[Bug 1860681] Re: Xenial update: 4.4.211 upstream stable release

2020-01-23 Thread Connor Kuehl
The following commits were skipped as they have already been applied:

* rsi: add fix for crash during assertions  
* mm/page_alloc.c: calculate 'available' memory in a separate function 

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * hidraw: Return EPOLLOUT from hidraw_poll
+ * HID: hidraw: Fix returning EPOLLOUT from hidraw_poll
+ * HID: hidraw, uhid: Always report EPOLLOUT
+ * cfg80211/mac80211: make ieee80211_send_layer2_update a public function
+ * mac80211: Do not send Layer 2 Update frame before authorization
+ * media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
+ * p54usb: Fix race between disconnect and firmware loading
+ * ALSA: line6: Fix write on zero-sized buffer
+ * ALSA: line6: Fix memory leak at line6_init_pcm() error path
+ * xen: let alloc_xenballooned_pages() fail if not enough memory free
+ * wimax: i2400: fix memory leak
+ * wimax: i2400: Fix memory leak in i2400m_op_rfkill_sw_toggle
+ * ext4: fix use-after-free race with debug_want_extra_isize
+ * ext4: add more paranoia checking in ext4_expand_extra_isize handling
+ * dccp: Fix memleak in __feat_register_sp
+ * rtc: mt6397: fix alarm register overwrite
+ * iommu: Remove device link to group on failure
+ * gpio: Fix error message on out-of-range GPIO in lookup table
+ * hsr: reset network header when supervision frame is created
+ * cifs: Adjust indentation in smb2_open_file
+ * RDMA/srpt: Report the SCSI residual to the initiator
+ * scsi: enclosure: Fix stale device oops with hot replug
+ * scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI
+ * platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0
+ * iio: imu: adis16480: assign bias value only if operation succeeded
+ * mei: fix modalias documentation
+ * clk: samsung: exynos5420: Preserve CPU clocks configuration during 
suspend/resume
+ * compat_ioctl: handle SIOCOUTQNSD
+ * tty: serial: imx: use the sg count from dma_map_sg
+ * tty: serial: pch_uart: correct usage of dma_unmap_sg
+ * media: exynos4-is: Fix recursive locking in isp_video_release()
+ * spi: atmel: fix handling of cs_change set on non-last xfer
+ * rtlwifi: Remove unnecessary NULL check in rtl_regd_init
+ * rtc: msm6242: Fix reading of 10-hour digit
+ * rseq/selftests: Turn off timeout setting
+ * hexagon: work around compiler crash
+ * ocfs2: call journal flush to mark journal as empty after journal recovery 
when mount
+ * ALSA: seq: Fix racy access for queue timer in proc read
+ * Fix built-in early-load Intel microcode alignment
+ * block: fix an integer overflow in logical block size
+ * USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx
+ * USB: serial: opticon: fix control-message timeouts
+ * USB: serial: suppress driver bind attributes
+ * USB: serial: ch341: handle unbound port at reset_resume
+ * USB: serial: io_edgeport: add missing active-port sanity check
+ * USB: serial: quatech2: handle unbound ports
+ * scsi: mptfusion: Fix double fetch bug in ioctl
+ * usb: core: hub: Improved device recognition on remote wakeup
+ * x86/efistub: Disable paging at mixed mode entry
+ * mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio()
+ * net: stmmac: 16KB buffer must be 16 byte aligned
+ * net: stmmac: Enable 16KB buffer size
+ * USB: serial: io_edgeport: use irqsave() in USB's complete callback
+ * USB: serial: io_edgeport: handle unbound ports on URB completion
+ * USB: serial: keyspan: handle unbound ports
+ * scsi: fnic: use kernel's '%pM' format option to print MAC
+ * scsi: fnic: fix invalid stack access
+ * arm64: dts: agilex/stratix10: fix pmu interrupt numbers
+ * netfilter: fix a use-after-free in mtype_destroy()
+ * batman-adv: Fix DAT candidate selection on little endian systems
+ * macvlan: use skb_reset_mac_header() in macvlan_queue_xmit()
+ * r8152: add missing endpoint sanity check
+ * tcp: fix marked lost packets not being retransmitted
+ * net: usb: lan78xx: limit size of local TSO packets
+ * xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk
+ * cw1200: 

[Bug 1860690] Re: Smartpqi updates for 18.04.4

2020-01-23 Thread Connor Kuehl
** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Jeff Lane (bladernr)

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1860690

Title:
  Smartpqi updates for 18.04.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860690/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1860681] [NEW] Xenial update: 4.4.211 upstream stable release

2020-01-23 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.211 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1860681

Title:
  Xenial update: 4.4.211 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860681/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1850540] Re: multi-zone raid0 corruption

2020-01-23 Thread Connor Kuehl
** Changed in: linux (Ubuntu Trusty)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1850540

Title:
  multi-zone raid0 corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/1850540/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1858625] Re: trusty/linux: 3.13.0-176.227 -proposed tracker

2020-01-22 Thread Connor Kuehl
** Summary changed:

- trusty/linux:  -proposed tracker
+ trusty/linux: 3.13.0-176.227 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858625

Title:
  trusty/linux: 3.13.0-176.227 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858625/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859865] Re: Xenial update: 4.4.210 upstream stable release

2020-01-16 Thread Connor Kuehl
The following commits were skipped as they have already been applied:

* kobject: Export kobject_get_unless_zero()
* mwifiex: fix possible heap overflow in mwifiex_process_country_ie() 

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * chardev: Avoid potential use-after-free in 'chrdev_open()'
+ * usb: chipidea: host: Disable port power only if previously enabled
+ * ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5
+ * kernel/trace: Fix do not unregister tracepoints when register 
sched_migrate_task fail
+ * tracing: Have stack tracer compile when MCOUNT_INSN_SIZE is not defined
+ * HID: Fix slab-out-of-bounds read in hid_field_extract
+ * HID: uhid: Fix returning EPOLLOUT from uhid_char_poll
+ * HID: hid-input: clear unmapped usages
+ * Input: add safety guards to input_set_keycode()
+ * drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ
+ * can: gs_usb: gs_usb_probe(): use descriptors of current altsetting
+ * can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling 
to irq mode
+ * can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing 
CAN sk_buffs
+ * staging: vt6656: set usb_set_intfdata on driver fail.
+ * USB: serial: option: add ZLP support for 0x1bc7/0x9010
+ * usb: musb: Disable pullup at init
+ * usb: musb: dma: Correct parameter passed to IRQ handler
+ * staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21
+ * tty: link tty and port before configuring it as console
+ * tty: always relink the port
+ * mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
+ * scsi: bfa: release allocated memory in case of error
+ * rtl8xxxu: prevent leaking urb
+ * USB: Fix: Don't skip endpoint descriptors with maxpacket=0
+ * netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
+ * netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
+ * drm/i915/gen9: Clear residual context state on context switch
+ * Linux 4.4.210
+ * UBUNTU: upstream stable to v4.4.210
  
-4.4.210 upstream stable release
-from git://git.kernel.org/
+    4.4.210 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859865

Title:
  Xenial update: 4.4.210 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859865/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859819] Re: bionic/linux-azure-5.3: 5.3.0-1010.11~18.04.1 -proposed tracker

2020-01-15 Thread Connor Kuehl
** Summary changed:

- bionic/linux-azure-5.3:  -proposed tracker
+ bionic/linux-azure-5.3: 5.3.0-1010.11~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859819

Title:
  bionic/linux-azure-5.3: 5.3.0-1010.11~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1859819/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859865] [NEW] Xenial update: 4.4.210 upstream stable release

2020-01-15 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.210 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859865

Title:
  Xenial update: 4.4.210 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859865/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859820] Re: eoan/linux-azure: 5.3.0-1010.11 -proposed tracker

2020-01-15 Thread Connor Kuehl
** Summary changed:

- eoan/linux-azure:  -proposed tracker
+ eoan/linux-azure: 5.3.0-1010.11 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859820

Title:
  eoan/linux-azure: 5.3.0-1010.11 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1859820/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859795] Re: bionic/linux-aws: 4.15.0-1058.60 -proposed tracker

2020-01-15 Thread Connor Kuehl
** Summary changed:

- bionic/linux-aws:  -proposed tracker
+ bionic/linux-aws: 4.15.0-1058.60 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859795

Title:
  bionic/linux-aws: 4.15.0-1058.60 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1859795/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859640] Re: Xenial update: 4.4.209 upstream stable release

2020-01-15 Thread Connor Kuehl
Note, the following commit was skipped because it has already been
applied:

* Revert "perf report: Add warning when libunwind not compiled in"

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * PM / devfreq: Don't fail devfreq_dev_release if not in list
+ * RDMA/cma: add missed unregister_pernet_subsys in init failure
+ * scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func
+ * scsi: qla2xxx: Don't call qlt_async_event twice
+ * scsi: iscsi: qla4xxx: fix double free in probe
+ * scsi: libsas: stop discovering if oob mode is disconnected
+ * usb: gadget: fix wrong endpoint desc
+ * md: raid1: check rdev before reference in raid1_sync_request func
+ * s390/cpum_sf: Adjust sampling interval to avoid hitting sample limits
+ * s390/cpum_sf: Avoid SBD overflow condition in irq handler
+ * xen/balloon: fix ballooned page accounting without hotplug enabled
+ * xfs: fix mount failure crash on invalid iclog memory access
+ * taskstats: fix data-race
+ * ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code
+ * MIPS: Avoid VDSO ABI breakage due to global register variable
+ * locks: print unsigned ino in /proc/locks
+ * dmaengine: Fix access to uninitialized dma_slave_caps
+ * compat_ioctl: block: handle Persistent Reservations
+ * gpiolib: fix up emulated open drain outputs
+ * ALSA: cs4236: fix error return comparison of an unsigned integer
+ * ftrace: Avoid potential division by zero in function profiler
+ * Bluetooth: btusb: fix PM leak in error case of setup
+ * Bluetooth: delete a stray unlock
+ * tty: serial: msm_serial: Fix lockup for sysrq and oops
+ * drm/mst: Fix MST sideband up-reply failure handling
+ * powerpc/pseries/hvconsole: Fix stack overread via udbg
+ * ath9k_htc: Modify byte order for an error message
+ * ath9k_htc: Discard undersized packets
+ * net: add annotations on hh->hh_len lockless accesses
+ * s390/smp: fix physical to logical CPU map for SMT
+ * locking/x86: Remove the unused atomic_inc_short() methd
+ * pstore/ram: Write new dumps to start of recycled zones
+ * locking/spinlock/debug: Fix various data races
+ * netfilter: ctnetlink: netns exit must wait for callbacks
+ * ARM: vexpress: Set-up shared OPP table instead of individual for each CPU
+ * netfilter: uapi: Avoid undefined left-shift in xt_sctp.h
+ * ARM: dts: am437x-gp/epos-evm: fix panel compatible
+ * powerpc: Ensure that swiotlb buffer is allocated from low memory
+ * bnx2x: Do not handle requests from VFs after parity
+ * bnx2x: Fix logic to get total no. of PFs per engine
+ * net: usb: lan78xx: Fix error message format specifier
+ * rfkill: Fix incorrect check to avoid NULL pointer dereference
+ * ASoC: wm8962: fix lambda value
+ * regulator: rn5t618: fix module aliases
+ * kconfig: don't crash on NULL expressions in expr_eq()
+ * parisc: Fix compiler warnings in debug_core.c
+ * llc2: Fix return statement of llc_stat_ev_rx_null_dsap_xid_c (and _test_c)
+ * net: stmmac: dwmac-sunxi: Allow all RGMII modes
+ * net: usb: lan78xx: fix possible skb leak
+ * pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
+ * sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY
+ * tcp: fix "old stuff" D-SACK causing SACK to be treated as D-SACK
+ * vlan: vlan_changelink() should propagate errors
+ * vlan: fix memory leak in vlan_dev_set_egress_priority
+ * vxlan: fix tos value before xmit
+ * macvlan: do not assume mac_header is set in macvlan_broadcast()
+ * USB: core: fix check for duplicate endpoints
+ * USB: serial: option: add Telit ME910G1 0x110a composition
+ * Linux 4.4.209
+ * UBUNTU: upstream stable to v4.4.209
  
-4.4.209 upstream stable release
-from git://git.kernel.org/
+    4.4.209 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859640

Title:
  Xenial update: 4.4.209 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859640/+subscriptions

-- 

[Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-14 Thread Connor Kuehl
https://lists.ubuntu.com/archives/kernel-team/2020-January/106863.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856603/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-14 Thread Connor Kuehl
It looks like the version of this routine is Xenial is not impacted
since it hasn't received this refactor patch which constrains the
allocation to 16 bytes: 03b5929ebb20 ("nvme: rewrite discard support").
I will remove the Xenial nomination.

** Description changed:

+ [Impact]
+ 
+ Discard requests can fail on a non-compliant nvme device meaning that
+ prescribed maintenance use of fstrim will be unsuccessful and unused
+ blocks are no longer properly disposed of.
+ 
+ [Test case]
+ 
+ Run fstrim (from bug report, ran as root: fstrim -v /)
+ 
+ Expected result: "/: 758.3 GiB (814159003648 bytes) trimmed" -- will
+ vary depending on the blocks that are unused for your system
+ 
+ Unpatched actual result: "fstrim: /: FITRIM ioctl failed: Input/output
+ error"
+ 
+ [Regression Potential]
+ 
+ This patch only increases the size of a memory allocation and does not
+ add any changes in logic for error handling or normal flow of control.
+ This routine already handles the case where the memory allocation fails.
+ Because of this, it is a low risk change.
+ 
+ Original bug description below:
+ --
+ 
  /dev/nvme0n1 Sabrent Rocket 4.0 1TB firmware RKT401.1
  
  on Ubuntu 19.10 with an ASRock 300 Deskmini motherboard and a Ryzen
  3400G CPU. The filesystem is ext4:
  
  Linux elemental 5.3.0-24-generic #26-Ubuntu SMP Thu Nov 14 01:33:18 UTC
  2019 x86_64 x86_64 x86_64 GNU/Linux
  
  UUID=c1812230-91be-4a18-8055-c3b7c82fbbd8 / ext4 defaults 0 0
  /dev/nvme0n1p2 on / type ext4 (rw,relatime)
  
  When I run fstrim -v / as root, I get the following error message at the
  command line:
  
  seth@elemental:~$ sudo fstrim -v /
  fstrim: /: FITRIM ioctl failed: Input/output error
  
  and the following kernel messages are logged:
  
  [ 136.309115] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x0 flags=0x]
  [ 136.309129] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x700 flags=0x]
  [ 136.309139] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x680 flags=0x]
  [ 136.309150] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x300 flags=0x]
  [ 136.309162] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x200 flags=0x]
  [ 136.309171] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x580 flags=0x]
  [ 136.309180] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x100 flags=0x]
  [ 136.309189] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x400 flags=0x]
  [ 136.309198] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x380 flags=0x]
  [ 136.309207] nvme :01:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT 
domain=0x address=0x780 flags=0x]
  [ 136.309216] amd_iommu_report_page_fault: 1 callbacks suppressed
  [ 136.309218] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x180 flags=0x]
  [ 136.309228] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x500 flags=0x]
  [ 136.309238] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x480 flags=0x]
  [ 136.309250] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x280 flags=0x]
  [ 136.309259] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x600 flags=0x]
  [ 136.309269] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x80 flags=0x]
  [ 136.309279] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x980 flags=0x]
  [ 136.309291] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x900 flags=0x]
  [ 136.309301] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0x880 flags=0x]
  [ 136.309311] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 
domain=0x address=0xa00 flags=0x]
  [ 136.309762] blk_update_request: I/O error, dev nvme0n1, sector 1141976 op 
0x3:(DISCARD) flags 0x800 phys_seg 1 prio class 0
  
- 
- I have tried setting iommu passthrough on boot but this doesn’t seem to help:
+ I have tried setting iommu passthrough on boot but this doesn’t seem to
+ help:
  
  GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=pt avic=1”
  
  This is possibly related to:
  
  https://bugzilla.kernel.org/show_bug.cgi?id=202665
  
http://git.infradead.org/nvme.git/commitdiff/530436c45ef2e446c12538a400e465929a0b3ade?hp=400b6a7b13a3fd71cff087139ce45dd1e5fff444

** No longer affects: linux (Ubuntu Xenial)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

To manage notifications about this bug go to:

[Bug 1859640] Re: Xenial update: 4.4.209 upstream stable release

2020-01-14 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859640

Title:
  Xenial update: 4.4.209 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859640/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1859640] [NEW] Xenial update: 4.4.209 upstream stable release

2020-01-14 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.209 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859640

Title:
  Xenial update: 4.4.209 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859640/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856608] Re: [Regression] usb usb2-port2: Cannot enable. Maybe the USB cable is bad?

2020-01-08 Thread Connor Kuehl
** Changed in: linux (Ubuntu Eoan)
   Status: Incomplete => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856608

Title:
  [Regression] usb usb2-port2: Cannot enable. Maybe the USB cable is
  bad?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856608/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1858955] [NEW] bionic/linux-raspi2: -proposed tracker

2020-01-08 Thread Connor Kuehl
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
kernel-stable-master-bug: 1858956
packages:
  main: linux-raspi2
  meta: linux-meta-raspi2
phase: Holding before Packaging
phase-changed: Wednesday, 08. January 2020 23:22 UTC
reason:
  prepare-package: Holding -- waiting for master bug
trackers:
  bionic/linux-raspi2/pi-kernel: bug 1858954
variant: debs

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Invalid

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux-raspi2 (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-raspi2 (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.12.02-12 kernel-sru-derivative-of-1858956

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: bionic kernel-release-tracking-bug

** Also affects: linux-raspi2 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux-raspi2 (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
  

[Bug 1858956] [NEW] bionic/linux: -proposed tracker

2020-01-08 Thread Connor Kuehl
Public bug reported:

This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
packages:
  lrm: linux-restricted-modules
  main: linux
  meta: linux-meta
  signed: linux-signed
phase: Ready for Packaging
phase-changed: Wednesday, 08. January 2020 23:22 UTC
reason:
  prepare-package: Pending -- version not specified
trackers:
  bionic/linux-raspi2: bug 1858955
  bionic/linux/pc-kernel: bug 1858952
  bionic/linux/pc-lowlatency-kernel: bug 1858953
variant: debs

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Confirmed

** Affects: kernel-sru-workflow/prepare-package-lrm
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Bionic)
 Importance: Medium
 Status: Confirmed


** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live 
kernel-sru-cycle-2019.12.02-12

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-lrm
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Tags added: bionic kernel-release-tracking-bug

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => 

[Bug 1858943] Re: eoan/linux: 5.3.0-27.29 -proposed tracker

2020-01-08 Thread Connor Kuehl
** Summary changed:

- eoan/linux:  -proposed tracker
+ eoan/linux: 5.3.0-27.29 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858943

Title:
  eoan/linux: 5.3.0-27.29 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858943/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1858798] Re: tools/perf fails to build after Xenial update to 4.4.208 upstream stable release

2020-01-08 Thread Connor Kuehl
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858798

Title:
  tools/perf fails to build after Xenial update to 4.4.208 upstream
  stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858798/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1858594] Re: xenial/linux: 4.4.0-172.202 -proposed tracker

2020-01-08 Thread Connor Kuehl
** Summary changed:

- xenial/linux: 4.4.0-172.201 -proposed tracker
+ xenial/linux: 4.4.0-172.202 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Released => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: Fix Released => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858594

Title:
  xenial/linux: 4.4.0-172.202 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858594/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1858594] Re: xenial/linux: 4.4.0-172.201 -proposed tracker

2020-01-07 Thread Connor Kuehl
** Summary changed:

- xenial/linux:  -proposed tracker
+ xenial/linux: 4.4.0-172.201 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858594

Title:
  xenial/linux: 4.4.0-172.201 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858594/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-07 Thread Connor Kuehl
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** No longer affects: fstrim (Ubuntu)

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux (Ubuntu Disco)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

** No longer affects: fstrim (Ubuntu Xenial)

** No longer affects: fstrim (Ubuntu Bionic)

** No longer affects: fstrim (Ubuntu Disco)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856603/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856603] Re: fstrim on nvme / AMD CPU fails and produces kernel error messages

2020-01-07 Thread Connor Kuehl
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: fstrim (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

** No longer affects: fstrim (Ubuntu Eoan)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856603

Title:
  fstrim on nvme / AMD CPU fails and produces kernel error messages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fstrim/+bug/1856603/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1858462] Re: Xenial update: 4.4.208 upstream stable release

2020-01-06 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * btrfs: do not leak reloc root if we fail to read the fs root
+ * btrfs: handle ENOENT in btrfs_uuid_tree_iterate
+ * ALSA: hda/ca0132 - Keep power on during processing DSP response
+ * ALSA: hda/ca0132 - Avoid endless loop
+ * drm: mst: Fix query_payload ack reply struct
+ * iio: light: bh1750: Resolve compiler warning and make code more readable
+ * spi: Add call to spi_slave_abort() function when spidev driver is released
+ * staging: rtl8188eu: fix possible null dereference
+ * rtlwifi: prevent memory leak in rtl_usb_probe
+ * IB/iser: bound protection_sg size by data_sg size
+ * media: am437x-vpfe: Setting STD to current value is not an error
+ * media: i2c: ov2659: fix s_stream return value
+ * media: i2c: ov2659: Fix missing 720p register config
+ * media: ov6650: Fix stored frame format not in sync with hardware
+ * tools/power/cpupower: Fix initializer override in hsw_ext_cstates
+ * usb: renesas_usbhs: add suspend event support in gadget mode
+ * hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled
+ * regulator: max8907: Fix the usage of uninitialized variable in 
max8907_regulator_probe()
+ * media: flexcop-usb: fix NULL-ptr deref in flexcop_usb_transfer_init()
+ * samples: pktgen: fix proc_cmd command result check logic
+ * mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
+ * media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format
+ * media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence 
number
+ * media: ti-vpe: vpe: Make sure YUYV is set as default format
+ * extcon: sm5502: Reset registers during initialization
+ * x86/mm: Use the correct function type for native_set_fixmap()
+ * perf report: Add warning when libunwind not compiled in
+ * iio: adc: max1027: Reset the device at probe time
+ * Bluetooth: hci_core: fix init for HCI_USER_CHANNEL
+ * drm/gma500: fix memory disclosures due to uninitialized bytes
+ * x86/ioapic: Prevent inconsistent state when moving an interrupt
+ * arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill()
+ * libata: Ensure ata_port probe has completed before detach
+ * pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B
+ * bnx2x: Fix PF-VF communication over multi-cos queues.
+ * spi: img-spfi: fix potential double release
+ * rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt()
+ * perf probe: Fix to find range-only function instance
+ * perf probe: Fix to list probe event with correct line number
+ * perf probe: Walk function lines in lexical blocks
+ * perf probe: Fix to probe an inline function which has no entry pc
+ * perf probe: Fix to show ranges of variables in functions without entry_pc
+ * perf probe: Fix to show inlined function callsite without entry_pc
+ * perf probe: Skip overlapped location on searching variables
+ * perf probe: Return a better scope DIE if there is no best scope
+ * perf probe: Fix to show calling lines of inlined functions
+ * perf probe: Skip end-of-sequence and non statement lines
+ * perf probe: Filter out instances except for inlined subroutine and 
subprogram
+ * ath10k: fix get invalid tx rate for Mesh metric
+ * media: pvrusb2: Fix oops on tear-down when radio support is not present
+ * media: si470x-i2c: add missed operations in remove
+ * EDAC/ghes: Fix grain calculation
+ * spi: pxa2xx: Add missed security checks
+ * ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile
+ * parport: load lowlevel driver if ports not found
+ * cpufreq: Register drivers only after CPU devices have been registered
+ * x86/crash: Add a forward declaration of struct kimage
+ * spi: tegra20-slink: add missed clk_unprepare
+ * btrfs: don't prematurely free work in end_workqueue_fn()
+ * iwlwifi: check kasprintf() return value
+ * fbtft: Make sure string is NULL terminated
+ * crypto: sun4i-ss - Fix 64-bit size_t warnings on sun4i-ss-hash.c
+ * crypto: vmx - Avoid weird build failures
+ * libtraceevent: Fix memory leakage in copy_filter_type
+ * net: phy: initialise phydev speed and duplex sanely
+ * Revert "mmc: sdhci: Fix 

[Bug 1858489] Re: Xenial update: 4.4.207 upstream stable release

2020-01-06 Thread Connor Kuehl
Note the following patches were skipped as they were already applied:   


* CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks   
* crypto: user - fix memory leak in crypto_report   

The following patch was reverted in favor of its upstream stable
version:

* KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID
(CVE-2019-19332

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * x86/apic/32: Avoid bogus LDR warnings
+ * usb: gadget: u_serial: add missing port entry locking
+ * tty: serial: msm_serial: Fix flow control
+ * x86/PCI: Avoid AMD FCH XHCI USB PME# from D0 defect
+ * serial: serial_core: Perform NULL checks for break_ctl ops
+ * serial: ifx6x60: add missed pm_runtime_disable
+ * autofs: fix a leak in autofs_expire_indirect()
+ * NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error
+ * Input: cyttsp4_core - fix use after free bug
+ * ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed()
+ * rsxx: add missed destroy_workqueue calls in remove
+ * net: ep93xx_eth: fix mismatch of request_mem_region in remove
+ * serial: core: Allow processing sysrq at port unlock time
+ * iwlwifi: mvm: Send non offchannel traffic via AP sta
+ * ARM: 8813/1: Make aligned 2-byte getuser()/putuser() atomic on ARMv6+
+ * extcon: max8997: Fix lack of path setting in USB device mode
+ * clk: rockchip: fix rk3188 sclk_smc gate data
+ * clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering
+ * dlm: fix missing idr_destroy for recover_idr
+ * MIPS: SiByte: Enable ZONE_DMA32 for LittleSur
+ * scsi: zfcp: drop default switch case which might paper over missing case
+ * pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues
+ * Staging: iio: adt7316: Fix i2c data reading, set the data field
+ * regulator: Fix return value of _set_load() stub
+ * MIPS: OCTEON: octeon-platform: fix typing
+ * math-emu/soft-fp.h: (_FP_ROUND_ZERO) cast 0 to void to fix warning
+ * rtc: max8997: Fix the returned value in case of error in 
'max8997_rtc_read_alarm()'
+ * rtc: dt-binding: abx80x: fix resistance scale
+ * ARM: dts: exynos: Use Samsung SoC specific compatible for DWC2 module
+ * dmaengine: coh901318: Fix a double-lock bug
+ * dmaengine: coh901318: Remove unused variable
+ * ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion()
+ * dma-mapping: fix return type of dma_set_max_seg_size()
+ * altera-stapl: check for a null key before strcasecmp'ing it
+ * serial: imx: fix error handling in console_setup
+ * i2c: imx: don't print error message on probe defer
+ * dlm: NULL check before kmem_cache_destroy is not needed
+ * nfsd: fix a warning in __cld_pipe_upcall()
+ * ARM: OMAP1/2: fix SoC name printing
+ * net/x25: fix called/calling length calculation in x25_parse_address_block
+ * net/x25: fix null_x25_address handling
+ * ARM: dts: mmp2: fix the gpio interrupt cell number
+ * tcp: fix off-by-one bug on aborting window-probing socket
+ * modpost: skip ELF local symbols during section mismatch check
+ * kbuild: fix single target build for external module
+ * ARM: dts: pxa: clean up USB controller nodes
+ * dlm: fix invalid cluster name warning
+ * powerpc/math-emu: Update macros from GCC
+ * MIPS: OCTEON: cvmx_pko_mem_debug8: use oldest forward compatible definition
+ * nfsd: Return EPERM, not EACCES, in some SETATTR cases
+ * mlx4: Use snprintf instead of complicated strcpy
+ * ARM: dts: sunxi: Fix PMU compatible strings
+ * sched/fair: Scale bandwidth quota and period without losing quota/period 
ratio precision
+ * fuse: verify nlink
+ * fuse: verify attributes
+ * ALSA: pcm: oss: Avoid potential buffer overflows
+ * Input: goodix - add upside-down quirk for Teclast X89 tablet
+ * CIFS: Fix SMB2 oplock break processing
+ * tty: vt: keyboard: reject invalid keycodes
+ * can: slcan: Fix use-after-free Read in slcan_open
+ * jbd2: Fix possible overflow in jbd2_log_space_left()
+ * drm/i810: Prevent underflow in ioctl
+ * KVM: x86: do not modify masked 

[Bug 1858489] [NEW] Xenial update: 4.4.207 upstream stable release

2020-01-06 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.207 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858489

Title:
  Xenial update: 4.4.207 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858489/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1858462] [NEW] Xenial update: 4.4.208 upstream stable release

2020-01-06 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.208 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858462

Title:
  Xenial update: 4.4.208 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858462/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853791] Re: External microphone can't work on some dell machines with the codec alc256 or alc236

2019-12-19 Thread Connor Kuehl
Hey Hui,

Do you have access to a machine that you can use to verify that this bug
is fixed by the kernel in -proposed?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853791

Title:
  External microphone can't work on some dell machines with the codec
  alc256 or alc236

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1853791/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1850195] Re: Update EFA driver to 1.5.0

2019-12-19 Thread Connor Kuehl
** Description changed:

- Version 1.4.1 of the EFA driver has been tagged: https://github.com/amzn
+ Version 1.5.0 of the EFA driver has been tagged: https://github.com/amzn
  /amzn-drivers/releases/tag/efa_linux_1.5.0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1850195

Title:
  Update EFA driver to 1.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1850195/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856870] Re: Eoan update: 5.3.18 upstream stable release

2019-12-18 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * inet: protect against too small mtu values.
+ * mqprio: Fix out-of-bounds access in mqprio_dump
+ * net: bridge: deny dev_set_mac_address() when unregistering
+ * net: dsa: fix flow dissection on Tx path
+ * net: ethernet: ti: cpsw: fix extra rx interrupt
+ * net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues
+ * net: thunderx: start phy before starting autonegotiation
+ * net/tls: Fix return values to avoid ENOTSUPP
+ * openvswitch: support asymmetric conntrack
+ * tcp: md5: fix potential overestimation of TCP option space
+ * tipc: fix ordering of tipc module init and exit routine
+ * net/mlx5e: Query global pause state before setting prio2buffer
+ * net: ipv6: add net argument to ip6_dst_lookup_flow
+ * net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
+ * tcp: fix rejected syncookies due to stale timestamps
+ * tcp: tighten acceptance of ACKs not matching a child socket
+ * tcp: Protect accesses to .ts_recent_stamp with {READ,WRITE}_ONCE()
+ * gre: refetch erspan header from skb->data after pskb_may_pull()
+ * Fixed updating of ethertype in function skb_mpls_pop
+ * hsr: fix a NULL pointer dereference in hsr_dev_xmit()
+ * net: Fixed updating of ethertype in skb_mpls_push()
+ * net/mlx5e: Fix TXQ indices to be sequential
+ * page_pool: do not release pool until inflight == 0.
+ * xdp: obtain the mem_id mutex before trying to remove an entry.
+ * Linux 5.3.18
+ * UBUNTU: upstream stable to v5.3.18
  
-5.3.18 upstream stable release
-from git://git.kernel.org/
+    5.3.18 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856870

Title:
  Eoan update: 5.3.18 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856870/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856869] Re: Eoan update: 5.3.17 upstream stable release

2019-12-18 Thread Connor Kuehl
Please note I:

* Reverted the UBUNTU SAUCE version of "ovl: fix lookup failure on multi lower 
squashfs" in favor of the upstream stable version

   
* Reverted the UBUNTU SAUCE version of "seccomp: avoid overflow in implicit 
constant conversion" in favor of the upstream stable version

   
* Reverted the UBUNTU SAUCE version of "mfd: rk808: Fix RK818 ID template" in 
favor of the upstream stable version

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856869

Title:
  Eoan update: 5.3.17 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856869/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856869] Re: Eoan update: 5.3.17 upstream stable release

2019-12-18 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel
+ * net/mlx4_en: fix mlx4 ethtool -N insertion
+ * net/mlx4_en: Fix wrong limitation for number of TX rings
+ * net: rtnetlink: prevent underflows in do_setvfinfo()
+ * net/sched: act_pedit: fix WARN() in the traffic path
+ * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key
+ * sfc: Only cancel the PPS workqueue if it exists
+ * net/mlxfw: Verify FSM error code translation doesn't exceed array size
+ * net/mlx5e: Fix set vf link state error flow
+ * net/mlx5: Fix auto group size calculation
+ * net/tls: enable sk_msg redirect to tls socket egress
+ * ipv6/route: return if there is no fib_nh_gw_family
+ * taprio: don't reject same mqprio settings
+ * net/ipv4: fix sysctl max for fib_multipath_hash_policy
+ * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6
+ * net/mlx5e: Do not use non-EXT link modes in EXT mode
+ * net/mlx5: Update the list of the PCI supported devices
+ * vhost/vsock: split packets to send using multiple buffers
+ * gpio: max77620: Fixup debounce delays
+ * gpio: bd70528: Use correct unit for debounce times
+ * tools: gpio: Correctly add make dependencies for gpio_utils
+ * fork: fix pidfd_poll()'s return type
+ * nbd:fix memory leak in nbd_get_socket()
+ * virtio_console: allocate inbufs in add_port() only if it is needed
+ * virtio_ring: fix return code on DMA mapping fails
+ * virtio_balloon: fix shrinker count
+ * Revert "fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()"
+ * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span()
+ * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node()
+ * drm/amdgpu: disable gfxoff when using register read interface
+ * drm/amdgpu: disable gfxoff on original raven
+ * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs
+ * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs
+ * drm/i915/pmu: "Frequency" is reported as accumulated cycles
+ * drm/i915/userptr: Try to acquire the page lock around set_page_dirty()
+ * Bluetooth: Fix invalid-free in bcsp_close()
+ * ath10k: restore QCA9880-AR1A (v1) detection
+ * ath10k: Fix HOST capability QMI incompatibility
+ * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe
+ * ath9k_hw: fix uninitialized variable data
+ * Revert "Bluetooth: hci_ll: set operational frequency earlier"
+ * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues"
+ * md/raid10: prevent access of uninitialized resync_pages offset
+ * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n
+ * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary
+ * x86/insn: Fix awk regexp warnings
+ * x86/speculation: Fix incorrect MDS/TAA mitigation status
+ * x86/speculation: Fix redundant MDS mitigation message
+ * nbd: prevent memory leak
+ * gve: fix dma sync bug where not all pages synced
+ * x86/stackframe/32: Repair 32-bit Xen PV
+ * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout
+ * x86/xen/32: Simplify ring check in xen_iret_crit_fixup()
+ * x86/doublefault/32: Fix stack canaries in the double fault handler
+ * x86/pti/32: Size initial_page_table correctly
+ * x86/cpu_entry_area: Add guard page for entry stack on 32bit
+ * x86/entry/32: Fix IRET exception
+ * x86/entry/32: Use %ss segment where required
+ * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL
+ * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry
+ * x86/entry/32: Fix NMI vs ESPFIX
+ * selftests/x86/mov_ss_trap: Fix the SYSENTER test
+ * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel
+ * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make 
the CPU_ENTRY_AREA_PAGES assert precise
+ * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3
+ * futex: Prevent robust futex exit race
+ * ALSA: usb-audio: Fix NULL dereference at parsing BADD
+ * nfc: port100: handle command failure cleanly
+ * media: vivid: Set 

[Bug 1856869] [NEW] Eoan update: 5.3.17 upstream stable release

2019-12-18 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.17 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856869

Title:
  Eoan update: 5.3.17 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856869/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856870] [NEW] Eoan update: 5.3.18 upstream stable release

2019-12-18 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.18 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856870

Title:
  Eoan update: 5.3.18 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856870/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856359] Re: EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions")

2019-12-13 Thread Connor Kuehl
It looks like Eoan already has this commit: https://git.launchpad.net
/~canonical-kernel/ubuntu/+source/linux-
aws/+git/eoan/commit/?id=f95be3d28d891b0c0f339a504e3aa8e382bbd9a6

And Xenial and Bionic don't appear to have 0ede73bc012c ("IB/uverbs:
Extend uverbs_ioctl header with driver_id") and therefore don't need the
additional commit that wires into it.

** Changed in: linux-aws (Ubuntu Eoan)
   Status: In Progress => Invalid

** Changed in: linux-aws (Ubuntu Bionic)
   Status: In Progress => Invalid

** Changed in: linux-aws (Ubuntu Xenial)
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856359

Title:
  EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related
  definitions")

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1856359/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856359] [NEW] EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related definitions")

2019-12-13 Thread Connor Kuehl
Public bug reported:

For kernels that contain: 0ede73bc012c ("IB/uverbs: Extend uverbs_ioctl
header with driver_id"), then the EFA driver should be integrated for
enumeration with: f95be3d28d89 ("RDMA: Add EFA related definitions")

** Affects: linux-aws (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux-aws (Ubuntu Xenial)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Affects: linux-aws (Ubuntu Bionic)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Affects: linux-aws (Ubuntu Disco)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Affects: linux-aws (Ubuntu Eoan)
 Importance: Medium
     Assignee: Connor Kuehl (connork)
 Status: In Progress

** Also affects: linux-aws (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: linux-aws (Ubuntu)
   Status: In Progress => Invalid

** Changed in: linux-aws (Ubuntu)
   Importance: Medium => Undecided

** Changed in: linux-aws (Ubuntu)
 Assignee: Connor Kuehl (connork) => (unassigned)

** Changed in: linux-aws (Ubuntu Xenial)
     Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Bionic)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Disco)
     Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

** Changed in: linux-aws (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux-aws (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux-aws (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux-aws (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux-aws (Ubuntu Xenial)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856359

Title:
  EFA backport is missing commit f95be3d28d89 ("RDMA: Add EFA related
  definitions")

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1856359/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856334] Re: Eoan update: 5.3.16 upstream stable release

2019-12-13 Thread Connor Kuehl
Note:   

* The UBUNTU SAUCE version of "ALSA: hda: Add Cometlake-S PCI ID" was reverted  
  in favor of its upstream stable version.  

* "x86/PCI: Avoid AMD FCH XHCI USB PME# from D0 defect" was already applied.
   

* The UBUNTU SAUCE version of "ALSA: hda/realtek - Dell headphone has noise on 
unmute for ALC236"
  was reverted in favor of its upstream stable version. 

* "crypto: user - fix memory leak in crypto_reportstat" was already applied.


* "Fix an error message in raid0_make_request()" addresses a WARN statement that
  does not exist and was skipped.

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * rsi: release skb if rsi_prepare_beacon fails
+ * arm64: tegra: Fix 'active-low' warning for Jetson TX1 regulator
+ * perf scripts python: exported-sql-viewer.py: Fix use of TRUE with SQLite
+ * sparc64: implement ioremap_uc
+ * lp: fix sparc64 LPSETTIMEOUT ioctl
+ * time: Zero the upper 32-bits in __kernel_timespec on 32-bit
+ * usb: gadget: u_serial: add missing port entry locking
+ * tty: serial: fsl_lpuart: use the sg count from dma_map_sg
+ * tty: serial: msm_serial: Fix flow control
+ * serial: pl011: Fix DMA ->flush_buffer()
+ * serial: serial_core: Perform NULL checks for break_ctl ops
+ * serial: stm32: fix clearing interrupt error flags
+ * serial: ifx6x60: add missed pm_runtime_disable
+ * aio: Fix io_pgetevents() struct __compat_aio_sigset layout
+ * autofs: fix a leak in autofs_expire_indirect()
+ * MIPS: SGI-IP27: fix exception handler replication
+ * RDMA/hns: Correct the value of HNS_ROCE_HEM_CHUNK_LEN
+ * RDMA/hns: Correct the value of srq_desc_size
+ * iwlwifi: pcie: don't consider IV len in A-MSDU
+ * cgroup: don't put ERR_PTR() into fc->root
+ * exportfs_decode_fh(): negative pinned may become positive without the 
parent locked
+ * audit_get_nd(): don't unlock parent too early
+ * ecryptfs: fix unlink and rmdir in face of underlying fs modifications
+ * Revert "UBUNTU: SAUCE: ALSA: hda: Add Cometlake-S PCI ID"
+ * ALSA: hda: Add Cometlake-S PCI ID
+ * NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error
+ * xfrm: release device reference for invalid state
+ * block: check bi_size overflow before merge
+ * Input: cyttsp4_core - fix use after free bug
+ * sched/core: Avoid spurious lock dependencies
+ * sched/pelt: Fix update of blocked PELT ordering
+ * perf/core: Consistently fail fork on allocation failures
+ * ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed()
+ * x86/resctrl: Fix potential lockdep warning
+ * drm/sun4i: tcon: Set min division of TCON0_DCLK to 1.
+ * selftests: kvm: fix build with glibc >= 2.30
+ * rbd: silence bogus uninitialized warning in rbd_object_map_update_finish()
+ * rsxx: add missed destroy_workqueue calls in remove
+ * ravb: implement MTU change while device is up
+ * net: hns3: reallocate SSU' buffer size when pfc_en changes
+ * net: hns3: fix ETS bandwidth validation bug
+ * afs: Fix race in commit bulk status fetch
+ * net: ep93xx_eth: fix mismatch of request_mem_region in remove
+ * i2c: core: fix use after free in of_i2c_notify
+ * io_uring: transform send/recvmsg() -ERESTARTSYS to -EINTR
+ * fuse: verify nlink
+ * fuse: verify attributes
+ * io_uring: ensure req->submit is copied when req is deferred
+ * SUNRPC: Avoid RPC delays when exiting suspend
+ * ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC
+ * ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop
+ * Revert "UBUNTU: SAUCE: ALSA: hda/realtek - Dell headphone has noise on 
unmute for ALC236"
+ * ALSA: 

[Bug 1856334] [NEW] Eoan update: 5.3.16 upstream stable release

2019-12-13 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.16 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856334

Title:
  Eoan update: 5.3.16 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856334/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1850195] Re: Update EFA driver to 1.5.0

2019-12-12 Thread Connor Kuehl
** Summary changed:

- Update EFA driver to 1.4.1
+ Update EFA driver to 1.5.0

** Description changed:

  Version 1.4.1 of the EFA driver has been tagged: https://github.com/amzn
- /amzn-drivers/releases/tag/efa_linux_1.4.1
+ /amzn-drivers/releases/tag/efa_linux_1.5.0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1850195

Title:
  Update EFA driver to 1.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1850195/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1817721] Re: autopkgtest success rate in Bionic reached an unusable amount

2019-12-10 Thread Connor Kuehl
I'm seeing the "upstream" test suite fail in Eoan as well:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
/autopkgtest-eoan/eoan/ppc64el/s/systemd/20191206_074525_b4418@/log.gz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1817721

Title:
  autopkgtest success rate in Bionic reached an unusable amount

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1817721/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1855313] Re: Xenial update: 4.4.206 upstream stable release

2019-12-05 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * ASoC: compress: fix unsigned integer overflow check
+ * ASoC: kirkwood: fix external clock probe defer
+ * clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume
+ * reset: fix reset_control_ops kerneldoc comment
+ * can: peak_usb: report bus recovery as well
+ * can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open
+ * scripts/gdb: fix debugging modules compiled with hot/cold partitioning
+ * block: drbd: remove a stray unlock in __drbd_send_protocol()
+ * scsi: lpfc: Fix dif and first burst use in write commands
+ * ARM: debug-imx: only define DEBUG_IMX_UART_PORT if needed
+ * ARM: dts: imx53-voipac-dmm-668: Fix memory node duplication
+ * parisc: Fix serio address output
+ * parisc: Fix HP SDC hpa address output
+ * arm64: smp: Handle errors reported by the firmware
+ * PM / AVS: SmartReflex: NULL check before some freeing functions is not 
needed
+ * ARM: ks8695: fix section mismatch warning
+ * ACPI / LPSS: Ignore acpi_device_fix_up_power() return value
+ * crypto: user - support incremental algorithm dumps
+ * mwifiex: fix potential NULL dereference and use after free
+ * mwifiex: debugfs: correct histogram spacing, formatting
+ * rtl818x: fix potential use after free
+ * xfs: require both realtime inodes to mount
+ * ubi: Put MTD device after it is not used
+ * ubi: Do not drop UBI device reference before using
+ * microblaze: adjust the help to the real behavior
+ * microblaze: move "... is ready" messages to arch/microblaze/Makefile
+ * gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB
+ * VSOCK: bind to random port for VMADDR_PORT_ANY
+ * btrfs: only track ref_heads in delayed_ref_updates
+ * xen/pciback: Check dev_data before using it
+ * KVM: s390: unregister debug feature on failing arch init
+ * pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration
+ * pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10
+ * HID: doc: fix wrong data structure reference for UHID_OUTPUT
+ * gfs2: take jdata unstuff into account in do_grow
+ * xfs: Align compat attrlist_by_handle with native implementation.
+ * IB/qib: Fix an error code in qib_sdma_verbs_send()
+ * powerpc/book3s/32: fix number of bats in p/v_block_mapped()
+ * powerpc/xmon: fix dump_segments()
+ * drivers/regulator: fix a missing check of return value
+ * serial: max310x: Fix tx_empty() callback
+ * openrisc: Fix broken paths to arch/or32
+ * RDMA/srp: Propagate ib_post_send() failures to the SCSI mid-layer
+ * scsi: qla2xxx: deadlock by configfs_depend_item
+ * scsi: csiostor: fix incorrect dma device in case of vport
+ * ath6kl: Only use match sets when firmware supports it
+ * ath6kl: Fix off by one error in scan completion
+ * powerpc/prom: fix early DEBUG messages
+ * powerpc/mm: Make NULL pointer deferences explicit on bad page faults.
+ * powerpc/44x/bamboo: Fix PCI range
+ * drbd: reject attach of unsuitable uuids even if connected
+ * drbd: fix print_st_err()'s prototype to match the definition
+ * regulator: tps65910: fix a missing check of return value
+ * net/net_namespace: Check the return value of register_pernet_subsys()
+ * um: Make GCOV depend on !KCOV
+ * net: stmicro: fix a missing check of clk_prepare
+ * atl1e: checking the status of atl1e_write_phy_reg
+ * tipc: fix a missing check of genlmsg_put
+ * ocfs2: clear journal dirty flag after shutdown journal
+ * lib/genalloc.c: use vzalloc_node() to allocate the bitmap
+ * lib/genalloc.c: include vmalloc.h
+ * mtd: Check add_mtd_device() ret code
+ * tipc: fix memory leak in tipc_nl_compat_publ_dump
+ * net/core/neighbour: tell kmemleak about hash tables
+ * net/core/neighbour: fix kmemleak minimal reference count for hash tables
+ * sfc: suppress duplicate nvmem partition types in efx_ef10_mtd_probe
+ * decnet: fix DN_IFREQ_SIZE
+ * tipc: fix skb may be leaky in tipc_link_input
+ * sfc: initialise found bitmap in efx_ef10_mtd_probe
+ * net: fix possible overflow in __sk_mem_raise_allocated()
+ * net: dev: Use unsigned integer as an argument to left-shift
+ * scsi: 

[Bug 1855313] Re: Xenial update: 4.4.206 upstream stable release

2019-12-05 Thread Connor Kuehl
Note that the following commit was skipped as it has already been
applied:

* "powerpc/pseries/dlpar: Fix a missing check in
dlpar_parse_cc_property()"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855313

Title:
  Xenial update: 4.4.206 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855313/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1855306] Re: Eoan update: 5.3.15 upstream stable release

2019-12-05 Thread Connor Kuehl
Note that the following patch was skipped as it's already been applied:

 * "xfrm: Fix memleak on xfrm state destroy"

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * io_uring: async workers should inherit the user creds
+ * net: separate out the msghdr copy from ___sys_{send,recv}msg()
+ * net: disallow ancillary data for __sys_{send,recv}msg_file()
+ * XArray: Fix xas_next() with a single entry at 0
+ * clk: meson: gxbb: let sar_adc_clk_div set the parent clock rate
+ * clk: at91: sam9x60: fix programmable clock
+ * thunderbolt: Read DP IN adapter first two dwords in one go
+ * thunderbolt: Fix lockdep circular locking depedency warning
+ * clocksource/drivers/mediatek: Fix error handling
+ * soundwire: intel: fix intel_register_dai PDI offsets and numbers
+ * ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX
+ * ASoC: compress: fix unsigned integer overflow check
+ * reset: Fix memory leak in reset_control_array_put()
+ * clk: samsung: exynos5433: Fix error paths
+ * clk: samsung: exynos542x: Move G3D subsystem clocks to its sub-CMU
+ * ASoC: kirkwood: fix external clock probe defer
+ * ASoC: kirkwood: fix device remove ordering
+ * arm64: dts: ls1028a: fix a compatible issue
+ * clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume
+ * pinctrl: cherryview: Allocate IRQ chip dynamic
+ * ARM: dts: imx6qdl-sabreauto: Fix storm of accelerometer interrupts
+ * soc: imx: gpc: fix initialiser format
+ * reset: fix reset_control_ops kerneldoc comment
+ * arm64: dts: imx8mm: fix compatible string for sdma
+ * ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data
+ * ASoC: ti: sdma-pcm: Add back the flags parameter for non standard dma names
+ * ASoC: rockchip: rockchip_max98090: Enable SHDN to fix headset detection
+ * clk: at91: avoid sleeping early
+ * clk: sunxi: Fix operator precedence in sunxi_divs_clk_setup
+ * clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18
+ * ARM: dts: sun8i-a83t-tbs-a711: Fix WiFi resume from suspend
+ * bpf: Allow narrow loads of bpf_sysctl fields with offset > 0
+ * samples/bpf: fix build by setting HAVE_ATTR_TEST to zero
+ * bpf: Change size to u64 for bpf_map_{area_alloc, charge_init}()
+ * powerpc/bpf: Fix tail call implementation
+ * idr: Fix idr_get_next_ul race with idr_remove
+ * idr: Fix integer overflow in idr_for_each_entry
+ * idr: Fix idr_alloc_u32 on 32-bit systems
+ * x86/resctrl: Prevent NULL pointer dereference when reading mondata
+ * arm64: dts: zii-ultra: fix ARM regulator GPIO handle
+ * fbdev: c2p: Fix link failure on non-inlining
+ * ASoC: hdac_hda: fix race in device removal
+ * clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call
+ * clk: ti: clkctrl: Fix failed to enable error with double udelay timeout
+ * net: fec: add missed clk_disable_unprepare in remove
+ * netfilter: ipset: Fix nla_policies to fully support NL_VALIDATE_STRICT
+ * bridge: ebtables: don't crash when using dnat target in output chains
+ * netfilter: nf_tables: bogus EOPNOTSUPP on basechain update
+ * netfilter: nf_tables_offload: skip EBUSY on chain update
+ * stacktrace: Don't skip first entry on noncurrent tasks
+ * can: peak_usb: report bus recovery as well
+ * can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open
+ * can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb 
mem leak
+ * can: rx-offload: can_rx_offload_offload_one(): do not increase the 
skb_queue beyond skb_queue_len_max
+ * can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on 
queue overflow or OOM
+ * can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate 
error value in case of errors
+ * can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error
+ * can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error
+ * can: flexcan: increase error counters if skb enqueueing via 
can_rx_offload_queue_sorted() fails
+ * x86/tsc: Respect tsc command line paraemeter for clocksource_tsc_early
+ * perf scripting engines: Iterate on tep event arrays directly
+ * can: mcp251x: 

[Bug 1855313] [NEW] Xenial update: 4.4.206 upstream stable release

2019-12-05 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.206 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855313

Title:
  Xenial update: 4.4.206 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855313/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1855306] [NEW] Eoan update: 5.3.15 upstream stable release

2019-12-05 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.15 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855306

Title:
  Eoan update: 5.3.15 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855306/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854801] Re: xenial/linux-aws-hwe: 4.15.0-1057.59~16.04.1 -proposed tracker

2019-12-05 Thread Connor Kuehl
** Summary changed:

- xenial/linux-aws-hwe:  -proposed tracker
+ xenial/linux-aws-hwe: 4.15.0-1057.59~16.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854801

Title:
  xenial/linux-aws-hwe: 4.15.0-1057.59~16.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854801/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854744] Re: eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker

2019-12-04 Thread Connor Kuehl
** Summary changed:

- eoan/linux-raspi2:  -proposed tracker
+ eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854744

Title:
  eoan/linux-raspi2: 5.3.0-1015.17 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854746] Re: eoan/linux-aws: 5.3.0-1009.10 -proposed tracker

2019-12-04 Thread Connor Kuehl
** Summary changed:

- eoan/linux-aws:  -proposed tracker
+ eoan/linux-aws: 5.3.0-1009.10 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854746

Title:
  eoan/linux-aws: 5.3.0-1009.10 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854746/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854857] Re: Xenial update: 4.4.205 upstream stable release

2019-12-04 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+  *Revert "sock: Reset dst when changing sk_mark via setsockopt"
+  *Linux 4.4.205
+  *UBUNTU: upstream stable to v4.4.205
  
-4.4.205 upstream stable release
-from git://git.kernel.org/
+    4.4.205 upstream stable release
+    from git://git.kernel.org/

** Description changed:

  SRU Justification
  
  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:
  
-  *Revert "sock: Reset dst when changing sk_mark via setsockopt"
-  *Linux 4.4.205
-  *UBUNTU: upstream stable to v4.4.205
+  * Revert "sock: Reset dst when changing sk_mark via setsockopt"
+  * Linux 4.4.205
+  * UBUNTU: upstream stable to v4.4.205
  
     4.4.205 upstream stable release
     from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854857

Title:
  Xenial update: 4.4.205 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854857/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854855] Re: Xenial update: 4.4.204 upstream stable release

2019-12-04 Thread Connor Kuehl
Please note the following commits were skipped since they are already
applied:

* platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from 
asus_nb_wmi
130,132d128
* powerpc/64s: support nospectre_v2 cmdline option
* powerpc/book3s64: Fix link stack flush on context switch
* KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * net/mlx4_en: fix mlx4 ethtool -N insertion
+ * sfc: Only cancel the PPS workqueue if it exists
+ * net/sched: act_pedit: fix WARN() in the traffic path
+ * net: rtnetlink: prevent underflows in do_setvfinfo()
+ * Revert "fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()"
+ * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node()
+ * asus-wmi: Create quirk for airplane_mode LED
+ * asus-wmi: Add quirk_no_rfkill_wapf4 for the Asus X456UF
+ * asus-wmi: Add quirk_no_rfkill for the Asus N552VW
+ * asus-wmi: Add quirk_no_rfkill for the Asus U303LB
+ * asus-wmi: Add quirk_no_rfkill for the Asus Z550MA
+ * platform/x86: asus-wmi: Filter buggy scan codes on ASUS Q500A
+ * platform/x86: asus-wmi: fix asus ux303ub brightness issue
+ * platform/x86: asus-wmi: Set specified XUSB2PR value for X550LB
+ * asus-wmi: provide access to ALS control
+ * platform/x86: asus-wmi: try to set als by default
+ * platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ
+ * platform/x86: asus-wmi: add SERIO_I8042 dependency
+ * mwifiex: Fix NL80211_TX_POWER_LIMITED
+ * ALSA: isight: fix leak of reference to firewire unit in error path of 
.probe callback
+ * printk: fix integer overflow in setup_log_buf()
+ * gfs2: Fix marking bitmaps non-full
+ * synclink_gt(): fix compat_ioctl()
+ * powerpc: Fix signedness bug in update_flash_db()
+ * powerpc/eeh: Fix use of EEH_PE_KEEP on wrong field
+ * brcmsmac: AP mode: update beacon when TIM changes
+ * spi: sh-msiof: fix deferred probing
+ * mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail
+ * btrfs: handle error of get_old_root
+ * gsmi: Fix bug in append_to_eventlog sysfs handler
+ * misc: mic: fix a DMA pool free failure
+ * amiflop: clean up on errors during setup
+ * scsi: ips: fix missing break in switch
+ * KVM/x86: Fix invvpid and invept register operand size in 64-bit mode
+ * scsi: isci: Use proper enumerated type in atapi_d2h_reg_frame_handler
+ * scsi: isci: Change sci_controller_start_task's return type to sci_status
+ * scsi: iscsi_tcp: Explicitly cast param in iscsi_sw_tcp_host_get_param
+ * clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk
+ * scsi: dc395x: fix dma API usage in srb_done
+ * scsi: dc395x: fix DMA API usage in sg_update_list
+ * net: fix warning in af_unix
+ * kprobes, x86/ptrace.h: Make regs_get_kernel_stack_nth() not fault on bad 
stack
+ * ALSA: i2c/cs8427: Fix int to char conversion
+ * macintosh/windfarm_smu_sat: Fix debug output
+ * USB: misc: appledisplay: fix backlight update_status return code
+ * SUNRPC: Fix a compile warning for cmpxchg64()
+ * atm: zatm: Fix empty body Clang warnings
+ * s390/perf: Return error when debug_register fails
+ * spi: omap2-mcspi: Set FIFO DMA trigger level to word length
+ * sparc: Fix parport build warnings.
+ * ceph: fix dentry leak in ceph_readdir_prepopulate
+ * rtc: s35390a: Change buf's type to u8 in s35390a_init
+ * mISDN: Fix type of switch control variable in ctrl_teimanager
+ * qlcnic: fix a return in qlcnic_dcb_get_capability()
+ * mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values
+ * mfd: max8997: Enale irq-wakeup unconditionally
+ * selftests/ftrace: Fix to test kprobe $comm arg only if available
+ * thermal: rcar_thermal: Prevent hardware access during system suspend
+ * sparc64: Rework xchg() definition to avoid warnings.
+ * fs/ocfs2/dlm/dlmdebug.c: fix a sleep-in-atomic-context bug in 
dlm_print_one_mle()
+ * mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock
+ * um: Make line/tty semantics use true write IRQ
+ * linux/bitmap.h: handle constant zero-size bitmaps correctly
+ * linux/bitmap.h: fix type 

[Bug 1854861] Re: Eoan update: 5.3.14 upstream stable release

2019-12-04 Thread Connor Kuehl
Note the following patches were skipped since they were already applied:

* powerpc/64s: support nospectre_v2 cmdline option
* powerpc/book3s64: Fix link stack flush on context switch
* KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854861

Title:
  Eoan update: 5.3.14 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854861/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854861] Re: Eoan update: 5.3.14 upstream stable release

2019-12-04 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel
+ * net/mlx4_en: fix mlx4 ethtool -N insertion
+ * net/mlx4_en: Fix wrong limitation for number of TX rings
+ * net: rtnetlink: prevent underflows in do_setvfinfo()
+ * net/sched: act_pedit: fix WARN() in the traffic path
+ * net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key
+ * sfc: Only cancel the PPS workqueue if it exists
+ * net/mlxfw: Verify FSM error code translation doesn't exceed array size
+ * net/mlx5e: Fix set vf link state error flow
+ * net/mlx5: Fix auto group size calculation
+ * net/tls: enable sk_msg redirect to tls socket egress
+ * ipv6/route: return if there is no fib_nh_gw_family
+ * taprio: don't reject same mqprio settings
+ * net/ipv4: fix sysctl max for fib_multipath_hash_policy
+ * net/mlx5e: Fix error flow cleanup in mlx5e_tc_tun_create_header_ipv4/6
+ * net/mlx5e: Do not use non-EXT link modes in EXT mode
+ * net/mlx5: Update the list of the PCI supported devices
+ * vhost/vsock: split packets to send using multiple buffers
+ * gpio: max77620: Fixup debounce delays
+ * gpio: bd70528: Use correct unit for debounce times
+ * tools: gpio: Correctly add make dependencies for gpio_utils
+ * fork: fix pidfd_poll()'s return type
+ * nbd:fix memory leak in nbd_get_socket()
+ * virtio_console: allocate inbufs in add_port() only if it is needed
+ * virtio_ring: fix return code on DMA mapping fails
+ * virtio_balloon: fix shrinker count
+ * Revert "fs: ocfs2: fix possible null-pointer dereferences in 
ocfs2_xa_prepare_entry()"
+ * mm/memory_hotplug: don't access uninitialized memmaps in shrink_zone_span()
+ * mm/ksm.c: don't WARN if page is still mapped in remove_stable_node()
+ * drm/amdgpu: disable gfxoff when using register read interface
+ * drm/amdgpu: disable gfxoff on original raven
+ * drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported ASICs
+ * drm/i915: Don't oops in dumb_create ioctl if we have no crtcs
+ * drm/i915/pmu: "Frequency" is reported as accumulated cycles
+ * drm/i915/userptr: Try to acquire the page lock around set_page_dirty()
+ * Bluetooth: Fix invalid-free in bcsp_close()
+ * ath10k: restore QCA9880-AR1A (v1) detection
+ * ath10k: Fix HOST capability QMI incompatibility
+ * ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe
+ * ath9k_hw: fix uninitialized variable data
+ * Revert "Bluetooth: hci_ll: set operational frequency earlier"
+ * Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues"
+ * md/raid10: prevent access of uninitialized resync_pages offset
+ * mdio_bus: Fix init if CONFIG_RESET_CONTROLLER=n
+ * ARM: 8904/1: skip nomap memblocks while finding the lowmem/highmem boundary
+ * x86/insn: Fix awk regexp warnings
+ * x86/speculation: Fix incorrect MDS/TAA mitigation status
+ * x86/speculation: Fix redundant MDS mitigation message
+ * nbd: prevent memory leak
+ * gve: fix dma sync bug where not all pages synced
+ * x86/stackframe/32: Repair 32-bit Xen PV
+ * x86/xen/32: Make xen_iret_crit_fixup() independent of frame layout
+ * x86/xen/32: Simplify ring check in xen_iret_crit_fixup()
+ * x86/doublefault/32: Fix stack canaries in the double fault handler
+ * x86/pti/32: Size initial_page_table correctly
+ * x86/cpu_entry_area: Add guard page for entry stack on 32bit
+ * x86/entry/32: Fix IRET exception
+ * x86/entry/32: Use %ss segment where required
+ * x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL
+ * x86/entry/32: Unwind the ESPFIX stack earlier on exception entry
+ * x86/entry/32: Fix NMI vs ESPFIX
+ * selftests/x86/mov_ss_trap: Fix the SYSENTER test
+ * selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel
+ * x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make 
the CPU_ENTRY_AREA_PAGES assert precise
+ * x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3
+ * futex: Prevent robust futex exit race
+ * ALSA: usb-audio: Fix NULL dereference at parsing BADD
+ * nfc: port100: handle command failure cleanly
+ * media: vivid: Set 

[Bug 1854776] Re: bionic/linux-gke-5.0: 5.0.0-1027.28~18.04.1 -proposed tracker

2019-12-04 Thread Connor Kuehl
** Summary changed:

- bionic/linux-gke-5.0:  -proposed tracker
+ bionic/linux-gke-5.0: 5.0.0-1027.28~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854776

Title:
  bionic/linux-gke-5.0: 5.0.0-1027.28~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854776/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854774] Re: bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker

2019-12-04 Thread Connor Kuehl
** Summary changed:

- bionic/linux-gcp:  -proposed tracker
+ bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854774

Title:
  bionic/linux-gcp: 5.0.0-1027.28~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854774/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854809] Re: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854809

Title:
  bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854809/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854809] Re: bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- bionic/linux-fips:  -proposed tracker
+ bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854809

Title:
  bionic/linux-fips: 4.15.0-1022.25 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854809/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854777] Re: disco/linux-gcp: 5.0.0-1027.28 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- disco/linux-gcp:  -proposed tracker
+ disco/linux-gcp: 5.0.0-1027.28 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854777

Title:
  disco/linux-gcp: 5.0.0-1027.28 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854777/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854781] Re: disco/linux-oracle: 5.0.0-1009.14 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- disco/linux-oracle:  -proposed tracker
+ disco/linux-oracle: 5.0.0-1009.14 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854781

Title:
  disco/linux-oracle: 5.0.0-1009.14 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854781/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854816] Re: xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- xenial/linux-gcp:  -proposed tracker
+ xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854816

Title:
  xenial/linux-gcp: 4.15.0-1051.54 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854816/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854778] Re: disco/linux-kvm: 5.0.0-1024.26 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- disco/linux-kvm:  -proposed tracker
+ disco/linux-kvm: 5.0.0-1024.26 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854778

Title:
  disco/linux-kvm: 5.0.0-1024.26 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854778/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854787] Re: bionic/linux-bluefield: 5.0.0-1007.17 -proposed tracker

2019-12-03 Thread Connor Kuehl
** Summary changed:

- bionic/linux-bluefield:  -proposed tracker
+ bionic/linux-bluefield: 5.0.0-1007.17 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854787

Title:
  bionic/linux-bluefield: 5.0.0-1007.17 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854787/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854835] Re: xenial/linux: 4.4.0-171.200 -proposed tracker

2019-12-02 Thread Connor Kuehl
** Summary changed:

- xenial/linux:  -proposed tracker
+ xenial/linux: 4.4.0-171.200 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854835

Title:
  xenial/linux: 4.4.0-171.200 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854835/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854861] [NEW] Eoan update: 5.3.14 upstream stable release

2019-12-02 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.14 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854861

Title:
  Eoan update: 5.3.14 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854861/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854857] [NEW] Xenial update: 4.4.205 upstream stable release

2019-12-02 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.205 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854857

Title:
  Xenial update: 4.4.205 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854857/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1854855] [NEW] Xenial update: 4.4.204 upstream stable release

2019-12-02 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.204 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854855

Title:
  Xenial update: 4.4.204 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854855/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853881] Re: Xenial update: 4.4.203 upstream stable release

2019-11-25 Thread Connor Kuehl
The following patch required offset adjustments:

x86/atomic: Fix smp_mb__{before,after}_atomic() 
- the changes to smp_mb__before_atomic and smp_mb__after_atomic had to be 
manually placed

The following patches were skipped since they have already been applied:

apparmor: fix uninitialized lsm_audit member
- Skipped as an equivalent patch has already been applied and it looks invasive 
to shape it into the stable version

apparmor: fix update the mtime of the profile file on replacement   
- Skipped as an equivalent patch has already been applied and it would be quite 
invasive to revert

apparmor: fix module parameters can be changed after policy is locked   
- Skipped as an equivalent patch has already been applied and it would be too 
invasive to revert and apply this.


** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * slip: Fix memory leak in slip_open error path
+ * ax88172a: fix information leak on short answers
+ * ALSA: usb-audio: Fix missing error check at mixer resolution test
+ * ALSA: usb-audio: not submit urb for stopped endpoint
+ * Input: ff-memless - kill timer in destroy()
+ * ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable
+ * ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either
+ * iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros
+ * mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm()
+ * mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup()
+ * mmc: sdhci-of-at91: fix quirk2 overwrite
+ * iio: dac: mcp4922: fix error handling in mcp4922_write_raw
+ * ALSA: pcm: signedness bug in snd_pcm_plug_alloc()
+ * ARM: dts: at91/trivial: Fix USART1 definition for at91sam9g45
+ * ALSA: seq: Do error checks at creating system ports
+ * gfs2: Don't set GFS2_RDF_UPTODATE when the lvb is updated
+ * ASoC: dpcm: Properly initialise hw->rate_max
+ * MIPS: BCM47XX: Enable USB power on Netgear WNDR3400v3
+ * ARM: dts: exynos: Fix sound in Snow-rev5 Chromebook
+ * i40e: use correct length for strncpy
+ * i40e: hold the rtnl lock on clearing interrupt scheme
+ * i40e: Prevent deleting MAC address from VF when set by PF
+ * ARM: dts: pxa: fix power i2c base address
+ * rtl8187: Fix warning generated when strncpy() destination length matches 
the sixe argument
+ * net: lan78xx: Bail out if lan78xx_get_endpoints fails
+ * ASoC: sgtl5000: avoid division by zero if lo_vag is zero
+ * ath10k: wmi: disable softirq's while calling ieee80211_rx
+ * mips: txx9: fix iounmap related issue
+ * of: make PowerMac cache node search conditional on CONFIG_PPC_PMAC
+ * ARM: dts: omap3-gta04: give spi_lcd node a label so that we can overwrite 
in other DTS files
+ * ARM: dts: omap3-gta04: tvout: enable as display1 alias
+ * ARM: dts: omap3-gta04: make NAND partitions compatible with recent U-Boot
+ * ARM: dts: omap3-gta04: keep vpll2 always on
+ * dmaengine: dma-jz4780: Further residue status fix
+ * signal: Always ignore SIGKILL and SIGSTOP sent to the global init
+ * signal: Properly deliver SIGILL from uprobes
+ * signal: Properly deliver SIGSEGV from x86 uprobes
+ * scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir()
+ * ARM: imx6: register pm_power_off handler if "fsl,pmic-stby-poweroff" is set
+ * scsi: pm80xx: Corrected dma_unmap_sg() parameter
+ * scsi: pm80xx: Fixed system hang issue during kexec boot
+ * kprobes: Don't call BUG_ON() if there is a kprobe in use on free list
+ * nvmem: core: return error code instead of NULL from nvmem_device_get
+ * media: fix: media: pci: meye: validate offset to avoid arbitrary access
+ * ALSA: intel8x0m: Register irq handler after register initializations
+ * pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map()
+ * llc: avoid blocking in 

[Bug 1853882] Re: Eoan update: 5.3.13 upstream stable release

2019-11-25 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
+ * block, bfq: deschedule empty bfq_queues not referred by any process
+ * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
+ * mm/memory_hotplug: fix updating the node span
+ * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
+ * fbdev: Ditch fb_edid_add_monspecs
+ * Linux 5.3.13
+ * UBUNTU: upstream stable to v5.3.13
  
-5.3.13 upstream stable release
-from git://git.kernel.org/
+    5.3.13 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853882

Title:
  Eoan update: 5.3.13 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853881] [NEW] Xenial update: 4.4.203 upstream stable release

2019-11-25 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.203 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853881

Title:
  Xenial update: 4.4.203 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853881/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853882] [NEW] Eoan update: 5.3.13 upstream stable release

2019-11-25 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.13 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853882

Title:
  Eoan update: 5.3.13 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853709] [NEW] lightdm does not greet or present login prompt when resuming from laptop suspend

2019-11-23 Thread Connor Kuehl
Public bug reported:

Expected result: when opening laptop lid the lock screen presents itself
so I can unlock my session

Actual result: the contents of my desktop are visible (windows, etc) and
I can move my mouse cursor around but I cannot interact with the desktop
session at all. Hovering over UI elements or clicking them has no
effect.

In order to get the login prompt I have to ctrl+alt+f1, login at the
console, and run sudo systemctl restart lightdm, then I can login
normally and resume whatever I was doing from before I closed the laptop
lid.

ProblemType: Bug
DistroRelease: Ubuntu 19.10
Package: lightdm 1.30.0-0ubuntu1
ProcVersionSignature: Ubuntu 5.3.0-23.25-generic 5.3.7
Uname: Linux 5.3.0-23-generic x86_64
ApportVersion: 2.20.11-0ubuntu8.2
Architecture: amd64
CurrentDesktop: XFCE
Date: Sat Nov 23 09:08:32 2019
InstallationDate: Installed on 2019-11-09 (14 days ago)
InstallationMedia: Xubuntu 19.10 "Eoan Ermine" - Release amd64 (20191017)
SourcePackage: lightdm
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: lightdm (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug eoan

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853709

Title:
  lightdm does not greet or present login prompt when resuming from
  laptop suspend

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1853709/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853522] [NEW] docker 18.09.7-0ubuntu1~18.04.4 integration tests DockerSwarmSuite.TestSwarmInit and DockerSwarmSuite.TestSwarmUpdate are failing

2019-11-21 Thread Connor Kuehl
Public bug reported:


$ grep FAIL docker-integration-test.log.txt
FAIL: docker_cli_swarm_test.go:85: DockerSwarmSuite.TestSwarmInit
FAIL: docker_cli_swarm_test.go:37: DockerSwarmSuite.TestSwarmUpdate
OOPS: 1479 passed, 50 skipped, 2 FAILED
--- FAIL: Test (5215.24s)
FAIL

I've attached the full log but here are the relevant excerpts:

FAIL: docker_cli_swarm_test.go:85: DockerSwarmSuite.TestSwarmInit

[d6c1107a028f0] waiting for daemon to start
[d6c1107a028f0] daemon started

docker_cli_swarm_test.go:118:
c.Assert(spec.CAConfig.ExternalCAs[1].CACert, checker.Equals, 
string(expected))
... obtained string = ""
... expected string = "" +
... "-BEGIN CERTIFICATE-\n" +
... "MIID0TCCAzqgAwIBAgIJAP2r7GqEJwSnMA0GCSqGSIb3DQEBBQUAMIGiMQswCQYD\n" +
... "VQQGEwJVUzELMAkGA1UECBMCQ0ExFTATBgNVBAcTDFNhbkZyYW5jaXNjbzEVMBMG\n" +
... "A1UEChMMRm9ydC1GdW5zdG9uMREwDwYDVQQLEwhjaGFuZ2VtZTERMA8GA1UEAxMI\n" +
... "Y2hhbmdlbWUxETAPBgNVBCkTCGNoYW5nZW1lMR8wHQYJKoZIhvcNAQkBFhBtYWls\n" +
... "QGhvc3QuZG9tYWluMB4XDTEzMTIwMzE2NTYzMFoXDTIzMTIwMTE2NTYzMFowgaIx\n" +
... "CzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEVMBMGA1UEBxMMU2FuRnJhbmNpc2Nv\n" +
... "MRUwEwYDVQQKEwxGb3J0LUZ1bnN0b24xETAPBgNVBAsTCGNoYW5nZW1lMREwDwYD\n" +
... "VQQDEwhjaGFuZ2VtZTERMA8GA1UEKRMIY2hhbmdlbWUxHzAdBgkqhkiG9w0BCQEW\n" +
... "EG1haWxAaG9zdC5kb21haW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALAn\n" +
... "0xDw+5y7ZptQacq66pUhRu82JP2WU6IDgo5QUtNU6/CX5PwQATe/OnYTZQFbksxp\n" +
... "AU9boG0FCkgxfsgPYXEuZxVEGKI2fxfKHOZZI8mrkWmj6eWU/0cvCjGVc9rTITP5\n" +
... "sNQvg+hORyVDdNp2IdsbMJayiB3AQYMFx3vSDOMTAgMBAAGjggELMIIBBzAdBgNV\n" +
... "HQ4EFgQUZu7DFz09q0QBa2+ymRm9qgK1NPswgdcGA1UdIwSBzzCBzIAUZu7DFz09\n" +
... "q0QBa2+ymRm9qgK1NPuhgaikgaUwgaIxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJD\n" +
... "QTEVMBMGA1UEBxMMU2FuRnJhbmNpc2NvMRUwEwYDVQQKEwxGb3J0LUZ1bnN0b24x\n" +
... "ETAPBgNVBAsTCGNoYW5nZW1lMREwDwYDVQQDEwhjaGFuZ2VtZTERMA8GA1UEKRMI\n" +
... "Y2hhbmdlbWUxHzAdBgkqhkiG9w0BCQEWEG1haWxAaG9zdC5kb21haW6CCQD9q+xq\n" +
... "hCcEpzAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBBQUAA4GBAF8fJKKM+/oOdnNi\n" +
... "zEd0M1+PmZOyqvjYQn/2ZR8UHH6Imgc/OPQKZXf0bVE1Txc/DaUNn9Isd1SuCuaE\n" +
... "ic3vAIYYU7PmgeNN6vwec48V96T7jr+GAi6AVMhQEc2hHCfVtx11Xx+x6aHDZzJt\n" +
... "Zxtf5lL6KSO9Y+EFwM+rju6hm5hW\n" +
... "-END CERTIFICATE-\n"

[d6c1107a028f0] exiting daemon

FAIL: docker_cli_swarm_test.go:37: DockerSwarmSuite.TestSwarmUpdate

[daa25bb457f91] waiting for daemon to start
[daa25bb457f91] daemon started

docker_cli_swarm_test.go:69:
c.Assert(spec.CAConfig.ExternalCAs[0].CACert, checker.Equals, "")
... obtained string = "" +
... "-BEGIN CERTIFICATE-\n" +
... "MIIBaTCCARCgAwIBAgIUD3EOvCS/jyGkXNLWrMqSJYzzIW4wCgYIKoZIzj0EAwIw\n" +
... "EzERMA8GA1UEAxMIc3dhcm0tY2EwHhcNMTkxMTIxMTgzOTAwWhcNMzkxMTE2MTgz\n" +
... "OTAwWjATMREwDwYDVQQDEwhzd2FybS1jYTBZMBMGByqGSM49AgEGCCqGSM49AwEH\n" +
... "A0IABIOUj6OH5S3l+pQ9biFdNec0LtN5vmYyklxDql08/gWjpZoNpv+okyrw6vcA\n" +
... "jdwqvdgkKqtDEpn/5yY63g+zu6WjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB\n" +
... "Af8EBTADAQH/MB0GA1UdDgQWBBSqopXDDWBVtgPfdYI2U9kaH1cVVzAKBggqhkjO\n" +
... "PQQDAgNHADBEAiAOxEjb6xAWnMF1JiNpp/8mb92iSPN3cexkSFcC99sPwgIgcmJ6\n" +
... "+LFrps73iHNhzfscCtTKvnLTB7HJDsSjcwPXB4M=\n" +
... "-END CERTIFICATE-\n"
... expected string = ""

[daa25bb457f91] exiting daemon

---

Running the integration tests:

$ pull-lp-source docker.io bionic

$ cd cd docker.io-18.09.7

$ sudo make test-integration-cli

** Affects: docker.io (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "docker-integration-test.log.txt"
   
https://bugs.launchpad.net/bugs/1853522/+attachment/5306961/+files/docker-integration-test.log.txt

** Description changed:

  I've attached the full log but here is the relevant excerpts:
  
- $ grep FAIL docker-integration-test.log.txt 
+ $ grep FAIL docker-integration-test.log.txt
  FAIL: docker_cli_swarm_test.go:85: DockerSwarmSuite.TestSwarmInit
  FAIL: docker_cli_swarm_test.go:37: DockerSwarmSuite.TestSwarmUpdate
  OOPS: 1479 passed, 50 skipped, 2 FAILED
  --- FAIL: Test (5215.24s)
  FAIL
+ 
+ 
+ Running the integration tests:
+ 
+ $ pull-lp-source docker.io bionic
+ 
+ $ cd cd docker.io-18.09.7
+ 
+ $ sudo make test-integration-cli

** Description changed:

- I've attached the full log but here is the relevant excerpts:
+ I've attached the full log but here is the relevant excerpt:
  
  $ grep FAIL docker-integration-test.log.txt
  FAIL: docker_cli_swarm_test.go:85: DockerSwarmSuite.TestSwarmInit
  FAIL: docker_cli_swarm_test.go:37: DockerSwarmSuite.TestSwarmUpdate
  OOPS: 1479 passed, 50 skipped, 2 FAILED
  --- FAIL: Test (5215.24s)
  FAIL
  
- 
  Running the integration tests:
  
  $ pull-lp-source docker.io bionic
  
  $ cd cd docker.io-18.09.7
  
  $ sudo make test-integration-cli

** Description changed:

- I've attached the full log but here is the relevant excerpt:
  
  $ grep FAIL 

[Bug 1853475] Re: Eoan update: 5.3.12 upstream stable release

2019-11-21 Thread Connor Kuehl
Note: the sauce version of "x86/intel: Disable HPET on Intel Coffe Lake
platforms" was reverted in favor of the upstream stable variant:
"x86/quirks: Disable HPET on Intel Coffe Lake platforms"

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * scsi: core: Handle drivers which set sg_tablesize to zero
+ * ax88172a: fix information leak on short answers
+ * devlink: disallow reload operation during device cleanup
+ * ipmr: Fix skb headroom in ipmr_get_route().
+ * mlxsw: core: Enable devlink reload only on probe
+ * net: gemini: add missed free_netdev
+ * net/smc: fix fastopen for non-blocking connect()
+ * net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules
+ * slip: Fix memory leak in slip_open error path
+ * tcp: remove redundant new line from tcp_event_sk_skb
+ * dpaa2-eth: free already allocated channels on probe defer
+ * devlink: Add method for time-stamp on reporter's dump
+ * net/smc: fix refcount non-blocking connect() -part 2
+ * ALSA: usb-audio: Fix missing error check at mixer resolution test
+ * ALSA: usb-audio: not submit urb for stopped endpoint
+ * ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk()
+ * ALSA: usb-audio: Fix incorrect size check for processing/extension units
+ * Btrfs: fix log context list corruption after rename exchange operation
+ * cgroup: freezer: call cgroup_enter_frozen() with preemption disabled in 
ptrace_stop()
+ * Input: ff-memless - kill timer in destroy()
+ * Input: synaptics-rmi4 - fix video buffer size
+ * Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver
+ * Input: synaptics-rmi4 - do not consume more data than we have (F11, F12)
+ * Input: synaptics-rmi4 - clear IRQ enables for F54
+ * Input: synaptics-rmi4 - destroy F54 poller workqueue when removing
+ * KVM: MMU: Do not treat ZONE_DEVICE pages as being reserved
+ * IB/hfi1: Ensure r_tid_ack is valid before building TID RDMA ACK packet
+ * IB/hfi1: Calculate flow weight based on QP MTU for TID RDMA
+ * IB/hfi1: TID RDMA WRITE should not return IB_WC_RNR_RETRY_EXC_ERR
+ * IB/hfi1: Ensure full Gen3 speed in a Gen4 system
+ * IB/hfi1: Use a common pad buffer for 9B and 16B packets
+ * i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present
+ * UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: x86/intel: Disable HPET on Intel 
Coffe Lake platforms"
+ * x86/quirks: Disable HPET on Intel Coffe Lake platforms
+ * ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable
+ * ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either
+ * io_uring: ensure registered buffer import returns the IO length
+ * drm/i915: update rawclk also on resume
+ * Revert "drm/i915/ehl: Update MOCS table for EHL"
+ * ntp/y2038: Remove incorrect time_t truncation
+ * net: ethernet: dwmac-sun8i: Use the correct function in exit path
+ * iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros
+ * mm: mempolicy: fix the wrong return value and potential pages leak of mbind
+ * mm: memcg: switch to css_tryget() in get_mem_cgroup_from_mm()
+ * mm: hugetlb: switch to css_tryget() in hugetlb_cgroup_charge_cgroup()
+ * mm: slub: really fix slab walking for init_on_free
+ * mm/memory_hotplug: fix try_offline_node()
+ * mm/page_io.c: do not free shared swap slots
+ * mmc: sdhci-of-at91: fix quirk2 overwrite
+ * slcan: Fix memory leak in error path
+ * Linux 5.3.12
+ * UBUNTU: upstream stable to v5.3.12
  
-5.3.12 upstream stable release
-from git://git.kernel.org/
+    5.3.12 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853475

Title:
  Eoan update: 5.3.12 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853475] Re: Eoan update: 5.3.12 upstream stable release

2019-11-21 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853475

Title:
  Eoan update: 5.3.12 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853475] [NEW] Eoan update: 5.3.12 upstream stable release

2019-11-21 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   5.3.12 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Eoan)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853475

Title:
  Eoan update: 5.3.12 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1762835] Re: Conflicting mmc modules built in

2019-11-20 Thread Connor Kuehl
** Changed in: linux-raspi2 (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Changed in: linux-raspi2 (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux-raspi2 (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux-raspi2 (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Disco)
 Assignee: (unassigned) => Juerg Haefliger (juergh)

** Changed in: linux-raspi2 (Ubuntu Eoan)
 Assignee: (unassigned) => Juerg Haefliger (juergh)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1762835

Title:
  Conflicting mmc modules built in

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-raspi2/+bug/1762835/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852220] Re: eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker

2019-11-20 Thread Connor Kuehl
** Summary changed:

- eoan/linux-raspi2:  -proposed tracker
+ eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852220

Title:
  eoan/linux-raspi2: 5.3.0-1013.15 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852220/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853177] Re: Xenial update: 4.4.202 upstream stable release

2019-11-19 Thread Connor Kuehl
Please note that the following commits from this upstream Linux stable
update were dropped in favor of the UBUNTU SAUCE equivalents:

* KVM: Introduce kvm_get_arch_capabilities()
* KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts
* kvm: x86: IA32_ARCH_CAPABILITIES is always supported
* KVM: x86: use Intel speculation bugs and features as derived in generic x86 
code
* x86/msr: Add the IA32_TSX_CTRL MSR
* x86/cpu: Add a helper function x86_read_arch_cap_msr()
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default
* x86/speculation/taa: Add mitigation for TSX Async Abort
* x86/speculation/taa: Add sysfs reporting for TSX Async Abort
* kvm/x86: Export MDS_NO=0 to guests when TSX is enabled
* x86/tsx: Add "auto" option to the tsx= cmdline parameter
* x86/speculation/taa: Add documentation for TSX Async Abort
* x86/tsx: Add config options to set tsx=on|off|auto
* x86/bugs: Add ITLB_MULTIHIT bug infrastructure

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853177

Title:
  Xenial update: 4.4.202 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853177] Re: Xenial update: 4.4.202 upstream stable release

2019-11-19 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * kvm: mmu: Don't read PDPTEs when paging is not enabled
+ * MIPS: BCM63XX: fix switch core reset on BCM6368
+ * powerpc/Makefile: Use cflags-y/aflags-y for setting endian options
+ * powerpc: Fix compiling a BE kernel with a powerpc64le toolchain
+ * powerpc/boot: Request no dynamic linker for boot wrapper
+ * x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
+ * Linux 4.4.202
+ * UBUNTU: upstream stable to v4.4.202
  
-4.4.202 upstream stable release
-from git://git.kernel.org/
+    4.4.202 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853177

Title:
  Xenial update: 4.4.202 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852305] Re: trusty/linux-lts-xenial: 4.4.0-170.199~14.04.1 -proposed tracker

2019-11-19 Thread Connor Kuehl
** Summary changed:

- trusty/linux-lts-xenial:  -proposed tracker
+ trusty/linux-lts-xenial: 4.4.0-170.199~14.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852305

Title:
  trusty/linux-lts-xenial: 4.4.0-170.199~14.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852305/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-19 Thread Connor Kuehl
Also of note:

* ("perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus
precise RIP validity") modified a routine that was expected to be in
"arch/x86/kernel/cpu/perf_event_amd_ibs.c" but was found in
"arch/x86/events/amd/ibs.c"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853177] [NEW] Xenial update: 4.4.202 upstream stable release

2019-11-19 Thread Connor Kuehl
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   4.4.202 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Xenial)
 Importance: Medium
 Assignee: Connor Kuehl (connork)
 Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853177

Title:
  Xenial update: 4.4.202 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-19 Thread Connor Kuehl
The following patches were NOT applied from this upstream stable update
in favor of their UBUNTU SAUCE equivalents:

