[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release
This bug was fixed in the package linux-oem-6.0 - 6.0.0-1008.8 --- linux-oem-6.0 (6.0.0-1008.8) jammy; urgency=medium * jammy/linux-oem-6.0: 6.0.0-1008.8 -proposed tracker (LP: #1996347) * Packaging resync (LP: #1786013) - debian/dkms-versions -- update from kernel-versions (main/2022.11.14) * Fix a race condition with AMD PMF and Thinkpad-ACPI (LP: #1993242) - platform/x86/amd/pmf: Fix undefined reference to platform_profile - platform/x86/amd/pmf: Fix clang unused variable warning - platform/x86/amd/pmf: install notify handler after acpi init * Screen freeze after resuming from suspend (nvme0: I/O timeout) (LP: #1996048) - SAUCE: PCI: vmd: Disable MSI remapping after suspend * Fibocom WWAN FM350-GL suspend error (notebook not suspend) (LP: #1990700) - net: wwan: t7xx: Add AP CLDMA * Add some ACPI device IDs for Intel HID device (LP: #1995453) - platform/x86/intel/hid: Add some ACPI device IDs * amd_sfh modprobe fails when no sensor reported from AMD MP2 (LP: #1993240) - HID: amd_sfh: Change dev_err to dev_dbg for additional debug info * Jammy update: v6.0.9 upstream stable release (LP: #1996785) - drm/i915/gvt: Add missing vfio_unregister_group_dev() call - m68k: Rework BI_VIRT_RNG_SEED as BI_RNG_SEED - KVM: debugfs: Return retval of simple_attr_open() if it fails - drm/i915: Allow more varied alternate fixed modes for panels - drm/i915: Simplify intel_panel_add_edid_alt_fixed_modes() - drm/i915/sdvo: Grab mode_config.mutex during LVDS init to avoid WARNs - drm/amd/display: Acquire FCLK DPM levels on DCN32 - drm/amd/display: Limit dcn32 to 1950Mhz display clock - drm/amd/display: Set memclk levels to be at least 1 for dcn32 - drm/amdkfd: handle CPU fault on COW mapping - drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() - cxl/region: Recycle region ids - HID: wacom: Fix logic used for 3rd barrel switch emulation - hwspinlock: qcom: correct MMIO max register for newer SoCs - phy: stm32: fix an error code in probe - wifi: cfg80211: silence a sparse RCU warning - wifi: cfg80211: fix memory leak in query_regdb_file() - soundwire: qcom: reinit broadcast completion - soundwire: qcom: check for outanding writes before doing a read - ALSA: arm: pxa: pxa2xx-ac97-lib: fix return value check of platform_get_irq() - spi: mediatek: Fix package division error - bpf, verifier: Fix memory leak in array reallocation for stack state - bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queues - wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit() - wifi: mac80211: Set TWT Information Frame Disabled bit as 1 - bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE - HID: hyperv: fix possible memory leak in mousevsc_probe() - drm/vc4: hdmi: Fix HSM clock too low on Pi4 - bpf, sock_map: Move cancel_work_sync() out of sock lock - PCI: hv: Fix the definition of vector in hv_compose_msi_msg() - bpf: Add helper macro bpf_for_each_reg_in_vstate - bpf: Fix wrong reg type conversion in release_reference() - net: gso: fix panic on frag_list with mixed head alloc types - macsec: delete new rxsc when offload fails - macsec: fix secy->n_rx_sc accounting - macsec: fix detection of RXSCs when toggling offloading - macsec: clear encryption keys from the stack after setting up offload - octeontx2-pf: NIX TX overwrites SQ_CTX_HW_S[SQ_INT] - net: tun: Fix memory leaks of napi_get_frags - bnxt_en: Fix possible crash in bnxt_hwrm_set_coal() - bnxt_en: fix potentially incorrect return value for ndo_rx_flow_steer - net: fman: Unregister ethernet device on removal - capabilities: fix undefined behavior in bit shift for CAP_TO_MASK - phy: ralink: mt7621-pci: add sentinel to quirks table - KVM: s390: pv: don't allow userspace to set the clock under PV - KVM: s390: pci: Fix allocation size of aift kzdev elements - net: lapbether: fix issue of dev reference count leakage in lapbeth_device_event() - hamradio: fix issue of dev reference count leakage in bpq_device_event() - net: wwan: iosm: fix memory leak in ipc_wwan_dellink - net: wwan: mhi: fix memory leak in mhi_mbim_dellink - drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() - tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent - platform/x86: p2sb: Don't fail if unknown CPU is found - ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network - can: af_can: fix NULL pointer dereference in can_rx_register() - drm/i915/psr: Send update also on invalidate - drm/i915: Do not set cache_dirty for DGFX - net: stmmac: dwmac-meson8b: fix meson8b_devm_clk_prepare_enable() - dt-bindings: net: tsnep: Fix typo on generic nvmem property - net:
[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release
** Changed in: linux-oem-6.0 (Ubuntu) Status: Confirmed => Invalid ** Changed in: linux-oem-6.0 (Ubuntu Jammy) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-6.0 in Ubuntu. https://bugs.launchpad.net/bugs/1996081 Title: Jammy update: v6.0.5 upstream stable release Status in linux-oem-6.0 package in Ubuntu: Invalid Status in linux-oem-6.0 source package in Jammy: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v6.0.5 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-oem-6.0/+bug/1996081/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1008.8 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy' to 'verification-done-jammy'. If the problem still exists, change the tag 'verification-needed-jammy' to 'verification-failed-jammy'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-6.0 in Ubuntu. https://bugs.launchpad.net/bugs/1996081 Title: Jammy update: v6.0.5 upstream stable release Status in linux-oem-6.0 package in Ubuntu: Confirmed Status in linux-oem-6.0 source package in Jammy: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v6.0.5 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-oem-6.0/+bug/1996081/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1008.8 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy' to 'verification-done-jammy'. If the problem still exists, change the tag 'verification-needed-jammy' to 'verification-failed-jammy'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-6.0 in Ubuntu. https://bugs.launchpad.net/bugs/1996081 Title: Jammy update: v6.0.5 upstream stable release Status in linux-oem-6.0 package in Ubuntu: Confirmed Status in linux-oem-6.0 source package in Jammy: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v6.0.5 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-oem-6.0/+bug/1996081/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp