This bug was fixed in the package linux-azure - 4.15.0-1092.102~16.04.1 --------------- linux-azure (4.15.0-1092.102~16.04.1) xenial; urgency=medium
* xenial/linux-azure: 4.15.0-1092.102~16.04.1 -proposed tracker (LP: #1887032) [ Ubuntu: 4.15.0-1092.102 ] * bionic/linux-azure-4.15: 4.15.0-1092.102 -proposed tracker (LP: #1887034) * Azure diagnostic/serviceability improvement (LP: #1875456) - Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic - Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer - Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr - x86/Hyper-V: Unload vmbus channel in hv panic callback - x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump - x86/Hyper-V: Trigger crash enlightenment only once during system crash. - x86/Hyper-V: Report crash register data or kmsg before running crash kernel - x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set - x86/Hyper-V: Report crash data in die() when panic_on_oops is set * Request to include two NUMA related commits in Azure kernels (LP: #1880975) - PCI: hv: Decouple the func definition in hv_dr_state from VSP message - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 * bionic/linux: 4.15.0-112.113 -proposed tracker (LP: #1887048) * Packaging resync (LP: #1786013) - update dkms package versions * CVE-2020-11935 - SAUCE: aufs: do not call i_readcount_inc() - SAUCE: aufs: bugfix, IMA i_readcount * CVE-2020-10757 - mm: Fix mremap not considering huge pmd devmap * Update lockdown patches (LP: #1884159) - efi/efi_test: Lock down /dev/efi_test and require CAP_SYS_ADMIN - efi: Restrict efivar_ssdt_load when the kernel is locked down - powerpc/xmon: add read-only mode - powerpc/xmon: Restrict when kernel is locked down - [Config] CONFIG_XMON_DEFAULT_RO_MODE=y - SAUCE: acpi: disallow loading configfs acpi tables when locked down * seccomp_bpf fails on powerpc (LP: #1885757) - SAUCE: selftests/seccomp: fix ptrace tests on powerpc * Introduce the new NVIDIA 418-server and 440-server series, and update the current NVIDIA drivers (LP: #1881137) - [packaging] add signed modules for the 418-server and the 440-server flavours * bionic/linux: 4.15.0-111.112 -proposed tracker (LP: #1886999) * Bionic update: upstream stable patchset 2020-05-07 (LP: #1877461) - SAUCE: mlxsw: Add missmerged ERR_PTR hunk * linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668) - SAUCE: Revert "netprio_cgroup: Fix unlimited memory leak of v2 cgroups" -- Marcelo Henrique Cerri <marcelo.ce...@canonical.com> Tue, 14 Jul 2020 16:45:11 -0300 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-azure in Ubuntu. https://bugs.launchpad.net/bugs/1880975 Title: Request to include two NUMA related commits in Azure kernels Status in linux-azure package in Ubuntu: Fix Released Status in linux-azure-4.15 package in Ubuntu: New Status in linux-azure source package in Bionic: Invalid Status in linux-azure-4.15 source package in Bionic: Fix Released Status in linux-azure source package in Eoan: Fix Released Status in linux-azure-4.15 source package in Eoan: Invalid Status in linux-azure source package in Focal: Fix Released Status in linux-azure-4.15 source package in Focal: Invalid Bug description: Microsoft would like to request the following two commits in all releases supported on Azure: 999dd956d838 ("PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2") f9ad0f361cf3 ("PCI: hv: Decouple the func definition in hv_dr_state from VSP message") These two commits will add support for PCI protocol version 1.3. This will allow the host to pass NUMA node information for devices on the bus. Currently it is assumed the NUMA node is 0, which these patches will correct. This functionality will provide an increase in performance, especially for HPC and AI workloads. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1880975/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp