[Kernel-packages] [Bug 1983152] Re: Focal update: v5.4.200 upstream stable release

2022-12-15 Thread Ubuntu Kernel Bot
** Tags removed: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983152

Title:
  Focal update: v5.4.200 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.200 upstream stable release
     from git://git.kernel.org/

  Revert "UBUNTU: SAUCE: random: Make getrandom() ready earlier"
  9p: missing chunk of "fs/9p: Don't update file type when updating file 
attributes"
  bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
  nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
  crypto: blake2s - generic C library implementation and selftest
  lib/crypto: blake2s: move hmac construction into wireguard
  lib/crypto: sha1: re-roll loops to reduce code size
  compat_ioctl: remove /dev/random commands
  random: don't forget compat_ioctl on urandom
  random: Don't wake crng_init_wait when crng_init == 1
  random: Add a urandom_read_nowait() for random APIs that don't warn
  random: add GRND_INSECURE to return best-effort non-cryptographic bytes
  random: ignore GRND_RANDOM in getentropy(2)
  random: make /dev/random be almost like /dev/urandom
  random: remove the blocking pool
  random: delete code to pull data into pools
  random: remove kernel.random.read_wakeup_threshold
  random: remove unnecessary unlikely()
  random: convert to ENTROPY_BITS for better code readability
  random: Add and use pr_fmt()
  random: fix typo in add_timer_randomness()
  random: remove some dead code of poolinfo
  random: split primary/secondary crng init paths
  random: avoid warnings for !CONFIG_NUMA builds
  x86: Remove arch_has_random, arch_has_random_seed
  powerpc: Remove arch_has_random, arch_has_random_seed
  s390: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Use false with bool
  linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
  powerpc: Use bool in archrandom.h
  random: add arch_get_random_*long_early()
  random: avoid arch_get_random_seed_long() when collecting IRQ randomness
  random: remove dead code left over from blocking pool
  MAINTAINERS: co-maintain random.c
  crypto: blake2s - include  instead of 
  crypto: blake2s - adjust include guard naming
  random: document add_hwgenerator_randomness() with other input functions
  random: remove unused irq_flags argument from add_interrupt_randomness()
  random: use BLAKE2s instead of SHA1 in extraction
  random: do not sign extend bytes for rotation when mixing
  random: do not re-init if crng_reseed completes before primary init
  random: mix bootloader randomness into pool
  random: harmonize "crng init done" messages
  random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
  random: initialize ChaCha20 constants with correct endianness
  random: early initialization of ChaCha constants
  random: avoid superfluous call to RDRAND in CRNG extraction
  random: don't reset crng_init_cnt on urandom_read()
  random: fix typo in comments
  random: cleanup poolinfo abstraction
  random: cleanup integer types
  random: remove incomplete last_data logic
  random: remove unused extract_entropy() reserved argument
  random: rather than entropy_store abstraction, use global
  random: remove unused OUTPUT_POOL constants
  random: de-duplicate INPUT_POOL constants
  random: prepend remaining pool constants with POOL_
  random: cleanup fractional entropy shift constants
  random: access input_pool_data directly rather than through pointer
  random: selectively clang-format where it makes sense
  random: simplify arithmetic function flow in account()
  random: continually use hwgenerator randomness
  random: access primary_pool directly rather than through pointer
  random: only call crng_finalize_init() for primary_crng
  random: use computational hash for entropy extraction
  random: simplify entropy debiting
  random: use linear min-entropy accumulation crediting
  random: always wake up entropy writers after extraction
  random: make credit_entropy_bits() always safe
  random: remove use_input_pool parameter from crng_reseed()
  random: remove batched entropy locking
  random: fix locking in crng_fast_load()
  random: use RDSEED instead of RDRAND in entropy extraction
  random: get rid of secondary crngs
  random: inline leaves of rand_initialize()
  random: 

[Kernel-packages] [Bug 1983152] Re: Focal update: v5.4.200 upstream stable release

2022-11-18 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-xilinx-
zynqmp/5.4.0-1019.22 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-focal' to 'verification-
done-focal'. If the problem still exists, change the tag 'verification-
needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983152

Title:
  Focal update: v5.4.200 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.200 upstream stable release
     from git://git.kernel.org/

  Revert "UBUNTU: SAUCE: random: Make getrandom() ready earlier"
  9p: missing chunk of "fs/9p: Don't update file type when updating file 
attributes"
  bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
  nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
  crypto: blake2s - generic C library implementation and selftest
  lib/crypto: blake2s: move hmac construction into wireguard
  lib/crypto: sha1: re-roll loops to reduce code size
  compat_ioctl: remove /dev/random commands
  random: don't forget compat_ioctl on urandom
  random: Don't wake crng_init_wait when crng_init == 1
  random: Add a urandom_read_nowait() for random APIs that don't warn
  random: add GRND_INSECURE to return best-effort non-cryptographic bytes
  random: ignore GRND_RANDOM in getentropy(2)
  random: make /dev/random be almost like /dev/urandom
  random: remove the blocking pool
  random: delete code to pull data into pools
  random: remove kernel.random.read_wakeup_threshold
  random: remove unnecessary unlikely()
  random: convert to ENTROPY_BITS for better code readability
  random: Add and use pr_fmt()
  random: fix typo in add_timer_randomness()
  random: remove some dead code of poolinfo
  random: split primary/secondary crng init paths
  random: avoid warnings for !CONFIG_NUMA builds
  x86: Remove arch_has_random, arch_has_random_seed
  powerpc: Remove arch_has_random, arch_has_random_seed
  s390: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Use false with bool
  linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
  powerpc: Use bool in archrandom.h
  random: add arch_get_random_*long_early()
  random: avoid arch_get_random_seed_long() when collecting IRQ randomness
  random: remove dead code left over from blocking pool
  MAINTAINERS: co-maintain random.c
  crypto: blake2s - include  instead of 
  crypto: blake2s - adjust include guard naming
  random: document add_hwgenerator_randomness() with other input functions
  random: remove unused irq_flags argument from add_interrupt_randomness()
  random: use BLAKE2s instead of SHA1 in extraction
  random: do not sign extend bytes for rotation when mixing
  random: do not re-init if crng_reseed completes before primary init
  random: mix bootloader randomness into pool
  random: harmonize "crng init done" messages
  random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
  random: initialize ChaCha20 constants with correct endianness
  random: early initialization of ChaCha constants
  random: avoid superfluous call to RDRAND in CRNG extraction
  random: don't reset crng_init_cnt on urandom_read()
  random: fix typo in comments
  random: cleanup poolinfo abstraction
  random: cleanup integer types
  random: remove incomplete last_data logic
  random: remove unused extract_entropy() reserved argument
  random: rather than entropy_store abstraction, use global
  random: remove unused OUTPUT_POOL constants
  random: de-duplicate INPUT_POOL constants
  random: prepend remaining pool constants with POOL_
  random: cleanup fractional entropy shift constants
  random: access input_pool_data directly rather than through pointer
  random: selectively clang-format where it makes sense
  random: simplify arithmetic function flow in account()
  random: continually use hwgenerator randomness
  random: access primary_pool directly rather than through pointer
  random: only call 

[Kernel-packages] [Bug 1983152] Re: Focal update: v5.4.200 upstream stable release

2022-11-18 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-xilinx-
zynqmp/5.4.0-1019.22 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-focal' to 'verification-
done-focal'. If the problem still exists, change the tag 'verification-
needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983152

Title:
  Focal update: v5.4.200 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.200 upstream stable release
     from git://git.kernel.org/

  Revert "UBUNTU: SAUCE: random: Make getrandom() ready earlier"
  9p: missing chunk of "fs/9p: Don't update file type when updating file 
attributes"
  bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
  nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
  crypto: blake2s - generic C library implementation and selftest
  lib/crypto: blake2s: move hmac construction into wireguard
  lib/crypto: sha1: re-roll loops to reduce code size
  compat_ioctl: remove /dev/random commands
  random: don't forget compat_ioctl on urandom
  random: Don't wake crng_init_wait when crng_init == 1
  random: Add a urandom_read_nowait() for random APIs that don't warn
  random: add GRND_INSECURE to return best-effort non-cryptographic bytes
  random: ignore GRND_RANDOM in getentropy(2)
  random: make /dev/random be almost like /dev/urandom
  random: remove the blocking pool
  random: delete code to pull data into pools
  random: remove kernel.random.read_wakeup_threshold
  random: remove unnecessary unlikely()
  random: convert to ENTROPY_BITS for better code readability
  random: Add and use pr_fmt()
  random: fix typo in add_timer_randomness()
  random: remove some dead code of poolinfo
  random: split primary/secondary crng init paths
  random: avoid warnings for !CONFIG_NUMA builds
  x86: Remove arch_has_random, arch_has_random_seed
  powerpc: Remove arch_has_random, arch_has_random_seed
  s390: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Use false with bool
  linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
  powerpc: Use bool in archrandom.h
  random: add arch_get_random_*long_early()
  random: avoid arch_get_random_seed_long() when collecting IRQ randomness
  random: remove dead code left over from blocking pool
  MAINTAINERS: co-maintain random.c
  crypto: blake2s - include  instead of 
  crypto: blake2s - adjust include guard naming
  random: document add_hwgenerator_randomness() with other input functions
  random: remove unused irq_flags argument from add_interrupt_randomness()
  random: use BLAKE2s instead of SHA1 in extraction
  random: do not sign extend bytes for rotation when mixing
  random: do not re-init if crng_reseed completes before primary init
  random: mix bootloader randomness into pool
  random: harmonize "crng init done" messages
  random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
  random: initialize ChaCha20 constants with correct endianness
  random: early initialization of ChaCha constants
  random: avoid superfluous call to RDRAND in CRNG extraction
  random: don't reset crng_init_cnt on urandom_read()
  random: fix typo in comments
  random: cleanup poolinfo abstraction
  random: cleanup integer types
  random: remove incomplete last_data logic
  random: remove unused extract_entropy() reserved argument
  random: rather than entropy_store abstraction, use global
  random: remove unused OUTPUT_POOL constants
  random: de-duplicate INPUT_POOL constants
  random: prepend remaining pool constants with POOL_
  random: cleanup fractional entropy shift constants
  random: access input_pool_data directly rather than through pointer
  random: selectively clang-format where it makes sense
  random: simplify arithmetic function flow in account()
  random: continually use hwgenerator randomness
  random: access primary_pool directly rather 

[Kernel-packages] [Bug 1983152] Re: Focal update: v5.4.200 upstream stable release

2022-09-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-126.142

---
linux (5.4.0-126.142) focal; urgency=medium

  * focal/linux: 5.4.0-126.142 -proposed tracker (LP: #1987819)

  * [SRU] fnic driver on needs to be updated to 1.6.0.53 on Focal (LP: #1984011)
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG()
- scsi: fnic: Avoid looping in TRANS ETH on unload
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG()
- scsi: fnic: Set scsi_set_resid() only for underflow
- scsi: fnic: Validate io_req before others

  * Focal update: v5.4.203 upstream stable release (LP: #1986999)
- drm: remove drm_fb_helper_modinit
- powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
- net: mscc: ocelot: allow unregistered IP multicast flooding
- ARM: 8989/1: use .fpu assembler directives instead of assembler arguments
- ARM: 8990/1: use VFP assembler mnemonics in register load/store macros
- ARM: 8971/1: replace the sole use of a symbol with its definition
- crypto: arm/sha256-neon - avoid ADRL pseudo instruction
- crypto: arm/sha512-neon - avoid ADRL pseudo instruction
- ARM: 8933/1: replace Sun/Solaris style flag on section directive
- ARM: 8929/1: use APSR_nzcv instead of r15 as mrc operand
- ARM: OMAP2+: drop unnecessary adrl
- ARM: 9029/1: Make iwmmxt.S support Clang's integrated assembler
- crypto: arm - use Kconfig based compiler checks for crypto opcodes
- crypto: arm/ghash-ce - define fpu before fpu registers are referenced
- Linux 5.4.203

  * Focal update: v5.4.202 upstream stable release (LP: #1986995)
- random: schedule mix_interrupt_randomness() less often
- ALSA: hda/via: Fix missing beep setup
- ALSA: hda/conexant: Fix missing beep setup
- ALSA: hda/realtek - ALC897 headset MIC no sound
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments
- mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint
- dm era: commit metadata in postsuspend after worker stops
- dm mirror log: clear log bits up to BITS_PER_LONG boundary
- random: quiet urandom warning ratelimit suppression message
- USB: serial: option: add Telit LE910Cx 0x1250 composition
- USB: serial: option: add Quectel EM05-G modem
- USB: serial: option: add Quectel RM500K module support
- bpf: Fix request_sock leak in sk lookup helpers
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised
- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
- erspan: do not assume transport header is always set
- net/tls: fix tls_sk_proto_close executed repeatedly
- udmabuf: add back sanity check
- x86/xen: Remove undefined behavior in setup_features()
- MIPS: Remove repetitive increase irq_err_count
- afs: Fix dynamic root getattr
- ice: ethtool: advertise 1000M speeds properly
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips
- igb: Make DMA faster when CPU is active on the PCIe link
- virtio_net: fix xdp_rxq_info bug after suspend/resume
- Revert "net/tls: fix tls_sk_proto_close executed repeatedly"
- gpio: winbond: Fix error code in winbond_gpio_get()
- s390/cpumf: Handle events cycles and instructions identical
- iio: adc: vf610: fix conversion mode sysfs node name
- xhci: turn off port power in shutdown
- usb: chipidea: udc: check request status before setting device address
- iio:chemical:ccs811: rearrange iio trigger get and register
- iio:accel:bma180: rearrange iio trigger get and register
- iio:accel:mxc4005: rearrange iio trigger get and register
- iio: accel: mma8452: ignore the return value of reset operation
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
- iio: trigger: sysfs: fix use-after-free on remove
- iio: adc: stm32: fix maximum clock rate for stm32mp15x
- iio: adc: axp288: Override TS pin bias current for some models
- xtensa: xtfpga: Fix refcount leak bug in setup
- xtensa: Fix refcount leak bug in time.c
- parisc: Enable ARCH_HAS_STRICT_MODULE_RWX
- powerpc: Enable execve syscall exit tracepoint
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
- powerpc/powernv: wire up rng during setup_arch
- ARM: dts: imx6qdl: correct PU regulator ramp delay
- ARM: exynos: Fix refcount leak in exynos_map_pmu
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
- ARM: Fix refcount leak in axxia_boot_secondary
- ARM: cns3xxx: Fix refcount leak in cns3xxx_init
- modpost: fix section mismatch check for 

[Kernel-packages] [Bug 1983152] Re: Focal update: v5.4.200 upstream stable release

2022-08-23 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983152

Title:
  Focal update: v5.4.200 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.200 upstream stable release
     from git://git.kernel.org/

  Revert "UBUNTU: SAUCE: random: Make getrandom() ready earlier"
  9p: missing chunk of "fs/9p: Don't update file type when updating file 
attributes"
  bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
  nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
  crypto: blake2s - generic C library implementation and selftest
  lib/crypto: blake2s: move hmac construction into wireguard
  lib/crypto: sha1: re-roll loops to reduce code size
  compat_ioctl: remove /dev/random commands
  random: don't forget compat_ioctl on urandom
  random: Don't wake crng_init_wait when crng_init == 1
  random: Add a urandom_read_nowait() for random APIs that don't warn
  random: add GRND_INSECURE to return best-effort non-cryptographic bytes
  random: ignore GRND_RANDOM in getentropy(2)
  random: make /dev/random be almost like /dev/urandom
  random: remove the blocking pool
  random: delete code to pull data into pools
  random: remove kernel.random.read_wakeup_threshold
  random: remove unnecessary unlikely()
  random: convert to ENTROPY_BITS for better code readability
  random: Add and use pr_fmt()
  random: fix typo in add_timer_randomness()
  random: remove some dead code of poolinfo
  random: split primary/secondary crng init paths
  random: avoid warnings for !CONFIG_NUMA builds
  x86: Remove arch_has_random, arch_has_random_seed
  powerpc: Remove arch_has_random, arch_has_random_seed
  s390: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Use false with bool
  linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
  powerpc: Use bool in archrandom.h
  random: add arch_get_random_*long_early()
  random: avoid arch_get_random_seed_long() when collecting IRQ randomness
  random: remove dead code left over from blocking pool
  MAINTAINERS: co-maintain random.c
  crypto: blake2s - include  instead of 
  crypto: blake2s - adjust include guard naming
  random: document add_hwgenerator_randomness() with other input functions
  random: remove unused irq_flags argument from add_interrupt_randomness()
  random: use BLAKE2s instead of SHA1 in extraction
  random: do not sign extend bytes for rotation when mixing
  random: do not re-init if crng_reseed completes before primary init
  random: mix bootloader randomness into pool
  random: harmonize "crng init done" messages
  random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
  random: initialize ChaCha20 constants with correct endianness
  random: early initialization of ChaCha constants
  random: avoid superfluous call to RDRAND in CRNG extraction
  random: don't reset crng_init_cnt on urandom_read()
  random: fix typo in comments
  random: cleanup poolinfo abstraction
  random: cleanup integer types
  random: remove incomplete last_data logic
  random: remove unused extract_entropy() reserved argument
  random: rather than entropy_store abstraction, use global
  random: remove unused OUTPUT_POOL constants
  random: de-duplicate INPUT_POOL constants
  random: prepend remaining pool constants with POOL_
  random: cleanup fractional entropy shift constants
  random: access input_pool_data directly rather than through pointer
  random: selectively clang-format where it makes sense
  random: simplify arithmetic function flow in account()
  random: continually use hwgenerator randomness
  random: access primary_pool directly rather than through pointer
  random: only call crng_finalize_init() for primary_crng
  random: use computational hash for entropy extraction
  random: simplify entropy debiting
  random: use linear min-entropy accumulation crediting
  random: always wake up entropy writers after extraction
  random: make credit_entropy_bits() always safe
  random: remove use_input_pool parameter from crng_reseed()
  random: remove batched entropy locking
  random: fix locking in crng_fast_load()
  random: use RDSEED instead of RDRAND in entropy extraction
  random: get rid of secondary crngs
  random: inline