[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel

2020-09-22 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-gke-5.4 - 5.4.0-1025.25~18.04.1

---
linux-gke-5.4 (5.4.0-1025.25~18.04.1) bionic; urgency=medium

  * bionic/linux-gke-5.4: 5.4.0-1025.25~18.04.1 -proposed tracker (LP:
#1894645)

  * Packaging resync (LP: #1786013)
- [Packaging] update variants

  * Request for eBPF patches into the 5.4 kernel (LP: #1887740)
- bpf: Enable retrieval of socket cookie for bind/post-bind hook
- bpf: Enable perf event rb output for bpf cgroup progs
- bpf: Add netns cookie and enable it for bpf cgroup hooks
- bpf, net: Fix build issue when net ns not configured
- bpf: Allow to retrieve cgroup v1 classid from v2 hooks
- bpf: Enable retrival of pid/tgid/comm from bpf cgroup hooks
- bpf: Add get{peer, sock}name attach types for sock_addr
- bpf, sk_msg: Add some generic helpers that may be useful from sk_msg
- bpf: Add BPF_FUNC_jiffies64
- bpf: Add socket assign support
- net: Track socket refcounts in skb_steal_sock()
- bpf: Don't refcount LISTEN sockets in sk_assign()
- bpf: Fix use of sk->sk_reuseport from sk_assign

  [ Ubuntu: 5.4.0-1025.25 ]

  * focal/linux-gcp: 5.4.0-1025.25 -proposed tracker (LP: #1894646)
  * focal/linux: 5.4.0-48.52 -proposed tracker (LP: #1894654)
  * mm/slub kernel oops on focal kernel 5.4.0-45 (LP: #1895109)
- SAUCE: Revert "mm/slub: fix a memory leak in sysfs_slab_add()"
  * Packaging resync (LP: #1786013)
- update dkms package versions
- update dkms package versions
  * Introduce the new NVIDIA 450-server and the 450 UDA series (LP: #1887674)
- [packaging] add signed modules for nvidia 450 and 450-server
  * [UBUNTU 20.04] zPCI attach/detach issues with PF/VF linking support
(LP: #1892849)
- s390/pci: fix zpci_bus_link_virtfn()
- s390/pci: re-introduce zpci_remove_device()
- s390/pci: fix PF/VF linking on hot plug
  * [UBUNTU 20.04] kernel: s390/cpum_cf,perf: changeDFLT_CCERROR counter name
(LP: #1891454)
- s390/cpum_cf, perf: change DFLT_CCERROR counter name
  * [UBUNTU 20.04] zPCI: Enabling of a reserved PCI function regression
introduced by multi-function support (LP: #1891437)
- s390/pci: fix enabling a reserved PCI function
  * CVE-2020-12888
- vfio/type1: Support faulting PFNMAP vmas
- vfio-pci: Fault mmaps to enable vma tracking
- vfio-pci: Invalidate mmaps and block MMIO access on disabled memory
  *  [Hyper-V] VSS and File Copy daemons intermittently fails to start
(LP: #1891224)
- [Packaging] Bind hv_vss_daemon startup to hv_vss device
- [Packaging] bind hv_fcopy_daemon startup to hv_fcopy device
  * alsa/hdmi: support nvidia mst hdmi/dp audio (LP: #1867704)
- ALSA: hda - Rename snd_hda_pin_sense to snd_hda_jack_pin_sense
- ALSA: hda - Add DP-MST jack support
- ALSA: hda - Add DP-MST support for non-acomp codecs
- ALSA: hda - Add DP-MST support for NVIDIA codecs
- ALSA: hda: hdmi - fix regression in connect list handling
- ALSA: hda: hdmi - fix kernel oops caused by invalid PCM idx
- ALSA: hda: hdmi - preserve non-MST PCM routing for Intel platforms
- ALSA: hda: hdmi - Keep old slot assignment behavior for Intel platforms
- ALSA: hda - Fix DP-MST support for NVIDIA codecs
  * Focal update: v5.4.60 upstream stable release (LP: #1892899)
- smb3: warn on confusing error scenario with sec=krb5
- genirq/affinity: Make affinity setting if activated opt-in
- genirq/PM: Always unlock IRQ descriptor in rearm_wake_irq()
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context()
- PCI: Add device even if driver attach failed
- PCI: qcom: Define some PARF params needed for ipq8064 SoC
- PCI: qcom: Add support for tx term offset for rev 2.1.0
- btrfs: allow use of global block reserve for balance item deletion
- btrfs: free anon block device right after subvolume deletion
- btrfs: don't allocate anonymous block device for user invisible roots
- btrfs: ref-verify: fix memory leak in add_block_entry
- btrfs: stop incremening log_batch for the log root tree when syncing log
- btrfs: remove no longer needed use of log_writers for the log root tree
- btrfs: don't traverse into the seed devices in show_devname
- btrfs: open device without device_list_mutex
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree
- btrfs: relocation: review the call sites which can be interrupted by 
signal
- btrfs: add missing check for nocow and compression inode flags
- btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on
  relocation tree
- btrfs: sysfs: use NOFS for device creation
- btrfs: don't WARN if we abort a transaction with EROFS
- btrfs: fix race between page release and a fast fsync
- btrfs: fix messages after changing compression level by remount
- btrfs: only search for left_info if there is no right_info in
  try_merge_free_space
- btrfs: inode: fix NULL pointer

[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel

2020-09-04 Thread Stefan Bader
** Changed in: linux-gke-5.4 (Ubuntu Bionic)
   Status: Triaged => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887740

Title:
  Request for eBPF patches into the 5.4 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke-5.4/+bug/1887740/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel

2020-09-02 Thread Stefan Bader
** Package changed: linux-gcp (Ubuntu) => linux-gke-5.4 (Ubuntu)

** Changed in: linux-gke-5.4 (Ubuntu)
   Status: New => Invalid

** Also affects: linux-gke-5.4 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux-gke-5.4 (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-gke-5.4 (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux-gke-5.4 (Ubuntu Bionic)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887740

Title:
  Request for eBPF patches into the 5.4 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke-5.4/+bug/1887740/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel

2020-08-30 Thread Khaled El Mously
** Description changed:

  The cloud vendor is requesting backport of 13 patches from upstream.
  These changes are mostly improvements to the bpf networking-related
  code.
  
  Please see the SalesForce case for more information:
  
  https://canonical.lightning.force.com/lightning/r/Case/5003z27kZitAAE/view
  
- 
  [Impact]
- Without these patches, BPF functionality incomplete in current 5.4
+ Without these patches, BPF functionality is incomplete in current 5.4 kernels
  
  [Fix]
  Add missing (networking) BPF code from upstream.
  
  [Test]
  The cloud vendor has tested these patches, before submitting them upsteam and 
then backporting for the Ubuntu 5.4 kernel
  
  [Regression Potential]
  Low. These changes are mostly extending BPF functionality in the net code not 
changing existing code.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887740

Title:
  Request for eBPF patches into the 5.4 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1887740/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel

2020-08-30 Thread Khaled El Mously
** Description changed:

+ The cloud vendor is requesting backport of 13 patches from upstream.
+ These changes are mostly improvements to the bpf networking-related
+ code.
+ 
  Please see the SalesForce case for more information:
  
  https://canonical.lightning.force.com/lightning/r/Case/5003z27kZitAAE/view
+ 
+ 
+ [Impact]
+ Without these patches, BPF functionality incomplete in current 5.4
+ 
+ [Fix]
+ Add missing (networking) BPF code from upstream.
+ 
+ [Test]
+ The cloud vendor has tested these patches, before submitting them upsteam and 
then backporting for the Ubuntu 5.4 kernel
+ 
+ [Regression Potential]
+ Low. These changes are mostly extending BPF functionality in the net code not 
changing existing code.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887740

Title:
  Request for eBPF patches into the 5.4 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1887740/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel

2020-08-30 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu)

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887740

Title:
  Request for eBPF patches into the 5.4 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1887740/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel

2020-07-16 Thread Andy Whitcroft
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887740

Title:
  Request for eBPF patches into the 5.4 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1887740/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs