[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel
This bug was fixed in the package linux-gke-5.4 - 5.4.0-1025.25~18.04.1 --- linux-gke-5.4 (5.4.0-1025.25~18.04.1) bionic; urgency=medium * bionic/linux-gke-5.4: 5.4.0-1025.25~18.04.1 -proposed tracker (LP: #1894645) * Packaging resync (LP: #1786013) - [Packaging] update variants * Request for eBPF patches into the 5.4 kernel (LP: #1887740) - bpf: Enable retrieval of socket cookie for bind/post-bind hook - bpf: Enable perf event rb output for bpf cgroup progs - bpf: Add netns cookie and enable it for bpf cgroup hooks - bpf, net: Fix build issue when net ns not configured - bpf: Allow to retrieve cgroup v1 classid from v2 hooks - bpf: Enable retrival of pid/tgid/comm from bpf cgroup hooks - bpf: Add get{peer, sock}name attach types for sock_addr - bpf, sk_msg: Add some generic helpers that may be useful from sk_msg - bpf: Add BPF_FUNC_jiffies64 - bpf: Add socket assign support - net: Track socket refcounts in skb_steal_sock() - bpf: Don't refcount LISTEN sockets in sk_assign() - bpf: Fix use of sk->sk_reuseport from sk_assign [ Ubuntu: 5.4.0-1025.25 ] * focal/linux-gcp: 5.4.0-1025.25 -proposed tracker (LP: #1894646) * focal/linux: 5.4.0-48.52 -proposed tracker (LP: #1894654) * mm/slub kernel oops on focal kernel 5.4.0-45 (LP: #1895109) - SAUCE: Revert "mm/slub: fix a memory leak in sysfs_slab_add()" * Packaging resync (LP: #1786013) - update dkms package versions - update dkms package versions * Introduce the new NVIDIA 450-server and the 450 UDA series (LP: #1887674) - [packaging] add signed modules for nvidia 450 and 450-server * [UBUNTU 20.04] zPCI attach/detach issues with PF/VF linking support (LP: #1892849) - s390/pci: fix zpci_bus_link_virtfn() - s390/pci: re-introduce zpci_remove_device() - s390/pci: fix PF/VF linking on hot plug * [UBUNTU 20.04] kernel: s390/cpum_cf,perf: changeDFLT_CCERROR counter name (LP: #1891454) - s390/cpum_cf, perf: change DFLT_CCERROR counter name * [UBUNTU 20.04] zPCI: Enabling of a reserved PCI function regression introduced by multi-function support (LP: #1891437) - s390/pci: fix enabling a reserved PCI function * CVE-2020-12888 - vfio/type1: Support faulting PFNMAP vmas - vfio-pci: Fault mmaps to enable vma tracking - vfio-pci: Invalidate mmaps and block MMIO access on disabled memory * [Hyper-V] VSS and File Copy daemons intermittently fails to start (LP: #1891224) - [Packaging] Bind hv_vss_daemon startup to hv_vss device - [Packaging] bind hv_fcopy_daemon startup to hv_fcopy device * alsa/hdmi: support nvidia mst hdmi/dp audio (LP: #1867704) - ALSA: hda - Rename snd_hda_pin_sense to snd_hda_jack_pin_sense - ALSA: hda - Add DP-MST jack support - ALSA: hda - Add DP-MST support for non-acomp codecs - ALSA: hda - Add DP-MST support for NVIDIA codecs - ALSA: hda: hdmi - fix regression in connect list handling - ALSA: hda: hdmi - fix kernel oops caused by invalid PCM idx - ALSA: hda: hdmi - preserve non-MST PCM routing for Intel platforms - ALSA: hda: hdmi - Keep old slot assignment behavior for Intel platforms - ALSA: hda - Fix DP-MST support for NVIDIA codecs * Focal update: v5.4.60 upstream stable release (LP: #1892899) - smb3: warn on confusing error scenario with sec=krb5 - genirq/affinity: Make affinity setting if activated opt-in - genirq/PM: Always unlock IRQ descriptor in rearm_wake_irq() - PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() - PCI: Add device even if driver attach failed - PCI: qcom: Define some PARF params needed for ipq8064 SoC - PCI: qcom: Add support for tx term offset for rev 2.1.0 - btrfs: allow use of global block reserve for balance item deletion - btrfs: free anon block device right after subvolume deletion - btrfs: don't allocate anonymous block device for user invisible roots - btrfs: ref-verify: fix memory leak in add_block_entry - btrfs: stop incremening log_batch for the log root tree when syncing log - btrfs: remove no longer needed use of log_writers for the log root tree - btrfs: don't traverse into the seed devices in show_devname - btrfs: open device without device_list_mutex - btrfs: move the chunk_mutex in btrfs_read_chunk_tree - btrfs: relocation: review the call sites which can be interrupted by signal - btrfs: add missing check for nocow and compression inode flags - btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on relocation tree - btrfs: sysfs: use NOFS for device creation - btrfs: don't WARN if we abort a transaction with EROFS - btrfs: fix race between page release and a fast fsync - btrfs: fix messages after changing compression level by remount - btrfs: only search for left_info if there is no right_info in try_merge_free_space - btrfs: inode: fix NULL pointer
[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel
** Changed in: linux-gke-5.4 (Ubuntu Bionic) Status: Triaged => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887740 Title: Request for eBPF patches into the 5.4 kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gke-5.4/+bug/1887740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel
** Package changed: linux-gcp (Ubuntu) => linux-gke-5.4 (Ubuntu) ** Changed in: linux-gke-5.4 (Ubuntu) Status: New => Invalid ** Also affects: linux-gke-5.4 (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux-gke-5.4 (Ubuntu Focal) Status: New => Invalid ** Changed in: linux-gke-5.4 (Ubuntu Bionic) Importance: Undecided => Medium ** Changed in: linux-gke-5.4 (Ubuntu Bionic) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887740 Title: Request for eBPF patches into the 5.4 kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gke-5.4/+bug/1887740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel
** Description changed: The cloud vendor is requesting backport of 13 patches from upstream. These changes are mostly improvements to the bpf networking-related code. Please see the SalesForce case for more information: https://canonical.lightning.force.com/lightning/r/Case/5003z27kZitAAE/view - [Impact] - Without these patches, BPF functionality incomplete in current 5.4 + Without these patches, BPF functionality is incomplete in current 5.4 kernels [Fix] Add missing (networking) BPF code from upstream. [Test] The cloud vendor has tested these patches, before submitting them upsteam and then backporting for the Ubuntu 5.4 kernel [Regression Potential] Low. These changes are mostly extending BPF functionality in the net code not changing existing code. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887740 Title: Request for eBPF patches into the 5.4 kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1887740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel
** Description changed: + The cloud vendor is requesting backport of 13 patches from upstream. + These changes are mostly improvements to the bpf networking-related + code. + Please see the SalesForce case for more information: https://canonical.lightning.force.com/lightning/r/Case/5003z27kZitAAE/view + + + [Impact] + Without these patches, BPF functionality incomplete in current 5.4 + + [Fix] + Add missing (networking) BPF code from upstream. + + [Test] + The cloud vendor has tested these patches, before submitting them upsteam and then backporting for the Ubuntu 5.4 kernel + + [Regression Potential] + Low. These changes are mostly extending BPF functionality in the net code not changing existing code. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887740 Title: Request for eBPF patches into the 5.4 kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1887740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel
** Also affects: linux-gcp (Ubuntu) Importance: Undecided Status: New ** No longer affects: linux (Ubuntu) ** Also affects: linux-gcp (Ubuntu Focal) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887740 Title: Request for eBPF patches into the 5.4 kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1887740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1887740] Re: Request for eBPF patches into the 5.4 kernel
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887740 Title: Request for eBPF patches into the 5.4 kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1887740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs