This bug was fixed in the package linux-raspi - 6.5.0-1002.2 --------------- linux-raspi (6.5.0-1002.2) mantic; urgency=medium
* mantic/linux-raspi: 6.5.0-1002.2 -proposed tracker (LP: #2033637) * Packaging resync (LP: #1786013) - [Packaging] update update.conf * Miscellaneous Ubuntu changes - [Config] raspi: Add notes to configs that differ from master - [Config] raspi: Set CONFIG_ARM_ERRATA_<foo>=n - [Config] raspi: Set PREEMPT_DYNAMIC=y - [Config] raspi: Set STAGING_MEDIA_DEPRECATED=n - [Config] raspi: Set EFI=n - [Config] raspi: Set POWER_RESET_GPIO_RESTART=n - [Config] raspi: Set HID_BPF=n - [Config] raspi: Set COMMON_CLK_FIXED_MMIO=n - [Config] raspi: Set PWM_STMPE=n - [Config] raspi: Set LEDS_SYSCON=n - [Packaging] raspi: Include bcm2835_smi module in linux-modules - SAUCE: (no-up) Disable FIQ split-transaction FSM in dwc_otg * Miscellaneous upstream changes - drivers: media: imx296: Updated imx296 driver for external trigger - char: broadcom: vc_mem: Fix preprocessor conditional - drivers: dwc_otg: Fix fallthrough warnings - vc04_services/vc-sm-cma: Switch one-bit bitfields to bool - media: i2c: ov2311: Fix uninitialized variable usage - drm/panel: Fix default values for Waveshare 7.9 inch DSI touchscreen (#5565) - dtoverlays: Add i2c bus overrides to edt-ft5406 overlay - dtoverlays: Fix README text for i2c-fan - drivers: irqchip: irq-bcm2835: Concurrency fix - defconfigs: Add TINYDRM_ILI9486 to defconfigs - dtoverlays: Add drm option to piscreen overlay - drm/ili9486: Resolve clash in spi_device_id names - input: ads7846: Add missing spi_device_id strings - staging: bcm2835-codec: Downgrade the level for a debug message - configs: Raise 8250 UART limit to 5 on BCM2711 [ Ubuntu: 6.5.0-5.5 ] * mantic/linux: 6.5.0-5.5 -proposed tracker (LP: #2034546) * Packaging resync (LP: #1786013) - [Packaging] update helper scripts - debian/dkms-versions -- update from kernel-versions (main/d2023.08.23) [ Ubuntu: 6.5.0-4.4 ] * mantic/linux: 6.5.0-4.4 -proposed tracker (LP: #2034042) * Packaging resync (LP: #1786013) - debian/dkms-versions -- update from kernel-versions (main/d2023.08.23) [ Ubuntu: 6.5.0-3.3 ] * mantic/linux: 6.5.0-3.3 -proposed tracker (LP: #2033904) * Packaging resync (LP: #1786013) - debian/dkms-versions -- update from kernel-versions (main/d2023.08.23) * [23.10] Please test secure-boot and lockdown on the early 6.5 kernel (s390x) (LP: #2026833) - [Packaging] re-enable signing for s390x * Miscellaneous upstream changes - module/decompress: use vmalloc() for zstd decompression workspace [ Ubuntu: 6.5.0-2.2 ] * mantic/linux: 6.5.0-2.2 -proposed tracker (LP: #2033240) * Soundwire support for Dell SKU0C87 devices (LP: #2029281) - SAUCE: ASoC: Intel: soc-acpi: add support for Dell SKU0C87 devices * Fix numerous AER related issues (LP: #2033025) - SAUCE: PCI/AER: Disable AER service during suspend, again - SAUCE: PCI/DPC: Disable DPC service during suspend, again * Support Realtek RTL8852CE WiFi 6E/BT Combo (LP: #2025672) - wifi: rtw89: debug: Fix error handling in rtw89_debug_priv_btc_manual_set() - Bluetooth: btrtl: Load FW v2 otherwise FW v1 for RTL8852C * Rebase to v6.5 [ Ubuntu: 6.5.0-1.1 ] * mantic/linux: 6.5.0-1.1 -proposed tracker (LP: #2032750) * Packaging resync (LP: #1786013) - [Packaging] resync update-dkms-versions helper - [Packaging] update variants - debian/dkms-versions -- update from kernel-versions (main/d2023.07.26) * ceph: support idmapped mounts (LP: #2032959) - SAUCE: libceph: add spinlock around osd->o_requests - SAUCE: libceph: define struct ceph_sparse_extent and add some helpers - SAUCE: libceph: new sparse_read op, support sparse reads on msgr2 crc codepath - SAUCE: libceph: support sparse reads on msgr2 secure codepath - SAUCE: libceph: add sparse read support to msgr1 - SAUCE: libceph: add sparse read support to OSD client - SAUCE: ceph: add new mount option to enable sparse reads - SAUCE: ceph: preallocate inode for ops that may create one - SAUCE: ceph: make ceph_msdc_build_path use ref-walk - SAUCE: libceph: add new iov_iter-based ceph_msg_data_type and ceph_osd_data_type - SAUCE: ceph: use osd_req_op_extent_osd_iter for netfs reads - SAUCE: ceph: fscrypt_auth handling for ceph - SAUCE: ceph: implement -o test_dummy_encryption mount option - SAUCE: ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr - SAUCE: ceph: make ioctl cmds more readable in debug log - SAUCE: ceph: add base64 endcoding routines for encrypted names - SAUCE: ceph: encode encrypted name in ceph_mdsc_build_path and dentry release - SAUCE: ceph: send alternate_name in MClientRequest - SAUCE: ceph: decode alternate_name in lease info - SAUCE: ceph: set DCACHE_NOKEY_NAME flag in ceph_lookup/atomic_open() - SAUCE: ceph: make d_revalidate call fscrypt revalidator for encrypted dentries - SAUCE: ceph: add helpers for converting names for userland presentation - SAUCE: ceph: make ceph_fill_trace and ceph_get_name decrypt names - SAUCE: ceph: pass the request to parse_reply_info_readdir() - SAUCE: ceph: add support to readdir for encrypted names - SAUCE: ceph: create symlinks with encrypted and base64-encoded targets - SAUCE: ceph: add some fscrypt guardrails - SAUCE: ceph: allow encrypting a directory while not having Ax caps - SAUCE: ceph: mark directory as non-complete after loading key - SAUCE: ceph: size handling in MClientRequest, cap updates and inode traces - SAUCE: ceph: handle fscrypt fields in cap messages from MDS - SAUCE: ceph: add infrastructure for file encryption and decryption - SAUCE: libceph: add CEPH_OSD_OP_ASSERT_VER support - SAUCE: libceph: allow ceph_osdc_new_request to accept a multi-op read - SAUCE: ceph: add object version support for sync read - SAUCE: ceph: add truncate size handling support for fscrypt - SAUCE: ceph: don't use special DIO path for encrypted inodes - SAUCE: ceph: align data in pages in ceph_sync_write - SAUCE: ceph: add read/modify/write to ceph_sync_write - SAUCE: ceph: add encryption support to writepage and writepages - SAUCE: ceph: plumb in decryption during reads - SAUCE: ceph: invalidate pages when doing direct/sync writes - SAUCE: ceph: add support for encrypted snapshot names - SAUCE: ceph: prevent snapshot creation in encrypted locked directories - SAUCE: ceph: update documentation regarding snapshot naming limitations - SAUCE: ceph: drop messages from MDS when unmounting - SAUCE: ceph: wait for OSD requests' callbacks to finish when unmounting - SAUCE: ceph: fix updating i_truncate_pagecache_size for fscrypt - SAUCE: ceph: switch ceph_lookup/atomic_open() to use new fscrypt helper - SAUCE: libceph: do not include crypto/algapi.h - SAUCE: rbd: bump RBD_MAX_PARENT_CHAIN_LEN to 128 - SAUCE: ceph: dump info about cap flushes when we're waiting too long for them - SAUCE: mm: BUG if filemap_alloc_folio gives us a folio with a non-NULL ->private - SAUCE: ceph: make sure all the files successfully put before unmounting - SAUCE: ceph: BUG if MDS changed truncate_seq with client caps still outstanding - SAUCE: ceph: add the *_client debug macros support - SAUCE: ceph: pass the mdsc to several helpers - SAUCE: ceph: rename _to_client() to _to_fs_client() - SAUCE: ceph: move mdsmap.h to fs/ceph/ - SAUCE: ceph: add ceph_inode_to_client() helper support - SAUCE: ceph: print the client global_id in all the debug logs - SAUCE: ceph: make the members in struct ceph_mds_request_args_ext an union - SAUCE: ceph: make num_fwd and num_retry to __u32 - SAUCE: fs: export mnt_idmap_get/mnt_idmap_put - SAUCE: ceph: stash idmapping in mdsc request - SAUCE: ceph: handle idmapped mounts in create_request_message() - SAUCE: ceph: add enable_unsafe_idmap module parameter - SAUCE: ceph: pass an idmapping to mknod/symlink/mkdir - SAUCE: ceph: allow idmapped getattr inode op - SAUCE: ceph: allow idmapped permission inode op - SAUCE: ceph: pass idmap to __ceph_setattr - SAUCE: ceph: allow idmapped setattr inode op - SAUCE: ceph/acl: allow idmapped set_acl inode op - SAUCE: ceph/file: allow idmapped atomic_open inode op - SAUCE: ceph: allow idmapped mounts * Got soft lockup CPU if dell_uart_backlight is probed (LP: #2032174) - SAUCE: platform/x86: dell-uart-backlight: replace chars_in_buffer() with flush_chars() * Fix ACPI TAD on some Intel based systems (LP: #2032767) - ACPI: TAD: Install SystemCMOS address space handler for ACPI000E * Fix unreliable ethernet cable detection on I219 NIC (LP: #2028122) - e1000e: Use PME poll to circumvent unreliable ACPI wake * Fix panel brightness issues on HP laptops (LP: #2032704) - ACPI: video: Put ACPI video and its child devices into D0 on boot * FATAL:credentials.cc(127)] Check failed: . : Permission denied (13) (LP: #2017980) - [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * Support initrdless boot on default qemu virt models and openstack (LP: #2030745) - [Config] set VIRTIO_BLK=y for default qemu/openstack boot * Miscellaneous Ubuntu changes - [Packaging] rust: use Rust 1.68.2 - [Packaging] depend on clang/libclang-15 for Rust - [Config] update toolchain versions in annotations - [Config] update annotations after rebase to v6.5-rc6 - [Config] update toolchain version in annotations - [Packaging] temporarily disable Rust support - [Packaging] temporarily disable signing for ppc64el - [Packaging] temporarily disable signing for s390x [ Ubuntu: 6.5.0-0.0 ] * Empty entry -- Juerg Haefliger <juerg.haefli...@canonical.com> Fri, 08 Sep 2023 11:49:46 +0200 ** Changed in: linux-raspi (Ubuntu Mantic) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-raspi in Ubuntu. https://bugs.launchpad.net/bugs/2027983 Title: CONFIG_MPTCP_IPV6 is no longer enabled in Raspi Lunar in v6.2.0 Status in linux-raspi package in Ubuntu: Fix Released Status in linux-raspi source package in Lunar: Fix Released Status in linux-raspi source package in Mantic: Fix Released Bug description: Hello, First, thank you for maintaining this kernel package for RPi! When looking at something else[1], Phil Elwell from Raspbian OS noticed that in the Ubuntu Raspi Lunar image with a kernel v6.2, CONFIG_MPTCP_IPV6 is not enabled. I guess this is because CONFIG_IPV6 is compiled as a module while it should be inlined according to the source code [2][3]: CONFIG_IPV6 policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 's390x': 'y'}> CONFIG_IPV6 mark<ENFORCED> note<if this is a module we get a module load for every ipv6 packet> The note explicitly says that it should not be set as a module. Note that the previous kernels v5.15 and v5.19 do have CONFIG_IPV6=y (and CONFIG_MPTCP_IPV6=y) [4]. Also, the last v6.2 "generic" kernel config is also OK (CONFIG_IPV6=y) [5]. It looks like the v6.2.0-1001.1 [6] was OK but not the next one, 6.2.0-1002.2 [7]. I hope this will help finding the "regression". Cheers, Matt [1] https://github.com/raspberrypi/linux/pull/5487 [2] https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux-raspi/+git/lunar/tree/debian.raspi/config/annotations [3] https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux-raspi/+git/lunar/tree/debian.master/config/annotations [4] https://kernel.ubuntu.com/~kernel-ppa/config/lunar/linux-raspi/ [5] https://kernel.ubuntu.com/~kernel-ppa/config/lunar/linux/ [6] https://kernel.ubuntu.com/~kernel-ppa/config/lunar/linux-raspi/6.2.0-1001.1/arm64-config.flavour.raspi [7] https://kernel.ubuntu.com/~kernel-ppa/config/lunar/linux-raspi/6.2.0-1002.2/arm64-config.flavour.raspi To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-raspi/+bug/2027983/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp