focal/linux-gcp: 5.4.0-1044.47 -proposed tracker

Bug #1927603 reported by Kelsey Steele
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Invalid
Medium
Unassigned
Prepare-package
Fix Released
Medium
Ian May
Prepare-package-lrg
Fix Released
Medium
Kelsey Steele
Prepare-package-lrm
Fix Released
Medium
Kelsey Steele
Prepare-package-lrs
Fix Released
Medium
Kelsey Steele
Prepare-package-meta
Fix Released
Medium
Ian May
Prepare-package-signed
Fix Released
Medium
Ian May
Promote-signing-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-gcp (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
  lrg: build#1
  lrm: build#1
  lrs: build#1
  main: build#1
  meta: build#1
  signed: build#1
delta:
  promote-signing-to-proposed:
  - lrm
  - lrs
  promote-to-proposed:
  - lrm
  - lrg
  - lrs
  promote-to-security: []
  promote-to-updates:
  - main
  - lrs
  - meta
  - signed
  - lrm
  sru-review:
  - lrm
  - lrg
  - lrs
kernel-stable-master-bug: 1927619
packages:
  lrg: linux-restricted-generate-gcp
  lrm: linux-restricted-modules-gcp
  lrs: linux-restricted-signatures-gcp
  main: linux-gcp
  meta: linux-meta-gcp
  signed: linux-signed-gcp
phase: Complete
phase-changed: Thursday, 03. June 2021 04:56 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason: {}
synthetic:
  :promote-to-as-proposed: Fix Released
trackers:
  bionic/linux-gcp-5.4: bug 1927602
variant: debs
versions:
  lrm: 5.4.0-1044.47+1
  main: 5.4.0-1044.47
  meta: 5.4.0.1044.53
  signed: 5.4.0-1044.47
  source: 5.4.0-1044.47

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2021.05.10-1
description: updated
tags: added: kernel-sru-derivative-of-1927619
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-gcp (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → In Progress
description: updated
description: updated
description: updated
Ian May (ian-may)
summary: - focal/linux-gcp: <version to be filled> -proposed tracker
+ focal/linux-gcp: 5.4.0-1044.47 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Kelsey Steele (kelsey-steele) wrote :

Automated testing is stuck due to glibc results. Tests are expecting glibc version 2.31-0ubuntu9.3, though this version was pulled. Verified all glibc tests pass with the current version 2.31-0ubuntu9.2

All remaining tests have also passed. flipping to fix released.

description: updated
Andy Whitcroft (apw)
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-unblock-ppa
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Khaled El Mously (kmously) wrote :

No issues with RT

description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (30.4 KiB)

This bug was fixed in the package linux-gcp - 5.4.0-1044.47

---------------
linux-gcp (5.4.0-1044.47) focal; urgency=medium

  * focal/linux-gcp: 5.4.0-1044.47 -proposed tracker (LP: #1927603)

  * Enable BLK_DEV_NVME =y to support "shielded VM minimal images"
    (LP: #1927050)
    - [config] gcp: enable BLK_DEV_NVME=y

  [ Ubuntu: 5.4.0-74.83 ]

  * focal/linux: 5.4.0-74.83 -proposed tracker (LP: #1927619)
  * Introduce the 465 driver series, fabric-manager, and libnvidia-nscq
    (LP: #1925522)
    - debian/dkms-versions -- add NVIDIA 465 and migrate 450 to 460
  * linux-image-5.0.0-35-generic breaks checkpointing of container
    (LP: #1857257)
    - SAUCE: overlayfs: fix incorrect mnt_id of files opened from map_files
  * Enable CIFS GCM256 (LP: #1921916)
    - smb3: add defines for new crypto algorithms
    - smb3.1.1: add new module load parm require_gcm_256
    - smb3.1.1: add new module load parm enable_gcm_256
    - smb3.1.1: print warning if server does not support requested encryption type
    - smb3.1.1: rename nonces used for GCM and CCM encryption
    - smb3.1.1: set gcm256 when requested
    - cifs: Adjust key sizes and key generation routines for AES256 encryption
  * locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (LP: #1926184)
    - locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
  * [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink
    (LP: #1925452)
    - net/mlx5: Fix HW spec violation configuring uplink
  * Focal update: v5.4.114 upstream stable release (LP: #1926493)
    - Revert "scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure"
    - Revert "scsi: qla2xxx: Fix stuck login session using prli_pend_timer"
    - scsi: qla2xxx: Dual FCP-NVMe target port support
    - scsi: qla2xxx: Fix device connect issues in P2P configuration
    - scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure
    - scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport
    - scsi: qla2xxx: Fix stuck login session using prli_pend_timer
    - scsi: qla2xxx: Fix fabric scan hang
    - net/sctp: fix race condition in sctp_destroy_sock
    - Input: nspire-keypad - enable interrupts only when opened
    - gpio: sysfs: Obey valid_mask
    - dmaengine: dw: Make it dependent to HAS_IOMEM
    - ARM: dts: Drop duplicate sha2md5_fck to fix clk_disable race
    - ARM: dts: Fix moving mmc devices with aliases for omap4 & 5
    - lockdep: Add a missing initialization hint to the "INFO: Trying to register
      non-static key" message
    - arc: kernel: Return -EFAULT if copy_to_user() fails
    - ASoC: max98373: Added 30ms turn on/off time delay
    - neighbour: Disregard DEAD dst in neigh_update
    - ARM: keystone: fix integer overflow warning
    - ARM: omap1: fix building with clang IAS
    - drm/msm: Fix a5xx/a6xx timestamps
    - ASoC: fsl_esai: Fix TDM slot setup for I2S mode
    - scsi: scsi_transport_srp: Don't block target in SRP_PORT_LOST state
    - net: ieee802154: stop dump llsec keys for monitors
    - net: ieee802154: forbid monitor for add llsec key
    - net: ieee802154: forbid monitor for del llsec key
    - net: ieee802154: stop dump llsec devs for monitors
    - net: ieee8021...

Changed in linux-gcp (Ubuntu Focal):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.