* drm/i915/gtt: Add read only pages to gen8_pte_encode
* drm/i915/gtt: Read-only pages for insert_entries on bdw+
* drm/i915/gtt: Disable read-only support under GVT
* drm/i915: Rename gen7 cmdparser tables
* drm/i915: Disable Secure Batches for gen6+
* drm/i915: Remove Master tables from cmdparser
* drm/i915: Add support for mandatory cmdparsing
* drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
* drm/i915: Allow parsing of unsized batches
* drm/i915: Add gen9 BCS cmdparsing
* drm/i915/cmdparser: Add support for backward jumps
* drm/i915/cmdparser: Ignore Length operands during command matching
* drm/i915: Lower RM timeout to avoid DSI hard hangs
* drm/i915/gen8+: Add RC6 CTX corruption WA
* drm/i915/cmdparser: Fix jump whitelist clearing

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-19 Thread Connor Kuehl
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+ * CDC-NCM: handle incomplete transfer of MTU
+ * net: fix data-race in neigh_event_send()
+ * NFC: fdp: fix incorrect free object
+ * NFC: st21nfca: fix double free
+ * qede: fix NULL pointer deref in __qede_remove()
+ * nfc: netlink: fix double device reference drop
+ * ALSA: bebob: fix to detect configured source of sampling clock for 
Focusrite Saffire Pro i/o series
+ * ALSA: hda/ca0132 - Fix possible workqueue stall
+ * mm, vmstat: hide /proc/pagetypeinfo from normal users
+ * dump_stack: avoid the livelock of the dump_lock
+ * perf tools: Fix time sorting
+ * drm/radeon: fix si_enable_smc_cac() failed issue
+ * ceph: fix use-after-free in __ceph_remove_cap()
+ * iio: imu: adis16480: make sure provided frequency is positive
+ * netfilter: nf_tables: Align nft_expr private data to 64-bit
+ * netfilter: ipset: Fix an error code in ip_set_sockfn_get()
+ * can: usb_8dev: fix use-after-free on disconnect
+ * can: c_can: c_can_poll(): only read status register after status IRQ
+ * can: peak_usb: fix a potential out-of-sync while decoding packets
+ * can: gs_usb: gs_can_open(): prevent memory leak
+ * can: peak_usb: fix slab info leak
+ * drivers: usb: usbip: Add missing break statement to switch
+ * configfs: fix a deadlock in configfs_symlink()
+ * PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30
+ * scsi: qla2xxx: fixup incorrect usage of host_byte
+ * scsi: lpfc: Honor module parameter lpfc_use_adisc
+ * ipvs: move old_secure_tcp into struct netns_ipvs
+ * bonding: fix unexpected IFF_BONDING bit unset
+ * usb: fsl: Check memory resource before releasing it
+ * usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode.
+ * usb: gadget: composite: Fix possible double free memory bug
+ * usb: gadget: configfs: fix concurrent issue between composite APIs
+ * perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise 
RIP validity
+ * USB: Skip endpoints with 0 maxpacket length
+ * scsi: qla2xxx: stop timer in shutdown path
+ * net: hisilicon: Fix "Trying to free already-free IRQ"
+ * NFSv4: Don't allow a cached open with a revoked delegation
+ * igb: Fix constant media auto sense switching when no cable is connected
+ * e1000: fix memory leaks
+ * can: flexcan: disable completely the ECC mechanism
+ * mm/filemap.c: don't initiate writeback if mapping has no dirty pages
+ * cgroup,writeback: don't switch wbs immediately on dead wbs if the memcg is 
dead
+ * net: prevent load/store tearing on sk->sk_stamp
+ * Linux 4.4.201
+ * UBUNTU: upstream stable to v4.4.201
  
-4.4.201 upstream stable release
-from git://git.kernel.org/
+    4.4.201 upstream stable release
+    from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852338] Re: Eoan update: 5.3.11 upstream stable release

2019-11-18 Thread Connor Kuehl
Please note that the following SAUCE patches were reverted:

* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: x86: mmu: Recovery of shattered NX 
large pages"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: Add helper function for creating 
VM worker threads"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: kvm: mmu: ITLB_MULTIHIT mitigation"
* UBUNTU: SAUCE: Revert "kvm: x86, powerpc: do not allow clearing largepages 
debugfs entry"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: cpu/speculation: Uninline and export 
CPU mitigations helpers"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: x86: Add ITLB_MULTIHIT bug 
infrastructure"
* UBUNTU: SAUCE: Revert "x86/tsx: Add config options to set tsx=on|off|auto"
* UBUNTU: SAUCE: Revert "x86/speculation/taa: Add documentation for TSX Async 
Abort"
* UBUNTU: SAUCE: Revert "x86/tsx: Add "auto" option to the tsx= cmdline 
parameter"
* UBUNTU: SAUCE: Revert "kvm/x86: Export MDS_NO=0 to guests when TSX is enabled"
* UBUNTU: SAUCE: Revert "x86/speculation/taa: Add sysfs reporting for TSX Async 
Abort"
* UBUNTU: SAUCE: Revert "x86/speculation/taa: Add mitigation for TSX Async 
Abort"
* UBUNTU: SAUCE: Revert "x86/cpu: Add a "tsx=" cmdline option with TSX disabled 
by default"
* UBUNTU: SAUCE: Revert "x86/cpu: Add a helper function x86_read_arch_cap_msr()"
* UBUNTU: SAUCE: Revert "x86/msr: Add the IA32_TSX_CTRL MSR"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Fix jump whitelist 
clearing"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/gen8+: Add RC6 CTX corruption 
WA"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Lower RM timeout to avoid DSI 
hard hangs"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Ignore Length 
operands during command matching"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Add support for 
backward jumps"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915/cmdparser: Use explicit goto 
for error paths"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Add gen9 BCS cmdparsing"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Allow parsing of unsized 
batches"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Support ro ppgtt mapped 
cmdparser shadow buffers"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Add support for mandatory 
cmdparsing"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Remove Master tables from 
cmdparser"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Disable Secure Batches for 
gen6+"
* UBUNTU: SAUCE: Revert "UBUNTU: SAUCE: drm/i915: Rename gen7 cmdparser tables"

In favor of their upstream stable versions:

* drm/i915: Rename gen7 cmdparser tables
* drm/i915: Disable Secure Batches for gen6+
* drm/i915: Remove Master tables from cmdparser
* drm/i915: Add support for mandatory cmdparsing
* drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
* drm/i915: Allow parsing of unsized batches
* drm/i915: Add gen9 BCS cmdparsing
* drm/i915/cmdparser: Use explicit goto for error paths
* drm/i915/cmdparser: Add support for backward jumps
* drm/i915/cmdparser: Ignore Length operands during command matching
* drm/i915: Lower RM timeout to avoid DSI hard hangs
* drm/i915/gen8+: Add RC6 CTX corruption WA
* drm/i915/cmdparser: Fix jump whitelist clearing
* x86/msr: Add the IA32_TSX_CTRL MSR
* x86/cpu: Add a helper function x86_read_arch_cap_msr()
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by default
* x86/speculation/taa: Add mitigation for TSX Async Abort
* x86/speculation/taa: Add sysfs reporting for TSX Async Abort
* kvm/x86: Export MDS_NO=0 to guests when TSX is enabled
* x86/tsx: Add "auto" option to the tsx= cmdline parameter
* x86/speculation/taa: Add documentation for TSX Async Abort
* x86/tsx: Add config options to set tsx=on|off|auto
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
* x86/bugs: Add ITLB_MULTIHIT bug infrastructure
* x86/cpu: Add Tremont to the cpu vulnerability whitelist
* cpu/speculation: Uninline and export CPU mitigations helpers
* Documentation: Add ITLB_MULTIHIT documentation
* kvm: x86, powerpc: do not allow clearing largepages debugfs entry
* kvm: mmu: ITLB_MULTIHIT mitigation
* kvm: Add helper function for creating VM worker threads
* kvm: x86: mmu: Recovery of shattered NX large pages

** Description changed:

- 
- SRU Justification
- 
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
- 
-5.3.11 upstream stable release
-from git://git.kernel.org/
+ SRU Justification
+ 
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably 

[Bug 1852335] Re: Xenial update: 4.4.201 upstream stable release

2019-11-18 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852335

Title:
  Xenial update: 4.4.201 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852335/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852338] Re: Eoan update: 5.3.11 upstream stable release

2019-11-18 Thread Connor Kuehl
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Eoan)
 Assignee: (unassigned) => Connor Kuehl (connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852338

Title:
  Eoan update: 5.3.11 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852338/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852224] Re: bionic/linux-azure-5.3: 5.3.0-1008.9~18.04.1 -proposed tracker

2019-11-15 Thread Connor Kuehl
** Summary changed:

- bionic/linux-azure-5.3:  -proposed tracker
+ bionic/linux-azure-5.3: 5.3.0-1008.9~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852224

Title:
  bionic/linux-azure-5.3: 5.3.0-1008.9~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852224/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852235] Re: bionic/linux-aws-5.0: 5.0.0-1022.25~18.04.1 -proposed tracker

2019-11-15 Thread Connor Kuehl
** Summary changed:

- bionic/linux-aws-5.0:  -proposed tracker
+ bionic/linux-aws-5.0: 5.0.0-1022.25~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852235

Title:
  bionic/linux-aws-5.0: 5.0.0-1022.25~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852235/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852226] Re: bionic/linux-gcp-5.3: 5.3.0-1009.10~18.04.1 -proposed tracker

2019-11-15 Thread Connor Kuehl
** Summary changed:

- bionic/linux-gcp-5.3:  -proposed tracker
+ bionic/linux-gcp-5.3: 5.3.0-1009.10~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852226

Title:
  bionic/linux-gcp-5.3: 5.3.0-1009.10~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852226/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852222] Re: bionic/linux-aws-5.3: 5.3.0-1008.9~18.04.1 -proposed tracker

2019-11-15 Thread Connor Kuehl
** Summary changed:

- bionic/linux-aws-5.3:  -proposed tracker
+ bionic/linux-aws-5.3: 5.3.0-1008.9~18.04.1 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-lrm
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-lrm
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/185

Title:
  bionic/linux-aws-5.3: 5.3.0-1008.9~18.04.1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/185/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852236] Re: disco/linux-aws: 5.0.0-1022.25 -proposed tracker

2019-11-15 Thread Connor Kuehl
** Summary changed:

- disco/linux-aws:  -proposed tracker
+ disco/linux-aws: 5.0.0-1022.25 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852236

Title:
  disco/linux-aws: 5.0.0-1022.25 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852236/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852303] Re: xenial/linux-fips: 4.4.0-1026.31 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- xenial/linux-fips:  -proposed tracker
+ xenial/linux-fips: 4.4.0-1026.31 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852303

Title:
  xenial/linux-fips: 4.4.0-1026.31 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852303/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852304] Re: trusty/linux-aws: 4.4.0-1059.63 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- trusty/linux-aws:  -proposed tracker
+ trusty/linux-aws: 4.4.0-1059.63 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852304

Title:
  trusty/linux-aws: 4.4.0-1059.63 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852304/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852278] Re: bionic/linux-fips: 4.15.0-1021.24 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- bionic/linux-fips:  -proposed tracker
+ bionic/linux-fips: 4.15.0-1021.24 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852278

Title:
  bionic/linux-fips: 4.15.0-1021.24 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852252] Re: bionic/linux-bluefield: 5.0.0-1006.16 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- bionic/linux-bluefield:  -proposed tracker
+ bionic/linux-bluefield: 5.0.0-1006.16 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852252

Title:
  bionic/linux-bluefield: 5.0.0-1006.16 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852252/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852249] Re: disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- disco/linux-snapdragon:  -proposed tracker
+ disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852249

Title:
  disco/linux-snapdragon: 5.0.0-1027.29 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852249/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852296] Re: xenial/linux-aws: 4.4.0-1099.110 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- xenial/linux-aws:  -proposed tracker
+ xenial/linux-aws: 4.4.0-1099.110 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852296

Title:
  xenial/linux-aws: 4.4.0-1099.110 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852296/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852228] Re: eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- eoan/linux-kvm:  -proposed tracker
+ eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852228

Title:
  eoan/linux-kvm: 5.3.0-1008.9 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852228/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1852262] Re: bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker

2019-11-14 Thread Connor Kuehl
** Summary changed:

- bionic/linux-raspi2:  -proposed tracker
+ bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker

** Changed in: kernel-sru-workflow/prepare-package
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => In Progress

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Connor Kuehl 
(connork)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852262

Title:
  bionic/linux-raspi2: 4.15.0-1051.55 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1852262/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   >