focal/linux-raspi: 5.4.0-1013.13 -proposed tracker

Bug #1882684 reported by Kleber Sacilotto de Souza on 2020-06-09
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Kelsey Margarete Skunberg
Prepare-package-meta
Medium
Kelsey Margarete Skunberg
Promote-to-proposed
Medium
Andy Whitcroft
Promote-to-security
Medium
Andy Whitcroft
Promote-to-updates
Medium
Andy Whitcroft
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Verification-testing
Medium
Canonical Kernel Team
linux-raspi (Ubuntu)
Focal
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1884963
packages:
  main: linux-raspi
  meta: linux-meta-raspi
phase: Complete
phase-changed: Tuesday, 07. July 2020 05:19 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason: {}
trackers:
  bionic/linux-raspi-5.4: bug 1882922
  focal/linux-raspi/pi-kernel: bug 1882683
variant: debs
versions:
  main: 5.4.0-1013.13
  meta: 5.4.0.1013.13

CVE References

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2020.06.08-1
description: updated
tags: added: kernel-sru-derivative-of-1882697
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-raspi (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → In Progress
description: updated
description: updated
description: updated
description: updated
summary: - focal/linux-raspi: <version to be filled> -proposed tracker
+ focal/linux-raspi: 5.4.0-1013.13 -proposed tracker
description: updated
summary: - focal/linux-raspi: 5.4.0-1013.13 -proposed tracker
+ focal/linux-raspi: <version to be filled> -proposed tracker
description: updated
summary: - focal/linux-raspi: <version to be filled> -proposed tracker
+ focal/linux-raspi: 5.4.0-1013.13 -proposed tracker
description: updated
description: updated
description: updated
description: updated
tags: added: block-proposed-focal
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Gavin Lin (gavin.lin) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here:
Rpi2b-armhf: https://certification.canonical.com/hardware/201906-27188/submission/171733/
Rpi3b-arm64: https://certification.canonical.com/hardware/201811-26649/submission/171792/
Rpi3b-armhf: https://certification.canonical.com/hardware/201811-26649/submission/171731/
Rpi3a+-arm64: https://certification.canonical.com/hardware/201901-26785/submission/172107/
Rpi3a+-armhf: https://certification.canonical.com/hardware/201901-26785/submission/171732/
Rpi3b+-arm64: https://certification.canonical.com/hardware/201810-26542/submission/171790/
Rpi3b+-armhf: https://certification.canonical.com/hardware/201810-26542/submission/171730/
Rpi4b-1g-arm64: https://certification.canonical.com/hardware/201910-27407/submission/171762/
Rpi4b-1g-armhf: https://certification.canonical.com/hardware/201910-27407/submission/171725/
Rpi4b-2g-arm64: https://certification.canonical.com/hardware/201911-27506/submission/172166/
Rpi4b-2g-armhf: https://certification.canonical.com/hardware/201911-27506/submission/171727/
Rpi4b-4g-arm64: https://certification.canonical.com/hardware/201911-27455/submission/172165/
Rpi4b-4g-armhf: https://certification.canonical.com/hardware/201911-27455/submission/171726/
CM3-arm64: https://certification.canonical.com/hardware/201711-25992/submission/171793/
CM3-armhf: https://certification.canonical.com/hardware/201711-25992/submission/171801/
CM3+-arm64: https://certification.canonical.com/hardware/201908-27277/submission/171795/
CM3+-armhf: https://certification.canonical.com/hardware/201908-27277/submission/171729/

description: updated
description: updated
description: updated
description: updated
tags: removed: block-proposed-focal
tags: removed: block-proposed
description: updated
Launchpad Janitor (janitor) wrote :
Download full text (30.3 KiB)

This bug was fixed in the package linux-raspi - 5.4.0-1013.13

---------------
linux-raspi (5.4.0-1013.13) focal; urgency=medium

  * focal/linux-raspi: 5.4.0-1013.13 -proposed tracker (LP: #1882684)

  * Focal update: v5.4.42 upstream stable release (LP: #1879759)
    - [Config] raspi: update configs for CC_HAS_WARN_MAYBE_UNINITIALIZED

  * Packaging resync (LP: #1786013)
    - [Packaging] update helper scripts

  [ Ubuntu: 5.4.0-38.42 ]

  * CVE-2020-0543
    - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when
      not supported
  * Realtek 8723DE [10ec:d723] subsystem [10ec:d738] disconnects unsolicitedly
    when Bluetooth is paired: Reason: 23=IEEE8021X_FAILED (LP: #1878147)
    - SAUCE: Revert "UBUNTU: SAUCE: rtw88: Move driver IQK to set channel before
      association for 11N chip"
    - SAUCE: Revert "UBUNTU: SAUCE: rtw88: fix rate for a while after being
      connected"
    - SAUCE: Revert "UBUNTU: SAUCE: rtw88: No retry and report for auth and assoc"
    - SAUCE: Revert "UBUNTU: SAUCE: rtw88: 8723d: Add coex support"
    - rtw88: add a debugfs entry to dump coex's info
    - rtw88: add a debugfs entry to enable/disable coex mechanism
    - rtw88: 8723d: Add coex support
    - SAUCE: rtw88: coex: 8723d: set antanna control owner
    - SAUCE: rtw88: coex: 8723d: handle BT inquiry cases
    - SAUCE: rtw88: fix EAPOL 4-way failure by finish IQK earlier
  * CPU stress test fails with focal kernel (LP: #1867900)
    - [Config] Disable hisi_sec2 temporarily
  * Enforce all config annotations (LP: #1879327)
    - [Config]: do not enforce CONFIG_VERSION_SIGNATURE
    - [Config]: prepare to enforce all
    - [Config]: enforce all config options
  * Focal update: v5.4.44 upstream stable release (LP: #1881927)
    - ax25: fix setsockopt(SO_BINDTODEVICE)
    - dpaa_eth: fix usage as DSA master, try 3
    - net: don't return invalid table id error when we fall back to PF_UNSPEC
    - net: dsa: mt7530: fix roaming from DSA user ports
    - net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend
    - __netif_receive_skb_core: pass skb by reference
    - net: inet_csk: Fix so_reuseport bind-address cache in tb->fast*
    - net: ipip: fix wrong address family in init error path
    - net/mlx5: Add command entry handling completion
    - net: mvpp2: fix RX hashing for non-10G ports
    - net: nlmsg_cancel() if put fails for nhmsg
    - net: qrtr: Fix passing invalid reference to qrtr_local_enqueue()
    - net: revert "net: get rid of an signed integer overflow in
      ip_idents_reserve()"
    - net sched: fix reporting the first-time use timestamp
    - net/tls: fix race condition causing kernel panic
    - nexthop: Fix attribute checking for groups
    - r8152: support additional Microsoft Surface Ethernet Adapter variant
    - sctp: Don't add the shutdown timer if its already been added
    - sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and
      socket is closed
    - tipc: block BH before using dst_cache
    - net/mlx5e: kTLS, Destroy key object after destroying the TIS
    - net/mlx5e: Fix inner tirs handling
    - net/mlx5: Fix memory leak in mlx5_events_init
    - net/mlx5e: Up...

Changed in linux-raspi (Ubuntu Focal):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers