xenial/linux: 4.4.0-197.229 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Medium
|
Unassigned | ||||
Automated-testing |
Medium
|
Canonical Kernel Team | ||||
Certification-testing |
Medium
|
Canonical Hardware Certification | ||||
Kernel-signoff |
Medium
|
Stefan Bader | ||||
Prepare-package |
Medium
|
Thadeu Lima de Souza Cascardo | ||||
Prepare-package-meta |
Medium
|
Thadeu Lima de Souza Cascardo | ||||
Prepare-package-signed |
Medium
|
Thadeu Lima de Souza Cascardo | ||||
Promote-to-proposed |
Medium
|
Andy Whitcroft | ||||
Promote-to-security |
Medium
|
Andy Whitcroft | ||||
Promote-to-updates |
Medium
|
Andy Whitcroft | ||||
Regression-testing |
Medium
|
Po-Hsu Lin | ||||
Security-signoff |
Medium
|
Steve Beattie | ||||
Verification-testing |
Medium
|
Stefan Bader | ||||
linux (Ubuntu) | ||||||
Xenial |
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
bugs-spammed: true
packages:
main: linux
meta: linux-meta
signed: linux-signed
phase: Complete
phase-changed: Tuesday, 01. December 2020 18:19 UTC
proposed-
proposed-
reason: {}
trackers:
trusty/linux-aws: bug 1903105
trusty/
xenial/linux-aws: bug 1903096
xenial/
xenial/
xenial/linux-kvm: bug 1905657
xenial/
xenial/
xenial/
xenial/
xenial/
variant: debs
versions:
main: 4.4.0-197.229
meta: 4.4.0.197.203
signed: 4.4.0-197.229
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.11.09-5 |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
description: | updated |
summary: |
- xenial/linux: <version to be filled> -proposed tracker + xenial/linux: 4.4.0-197.229 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Kevin Yeh (kevinyeh) wrote : | #1 |
Stefan Bader (smb) wrote : | #2 |
The unverified report was fixed by re-spin #5 (being able to compile for 32bit ppc).
description: | updated |
Stefan Bader (smb) wrote : | #3 |
To my knowledge, there should be no blocking issues.
description: | updated |
Po-Hsu Lin (cypressyew) wrote : | #4 |
4.4.0-197.229 - generic
Regression test CMPL, RTB.
36 / 60 tests were run, missing: ubuntu_
Issue to note in amd64:
ubuntu_
ubuntu_
51 / 54 tests were run, missing: ubuntu_
Issue to note in i386:
ubuntu_
ubuntu_
42 / 56 tests were run, missing: ubuntu_
Issue to note in ppc64le (P8):
ubuntu_
51 / 52 tests were run, missing: ubuntu_boot
Issue to note in s390x (Ubuntu on LPAR):
libhugetlbfs - failed 5 (Address is not hugepage, Heap not on hugepages) killed by signal 1 bad config 1
ubuntu_bpf_jit - ld_abs+
ubuntu_
ubuntu_
ubuntu_
51 / 52 tests were run, missing: ubuntu_boot
Issue to note in s390x (zVM):
libhugetlbfs - failed 5 (Address is not hugepage, Heap not on hugepages) killed by signal 1 bad config 1
ubuntu_bpf_jit - ld_abs+
ubuntu_
tags: | added: regression-testing-passed |
description: | updated |
Andy Whitcroft (apw) wrote : | #5 |
pc-kernel and pc-lowlatency-
tags: | added: kernel-unblock-hold-promote-to-updates |
description: | updated |
description: | updated |
Launchpad Janitor (janitor) wrote : | #6 |
This bug was fixed in the package linux - 4.4.0-197.229
---------------
linux (4.4.0-197.229) xenial; urgency=medium
* xenial/linux: 4.4.0-197.229 -proposed tracker (LP: #1905489)
* sha1_ce and sha2_ce modules no longer load on arm64 (LP: #1905336)
- SAUCE: Revert "crypto: arm64/sha - avoid non-standard inline asm tricks"
* Fails to build on powerpc (LP: #1905475)
- powerpc/
- SAUCE: powerpc/uaccess: only include kup-radix.h on PPC_BOOK3S_64
linux (4.4.0-196.228) xenial; urgency=medium
* xenial/linux: 4.4.0-196.228 -proposed tracker (LP: #1905309)
* CVE-2020-4788
- SAUCE: powerpc/64s: Define MASKABLE_
- SAUCE: powerpc/64s: move some exception handlers out of line
- powerpc/64s: flush L1D on kernel entry
- SAUCE: powerpc: Add a framework for user access tracking
- powerpc: Implement user_access_begin and friends
- powerpc: Fix __clear_user() with KUAP enabled
- powerpc/uaccess: Evaluate macro arguments once, before user access is
allowed
- powerpc/64s: flush L1D after user accesses
linux (4.4.0-195.227) xenial; urgency=medium
* xenial/linux: 4.4.0-195.227 -proposed tracker (LP: #1903107)
* Update kernel packaging to support forward porting kernels (LP: #1902957)
- [Debian] Update for leader included in BACKPORT_SUFFIX
* Avoid double newline when running insertchanges (LP: #1903293)
- [Packaging] insertchanges: avoid double newline
* EFI: Fails when BootCurrent entry does not exist (LP: #1899993)
- efivarfs: Replace invalid slashes with exclamation marks in dentries.
* CVE-2020-14351
- perf/core: Fix race in the perf_mmap_close() function
* CVE-2020-25645
- geneve: add transport ports in route lookup for geneve
* Xenial update: v4.4.241 upstream stable release (LP: #1902097)
- ibmveth: Identify ingress large send packets.
- tipc: fix the skb_unshare() in tipc_buf_append()
- net/ipv4: always honour route mtu during forwarding
- r8169: fix data corruption issue on RTL8402
- ALSA: bebob: potential info leak in hwdep_read()
- mm/kasan: print name of mem[set,cpy,move]() caller in report
- mm/kasan: add API to check memory regions
- compiler.h, kasan: Avoid duplicating __read_
- compiler.h: Add read_word_
- lib/strscpy: Shut up KASAN false-positives in strscpy()
- x86/mm/ptdump: Fix soft lockup in page table walker
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling
ether_setup
- nfc: Ensure presence of NFC_ATTR_
nfc_
- tcp: fix to update snd_wl1 in bulk receiver fast path
- icmp: randomize the global rate limiter
- cifs: remove bogus debug code
- ima: Don't ignore errors from crypto_
- EDAC/i5100: Fix error handling order in i5100_init_one()
- crypto: ixp4xx - Fix the size used in a 'dma_free_
- media: Revert "media: exynos4-is: Add missed check for
pinctrl_
...
Changed in linux (Ubuntu Xenial): | |
status: | New → Fix Released |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
All tasks have been completed and the bug is being set to Fix Released
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
tags: | removed: kernel-release-tracking-bug-live |
Leveraging results from 4.4.0-195, no regression were observed, results are available here: /trello. com/c/k7BgIIzA/ 1068-xenial- linux-image- 440-195- generic- 440-195227
https:/