: move old_secure_tcp into struct netns_ipvs * bonding: fix unexpected IFF_BONDING bit unset * usb: fsl: Check memory resource before releasing it * usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode. * usb: gadget: composite: Fix possible double free memory bug * usb: gadget: configfs: fix concurrent issue between composite APIs * perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity * USB: Skip endpoints with 0 maxpacket length * scsi: qla2xxx: stop timer in shutdown path * net: hisilicon: Fix "Trying to free already-free IRQ" * NFSv4: Don't allow a cached open with a revoked delegation * igb: Fix constant media auto sense switching when no cable is connected * e1000: fix memory leaks * can: flexcan: disable completely the ECC mechanism * mm/filemap.c: don't initiate writeback if mapping has no dirty pages * cgroup,writeback: don't switch wbs immediately on dead wbs if the memcg is dead * net: prevent load/store tearing on sk->sk_stamp * Linux 4.4.201 * UBUNTU: upstream stable to v4.4.201 4.4.201 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + * CDC-NCM: handle incomplete transfer of MTU + * net: fix data-race in neigh_event_send() + * NFC: fdp: fix incorrect free object + * NFC: st21nfca: fix double free + * qede: fix NULL pointer deref in __qede_remove() + * nfc: netlink: fix double device reference drop + * ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series + * ALSA: hda/ca0132 - Fix possible workqueue stall + * mm, vmstat: hide /proc/pagetypeinfo from normal users + * dump_stack: avoid the livelock of the dump_lock + * perf tools: Fix time sorting + * drm/radeon: fix si_enable_smc_cac() failed issue + * ceph: fix use-after-free in __ceph_remove_cap() + * iio: imu: adis16480: make sure provided frequency is positive + * netfilter: nf_tables: Align nft_expr private data to 64-bit + * netfilter: ipset: Fix an error code in ip_set_sockfn_get() + * can: usb_8dev: fix use-after-free on disconnect + * can: c_can: c_can_poll(): only read status register after status IRQ + * can: peak_usb: fix a potential out-of-sync while decoding packets + * can: gs_usb: gs_can_open(): prevent memory leak + * can: peak_usb: fix slab info leak + * drivers: usb: usbip: Add missing break statement to switch + * configfs: fix a deadlock in configfs_symlink() + * PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 + * scsi: qla2xxx: fixup incorrect usage of host_byte + * scsi: lpfc: Honor module parameter lpfc_use_adisc + * ipvs: move old_secure_tcp into struct netns_ipvs + * bonding: fix unexpected IFF_BONDING bit unset + * usb: fsl: Check memory resource before releasing it + * usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode. + * usb: gadget: composite: Fix possible double free memory bug + * usb: gadget: configfs: fix concurrent issue between composite APIs + * perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity + * USB: Skip endpoints with 0 maxpacket length + * scsi: qla2xxx: stop timer in shutdown path + * net: hisilicon: Fix "Trying to free already-free IRQ" + * NFSv4: Don't allow a cached open with a revoked delegation + * igb: Fix constant media auto sense switching when no cable is connected + * e1000: fix memory leaks + * can: flexcan: disable completely the ECC mechanism + * mm/filemap.c: don't initiate writeback if mapping has no dirty pages + * cgroup,writeback: don't switch wbs immediately on dead wbs if the memcg is dead + * net: prevent load/store tearing on sk->sk_stamp + * Linux 4.4.201 + * UBUNTU: upstream stable to v4.4.201 -4.4.201 upstream stable release -from git://git.kernel.org/ + 4.4.201 upstream stable release + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852335 Title: Xenial update: 4.4.201 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * CDC-NCM: handle incomplete transfer of MTU * net: fix data-race in neigh_event_send() * NFC: fdp: fix incorrect free object * NFC: st21nfca: fix double free * qede: fix NULL pointer deref in __qede_remove() * nfc: netlink: fix double device reference drop * ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series * ALSA: hda/ca0132 - Fix possible workqueue stall * mm, vmstat: hide /proc/pagetypeinfo from normal users * dump_stack: avoid the livelock of the dump_lock * perf
[Kernel-packages] [Bug 1852338] Re: Eoan update: 5.3.11 upstream stable release
