Forget the previous patch. It contains BUSYBOX changes as well which I
believe we don't need (doesn't make sense).
** Summary changed:
- Create the kdump initrd with MODULES=most and BUSYBOX=y
+ Create the kdump initrd with MODULES=most
** Description changed:
There are use cases where most
Public bug reported:
If kdump-tools fails to create an initrd, the temp initrd is not
deleted:
kdump-tools: Generating /var/lib/kdump/initrd.img-4.15.0-74-generic
update-initramfs: failed for with 1.
$ ls -l /var/lib/kdump
total 4
drwxr-xr-x 5 root root 4096 Jan 17 12:14 initramfs-tools
-rw-r--r
** Patch added:
"0001-Add-a-config-variable-to-control-which-modules-to-in.patch"
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1860089/+attachment/5321130/+files/0001-Add-a-config-variable-to-control-which-modules-to-in.patch
--
You received this bug notification because you a
** Patch added: "0001-Delete-temporary-initrd-on-failure.patch"
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/1860118/+attachment/5321129/+files/0001-Delete-temporary-initrd-on-failure.patch
--
You received this bug notification because you are a member of Kernel
Packages, which
Public bug reported:
The main Focal kernel in now based on 5.4, so update linux-raspi2
accordingly.
** Affects: linux-raspi2 (Ubuntu)
Importance: Undecided
Status: Confirmed
** Affects: linux-raspi2 (Ubuntu Focal)
Importance: Undecided
Status: Confirmed
** Also affec
** Summary changed:
- Update linux-raspi2 from 5.3 to 5.4
+ Create new linux-raspi2-5.4 package
** Description changed:
- The main Focal kernel in now based on 5.4, so update linux-raspi2
- accordingly.
+ The main Focal kernel in now based on 5.4, so create a corresponding
+ linux-raspi2-5.4 pac
eam (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
*
cal-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
--
cal-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
--
** Tags added: kernel-unblock-ppa
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1833977
Title:
linux-ibm-gt: 4.15.0-1025.27 -proposed tracker
Status in Kernel SRU Workflow:
In Progre
cal-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
--
Private bug reported:
Placeholder. Need to change Precise arch/x86/kernel/kvm/* from:
if (ibrs_enabled && (svm->spec_ctrl != SPEC_CTRL_IBRS))
wrmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl);
if (ibrs_enabled) {
rdmsrl(MSR_IA32_SPEC_CTRL, svm->spec_ctrl);
if (svm->spec_ctrl != SPEC_CTRL_IB
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Invalid
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
--
You received this bug notification
** Changed in: kernel-sru-workflow/security-signoff
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1834528
Title:
linux-ibm-gt: 4.15.0-1026.28 -pro
cal-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
--
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Invalid
--
You received this bug notification becau
eam) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-
*** This bug is a duplicate of bug 1834941 ***
https://bugs.launchpad.net/bugs/1834941
** This bug is no longer a duplicate of bug 1834528
linux-ibm-gt: 4.15.0-1026.28 -proposed tracker
** This bug has been marked a duplicate of bug 1834941
linux-ibm-gt: 4.15.0-1027.29 -proposed tracker
*** This bug is a duplicate of bug 1834941 ***
https://bugs.launchpad.net/bugs/1834941
** This bug has been marked a duplicate of bug 1834941
linux-ibm-gt: 4.15.0-1027.29 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscrib
*** This bug is a duplicate of bug 1834941 ***
https://bugs.launchpad.net/bugs/1834941
** This bug is no longer a duplicate of bug 1834528
linux-ibm-gt: 4.15.0-1026.28 -proposed tracker
** This bug has been marked a duplicate of bug 1834941
linux-ibm-gt: 4.15.0-1027.29 -proposed tracker
eam) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-lbm
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-lbm
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-
nel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli
nel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1842812
Title:
bionic/linux-ibm-gt: 4.15.0-1036.38 -pro
eam (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-lrm
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
*
eam (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juer
nel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-lrm
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli
@apolitech please do not hijack this bug for a completely unrelated
problem. If you believe yours is legit kernel issue then raise a new
ticket at https://bugs.launchpad.net/ubuntu/+source/linux/+filebug.
--
You received this bug notification because you are a member of Kernel
Packages, which is
I've built a test kernel that provides a new package linux-tools-
dev-. This is probably not what you ultimately want but would
that help in any way?
To install it:
$ sudo add-apt-repository ppa:juergh/kernel
$ sudo apt install linux-tools-dev-5.0.0-29
$ dpkg -L linux-tools-dev-5.0.0-29
/.
/usr
I understand, I just don't see how we can achieve this. You can have
multiple linux-tools packages installed and you'll get different
versions of libcpupower. We don't guarantee ABI stability so your
running app needs to be linked to the version of the running kernel or
it might no longer work.
I
** Changed in: linux (Ubuntu Disco)
Assignee: (unassigned) => Juerg Haefliger (juergh)
** Changed in: linux (Ubuntu Cosmic)
Assignee: (unassigned) => Juerg Haefliger (juergh)
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Juerg Haefliger (juergh)
** C
nel Team (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefli
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1844386
Title:
bionic/linux-ibm-gt: 4.15.0-1038.40 -pro
eam (canonical-kernel-team) => Juerg Haefliger
(juergh)
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) => Juerg Haefliger
(juer
** No longer affects: linux (Ubuntu Cosmic)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1822235
Title:
All 29 tests in kvm-unit-test failed (timeouted) on i386
Status in ubuntu-kerne
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1756866
Title:
Xenial update to 4.4.118 stable release
Status in linux package
Skipping the following patches (already applied):
* KVM: VMX: Make indirect call speculation safe
* KVM: x86: Make indirect calls in emulator speculation safe
* Drivers: hv: vmbus: fix build warning
--
You received this bug notification because you are a member of Kernel
Packages, which is
Skipping the following patches:
* x86/kvm: Update spectre-v1 mitigation
* x86/spectre: Report get_user mitigation for spectre_v1
* nl80211: Sanitize array index in parse_txq_params
* vfs, fdtable: Prevent bounds-check bypass via speculative execution
* x86/syscall: Sanitize syscall t
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
Skipped the following patch:
* nospec: Allow index argument to have const-qualified type
This patch modifies code from upstream's Spectre v1 implementation which
we haven't pulled in yet (skipped in the update to 4.4.118:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1756866/comments/2)
Skipped the following patch:
* mpls, nospec: Sanitize array index in mpls_label_ok()
It references array_index_nospec() which comes from upstream's Spectre
v1 implementation.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubu
Skipped the following patch:
* x86/syscall: Sanitize syscall table de-references under speculation fix
Which fixes a Spectre v1 commit from upstream 4.4.118 which we haven't
applied (yet).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
Skipped the following patches because they were applied already:
* netfilter: x_tables: pack percpu counter allocations
* netfilter: x_tables: pass xt_counters struct to counter allocator
* netfilter: x_tables: pass xt_counters struct instead of packet counter
* ARM: omap2: hide omap3_s
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
Skipped the following patches because they're applied already:
* bpf: fix incorrect sign extension in check_alu_op()
* scsi: ses: don't get power status of SES device slot on probe
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linu
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
Reverted the following SAUCE patch to be replaced by its upstream equivalent:
* UBUNTU: SAUCE: (no-up) iio: st_pressure: st_accel: Initialise sensor
platform data properly
Skipped the following patches since they're already applied:
* CIFS: Enable encryption during session setup phase
*
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
Skipped the following commits because they modify upstream's Spectre v1 code
which we haven't pulled in (yet) with the 4.4.118 stable update:
* nospec: Kill array_index_nospec_mask_check()
* nospec: Move array_index_nospec() parameter checking into separate macro
--
You received this bug
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch i
Skipped the following commits because they're already applied:
* scsi: libiscsi: Allow sd_shutdown on bad transport
* blk-mq: NVMe 512B/4K+T10 DIF/DIX format returns I/O error on dd with split
op
--
You received this bug notification because you are a member of Kernel
Packages, which is su
Skipped the following commit since it introduces a build failure as shown below:
* perf tests: Decompress kernel module before objdump
CC tests/llvm-src-base.o
CC tests/llvm-src-kbuild.o
LD util/libperf-in.o
tests/code-reading.c: In function 'read_object_code':
tests/cod
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
** Changed in: linux (Ubuntu)
Status: New => Incomplete
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ i
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
Skipped the following already-applied patches:
* Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (applied as:
UBUNTU: SAUCE: Input: elan_i2c - add ELAN0612 to the ACPI table)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to li
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774181
Title:
Update to upstream's implementation of S
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1775137
Title:
Prevent speculation on user controlled p
For Trusty 3.13, add the following patches:
* UBUNTU: SAUCE: filter: Use barrier_nospec() instead of osb()
* UBUNTU: SAUCE: Rename osb() to barrier_nospec()
* UBUNTU: SAUCE: Replace osb() calls with array_index_nospec()
* nospec: Kill array_index_nospec_mask_check()
* nospec: Move array_i
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1775137
Title:
Prevent speculation on user controlled p
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774181
Title:
Update to upstream's implementation of S
Per git bisect, the fix for this should be:
commit 6c971c09f38704513c426ba6515f22fb3d6c87d5
Author: Y.C. Chen
Date: Thu Jan 26 09:45:40 2017 +0800
drm/ast: Fixed system hanged if disable P2A
The original ast driver will access some BMC configuration through P2A
bridge
that ca
Public bug reported:
Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box
results in stuck CPU warnings:
[ 33.551942] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]
[ 33.558560] Modules linked in: hid_generic ast(+) crct10dif_pclmul
syscopyarea crc32_pclmul sys
ate)
+ and received testing there.
+
+ == Test Case ==
+
+ Booted a patched kernel on HW to verify it comes up without stuck CPU
+ warnings.
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Juerg Haefliger (juergh)
--
You received this bug notification because you are a member of Ke
Public bug reported:
== SRU Justification ==
Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel box
with a i40e NIC results in no network. The 3.13 i40e driver doesn't
support the following HW:
3d:00.0 Ethernet controller: Intel Corporation Device 37d2 (rev 02)
Subsystem
Thanks for the clarification, @brenohl. I decided to drop the two and
adjust the patch that collided. See https://lists.ubuntu.com/archives
/kernel-team/2018-May/092834.html.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
Public bug reported:
Xenial is currently lacking full support of upstream's Spectre v1
mitigation. As a first step to get there, add the array_index_nospec
macro and all the (simple) patches that make use of it.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Juerg Haef
** Changed in: linux (Ubuntu)
Status: New => Incomplete
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1765007
Ti
** Summary changed:
- Add array_index_nospec
+ Update to upstream's implementation of Spectre v1 mitigation
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774181
Title:
Update to upstr
Public bug reported:
Upstream's Spectre v1 mitigation prevents speculation on a user
controlled pointer. This part of the Spectre v1 patchset was never
backported to 4.4 (for unknown reasons) so Xenial is lacking it as well.
All the other stable upstream kernels include it, so add it to Xenial.
Sp
** Description changed:
Xenial is currently lacking full support of upstream's Spectre v1
- mitigation. As a first step to get there, add the array_index_nospec
- macro and all the (simple) patches that make use of it.
+ mitigation. Add the missing patches and merge them with Ubuntu's current
+
** Description changed:
- Upstream's Spectre v1 mitigation prevents speculation on a user
- controlled pointer. This part of the Spectre v1 patchset was never
- backported to 4.4 (for unknown reasons) so Xenial is lacking it as well.
- All the other stable upstream kernels include it, so add it to
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1772575
Title:
Kernel 4.4 NBD size overflow with image siz
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1771301
Title:
Setting ipv6.disable=1 prevents both IPv4 a
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1771826
Title:
Creation of IMA file hashes fails when appr
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1773905
Title:
Support UVC1.5 Camera for Xenial
Status in l
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1772775
Title:
4.4.0-127.153 generates many "sit: non-ECT"
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744173
Title:
rfi-flush: Switch to new linear fallback fl
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1772671
Title:
Kernel produces empty lines in /proc/PID/st
Skipped the following patches (already applied):
* KVM: s390: Enable all facility bits that are known good for passthrough
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774173
Title:
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable
List of previously applied patches:
* mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()
* bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y
* virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS
--
You received this bug notification becau
** Description changed:
-
SRU Justification
Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable L
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable L
List of previously applied patches:
* Revert "ima: limit file hash setting by user to fix and log modes"
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1776177
Title:
Xenial update to
** Description changed:
[Impact]
- Change flush from congruence-first with dependencies to linear with
- no dependencies, which increases flush performance by 8x on P8, and
- 3x on P9 (as measured with null syscall loop, which will have the
- flush area in the L2).
+ Change flush method from "co
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Juerg Haefliger (juergh)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1767857
Title:
Kernel 4.4.0-122 Breaks qemu-sys
For the latest xenial patchset: What's the purpose of patches 0001 &
0004??
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744173
Title:
rfi-flush: Switch to new linear fallback flush
301 - 400 of 3121 matches
Mail list logo