[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release

2022-12-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-oem-6.0 - 6.0.0-1008.8

---
linux-oem-6.0 (6.0.0-1008.8) jammy; urgency=medium

  * jammy/linux-oem-6.0: 6.0.0-1008.8 -proposed tracker (LP: #1996347)

  * Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2022.11.14)

  * Fix a race condition with AMD PMF and Thinkpad-ACPI (LP: #1993242)
- platform/x86/amd/pmf: Fix undefined reference to platform_profile
- platform/x86/amd/pmf: Fix clang unused variable warning
- platform/x86/amd/pmf: install notify handler after acpi init

  * Screen freeze after resuming from suspend (nvme0: I/O timeout)
(LP: #1996048)
- SAUCE: PCI: vmd: Disable MSI remapping after suspend

  *  Fibocom WWAN FM350-GL suspend error (notebook not suspend) (LP: #1990700)
- net: wwan: t7xx: Add AP CLDMA

  * Add some ACPI device IDs for Intel HID device (LP: #1995453)
- platform/x86/intel/hid: Add some ACPI device IDs

  * amd_sfh modprobe fails when no sensor reported from AMD MP2 (LP: #1993240)
- HID: amd_sfh: Change dev_err to dev_dbg for additional debug info

  * Jammy update: v6.0.9 upstream stable release (LP: #1996785)
- drm/i915/gvt: Add missing vfio_unregister_group_dev() call
- m68k: Rework BI_VIRT_RNG_SEED as BI_RNG_SEED
- KVM: debugfs: Return retval of simple_attr_open() if it fails
- drm/i915: Allow more varied alternate fixed modes for panels
- drm/i915: Simplify intel_panel_add_edid_alt_fixed_modes()
- drm/i915/sdvo: Grab mode_config.mutex during LVDS init to avoid WARNs
- drm/amd/display: Acquire FCLK DPM levels on DCN32
- drm/amd/display: Limit dcn32 to 1950Mhz display clock
- drm/amd/display: Set memclk levels to be at least 1 for dcn32
- drm/amdkfd: handle CPU fault on COW mapping
- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram()
- cxl/region: Recycle region ids
- HID: wacom: Fix logic used for 3rd barrel switch emulation
- hwspinlock: qcom: correct MMIO max register for newer SoCs
- phy: stm32: fix an error code in probe
- wifi: cfg80211: silence a sparse RCU warning
- wifi: cfg80211: fix memory leak in query_regdb_file()
- soundwire: qcom: reinit broadcast completion
- soundwire: qcom: check for outanding writes before doing a read
- ALSA: arm: pxa: pxa2xx-ac97-lib: fix return value check of
  platform_get_irq()
- spi: mediatek: Fix package division error
- bpf, verifier: Fix memory leak in array reallocation for stack state
- bpf, sockmap: Fix the sk->sk_forward_alloc warning of 
sk_stream_kill_queues
- wifi: mac80211: fix general-protection-fault in 
ieee80211_subif_start_xmit()
- wifi: mac80211: Set TWT Information Frame Disabled bit as 1
- bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without
  FILE
- HID: hyperv: fix possible memory leak in mousevsc_probe()
- drm/vc4: hdmi: Fix HSM clock too low on Pi4
- bpf, sock_map: Move cancel_work_sync() out of sock lock
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg()
- bpf: Add helper macro bpf_for_each_reg_in_vstate
- bpf: Fix wrong reg type conversion in release_reference()
- net: gso: fix panic on frag_list with mixed head alloc types
- macsec: delete new rxsc when offload fails
- macsec: fix secy->n_rx_sc accounting
- macsec: fix detection of RXSCs when toggling offloading
- macsec: clear encryption keys from the stack after setting up offload
- octeontx2-pf: NIX TX overwrites SQ_CTX_HW_S[SQ_INT]
- net: tun: Fix memory leaks of napi_get_frags
- bnxt_en: Fix possible crash in bnxt_hwrm_set_coal()
- bnxt_en: fix potentially incorrect return value for ndo_rx_flow_steer
- net: fman: Unregister ethernet device on removal
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
- phy: ralink: mt7621-pci: add sentinel to quirks table
- KVM: s390: pv: don't allow userspace to set the clock under PV
- KVM: s390: pci: Fix allocation size of aift kzdev elements
- net: lapbether: fix issue of dev reference count leakage in
  lapbeth_device_event()
- hamradio: fix issue of dev reference count leakage in bpq_device_event()
- net: wwan: iosm: fix memory leak in ipc_wwan_dellink
- net: wwan: mhi: fix memory leak in mhi_mbim_dellink
- drm/vc4: Fix missing platform_unregister_drivers() call in
  vc4_drm_register()
- tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent
- platform/x86: p2sb: Don't fail if unknown CPU is found
- ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network
- can: af_can: fix NULL pointer dereference in can_rx_register()
- drm/i915/psr: Send update also on invalidate
- drm/i915: Do not set cache_dirty for DGFX
- net: stmmac: dwmac-meson8b: fix meson8b_devm_clk_prepare_enable()
- dt-bindings: net: tsnep: Fix typo on generic nvmem property
- net: 

[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release

2022-12-07 Thread Timo Aaltonen
** Changed in: linux-oem-6.0 (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux-oem-6.0 (Ubuntu Jammy)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1996081

Title:
  Jammy update: v6.0.5 upstream stable release

Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 v6.0.5 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oem-6.0/+bug/1996081/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release

2022-11-16 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1008.8
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1996081

Title:
  Jammy update: v6.0.5 upstream stable release

Status in linux-oem-6.0 package in Ubuntu:
  Confirmed
Status in linux-oem-6.0 source package in Jammy:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 v6.0.5 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oem-6.0/+bug/1996081/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996081] Re: Jammy update: v6.0.5 upstream stable release

2022-11-16 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1008.8
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1996081

Title:
  Jammy update: v6.0.5 upstream stable release

Status in linux-oem-6.0 package in Ubuntu:
  Confirmed
Status in linux-oem-6.0 source package in Jammy:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 v6.0.5 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oem-6.0/+bug/1996081/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp