[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
This bug was fixed in the package linux-gke - 6.8.0-1038.43
---
linux-gke (6.8.0-1038.43) noble; urgency=medium
* noble/linux-gke: 6.8.0-1038.43 -proposed tracker (LP: #2125362)
* sources list generation using dwarfdump takes up to 0.5hr in build process
(LP: #2104911)
- [Packaging] gke: Don't generate list of source files
* Fix HLT logic execution for TDX VMs (LP: #2112602)
- x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT
* Add SVSM vTPM support for AMD SEV-SNP confidential VMs (LP: #2111956)
- x86/irqflags: Provide native versions of the local_irq_save()/restore()
- x86/sev: Rename snp_init() in boot/compressed/sev.c
- x86/sev: Make the VMPL0 checking more straight forward
- x86/sev: Shorten struct name snp_secrets_page_layout to snp_secrets_page
- x86/sev: Check for the presence of an SVSM in the SNP secrets page
- x86/sev: Use kernel provided SVSM Calling Areas
- x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
- x86/sev: Use the SVSM to create a vCPU when not in VMPL0
- x86/sev: Provide SVSM discovery support
- x86/sev: Provide guest VMPL level to userspace
- virt: sev-guest: Choose the VMPCK key based on executing VMPL
- sev-guest: configfs-tsm: Allow the privlevel_floor attribute to be
updated
- fs/configfs: Add a callback to determine attribute visibility
- x86/sev: Take advantage of configfs visibility support in TSM
- x86/sev: Extend the config-fs attestation support for an SVSM
- x86/sev: Allow non-VMPL0 execution when an SVSM is present
- x86/sev: Move SEV compilation units
- Documentation/ABI/configfs-tsm: Fix an unexpected indentation silly
- tpm: Make chip->{status,cancel,req_canceled} opt
- x86/sev: Add SVSM vTPM probe/send_command functions
- svsm: Add header with SVSM_VTPM_CMD helpers
- tpm: Add SNP SVSM vTPM driver
- x86/sev: Register tpm-svsm platform device
- [Config] gke: Make tpm_svsm built-in
[ Ubuntu: 6.8.0-86.87 ]
* noble/linux: 6.8.0-86.87 -proposed tracker (LP: #2125391)
- Fix FTBS caused by incorrect pick/backport of
"perf dso: fix dso__is_kallsyms() check"
* noble ubuntu_ftrace_smoke_test:mmiotrace timeout on aws:r5.metal
(LP: #2121673)
- mm: memcg: add NULL check to obj_cgroup_put()
- memcg: drain obj stock on cpu hotplug teardown
* [25.04 FEAT] [post announcement] [KRN2304] CPU-MF Counters for new IBM Z
hardware - perf part (LP: #2103415)
- perf list: Add IBM z17 event descriptions
* memory leaks when configuring a small rate limit in audit (LP: #2122554)
- audit: fix skb leak when audit rate limit is exceeded
* [UBUNTU 24.04] PAI/NNPA support for new IBM z17 (LP: #2121956)
- s390/pai: export number of sysfs attribute files
- s390/pai_crypto: Add support for MSA 10 and 11 pai counters
- s390/pai_ext: Update PAI extension 1 counters
* [UBUNTU 24.04] s390/pci: Don't abort recovery for user-space drivers
(LP: #2121150)
- s390/pci: Allow automatic recovery with minimal driver support
* [UBUNTU 24.04] s390/pci: Fix stale function handles in error handling
(LP: #2121149)
- s390/pci: Fix stale function handles in error handling
- s390/pci: Do not try re-enabling load/store if device is disabled
* [UBUNTU 24.04] vfio/pci: fix 8-byte PCI loads and stores (LP: #2121146)
- vfio/pci: Extract duplicated code into macro
- vfio/pci: Support 8-byte PCI loads and stores
- vfio/pci: Fix typo in macro to declare accessors
* x86 systems with PCIe BAR addresses located outside a certain range see
P2PDMA allocation failures and CUDA initialization errors (LP: #2120209)
- x86/kaslr: Reduce KASLR entropy on most x86 systems
- x86/mm/init: Handle the special case of device private pages in
add_pages(), to not increase max_pfn and trigger
dma_addressing_limited() bounce buffers
* sources list generation using dwarfdump takes up to 0.5hr in build process
(LP: #2104911)
- [Packaging] Don't generate list of source files
* [SRU] Apparmor: Unshifted uids for hardlinks and unix sockets in user
namespaces (LP: #2121257)
- apparmor: shift ouid when mediating hard links in userns
- apparmor: shift uid when mediating af_unix in userns
* UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:452:16
(LP: #2119713)
- EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller
* [IdeaPad Slim 5 13ARP10 , 83J2] Microphone on AMD Ryzen 7 7735HS does not
work (LP: #2102749)
- ASoC: amd: yc: update quirk data for new Lenovo model
* Fix compilation failure because of incomplete backport (LP: #2120561)
- SAUCE: netfilter: ctnetlink: Fix -Wuninitialized in
ctnetlink_secctx_size()
* Noble update: upstream stable patchset 2025-09-01 (LP: #2121716)
- x86/mm/pat: cpa-test: fix length for CPA_ARRAY test
- cpufreq: scpi: compare kHz instead of Hz
- smack: dont compile
[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
** Also affects: linux-gke (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-gke (Ubuntu Oracular)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602
Title:
Fix HLT logic execution for TDX VMs
Status in linux-gcp package in Ubuntu:
New
Status in linux-gke package in Ubuntu:
New
Status in linux-gcp source package in Noble:
Fix Released
Status in linux-gke source package in Noble:
New
Status in linux-gcp source package in Oracular:
Fix Released
Bug description:
SRU Justification
[Impact]
Google has requested a backport of the following commits:
22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
Targets include 6.8 onwards.
[Fix]
Backport the patches as needed to noble:linux-gcp and later kernels.
[Test plan]
Compile and boot test. Verification on Google's side is optional as this is a
fairly isolated backport.
[Where problems could occur]
This fix affects TDX guest VMs which call the HLT instruction. An issue with
this fix would be visible to the user as unexpected #VEs (virtualization
exceptions) or unexpected interrupt behavior in their TDX guest VM.
[Other]
SF #00412211
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
This bug is awaiting verification that the linux-gcp-
fips/6.8.0-1035.37+fips1 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-noble-linux-gcp-fips' to
'verification-done-noble-linux-gcp-fips'. If the problem still exists,
change the tag 'verification-needed-noble-linux-gcp-fips' to
'verification-failed-noble-linux-gcp-fips'.
If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.
See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!
** Tags added: kernel-spammed-noble-linux-gcp-fips-v2
verification-needed-noble-linux-gcp-fips
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602
Title:
Fix HLT logic execution for TDX VMs
Status in linux-gcp package in Ubuntu:
New
Status in linux-gcp source package in Noble:
Fix Released
Status in linux-gcp source package in Oracular:
Fix Released
Bug description:
SRU Justification
[Impact]
Google has requested a backport of the following commits:
22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
Targets include 6.8 onwards.
[Fix]
Backport the patches as needed to noble:linux-gcp and later kernels.
[Test plan]
Compile and boot test. Verification on Google's side is optional as this is a
fairly isolated backport.
[Where problems could occur]
This fix affects TDX guest VMs which call the HLT instruction. An issue with
this fix would be visible to the user as unexpected #VEs (virtualization
exceptions) or unexpected interrupt behavior in their TDX guest VM.
[Other]
SF #00412211
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
This bug was fixed in the package linux-gcp - 6.8.0-1033.35 --- linux-gcp (6.8.0-1033.35) noble; urgency=medium * noble/linux-gcp: 6.8.0-1033.35 -proposed tracker (LP: #2114640) * linux-gcp: NVIDIA Grace platform support (LP: #2111859) - arm64: tlb: Improve __TLBI_VADDR_RANGE() - arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES - arm64/io: Provide a WC friendly __iowriteXX_copy() - net: hns3: Remove io_stop_wc() calls after __iowrite64_copy() - PCI: Clear Secondary Status errors after enumeration - coresight: Remove unused ETM Perf stubs - coresight: Clarify comments around the PID of the sink owner - coresight: Move struct coresight_trace_id_map to common header - coresight: Expose map arguments in trace ID API - coresight: Make CPU id map a property of a trace ID map - coresight: Make language around "activated" sinks consistent - coresight: Remove ops callback checks - coresight: Move mode to struct coresight_device - coresight: Remove the 'enable' field. - coresight: Move all sysfs code to sysfs file - coresight: Remove atomic type from refcnt - coresight: Remove unused stubs - coresight: Add explicit member initializers to coresight_dev_type - coresight: Add helper for atomically taking the device - coresight: Add a helper for getting csdev->mode - coresight: Use per-sink trace ID maps for Perf sessions - coresight: Remove pending trace ID release mechanism - coresight: Emit sink ID in the HW_ID packets - coresight: Make trace ID map spinlock local to the map - perf auxtrace: Allow number of queues to be specified - perf cs-etm: Print error for new PERF_RECORD_AUX_OUTPUT_HW_ID versions - perf arm-spe/cs-etm: Directly iterate CPU maps - perf cs-etm: Use struct perf_cpu as much as possible - perf cs-etm: Create decoders after both AUX and HW_ID search passes - perf: cs-etm: Allocate queues for all CPUs - perf: cs-etm: Move traceid_list to each queue - perf: cs-etm: Create decoders based on the trace ID mappings - perf: cs-etm: Only save valid trace IDs into files - perf: cs-etm: Support version 0.1 of HW_ID packets - perf: cs-etm: Print queue number in raw trace dump - PCI: Use downstream bridges for distributing resources - PCI/DOE: Support discovery version 2 - cppc_cpufreq: Remove HiSilicon CPPC workaround - ACPI/HMAT: Move HMAT messages to pr_debug() - Fix mmu notifiers for range-based invalidates - perf arm-spe: Rename arm_spe__synth_data_source_generic() - perf arm-spe: Rename the common data source encoding - perf arm-spe: Support metadata version 2 - perf arm-spe: Introduce arm_spe__is_homogeneous() - perf arm-spe: Use metadata to decide the data source feature - perf arm-spe: Remove the unused 'midr' field - perf arm-spe: Add Neoverse-V2 to common data source encoding list - perf arm-spe: Add Cortex CPUs to common data source encoding list - perf: arm_cspmu: nvidia: remove unsupported SCF events - perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc - perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering - perf: arm_cspmu: nvidia: monitor all ports by default - arm64: amu: Delay allocating cpumask for AMU FIE support - arch_topology: init capacity_freq_ref to 0 - cpufreq: Allow arch_freq_get_on_cpu to return an error - cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry - arm64: Provide an AMU-based version of arch_freq_get_on_cpu - arm64: Update AMU-based freq scale factor on entering idle - arm64: Utilize for_each_cpu_wrap for reference lookup - [Packaging] gcp: enable CONFIG_CPUFREQ_ARCH_CUR_FREQ - [Packaging] gcp: enable CONFIG_ARM64_CONTPTE - x86: Stop using weak symbols for __iowrite32_copy() - s390: Implement __iowrite32_copy() - s390: Stop using weak symbols for __iowrite64_copy() - perf arm-spe: Define metadata header version 2 - tools/include: Sync arm64 headers with the kernel sources - arm64/io: add constant-argument check - perf cs-etm: Fix the assert() to handle captured and unprocessed cpu trace - perf arm-spe: Use old behavior when opening old SPE files - mm: make folio_pte_batch available outside of mm/memory.c - mm: fix folio_pte_batch() on XEN PV * backport arm64 THP improvements from 6.9 (LP: #2059316) // linux-gcp: NVIDIA Grace platform support (LP: #2111859) - arm64/mm: make set_ptes() robust when OAs cross 48-bit boundary - arm/pgtable: define PFN_PTE_SHIFT - nios2/pgtable: define PFN_PTE_SHIFT - powerpc/pgtable: define PFN_PTE_SHIFT - riscv/pgtable: define PFN_PTE_SHIFT - s390/pgtable: define PFN_PTE_SHIFT - sparc/pgtable: define PFN_PTE_SHIFT - mm/pgtable: make pte_next_pfn() independent of set_ptes() - arm/mm: use pte_next_pfn() in set_ptes() - powerpc/mm: use pte_next_pfn() in set_ptes()
[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
This bug was fixed in the package linux-gcp - 6.11.0-1017.17
---
linux-gcp (6.11.0-1017.17) oracular; urgency=medium
* oracular/linux-gcp: 6.11.0-1017.17 -proposed tracker (LP: #2114290)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
* Fix HLT logic execution for TDX VMs (LP: #2112602)
- x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT
[ Ubuntu: 6.11.0-29.29 ]
* oracular/linux: 6.11.0-29.29 -proposed tracker (LP: #2114305)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- [Packaging] update annotations scripts
* CVE-2025-37890
- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child
qdisc
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
* raid1: Fix NULL pointer dereference in process_checks() (LP: #2112519)
- md/raid1: Add check for missing source disk in process_checks()
* CVE-2025-37798
- sch_htb: make htb_qlen_notify() idempotent
- sch_htb: make htb_deactivate() idempotent
- sch_drr: make drr_qlen_notify() idempotent
- sch_hfsc: make hfsc_qlen_notify() idempotent
- sch_qfq: make qfq_qlen_notify() idempotent
- sch_ets: make est_qlen_notify() idempotent
- codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
* CVE-2025-37997
- netfilter: ipset: fix region locking in hash types
-- Ian Whitfield Wed, 25 Jun 2025
13:26:12 -0700
** Changed in: linux-gcp (Ubuntu Oracular)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37798
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37890
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37997
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602
Title:
Fix HLT logic execution for TDX VMs
Status in linux-gcp package in Ubuntu:
New
Status in linux-gcp source package in Noble:
Fix Committed
Status in linux-gcp source package in Oracular:
Fix Released
Bug description:
SRU Justification
[Impact]
Google has requested a backport of the following commits:
22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
Targets include 6.8 onwards.
