nvme: Missing patch in Ubuntu-4.4.0-41.61

Bug #1628520 reported by bugproxy
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Undecided
Unassigned
Xenial
Fix Released
Medium
Kamal Mostafa

Bug Description

== Comment: #0 - Gabriel Krisman Bertazi <email address hidden> - 2016-09-27 22:59:44 ==
Ubuntu-4.4.0-40.60 included my backport of :

b00a726a9fd ("NVMe: Don't unmap controller registers on reset") #upstream commit
  [ 30d6592fce71 on the Ubuntu -proposed branch]

But missed the fix up that came later:

81e9a969c441 ("nvme: Call pci_disable_device on the error path.") # 4.4.y tree

This means that we may hit an Oops if we need to go into the error path of the nvme probe.

Please cherry-pick this fix to your kernel.

bugproxy (bugproxy)
tags: added: architecture-all bugnameltc-146899 severity-high targetmilestone-inin---
Changed in ubuntu:
assignee: nobody → Taco Screen team (taco-screen-team)
affects: ubuntu → linux (Ubuntu)
Revision history for this message
Breno Leitão (breno-leitao) wrote :

This is a bug against 16.04, right?

Changed in linux (Ubuntu Xenial):
assignee: nobody → Kamal Mostafa (kamalmostafa)
status: New → In Progress
Changed in linux (Ubuntu Xenial):
importance: Undecided → Medium
Changed in linux (Ubuntu Xenial):
status: In Progress → Fix Committed
Revision history for this message
bugproxy (bugproxy) wrote : Comment bridged from LTC Bugzilla

------- Comment From <email address hidden> 2016-10-04 10:36 EDT-------
(In reply to comment #4)
> This is a bug against 16.04, right?

yes.

Revision history for this message
bugproxy (bugproxy) wrote :

------- Comment From <email address hidden> 2016-10-10 00:05 EDT-------
(In reply to comment #5)
> (In reply to comment #4)
> > This is a bug against 16.04, right?
>
> yes.

Patch was applied in master-next during a rebase on the -stable kernel.

c7ebb31cd3f7 ("nvme: Call pci_disable_device on the error path.")

I'm satisfied by this. Closing.

tags: added: targetmilestone-inin16044
removed: targetmilestone-inin---
Revision history for this message
Seth Forshee (sforshee) wrote :

This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-xenial' to 'verification-done-xenial'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-xenial
bugproxy (bugproxy)
tags: added: verification-done-xenial
removed: verification-needed-xenial
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 4.4.0-47.68

---------------
linux (4.4.0-47.68) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
    - LP: #1636941

  * Add a driver for Amazon Elastic Network Adapters (ENA) (LP: #1635721)
    - lib/bitmap.c: conversion routines to/from u32 array
    - net: ethtool: add new ETHTOOL_xLINKSETTINGS API
    - net: ena: Add a driver for Amazon Elastic Network Adapters (ENA)
    - [config] enable CONFIG_ENA_ETHERNET=m (Amazon ENA driver)

  * unexpectedly large memory usage of mounted snaps (LP: #1636847)
    - [Config] switch squashfs to single threaded decode

 -- Kamal Mostafa <email address hidden> Wed, 26 Oct 2016 10:47:55 -0700

Changed in linux (Ubuntu Xenial):
status: Fix Committed → Fix Released
bugproxy (bugproxy)
tags: removed: bugnameltc-146899 severity-high verification-done-xenial
Revision history for this message
Andrew Cloke (andrew-cloke) wrote :

Marking "root" bug as fix released, as the bug is specifically against the Xenial 4.4 kernel, and that is "Fix Released".

Changed in linux (Ubuntu):
assignee: Taco Screen team (taco-screen-team) → nobody
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.