Please note that the following SAUCE patches were reverted: * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: x86: mmu: Recovery of shattered NX large pages" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: Add helper function for creating VM worker threads" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: mmu: ITLB_MULTIHIT mitigation" * UBUNTU: SAUCE: Revert "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: cpu/speculation: Uninline and export CPU mitigations helpers" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: x86: Add ITLB_MULTIHIT bug infrastructure" * UBUNTU: SAUCE: Revert "x86/tsx: Add config options to set tsx=on|off|auto" * UBUNTU: SAUCE: Revert "x86/speculation/taa: Add documentation for TSX Async Abort" * UBUNTU: SAUCE: Revert "x86/tsx: Add "auto" option to the tsx= cmdline parameter" * UBUNTU: SAUCE: Revert "kvm/x86: Export MDS_NO=0 to guests when TSX is enabled" * UBUNTU: SAUCE: Revert "x86/speculation/taa: Add sysfs reporting for TSX Async Abort" * UBUNTU: SAUCE: Revert "x86/speculation/taa: Add mitigation for TSX Async Abort" * UBUNTU: SAUCE: Revert "x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default" * UBUNTU: SAUCE: Revert "x86/cpu: Add a helper function x86_read_arch_cap_msr()" * UBUNTU: SAUCE: Revert "x86/msr: Add the IA32_TSX_CTRL MSR" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Fix jump whitelist clearing" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/gen8+: Add RC6 CTX corruption WA" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Lower RM timeout to avoid DSI hard hangs" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Ignore Length operands during command matching" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Add support for backward jumps" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Use explicit goto for error paths" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Add gen9 BCS cmdparsing" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Allow parsing of unsized batches" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Support ro ppgtt mapped cmdparser shadow buffers" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Add support for mandatory cmdparsing" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Remove Master tables from cmdparser" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Disable Secure Batches for gen6+" * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Rename gen7 cmdparser tables" In favor of their upstream stable versions: * drm/i915: Rename gen7 cmdparser tables * drm/i915: Disable Secure Batches for gen6+ * drm/i915: Remove Master tables from cmdparser * drm/i915: Add support for mandatory cmdparsing * drm/i915: Support ro ppgtt mapped cmdparser shadow buffers * drm/i915: Allow parsing of unsized batches * drm/i915: Add gen9 BCS cmdparsing * drm/i915/cmdparser: Use explicit goto for error paths * drm/i915/cmdparser: Add support for backward jumps * drm/i915/cmdparser: Ignore Length operands during command matching * drm/i915: Lower RM timeout to avoid DSI hard hangs * drm/i915/gen8+: Add RC6 CTX corruption WA * drm/i915/cmdparser: Fix jump whitelist clearing * x86/msr: Add the IA32_TSX_CTRL MSR * x86/cpu: Add a helper function x86_read_arch_cap_msr() * x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default * x86/speculation/taa: Add mitigation for TSX Async Abort * x86/speculation/taa: Add sysfs reporting for TSX Async Abort * kvm/x86: Export MDS_NO=0 to guests when TSX is enabled * x86/tsx: Add "auto" option to the tsx= cmdline parameter * x86/speculation/taa: Add documentation for TSX Async Abort * x86/tsx: Add config options to set tsx=on|off|auto * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs * x86/bugs: Add ITLB_MULTIHIT bug infrastructure * x86/cpu: Add Tremont to the cpu vulnerability whitelist * cpu/speculation: Uninline and export CPU mitigations helpers * Documentation: Add ITLB_MULTIHIT documentation * kvm: x86, powerpc: do not allow clearing largepages debugfs entry * kvm: mmu: ITLB_MULTIHIT mitigation * kvm: Add helper function for creating VM worker threads * kvm: x86: mmu: Recovery of shattered NX large pages ** Description changed: - - SRU Justification - - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: - -5.3.11 upstream stable release -from git://git.kernel.org/ + SRU Justification + + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably
[Kernel-packages] [Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852335 Title: Xenial update: 4.4.201 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.201 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852338] Re: Eoan update: 5.3.11 upstream stable release
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux (Ubuntu Eoan) Status: New => In Progress ** Changed in: linux (Ubuntu Eoan) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Eoan) Assignee: (unassigned) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852338 Title: Eoan update: 5.3.11 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.3.11 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852338/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852236] Re: disco/linux-aws: 5.0.0-1022.25 -proposed tracker
** Summary changed: - disco/linux-aws: -proposed tracker + disco/linux-aws: 5.0.0-1022.25 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1852236 Title: disco/linux-aws: 5.0.0-1022.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Disco: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852253 packages: main: linux-aws meta: linux-meta-aws phase: Packaging phase-changed: Friday, 15. November 2019 16:00 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded trackers: bionic/linux-aws-5.0: bug 1852235 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852236/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852304] Re: trusty/linux-aws: 4.4.0-1059.63 -proposed tracker
** Summary changed: - trusty/linux-aws: -proposed tracker + trusty/linux-aws: 4.4.0-1059.63 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1852304 Title: trusty/linux-aws: 4.4.0-1059.63 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Trusty: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852306 packages: main: linux-aws meta: linux-meta-aws phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 13:32 UTC reason: prepare-package: Pending -- version not specified variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852304/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852303] Re: xenial/linux-fips: 4.4.0-1026.31 -proposed tracker
** Summary changed: - xenial/linux-fips: -proposed tracker + xenial/linux-fips: 4.4.0-1026.31 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852303 Title: xenial/linux-fips: 4.4.0-1026.31 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852306 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 13:31 UTC reason: prepare-package: Pending -- version not specified variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852303/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852278] Re: bionic/linux-fips: 4.15.0-1021.24 -proposed tracker
** Summary changed: - bionic/linux-fips: -proposed tracker + bionic/linux-fips: 4.15.0-1021.24 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852278 Title: bionic/linux-fips: 4.15.0-1021.24 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Bionic: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852289 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 10:31 UTC reason: prepare-package: Pending -- version not specified variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852278/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852249] Re: disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker
** Summary changed: - disco/linux-snapdragon: -proposed tracker + disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-snapdragon in Ubuntu. https://bugs.launchpad.net/bugs/1852249 Title: disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-snapdragon package in Ubuntu: Invalid Status in linux-snapdragon source package in Disco: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852253 packages: main: linux-snapdragon meta: linux-meta-snapdragon phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 09:12 UTC reason: prepare-package: Pending -- version not specified variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852249/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852296] Re: xenial/linux-aws: 4.4.0-1099.110 -proposed tracker
** Summary changed: - xenial/linux-aws: -proposed tracker + xenial/linux-aws: 4.4.0-1099.110 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/1852296 Title: xenial/linux-aws: 4.4.0-1099.110 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852306 packages: main: linux-aws meta: linux-meta-aws phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 13:30 UTC reason: prepare-package: Pending -- version not specified trackers: xenial/linux-aws/aws-kernel: bug 1852295 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852296/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852228] Re: eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker
** Summary changed: - eoan/linux-kvm: -proposed tracker + eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1852228 Title: eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-kvm package in Ubuntu: Invalid Status in linux-kvm source package in Eoan: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852232 packages: main: linux-kvm meta: linux-meta-kvm phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 13:29 UTC reason: prepare-package: Pending -- version not specified variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852228/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852298] Re: xenial/linux-kvm: 4.4.0-1063.70 -proposed tracker
** Summary changed: - xenial/linux-kvm: -proposed tracker + xenial/linux-kvm: 4.4.0-1063.70 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1852298 Title: xenial/linux-kvm: 4.4.0-1063.70 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-kvm package in Ubuntu: Invalid Status in linux-kvm source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852306 packages: main: linux-kvm meta: linux-meta-kvm phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 13:31 UTC reason: prepare-package: Pending -- version not specified variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852298/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852262] Re: bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker
** Summary changed: - bionic/linux-raspi2: -proposed tracker + bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-raspi2 in Ubuntu. https://bugs.launchpad.net/bugs/1852262 Title: bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-raspi2 package in Ubuntu: Invalid Status in linux-raspi2 source package in Bionic: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852289 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 10:42 UTC reason: prepare-package: Pending -- version not specified trackers: bionic/linux-raspi2/pi-kernel: bug 1852261 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852262/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852264] Re: bionic/linux-snapdragon: 4.15.0-1068.75 -proposed tracker
** Summary changed: - bionic/linux-snapdragon: -proposed tracker + bionic/linux-snapdragon: 4.15.0-1068.75 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-snapdragon in Ubuntu. https://bugs.launchpad.net/bugs/1852264 Title: bionic/linux-snapdragon: 4.15.0-1068.75 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-snapdragon package in Ubuntu: Invalid Status in linux-snapdragon source package in Bionic: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852289 packages: main: linux-snapdragon meta: linux-meta-snapdragon phase: Packaging phase-changed: Thursday, 14. November 2019 17:54 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded trackers: bionic/linux-snapdragon/dragonboard-kernel: bug 1852263 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852264/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852233] Re: disco/linux-raspi2: 5.0.0-1023.24 -proposed tracker
** Summary changed: - disco/linux-raspi2: -proposed tracker + disco/linux-raspi2: 5.0.0-1023.24 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-raspi2 in Ubuntu. https://bugs.launchpad.net/bugs/1852233 Title: disco/linux-raspi2: 5.0.0-1023.24 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-raspi2 package in Ubuntu: Invalid Status in linux-raspi2 source package in Disco: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1852253 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Ready for Packaging phase-changed: Thursday, 14. November 2019 09:10 UTC reason: prepare-package: Pending -- version not specified variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852233/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1844021] Re: Suspend stopped working from 4.4.0-157 onwards
** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Bionic) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1844021 Title: Suspend stopped working from 4.4.0-157 onwards Status in linux package in Ubuntu: Fix Released Status in linux source package in Bionic: Fix Committed Status in linux source package in Disco: Fix Committed Bug description: Since upgrading the kernel above 4.4.0-154, starting with 4.4.0-157, suspend does not work for me anymore. Never had such an issue in the last 6 years. This is the relevant output when suspend fails: [ 328.25] PM: Suspending system (mem) [ 328.288902] Suspending console(s) (use no_console_suspend to debug) [ 328.289118] wlp1s0: deauthenticating from xx:xx:xx:xx:xx:xx by local choice (Reason: 3=DEAUTH_LEAVING) [ 328.289209] sd 1:0:0:0: [sdb] Synchronizing SCSI cache [ 328.289570] sd 0:0:0:0: [sda] Synchronizing SCSI cache [ 328.289600] sd 0:0:0:0: [sda] Stopping disk [ 328.291700] sd 1:0:0:0: [sdb] Stopping disk [ 328.312413] xhci_hcd :03:00.0: WARN: xHC save state timeout [ 328.312456] suspend_common(): xhci_pci_suspend+0x0/0x70 returns -110 [ 328.312461] pci_pm_suspend(): hcd_pci_suspend+0x0/0x30 returns -110 [ 328.312465] dpm_run_callback(): pci_pm_suspend+0x0/0x150 returns -110 [ 328.312483] PM: Device :03:00.0 failed to suspend async: error -110 [ 328.848109] PM: Some devices failed to suspend, or early wake event detected This is my relevant lspci -v output: 03:00.0 USB controller: ASMedia Technology Inc. ASM1042 SuperSpeed USB Host Controller (prog-if 30 [XHCI]) Subsystem: Samsung Electronics Co Ltd ASM1042 SuperSpeed USB Host Controller Flags: bus master, fast devsel, latency 0, IRQ 16 Memory at f050 (64-bit, non-prefetchable) [size=32K] Capabilities: Kernel driver in use: xhci_hcd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1844021/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1819968] Re: Colour banding in Lenovo G50-80 laptop display (i915)
** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Bionic) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1819968 Title: Colour banding in Lenovo G50-80 laptop display (i915) Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Fix Committed Status in linux source package in Bionic: Fix Committed Status in linux source package in Eoan: Fix Committed Bug description: Colour bandind is visible everywhere in the system. I believe it's not a hardware problem, since booting with 'nomodeset' works as expected and the