Failed on Oracle B-4.15
Passed on Oracle B-5.0
** Tags added: sru-20191021
** Also affects: linux-oracle (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bu
Can be found on Oracle B-5.0 as well.
** Tags added: sru-20191021
** Also affects: linux-oracle (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launch
To test this, is there an sd card image of ubuntu for pi4 I can flash?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1848790
Title:
USB not working under arm64 on Pi4
Status in
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
5.0.0-1020.22~18.04.1 - aws
Regression test CMPL, RTB.
Issue to note in arm64 (aws):
ubuntu_kernel_selftests - msg_zerocopy in net on some nodes (bug 1812620)
ubuntu_ltp - proc01 (bug 1829849) fs_fill (bug 1842266) memcg_stat (bug
1829983) memcg_use_hierarchy (bug 1829989) memcg_usage_in_byte
The folks over at
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1849484 are saying
they think that bug is the same as this one, but I don't think it is.
What do you think?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubu
** Description changed:
[Impact]
The dell-uart-backlight driver has been loaded, but the backlight is
controller by graphics driver instead of scalar IC. The old way to determinate
weather the driver should be loaded is not working anymore, since the behavior
of scalar command, show firmwar
Hello Seth, or anyone else affected,
Accepted linux-firmware into eoan-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/linux-
firmware/1.183.2 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
https
Hello AaronMa, or anyone else affected,
Accepted linux-firmware into eoan-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/linux-
firmware/1.183.2 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
ht
Hello manuel, or anyone else affected,
Accepted linux-firmware into eoan-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/linux-
firmware/1.183.2 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
htt
Hello Hui, or anyone else affected,
Accepted linux-firmware into eoan-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/linux-
firmware/1.183.2 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
https:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1849042
Title:
xenial/linux-kvm: 4.4.0-1
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-snapdragon in Ubuntu.
https://bugs.launchpad.net/bugs/1849046
Title:
xenial/linux-snapd
I didn't mean actually random, and I think clock-based would be entirely
fine, but my paranoia about stacking two things with identical
superblocks might be just paranoia too. I dunno.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1849051
Title:
xenial/linux: 4.4.0-167.196 -
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1849041
Title:
xenial/linux-aws: 4.4.0-1
Hi,
I haven't read through this entire report, but I stumbled across it when
searching for 'stutter every 5 sexonds'. I too had the issue, across
many distros + compositors with Kodi (I didn't really test anything
else). I have enabled the tear free option in a xorg.conf and the issue
has disappea
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1849855
Title:
bionic/linux: 4.15.0-68.77 -p
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1850574
Title:
disco/linux: 5.0.0-34.36 -pro
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1848998
Title:
disco/linux-oracle: 5.
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1848997
Title:
bionic/linux-oracle-5.0: 5.0.
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-snapdragon in Ubuntu.
https://bugs.launchpad.net/bugs/1848999
Title:
disco/linux-snapdr
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1848995
Title:
disco/linux-gcp: 5.0.0-10
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1848996
Title:
disco/linux-kvm: 5.0.0-10
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1848992
Title:
bionic/linux-gcp: 5.0.0-1
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1848989
Title:
disco/linux-azure: 5.0.
Maybe after the proposed kernel is verified
To test -proposed kernel, with the old arm64 image:
edit /etc/apt/sources.list
and add below to that file:
deb http://ports.ubuntu.com/ubuntu-ports eoan-proposed main restricted
deb http://ports.ubuntu.com/ubuntu-ports eoan-proposed universe
deb http:/
** Changed in: linux (Ubuntu Eoan)
Status: Confirmed => In Progress
** Changed in: ubuntu-kernel-tests
Importance: Undecided => High
** Changed in: linux (Ubuntu)
Importance: Undecided => High
** Changed in: linux (Ubuntu Disco)
Importance: Undecided => High
** Changed in: linux
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Changed in: linux (Ubuntu Bionic)
Status: New => Confirmed
** Changed in: linux (Ubuntu Disco)
Status: New => Confirmed
--
You received this bug notification because you are a member o
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1848987
Title:
bionic/linux-azure: 5.0
Confirmed that patch alone fixes this issue.
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux-oem-osp1 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Disco)
Importance: Undecided
Status: New
** Also
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1848984
Title:
disco/linux-aws: 5.0.0-10
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1848983
Title:
bionic/linux-aws-5.0: 5.0.0-1
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1848981
Title:
disco/linux-raspi2: 5.
First known working commit
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8c4076723daca08bf35ccd68f22ea1c6219e207
"x86/timer: Skip PIT initialization on modern chipsets" (in v5.3-rc1)
** Changed in: linux-oem (Ubuntu Bionic)
Status: Confirmed => In Progress
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1851590
and then change the status of the bug to 'Confirmed'.
If, due to the nature
I don't believe this is anything new with the -34 kernel. I accidentally
installed the -32 kernel because I didn't save the sources.list file
with -proposed enabled and it gave me the same error. It appears to be
because the image is not set up for encryption and the cryptsetup-
initramfs package i
** Changed in: linux-gke-5.0 (Ubuntu)
Assignee: (unassigned) => Khaled El Mously (kmously)
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-gke-5.0 (Ubuntu)
** No longer affects: linux-gke-5.0 (Ubuntu Disco)
** Changed in: linux (Ubunt
** Tags removed: verification-needed-disco verification-needed-eoan
** Tags added: verification-bionic-disco verification-bionic-eoan
** Tags removed: verification-bionic-disco verification-bionic-eoan
** Tags added: verification-needed-disco verification-needed-eoan
** Tags removed: verification
Disco verification: SUCCESS (except for crypt error not seen on Eoan
when running update-initramfs)
The package did experience a crypt error while the finish scripts were running
update-initramfs:
update-initramfs: Generating /boot/initrd.img-5.0.0-34-generic
cryptsetup: WARNING: The initramfs im
Eoan Verification: SUCCESS
Eoan:
I1107 01:13:14.719551 1 iotest.go:34] Starting loop...
I1107 01:13:14.719636 1 iotest.go:38] Generating chunk done. Took:
29.737µs
I1107 01:13:14.719693 1 iotest.go:45] Writing chunk done. Took: 44.206µs
I1107 01:13:14.723320 1 iotest.go:49
** Also affects: linux-raspi2 (Ubuntu Eoan)
Importance: Undecided
Status: New
** Changed in: linux-raspi2 (Ubuntu Eoan)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
flock will not block inotify or udev events being emitted.
See
https://github.com/systemd/systemd/blob/master/src/udev/udevd.c#L322
https://github.com/systemd/systemd/blob/master/src/udev/udevd.c#L409
it will prevent udevd from running the rules against it. Thus
effectively the event will be fire
** Changed in: linux (Ubuntu Bionic)
Status: Triaged => Fix Committed
** Changed in: linux (Ubuntu Disco)
Status: Triaged => Fix Committed
** Changed in: linux (Ubuntu Eoan)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of K
The following packages ended up in the wrong component in the Proposed
pocket:
linux-restricted-modules-aws-5.3 5.3.0-1006.6~18.04.1 - is in universe instead
of multiverse
linux-modules-nvidia-390-5.3.0-1006-aws 5.3.0-1006.6~18.04.1 - is in universe
instead of multiverse
linux-modules-nvidia-390
** Also affects: dkms (Ubuntu Focal)
Importance: Critical
Status: Confirmed
** Also affects: dkms (Ubuntu Eoan)
Importance: Undecided
Status: New
** Changed in: dkms (Ubuntu Eoan)
Status: New => Triaged
** Changed in: dkms (Ubuntu Focal)
Status: Confirmed => Tri
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
When I'm more awake tomorrow I'll send a patch upstream as a suggested
fix and see if we can get a good solution on the UUIDs worked out.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1824
Additional dmesg output, right after the problem appears for the first
time (sometime after booting, definitely not related to suspend as I
supposed in my first message).
** Attachment added: "dmesg-2.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1849917/+attachment/5303375/+files
I thought all lowerdirs must be read-only, and the first one in the stack
will win. Even if there are same ones down the stack it shouldn't matter.
But I guess needs testing.
I wouldn't want to use random, as that will eat entropy on early boot of
Ubuntu Core systems.
Do we need a separate upstre
At least it doesn't mangle email notifications! Such that in email code is
readable.
On Wed, 6 Nov 2019, 18:50 Colin Ian King, <1824...@bugs.launchpad.net>
wrote:
> Just love the way launchpad mangles pasted code.
>
> --
> You received this bug notification because you are subscribed to the bug
>
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflo
** Changed in: linux-raspi2 (Ubuntu Disco)
Status: New => In Progress
** Changed in: linux-raspi2 (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux-raspi2 (Ubuntu Eoan)
Status: New => In Progress
** Changed in: linux-raspi2 (Ubuntu Disco)
Importance: Undecide
** Changed in: linux-oem (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Status: Incomplete => In Progress
** Changed in: linux-oem (Ubuntu Bionic)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Bionic)
Importance: Undecided => Me
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflo
And the dmesg.
** Attachment added: "dmesg.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1849917/+attachment/5303370/+files/dmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.
I'm affected by what seems to be the same bug or a very similar one.
Also Ubuntu 19.10 fresh install.
Additional information from what I have observed on my machine :
- It's not only the cursor that stutters but the whole machine freezes for an
instant. It's most noticeable while scrolling or watc
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
>From the bug history, this looks like an old bug that was fixed in
Ubuntu (Bionic or cosmic?) a while ago, then upstreamed to linux-stable,
then brought back to disco and eoan.
The bug itself was not opened against eoan or disco, and so I don't
think re-verification is needed on those 2 series.
Thanks @adconrad
This is the only outstanding issue for Xenial. I think we can wait
another day or so before we have to make a final decision. I'll wait
until tomorrow and then mark it as verified if you haven't already done
so by then.
--
You received this bug notification because you are a mem
While there may be arguments for synthesizing UUIDs in various fs
drivers, or creating them in the first place in fs-creation tools, I
agree that if overlayfs has a hard dependency on UUIDs for uniquely
identifying layers, it needs to fill in the gaps where the previous
tools/drivers failed to prov
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a me
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1849021
Title:
xenial/linux-oracle: 4
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1849022
Title:
bionic/linux-oracle: 4
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1849027
Title:
xenial/linux-azure: 4.1
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
These were skipped since they've already been applied:
* arm64: dts: qcom: Add Lenovo Miix 630
* arm64: dts: qcom: Add HP Envy x2
* arm64: dts: qcom: Add Asus NovaGo TP370QL
* rtw88: Fix misuse of GENMASK macro
* s390/pci: fix MSI message data
* thunderbolt: Correct path indices for PCIe tunnel
*
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1849019
Title:
bionic/linux-kvm: 4.15.0-
These patches were skipped as they have already been applied:
* ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()
* rtlwifi: Fix potential overflow on P2P code
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ub
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1849016
Title:
bionic/linux-aws: 4.15.0-
Just love the way launchpad mangles pasted code.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1824407
Title:
remount of multilower moved pivoted-root overlayfs root, results in
I/O e
blkid
/dev/nvme0n1p1: LABEL="ESP" UUID="B407-D3BC" TYPE="vfat" PARTLABEL="EFI
system partition" PARTUUID="fb8a1f92-fbd6-4ce2-ade4-0a11bdbaf74b"
ah, but that UUID is actually fat serial number / volume-id
Sets the volume ID of the newly created filesystem; VOLUME-ID is a
32-bit hexadecimal numbe
I was thinking of a more generalized overlayfs solution that detects if
file systems don't initialize the superblock uuid and overlayfs
improvises by generating the internal overlayfs uuid, something like:
diff --git a/fs/overlayfs/copy_up.c b/fs/overlayfs/copy_up.c
index 698d112bdb17..da3faaf68d6
There is mkfs-time of the filesystem superblock, which could be
converted to a timebased UUID.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1824407
Title:
remount of multilower moved p
I think kernel already generates some faked up UUIDs, i.e. i think there
is something for like FAT and DOS partition table, either fs uuid, or
like partition table uuid, partition uuid, partition type uuid, some
such.
They are "shorter" than normal, and less unique, but at least something.
Should
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
1 - 100 of 167 matches
Mail list logo