[Fix]
Backport the patches as needed to noble:linux-gcp and later kernels.
[Test plan]
Compile and boot test. Verification on Google's side is optional as this is a
fairly isolated backport.
[Where problems could occur]
This fix affects TDX guest VMs which call the HLT instruction. An issue with
this fix would be visible to the user as unexpected #VEs (virtualization
exceptions) or unexpected interrupt behavior in their TDX guest VM.
[Other]
SF #00412211
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
This bug is awaiting verification that the linux-gcp/6.11.0-1017.17
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-oracular-linux-gcp' to 'verification-done-
oracular-linux-gcp'. If the problem still exists, change the tag
'verification-needed-oracular-linux-gcp' to 'verification-failed-
oracular-linux-gcp'.
If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.
See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!
** Tags added: kernel-spammed-oracular-linux-gcp-v2
verification-needed-oracular-linux-gcp
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602
Title:
Fix HLT logic execution for TDX VMs
Status in linux-gcp package in Ubuntu:
New
Status in linux-gcp source package in Noble:
Fix Committed
Status in linux-gcp source package in Oracular:
Fix Committed
Bug description:
SRU Justification
[Impact]
Google has requested a backport of the following commits:
22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
Targets include 6.8 onwards.
[Fix]
Backport the patches as needed to noble:linux-gcp and later kernels.
[Test plan]
Compile and boot test. Verification on Google's side is optional as this is a
fairly isolated backport.
[Where problems could occur]
This fix affects TDX guest VMs which call the HLT instruction. An issue with
this fix would be visible to the user as unexpected #VEs (virtualization
exceptions) or unexpected interrupt behavior in their TDX guest VM.
[Other]
SF #00412211
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
** No longer affects: linux-gcp (Ubuntu Plucky) ** Description changed: SRU Justification [Impact] - Google has requested a backport of the following patchset: - https://lore.kernel.org/all/[email protected]/ + Google has requested a backport of the following commits: + 22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT") + 9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs") Targets include 6.8 onwards. [Fix] - Backport the three patches in that patchset, as needed, to noble:linux-gcp, oracular:linux-gcp, and plucky:linux-gcp. + Backport the patches as needed to noble:linux-gcp and later kernels. [Test plan] Compile and boot test. Verification on Google's side is optional as this is a fairly isolated backport. [Where problems could occur] This fix affects TDX guest VMs which call the HLT instruction. An issue with this fix would be visible to the user as unexpected #VEs (virtualization exceptions) or unexpected interrupt behavior in their TDX guest VM. [Other] SF #00412211 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/2112602 Title: Fix HLT logic execution for TDX VMs Status in linux-gcp package in Ubuntu: New Status in linux-gcp source package in Noble: New Status in linux-gcp source package in Oracular: New Bug description: SRU Justification [Impact] Google has requested a backport of the following commits: 22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT") 9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs") Targets include 6.8 onwards. [Fix] Backport the patches as needed to noble:linux-gcp and later kernels. [Test plan] Compile and boot test. Verification on Google's side is optional as this is a fairly isolated backport. [Where problems could occur] This fix affects TDX guest VMs which call the HLT instruction. An issue with this fix would be visible to the user as unexpected #VEs (virtualization exceptions) or unexpected interrupt behavior in their TDX guest VM. [Other] SF #00412211 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs
** Also affects: linux-gcp (Ubuntu Noble) Importance: Undecided Status: New ** Also affects: linux-gcp (Ubuntu Oracular) Importance: Undecided Status: New ** Also affects: linux-gcp (Ubuntu Plucky) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/2112602 Title: Fix HLT logic execution for TDX VMs Status in linux-gcp package in Ubuntu: New Status in linux-gcp source package in Noble: New Status in linux-gcp source package in Oracular: New Status in linux-gcp source package in Plucky: New Bug description: SRU Justification [Impact] Google has requested a backport of the following patchset: https://lore.kernel.org/all/[email protected]/ Targets include 6.8 onwards. [Fix] Backport the three patches in that patchset, as needed, to noble:linux-gcp, oracular:linux-gcp, and plucky:linux-gcp. [Test plan] Compile and boot test. Verification on Google's side is optional as this is a fairly isolated backport. [Where problems could occur] This fix affects TDX guest VMs which call the HLT instruction. An issue with this fix would be visible to the user as unexpected #VEs (virtualization exceptions) or unexpected interrupt behavior in their TDX guest VM. [Other] SF #00412211 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