previously installed Ubuntu 14.04 also worked. I tried installing kernel 4.18.0-16.17 from ppa:canonical-kernel- team/ppa but the problem remained. There were already similar bugs, https://bugs.launchpad.net/bugs/1749420 , https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1794387 and https://bugs.launchpad.net/bugs/1788308, but the fixes provided for those bugs did not work for my specific monitor. cat /proc/version_signature Ubuntu 4.15.0-46.49-generic 4.15.18 sudo lspci -vnvn 00:00.0 Host bridge [0600]: Intel Corporation Haswell-ULT DRAM Controller [8086:0a04] (rev 0b) Subsystem: Lenovo Haswell-ULT DRAM Controller [17aa:390b] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: hsw_uncore 00:02.0 VGA compatible controller [0300]: Intel Corporation Haswell-ULT Integrated Graphics Controller [8086:0a16] (rev 0b) (prog-if 00 [VGA controller]) Subsystem: Lenovo Haswell-ULT Integrated Graphics Controller [17aa:390b] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819968/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1845810] Re: [XPS 13 9360, Realtek ALC3246, Black Headphone Out, Front] High noise floor
** Changed in: linux (Ubuntu Bionic) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1845810 Title: [XPS 13 9360, Realtek ALC3246, Black Headphone Out, Front] High noise floor Status in linux package in Ubuntu: Triaged Status in linux source package in Bionic: Fix Committed Bug description: Since linux-image-4.15.0-60-generic 4.15.0-60.67, the background noise in my headphones has increased to unreasonable levels. In linux- image-4.15.0-58-generic 4.15.0-58.64 and previous kernels the noise was present but at a bearable level, which I had always assumed was a hardware design issue. Now, with the increased noise floor, the headphone socket is essentially unusable. This is a regression in a stable release (Bionic). The problem consistently reproduces as follows: OK: linux-image-4.15.0-58-generic 4.15.0-58.64 BAD: linux-image-4.15.0-60-generic4.15.0-60.67 BAD: linux-image-4.15.0-62-generic4.15.0-62.69 BAD: linux-image-4.15.0-64-generic4.15.0-64.73 Steps to reproduce: Hardware: Dell XPS 9360 (shipped with Ubuntu). I'm using a manually reinstalled Ubuntu Bionic, not the OEM installation. Mostly everything is on defaults. 1. Boot with no headphones connected 2. Log in 3. Plug the headphones in Expected: normal noise level Actual: very high noise level. Playback does work correctly but the SnR is terrible. The "Select Audio Device" prompt appears, but the noise problem is present before I make a selection. If I select Headphones or Headset (I'm using a headset) then the noise remains after a brief (~0.5s) interruption. If I select Microphone then the noise goes, but then the audio comes through the speakers and not the headset as required. I have tried messing with alsamixer but haven't found anything to explain or reduce the noise. Switching to a previous kernel fixes the problem immediately with no settings change required. ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: alsa-base 1.0.25+dfsg-0ubuntu5 ProcVersionSignature: Ubuntu 4.15.0-64.73-generic 4.15.18 Uname: Linux 4.15.0-64-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.7 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: robie 2126 F pulseaudio robie 3648 F alsamixer CurrentDesktop: ubuntu:GNOME Date: Sat Sep 28 23:51:05 2019 InstallationDate: Installed on 2017-05-11 (870 days ago) InstallationMedia: Ubuntu 17.10 "Artful Aardvark" - Alpha amd64 (20170507) PackageArchitecture: all SourcePackage: alsa-driver Symptom: audio Symptom_AlsaPlaybackTest: ALSA playback test through plughw:PCH successful Symptom_Card: Built-in Audio - HDA Intel PCH Symptom_Jack: Black Headphone Out, Front Symptom_PulsePlaybackTest: PulseAudio playback test successful Symptom_Type: High background noise, or volume is too low Title: [XPS 13 9360, Realtek ALC3246, Black Headphone Out, Front] Background noise or low volume UpgradeStatus: Upgraded to bionic on 2018-07-28 (427 days ago) dmi.bios.date: 03/14/2019 dmi.bios.vendor: Dell Inc. dmi.bios.version: 2.11.0 dmi.board.name: 00GCYR dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvr2.11.0:bd03/14/2019:svnDellInc.:pnXPS139360:pvr:rvnDellInc.:rn00GCYR:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.family: XPS dmi.product.name: XPS 13 9360 dmi.sys.vendor: Dell Inc. --- ProblemType: Bug ApportVersion: 2.20.9-0ubuntu7.7 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: robie 2329 F pulseaudio CurrentDesktop: ubuntu:GNOME DistroRelease: Ubuntu 18.04 HibernationDevice: RESUME=UUID=ae23a431-2f44-4c12-992a-a0da8186bfcc InstallationDate: Installed on 2017-05-11 (871 days ago) InstallationMedia: Ubuntu 17.10 "Artful Aardvark" - Alpha amd64 (20170507) Lsusb: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 003: ID 0bda:568b Realtek Semiconductor Corp. Bus 001 Device 002: ID 0cf3:e300 Atheros Communications, Inc. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Dell Inc. XPS 13 9360 Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.15.0-64-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1 ProcVersionSignature: Ubuntu 4.15.0-64.73-generic 4.15.18 RelatedPackageVersions: linux-restricted-modules-4.15.0-64-generic N/A linux-backports-modules-4.15.0-64-generic N/A linux-firmware 1.173.9 Tags: bionic Uname: Linux 4.15.0-64-generic x86_64 UpgradeStatus: Upgraded to bionic on 2018-07-28 (428 days ago) UserGroups:
[Kernel-packages] [Bug 1654448] Re: Dell XPS 13 9350/9360 headphone audio hiss
** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Bionic) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1654448 Title: Dell XPS 13 9350/9360 headphone audio hiss Status in linux package in Ubuntu: In Progress Status in linux source package in Bionic: Fix Committed Bug description: === SRU Justification === [Impact] XPS 13 9350/9360 has unbearlbe headphone noise after recent kernel updates. [Fix] Lock Headphone Mic Boost level to 1 as an workaround to solve the issue. [Test] Plug a headphone to audio jack, the noise is really bad. After applying the patch the noise is gone. [Regression Potenial] Low. This change only targets to 2 systems, so it has limited impact. === Original Bug Report === Pertaining to 16.04 on a dell XPS 13 9360 ii alsa-base 1.0.25+dfsg-0ubuntu5 Advanced Linux Sound Architecture Driver Version k4.4.0-57-generic. When headphones are plugged in, there is a clearly audible hiss (white noise). This is present as soon as the headphones are plugged in, whether 'headphones' or 'headset' are selected from the pop-up box. Using alsamixer to debug the issue reveals that it is related to "Headphone Mic Boost" - the default setting is: dB gain 0.00, 0.00. If this is changed to: 10.00, 10.00 (one notch up) the hiss disappears. 20.00, 20.00 cause a louder hiss and 30.00, 30.00 causes an even louder hiss with high frequency audio artifacts. When the headphones are removed and plugged back in the Headphone Mic Boost setting returns to dB gain 0 and the problem also returns. This (problem and workaround) has been reported in the wild: https://news.ycombinator.com/item?id=13050843 and https://www.reddit.com/r/Dell/comments/4j1zz4/headphones_have_static_noise_with_ubuntu_1604_on/ for example To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1654448/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1844021] Re: Suspend stopped working from 4.4.0-157 onwards
** Also affects: linux (Ubuntu Disco) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Disco) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1844021 Title: Suspend stopped working from 4.4.0-157 onwards Status in linux package in Ubuntu: Fix Released Status in linux source package in Disco: Fix Committed Bug description: Since upgrading the kernel above 4.4.0-154, starting with 4.4.0-157, suspend does not work for me anymore. Never had such an issue in the last 6 years. This is the relevant output when suspend fails: [ 328.25] PM: Suspending system (mem) [ 328.288902] Suspending console(s) (use no_console_suspend to debug) [ 328.289118] wlp1s0: deauthenticating from xx:xx:xx:xx:xx:xx by local choice (Reason: 3=DEAUTH_LEAVING) [ 328.289209] sd 1:0:0:0: [sdb] Synchronizing SCSI cache [ 328.289570] sd 0:0:0:0: [sda] Synchronizing SCSI cache [ 328.289600] sd 0:0:0:0: [sda] Stopping disk [ 328.291700] sd 1:0:0:0: [sdb] Stopping disk [ 328.312413] xhci_hcd :03:00.0: WARN: xHC save state timeout [ 328.312456] suspend_common(): xhci_pci_suspend+0x0/0x70 returns -110 [ 328.312461] pci_pm_suspend(): hcd_pci_suspend+0x0/0x30 returns -110 [ 328.312465] dpm_run_callback(): pci_pm_suspend+0x0/0x150 returns -110 [ 328.312483] PM: Device :03:00.0 failed to suspend async: error -110 [ 328.848109] PM: Some devices failed to suspend, or early wake event detected This is my relevant lspci -v output: 03:00.0 USB controller: ASMedia Technology Inc. ASM1042 SuperSpeed USB Host Controller (prog-if 30 [XHCI]) Subsystem: Samsung Electronics Co Ltd ASM1042 SuperSpeed USB Host Controller Flags: bus master, fast devsel, latency 0, IRQ 16 Memory at f050 (64-bit, non-prefetchable) [size=32K] Capabilities: Kernel driver in use: xhci_hcd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1844021/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1819968] Re: Colour banding in Lenovo G50-80 laptop display (i915)
** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Eoan) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1819968 Title: Colour banding in Lenovo G50-80 laptop display (i915) Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Fix Committed Status in linux source package in Bionic: Fix Committed Status in linux source package in Eoan: Fix Committed Bug description: Colour bandind is visible everywhere in the system. I believe it's not a hardware problem, since booting with 'nomodeset' works as expected and the previously installed Ubuntu 14.04 also worked. I tried installing kernel 4.18.0-16.17 from ppa:canonical-kernel- team/ppa but the problem remained. There were already similar bugs, https://bugs.launchpad.net/bugs/1749420 , https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1794387 and https://bugs.launchpad.net/bugs/1788308, but the fixes provided for those bugs did not work for my specific monitor. cat /proc/version_signature Ubuntu 4.15.0-46.49-generic 4.15.18 sudo lspci -vnvn 00:00.0 Host bridge [0600]: Intel Corporation Haswell-ULT DRAM Controller [8086:0a04] (rev 0b) Subsystem: Lenovo Haswell-ULT DRAM Controller [17aa:390b] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: hsw_uncore 00:02.0 VGA compatible controller [0300]: Intel Corporation Haswell-ULT Integrated Graphics Controller [8086:0a16] (rev 0b) (prog-if 00 [VGA controller]) Subsystem: Lenovo Haswell-ULT Integrated Graphics Controller [17aa:390b] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1819968/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1851549] Re: Xenial update: 4.4.199 upstream stable release
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1851549 Title: Xenial update: 4.4.199 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * scsi: ufs: skip shutdown if hba is not powered * scsi: megaraid: disable device when probe failed after enabled device * scsi: qla2xxx: Fix unbound sleep in fcport delete path. * ARM: OMAP2+: Fix missing reset done flag for am3 and am43 * ARM: dts: am4372: Set memory bandwidth limit for DISPC * nl80211: fix null pointer dereference * mips: Loongson: Fix the link time qualifier of 'serial_exit()' * net: hisilicon: Fix usage of uninitialized variable in function mdio_sc_cfg_reg_write() * namespace: fix namespace.pl script to support relative paths * loop: Add LOOP_SET_DIRECT_IO to compat ioctl * net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 * net: bcmgenet: Set phydev->dev_flags only for internal PHYs * sctp: change sctp_prot .no_autobind with true * net: avoid potential infinite loop in tc_ctl_action() * ipv4: Return -ENETUNREACH if we can't create route but saddr is valid * memfd: Fix locking when tagging pins * USB: legousbtower: fix memleak on disconnect * usb: udc: lpc32xx: fix bad bit shift operation * USB: serial: ti_usb_3410_5052: fix port-close races * USB: ldusb: fix memleak on disconnect * USB: usblp: fix use-after-free on disconnect * USB: ldusb: fix read info leaks * scsi: core: try to get module before removing device * ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting * cfg80211: wext: avoid copying malformed SSIDs * mac80211: Reject malformed SSID elements * drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 * scsi: zfcp: fix reaction on bit error threshold notification * mm/slub: fix a deadlock in show_slab_objects() * xtensa: drop EXPORT_SYMBOL for outs*/ins* * parisc: Fix vmap memory leak in ioremap()/iounmap() * CIFS: avoid using MID 0x * btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() * memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' * cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown * xen/netback: fix error path of xenvif_connect_data() * PCI: PM: Fix pci_power_up() * net: sched: Fix memory exposure from short TCA_U32_SEL * RDMA/cxgb4: Do not dma memory off of the stack * Linux 4.4.198 * UBUNTU: upstream stable to v4.4.198 * dm snapshot: use mutex instead of rw_semaphore * dm snapshot: introduce account_start_copy() and account_end_copy() * dm snapshot: rework COW throttling to fix deadlock * dm: Use kzalloc for all structs with embedded biosets/mempools * sc16is7xx: Fix for "Unexpected interrupt: 8" * x86/cpu: Add Atom Tremont (Jacobsville) * scripts/setlocalversion: Improve -dirty check with git-status --no-optional-locks * usb: handle warm-reset port requests on hub resume * exec: load_script: Do not exec truncated interpreter path * iio: fix center temperature of bmc150-accel-core * perf map: Fix overlapped map handling * RDMA/iwcm: Fix a lock inversion issue * fs: cifs: mute -Wunused-const-variable message * serial: mctrl_gpio: Check for NULL pointer * efi/cper: Fix endianness of PCIe class code * efi/x86: Do not clean dummy variable in kexec path * fs: ocfs2: fix possible null-pointer dereferences in ocfs2_xa_prepare_entry() * fs: ocfs2: fix a possible null-pointer dereference in ocfs2_info_scan_inode_alloc() * MIPS: fw: sni: Fix out of bounds init of o32 stack * NFSv4: Fix leak of clp->cl_acceptor string * tracing: Initialize iter->seq after zeroing in tracing_read_pipe() * USB: legousbtower: fix a signedness bug in tower_probe() * thunderbolt: Use 32-bit writes when writing ring producer/consumer * fuse: flush dirty data/metadata before non-truncate setattr * fuse: truncate pending writes on O_TRUNC * ALSA: bebob: Fix prototype of helper function to return negative value * UAS: Revert commit 3ae62a42090f ("UAS: fix alignment of scatter/gather segments") * USB: gadget: Reject endpoints with 0 maxpacket value * USB: ldusb: fix ring-buffer locking * USB: ldusb: fix control-message timeout * USB: serial: whiteheat: fix potential slab corruption * USB:
