I agree, it is odd that the test was skipped/not built until this cycle.
I'm not sure what changed. I don't see anything obvious in the kernel
selftest sources or autotest-client-test. Should the tag be sru-20250113
instead?
--
You received this bug notification because you are a member of Ubuntu
Hi Andreas,
we have an initial version of the plucky raspi kernel available in our
bootstrap ppa (6.14.0-1003.3). Could you maybe check if it resolves the
problem? The kernel that currently comes with plucky is an old oracular kernel.
https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Noble)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Noble)
Status: New => In Progress
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Ma
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
on GT reset
UBUNTU: Upstream stable to v6.6.62, v6.11.9
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Also affects: linux-raspi (Ubuntu Plucky)
Importance: Undecided
Status: Invalid
** Changed in: linux-raspi (Ubuntu Plucky)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
$ uname -a
Linux cloudimg 6.8.0-56-generic #58-Ubuntu SMP PREEMPT_DYNAMIC Fri Feb 14
15:33:28 UTC 2025 x86_64 x86_64 x86_64 GNU/Linux
$ python3 -c 'import perf; [print(c) for c in perf.cpu_map()]'
0
1
2
3
4
5
6
7
$
** Tags removed: verification-needed-noble-linux
** Tags added: verification-done-
Kernel boots again after the patch was reverted.
** Tags removed: verification-needed-xenial-linux
** Tags added: verification-done-xenial-linux
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2098704
Can you reproduce this problem on the latest raspi kernel? From the
information you shared it looks like you're running 6.11.0-1004-raspi
which is from last September. If you upgrade, you should be on version
6.11.0-1008.8, via the -proposed pocket you could even try out the
latest version 6.11.0-1
** Changed in: linux-raspi (Ubuntu Noble)
Status: New => Fix Committed
** Changed in: linux-raspi (Ubuntu Oracular)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
** Changed in: linux-raspi (Ubuntu Noble)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2099685
Title:
GPIO sysfs disabled in raspi kernel
To manage notifi
I'm glad to hear the issue is resolved.
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Noble)
Status: In Progress => Fix Released
** Changed in: linux (Ubuntu Oracular)
Status: In Progress => Fix Released
** Changed in: linux-hwe-6.8 (Ubun
Public bug reported:
timers/raw_skew subtest from kernel selftests fails to build on xenial:
17:30:43 DEBUG| [stdout] make[1]: Entering directory
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/timers'
17:30:43 DEBUG| [stdout] gcc -O3 -Wl,-no-as-needed
To fix this boot regression we will revert the CVE fix in xenial for
now.
** Changed in: linux (Ubuntu Xenial)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/209
Public bug reported:
The backport of upstream stable commit 05412471beba "bpf: Take return
from set_memory_ro() into account with bpf_prog_lock_ro()" (linux-6.9.y)
for xenial breaks the boot on arm64 machines in security cycle
s2025.01.13. Note that the backport for bionic that was submitted
toget
t missing common Soundwire module code on SDM845
UBUNTU: SAUCE: Revert "iio: adc: ti-lmp92064: add missing select
IIO_(TRIGGERED_)BUFFER in Kconfig"
UBUNTU: Upstream stable to v6.6.58, v6.6.59, v6.11.6
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affect
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Noble)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Noble)
Status: New => In Progress
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Ma
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
proc/kcore.c: allow translation of physical memory addresses
secretmem: disable memfd_secret() if arch cannot set direct map
io_uring/rw: fix cflags posting for single issue multishot read
UBUNTU: Upstream stable to v6.6.56, v6.11.1, v6.11.2, v6.11.3, v6.11.4
** Affects: linux (Ubuntu)
Importance
Hi Kelvin,
thanks for confirming my suspicion. This bug affects noble (24.04 LTS), the
jammy hwe kernel (22.04 LTS) and oracular (24.10). The earliest that we could
land a fix for these affected series is in the upcoming SRU cycle that will
release kernels (tentatively) in the first week of Marc
I would probably try the latest available stable v6.8 version, so
v6.8.12. It might be worth a shot to try the most recent stable mainline
version to, v6.12. Trying mainline 6.8 would verify whether it's an
upstream or an ubuntu-specific problem and trying 6.12 would show
whether there's a fix avai
With regards to the logs, whenever you're experiencing the issue, you
could grab the kernel log with dmesg and upload here. There might be
some clues in the kernel log as to what's going on or why this is
happening.
Since it sounds like you've experienced the issue up to mainline 6.11
kernel build
What hardware exactly are you experiencing this on? You can collect and
upload more information about your system with apport-collect:
https://github.com/canonical/apport
Ideally we would be able to narrow it down more. Could you try running a
more recent mainline kernel build? v6.12 would be good
e logic when DVB_DYNAMIC_MINORS is not set
Linux 6.11.10
UBUNTU: Upstream stable to v6.11.10
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Oracular)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Prog
(Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Oracular)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
zing vsk->trans to NULL to prevent a dangling pointer
Linux 6.11.8
UBUNTU: Upstream stable to v6.11.8
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Oracular)
Importance: Medium
Assignee: Manuel Diewald (diewald)
S
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Oracular)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Oracular)
Status: New => In Progress
** Changed in: linux (Ubuntu Oracular)
Assignee: (unassigned)
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
*** This bug is a duplicate of bug 2083994 ***
https://bugs.launchpad.net/bugs/2083994
You're right, I didn't notice the changes for #2083994 also include a
fix to address this issue. I think to make things less confusing I'll
mark this bug as duplicate and close my merge request.
** This bug
oracular:linux-raspi 6.11.0-1005.5:
root@ubuntu:~# echo "none" > /sys/devices/virtual/block/loop1/queue/scheduler
root@ubuntu:~# echo $?
0
** Tags removed: verification-needed-oracular-linux-raspi
** Tags added: verification-done-oracular-linux-raspi
--
You received this bug notification becaus
Verified with oracular:linux 6.11.0-1005.5 on a Pi4. Installed and
configured kdump-tools, edited /boot/firmware/cmdline.txt to include a
crashkernel setting and rebooted the system. Triggering a crash via echo
c | sudo tee /proc/sysrq-trigger caused the machine to reboot and a
crash dump was store
I've created a test kernel for noble here:
https://launchpad.net/~diewald/+archive/ubuntu/ppa-2085103
Please install the kernel and verify whether it solves the issue:
sudo add-apt-repository ppa:diewald/ppa-2085103
sudo apt update
sudo apt-get install linux-image-unsigned-6.8.0-51-generic
--
Y
Hi, I have a suspicion of what change in the kernel might have caused
this. I've prepared a test kernel for noble to verify my theory here:
https://launchpad.net/~diewald/+archive/ubuntu/ppa-2061373
It would be very helpful if you could install the kernel from that ppa
and see if that solves the p
ubuntu@ubuntu:~$ sudo uname -a
Linux ubuntu 6.11.0-1005-raspi #5-Ubuntu SMP PREEMPT_DYNAMIC Fri Nov 22
13:24:30 UTC 2024 aarch64 aarch64 aarch64 GNU/Linux
ubuntu@ubuntu:~$ sudo dmesg | grep landl
[0.000580] LSM: initializing
lsm=lockdown,capability,landlock,yama,apparmor,ima,evm
[0.000654
This issue resurfaced recently, e.g. with trusty:linux 3.13.0-201. The
root cause might be different, I suspect it might be related to trusty
missing upstream fix
2e356101e72a KEYS: reaching the keys quotas correctly
so this test is failing similarly to add_key05 (LP: #1879906) which was
fixed fo
I assume the attached kernel log (dmesg) is not from session where the
freeze occurred? Can you try and attach a kernel log that was captured
when your system froze? Could you also try a mainline 6.8 kernel? You
can find mainline kernel builds here:
https://kernel.ubuntu.com/mainline/. Once linux-h
** Also affects: linux (Ubuntu Noble)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089785
Title:
When resuming from sleep, computer sometime freezes
To
** Also affects: linux-bluefield (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux-bluefield (Ubuntu Jammy)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
The patch was nominated for the linux stable tree so it should find its
way into the affected Ubuntu kernels through upstream stable updates
eventually.
** Also affects: linux (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Oracular)
Importance: Undeci
** Changed in: linux-restricted-modules (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089802
Title:
package linux-modules-nvidia-550-6.8.0-47-generic 6.8.0-47
** Tags added: kern-12157
** Also affects: linux-raspi (Ubuntu Noble)
Importance: Undecided
Status: New
** Changed in: linux-raspi (Ubuntu Noble)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
So the issue is not present with noble 6.8? What kernel version was the
mainline build you used temporarily on noble? Do you still experience
the issue with the current mainline? Could you try to provide kernel
logs from when the issue is actually occurring?
** Changed in: linux (Ubuntu Oracular)
Did you upgrade from oracular? What was the last working kernel version?
** Changed in: linux-meta (Ubuntu Plucky)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089523
** Also affects: linux-meta (Ubuntu Plucky)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089523
Title:
linux-modules-iwlwifi-generic: initialization of
Is this still an issue with the latest kernel version in -updates
5.15.0-1069-gke? Can you provide more information, most importantly a
kernel log? You can collect logs with apport-collect:
https://github.com/canonical/apport.
** Also affects: linux-gke (Ubuntu Jammy)
Importance: Undecided
*** This bug is a duplicate of bug 2068107 ***
https://bugs.launchpad.net/bugs/2068107
** This bug has been marked a duplicate of bug 2068107
package linux-headers- failed to install/upgrade:
installed linux-headers- package post-installation script subprocess
returned error exit status
** Also affects: linux (Ubuntu Oracular)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089232
Title:
audio corruption since kernel >6.8, solved temporari
stable to v5.4.286
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
St
to ENOMEM
9p: fix slab cache name creation for real
Linux 5.15.173
UBUNTU: Upstream stable to v5.15.173
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status:
e to v5.15.172
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status
text UAFs
vt: prevent kernel-infoleak in con_font_get()
mac80211: always have ieee80211_sta_restart()
Linux 5.15.171
UBUNTU: Upstream stable to v5.15.171
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
A
** Patch added: "backport-iwlwifi-dkms_11510-0ubuntu1~22.04.2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/+bug/2089385/+attachment/5839505/+files/backport-iwlwifi-dkms_11510-0ubuntu1~22.04.2.debdiff
--
You received this bug notification because you are a member of
b16db
** Affects: backport-iwlwifi-dkms (Ubuntu)
Importance: Undecided
Status: New
** Affects: backport-iwlwifi-dkms (Ubuntu Jammy)
Importance: High
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Also affects: backport-iwlwifi-dkms (Ubuntu Jammy)
Importa
** Changed in: linux-raspi (Ubuntu Noble)
Status: Confirmed => Fix Committed
** Changed in: linux-raspi (Ubuntu Oracular)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
** Also affects: linux-raspi (Ubuntu Oracular)
Importance: Undecided
Status: New
** Also affects: kdump-tools (Ubuntu Oracular)
Importance: Undecided
Status: New
** Changed in: linux-raspi (Ubuntu Oracular)
Status: New => Fix Committed
** No longer affects: kdump-tools
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Ma
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
loc: Fix MTE false alarm in __do_krealloc
Linux 5.4.285
UBUNTU: Upstream stable to v5.4.285
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
*
11.5
UBUNTU: Upstream stable to v6.11.5
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Oracular)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed i
: Undecided
Status: Invalid
** Affects: linux (Ubuntu Oracular)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-sta
_uring/rw: fix cflags posting for single issue multishot read
Linux 6.11.4
UBUNTU: Upstream stable to v6.11.4
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Oracular)
Importance: Medium
Assignee: Manuel Diewald (diewald)
S
id overflow assignment
perf report: Fix segfault when 'sym' sort key is not used
pmdomain: core: Reduce debug summary table width
perf python: Allow checking for the existence of warning options in clang
Linux 6.11.3
UBUNTU: Upstream stable to v6.11.3
** Affects: linux (Ubuntu)
** Also affects: linux (Ubuntu Noble)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2087856
Title:
ELAN1206:00 04F3:30F1 Touchpad Functionality Lost with
Changed in: linux (Ubuntu Noble)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Oracular)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Manuel Diewald (diewald)
** Changed in: linux (Ubuntu Oracular)
Assignee: (unas
There might be a fix available via upstream stable, I will prepare a
test kernel to verify this.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2085103
Title:
pci hot plug get "retraining non-functio
Have you observed the issue also with the previous version
6.11.0-8-generic? Could you possibly test that version if you haven't
done so already? It would also be interesting whether 6.11 mainline
presents the same symptom: https://kernel.ubuntu.com/mainline/
(unfortunately our mainline builds are
Potentially a duplicate of bug
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1966159.
Can you try the suggested solution from that bug:
fix by setting the following permissions
chmod 0775 /usr/share/doc/linux-libc-dev/copyright.dpkg-new
Then Run
sudo apt-get upgrade
--
You received th
Either way, please collect more information and logs and attach them to
this bug. You may use apport-collect for that purpose
(https://wiki.ubuntu.com/Apport).
** Changed in: linux (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
You have filed the bug against the linux kernel package, but from what I
can tell, this does not necessarily look like a kernel issue. This could
rather be an issue with the installer maybe? The way the swap partition
is set up during installation seems to be the problem.
--
You received this bug
Can you attach a kernel log (dmesg) from when a crash or freeze occurred
please? Has this issue presented itself before or only after a recent
kernel upgrade? What is the last known working kernel version?
** Changed in: linux-signed-hwe-6.8 (Ubuntu)
Status: New => Incomplete
--
You recei
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Noble)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Noble)
Status: New => In Progress
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Ma
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
ion
drm/amd/display: Disable DMCUB timeout for DCN35
drm/amd/display: Avoid overflow from uint32_t to uint8_t
pinctrl: core: reset gpio_device in loop in pinctrl_pins_show()
UBUNTU: Upstream stable to v6.6.50, v6.10.9
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invali
am stable to v5.15.164
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
verification for short frame
Linux 5.4.281
UBUNTU: Upstream stable to v5.4.281
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags:
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confi
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
*
NTU: Upstream stable to v6.6.36, v6.9.7
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed
For noble:linux it seems not only the SM4 testcases, but also the ARIA
testcases are failing on s390x. Observed on s390x metal instances during
s2024.06.10. It seems the issue has been at least present since we
started testing noble during SRU cycles (2024.04.29).
FAIL tls.13_sm4_gcm.sendfile
FAI
rs always initialize ->done_io
pwm: Fix setting period with #pwm-cells = <1> and of_pwm_single_xlate()
net: txgbe: fix to clear interrupt status after handling IRQ
net: txgbe: fix GPIO interrupt blocking
Linux 6.8.12
UBUNTU: Upstream stable to v6.8.12
** Affects: linux (Ubuntu)
Importance:
a partscan sysfs attribute for disks
Linux 6.8.11
UBUNTU: Upstream stable to v6.8.11
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
o leak when fetching fw build id
Bluetooth: qca: fix firmware check error path
keys: Fix overwrite of key expiration on instantiation
Linux 6.8.10
UBUNTU: Upstream stable to v6.8.10
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Noble)
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Noble)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Noble)
Status: New => In Progress
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Ma
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
cts: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu J
Hi Matt,
This upstream stable update is series-specific (focal), so I set the status of
the generic linux package to 'Invalid'. Its status is tracked only for focal,
and as you can see it is currently 'In Progress'. Once it is applied to the
tree, the status will be changed to 'Fix committed' an
Cope with docutils 0.21
Linux 5.4.277
UBUNTU: Upstream stable to v5.4.277
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stab
erwrite of key expiration on instantiation
md: fix kmemleak of rdev->serial
Linux 5.15.159
UBUNTU: Upstream stable to v5.15.159
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diew
FIG_INPUT_SCHMITT_ENABLE readback
Linux 5.4.276
UBUNTU: Upstream stable to v5.4.276
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
**
*** This bug is a duplicate of bug 2053147 ***
https://bugs.launchpad.net/bugs/2053147
** This bug has been marked a duplicate of bug 2053147
CONFIG_EFI_STUB support disabled since 6.5.0-1002.2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags ad
portance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-sta
u)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: k
** Tags added: kern-10893
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065829
Title:
BTF support missing from kernel
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubunt
possible memcpy() run-time warning in
vmci_datagram_invoke_guest_handler()
Linux 5.15.155
UBUNTU: Upstream stable to v5.15.155
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald
.head.text section
Linux 6.8.5
UBUNTU: Upstream stable to v6.8.5
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stabl
** Tags added: kern-10457
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060677
Title:
Consistent (zfs?) errors at shutdown
To manage notifications about this bug go to:
https://bugs.launchpad.net/
** Tags added: kern-10444
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060300
Title:
KMS overlay causes OOM oops on 3A+
To manage notifications about this bug go to:
https://bugs.launchpad.net/ub
** Tags added: kern-10408
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060240
Title:
Pi DAC+ fails on Pi 5
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/
p: fix double-free on socket dismantle
Linux 5.15.151
UBUNTU: Upstream stable to v5.15.151
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Ta
1 - 100 of 124 matches
Mail list logo