focal/linux-bluefield: 5.4.0-1042.47 -proposed tracker

Bug #1979463 reported by Stefan Bader
14
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Unassigned
Boot-testing
Invalid
Medium
Unassigned
Certification-testing
Fix Released
Medium
Canonical Hardware Certification
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Zachary Tahenakos
Prepare-package-meta
Fix Released
Medium
Zachary Tahenakos
Prepare-package-signed
Fix Released
Medium
Zachary Tahenakos
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Invalid
Medium
Unassigned
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Stakeholder-signoff
Fix Released
Medium
Kernel SRU linux-bluefield Signoff
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-bluefield (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: b6fa0716b0a633ab
  route-entry: 1
delta:
  promote-to-proposed: [meta, main, signed]
  promote-to-security: []
  promote-to-updates: [meta, signed, main]
flag:
  bugs-spammed: true
  proposed-announcement-sent: true
issue: KSRU-2800
kernel-stable-master-bug: 1980509
packages:
  main: linux-bluefield
  meta: linux-meta-bluefield
  signed: linux-signed-bluefield
phase: Complete
phase-changed: Thursday, 28. July 2022 10:32 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Fix Released
variant: debs
versions:
  main: 5.4.0-1042.47
  meta: 5.4.0.1042.41
  signed: 5.4.0-1042.47
~~:
  clamps:
    new-review: b6fa0716b0a633ab
    promote-to-proposed: b6fa0716b0a633ab
    self: 5.4.0-1042.47
    sru-review: b6fa0716b0a633ab

CVE References

Stefan Bader (smb)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2022.06.20-1
description: updated
tags: added: kernel-sru-derivative-of-1979489
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-bluefield (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
tags: added: kernel-jira-issue-ksru-2800
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
summary: - focal/linux-bluefield: <version to be filled> -proposed tracker
+ focal/linux-bluefield: 5.4.0-1042.47 -proposed tracker
description: updated
tags: added: kernel-jira-in-review
description: updated
description: updated
description: updated
tags: removed: kernel-jira-in-review
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Meriton Tuli (meritont) wrote :

Using 5.4.0-1042-bluefield, with BlueField ATF version: v2.2(release):3.9.0-8-gb2194ee, BlueField UEFI version: 3.9.0-17-gbcbbade, MLNX_OFED_LINUX-5.6-1.0.3.1, DOCA 1.4.0076-1.5.6.1.0.3.3.bf.3.9.0.12155, FW 24.33.1048, regression ran without any new Issues

description: updated
Revision history for this message
Gavin Lin (gavin.lin) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here:
https://certification.canonical.com/hardware/202006-27986/submission/273617/

description: updated
tags: added: verification-testing-passed
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (14.8 KiB)

This bug was fixed in the package linux-bluefield - 5.4.0-1042.47

---------------
linux-bluefield (5.4.0-1042.47) focal; urgency=medium

  * focal/linux-bluefield: 5.4.0-1042.47 -proposed tracker (LP: #1979463)

  * Focal update: upstream stable patchset v5.4.192 (LP: #1979014)
    - [Config] bluefield: update configs for NVM

  * flowtable: fix TCP flow teardown (LP: #1975649)
    - netfilter: flowtable: fix TCP flow teardown

  * remove offload_pickup sysctl again (LP: #1975820)
    - netfilter: conntrack: remove offload_pickup sysctl again

  * mlxbf_gige: remove driver-managed interrupt counts (LP: #1975749)
    - mlxbf_gige: remove driver-managed interrupt counts

  [ Ubuntu: 5.4.0-122.138 ]

  * focal/linux: 5.4.0-122.138 -proposed tracker (LP: #1979489)
  * Remove SAUCE patches from test_vxlan_under_vrf.sh in net of
    ubuntu_kernel_selftests (LP: #1975691)
    - Revert "UBUNTU: SAUCE: selftests: net: Don't fail test_vxlan_under_vrf on
      xfail"
    - Revert "UBUNTU: SAUCE: selftests: net: Make test for VXLAN underlay in non-
      default VRF an expected failure"
  * Enable Asus USB-BT500 Bluetooth dongle(0b05:190e) (LP: #1976613)
    - Bluetooth: btusb: Add flag to define wideband speech capability
    - Bluetooth: btrtl: Add support for RTL8761B
    - Bluetooth: btusb: Add 0x0b05:0x190e Realtek 8761BU (ASUS BT500) device.
  * [UBUNTU 20.04] rcu stalls with many storage key guests (LP: #1975582)
    - s390/gmap: voluntarily schedule during key setting
    - s390/mm: use non-quiescing sske for KVM switch to keyed guest
  * Ubuntu 5.4.0-117.132-generic 5.4.189 has BUG: kernel NULL pointer
    dereference, address: 0000000000000034 (LP: #1978719)
    - mm: rmap: explicitly reset vma->anon_vma in unlink_anon_vmas()
  * Focal update: upstream stable patchset v5.4.192 (LP: #1979014)
    - floppy: disable FDRAWCMD by default
    - [Config] updateconfigs for BLK_DEV_FD_RAWCMD
    - hamradio: defer 6pack kfree after unregister_netdev
    - hamradio: remove needs_free_netdev to avoid UAF
    - lightnvm: disable the subsystem
    - [Config] updateconfigs for NVM, NVM_PBLK
    - usb: mtu3: fix USB 3.0 dual-role-switch from device to host
    - USB: quirks: add a Realtek card reader
    - USB: quirks: add STRING quirk for VCOM device
    - USB: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS
    - USB: serial: cp210x: add PIDs for Kamstrup USB Meter Reader
    - USB: serial: option: add support for Cinterion MV32-WA/MV32-WB
    - USB: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions
    - xhci: stop polling roothubs after shutdown
    - xhci: increase usb U3 -> U0 link resume timeout from 100ms to 500ms
    - iio: dac: ad5592r: Fix the missing return value.
    - iio: dac: ad5446: Fix read_raw not returning set value
    - iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on()
    - usb: misc: fix improper handling of refcount in uss720_probe()
    - usb: typec: ucsi: Fix role swapping
    - usb: gadget: uvc: Fix crash when encoding data for usb request
    - usb: gadget: configfs: clear deactivation flag in
      configfs_composite_unbind()
    - usb: dwc3: core: Fix tx/rx threshold settings
    - ...

Changed in linux-bluefield (Ubuntu Focal):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Changed in kernel-sru-workflow:
status: Fix Committed → Fix Released
description: updated
tags: removed: kernel-release-tracking-bug-live
description: updated
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.