[Kernel-packages] [Bug 1812618] Re: psock_snd from net test in ubuntu_kernel_selftests failed on C
Cosmic has gone EOL. ** Changed in: linux (Ubuntu Cosmic) Status: New => Won't Fix ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: ubuntu-kernel-tests Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1812618 Title: psock_snd from net test in ubuntu_kernel_selftests failed on C Status in ubuntu-kernel-tests: Invalid Status in linux package in Ubuntu: Invalid Status in linux source package in Cosmic: Won't Fix Bug description: This test will fail with Resource temporarily unavailable $ sudo ./psock_snd.sh dgram tx: 128 rx: 142 ./psock_snd: recv: Resource temporarily unavailable ProblemType: Bug DistroRelease: Ubuntu 18.10 Package: linux-image-4.18.0-13-generic 4.18.0-13.14 ProcVersionSignature: User Name 4.18.0-13.14-generic 4.18.17 Uname: Linux 4.18.0-13-generic x86_64 AlsaDevices: total 0 crw-rw 1 root audio 116, 1 Jan 21 07:41 seq crw-rw 1 root audio 116, 33 Jan 21 07:41 timer AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay' ApportVersion: 2.20.10-0ubuntu13.1 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 'arecord' AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: Date: Mon Jan 21 07:49:29 2019 IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig' Lsusb: Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: QEMU Standard PC (i440FX + PIIX, 1996) PciMultimedia: ProcFB: 0 cirrusdrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.18.0-13-generic root=UUID=2a4b0342-a2dd-4feb-b3e2-9644ca1c4a60 ro console=ttyS0,115200n8 RelatedPackageVersions: linux-restricted-modules-4.18.0-13-generic N/A linux-backports-modules-4.18.0-13-generic N/A linux-firmware 1.175.1 RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill' SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/01/2014 dmi.bios.vendor: SeaBIOS dmi.bios.version: Ubuntu-1.8.2-1ubuntu1 dmi.chassis.type: 1 dmi.chassis.vendor: QEMU dmi.chassis.version: pc-i440fx-xenial dmi.modalias: dmi:bvnSeaBIOS:bvrUbuntu-1.8.2-1ubuntu1:bd04/01/2014:svnQEMU:pnStandardPC(i440FX+PIIX,1996):pvrpc-i440fx-xenial:cvnQEMU:ct1:cvrpc-i440fx-xenial: dmi.product.name: Standard PC (i440FX + PIIX, 1996) dmi.product.version: pc-i440fx-xenial dmi.sys.vendor: QEMU To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812618/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852232] Re: eoan/linux: 5.3.0-24.26 -proposed tracker
** Summary changed: - eoan/linux: -proposed tracker + eoan/linux: 5.3.0-24.26 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852232 Title: eoan/linux: 5.3.0-24.26 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-lrm series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: lrm: linux-restricted-modules main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Wednesday, 13. November 2019 22:26 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-lrm: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: bionic/linux-hwe-edge: bug 1852231 eoan/linux-aws: bug 1852223 eoan/linux-azure: bug 1852225 eoan/linux-gcp: bug 1852227 eoan/linux-kvm: bug 1852228 eoan/linux-oracle: bug 1852230 eoan/linux-raspi2: bug 1852220 eoan/linux/pc-kernel: bug 1852217 eoan/linux/pc-lowlatency-kernel: bug 1852218 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852232/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1852253] Re: disco/linux: 5.0.0-37.40 -proposed tracker
** Summary changed: - disco/linux: -proposed tracker + disco/linux: 5.0.0-37.40 -proposed tracker ** Changed in: kernel-sru-workflow/prepare-package Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-lrm Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-lrm Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) ** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => In Progress ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl (connork) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1852253 Title: disco/linux: 5.0.0-37.40 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-lrm series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Disco: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: lrm: linux-restricted-modules main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Wednesday, 13. November 2019 19:36 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-lrm: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: bionic/linux-bluefield: bug 1852252 bionic/linux-hwe: bug 1852250 bionic/linux-oem-osp1: bug 1852251 disco/linux-aws: bug 1852236 disco/linux-azure: bug 1852239 disco/linux-gcp: bug 1852244 disco/linux-kvm: bug 1852245 disco/linux-oracle: bug 1852248 disco/linux-raspi2: bug 1852233 disco/linux-snapdragon: bug 1852249 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852253/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp