xenial/linux: 4.4.0-157.185 -proposed tracker

Bug #1837476 reported by Kleber Sacilotto de Souza
24
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Invalid
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Stefan Bader
Prepare-package-meta
Fix Released
Medium
Marcelo Cerri
Prepare-package-signed
Fix Released
Medium
Stefan Bader
Promote-to-proposed
Fix Released
Medium
Łukasz Zemczak
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Invalid
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux (Ubuntu)
Invalid
Undecided
Unassigned
Xenial
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

backports: bug 1837475 (trusty/linux-lts-xenial)
derivatives: bug 1834909 (linux-kvm), bug 1837155 (linux-fips), bug 1837470 (pc-kernel), bug 1837472 (linux-raspi2), bug 1837474 (linux-snapdragon)

-- swm properties --
boot-testing-requested: true
bugs-spammed: true
packages:
  main: linux
  meta: linux-meta
  signed: linux-signed
phase: Complete
phase-changed: Thursday, 25. July 2019 16:52 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
trackers:
  trusty/linux-lts-xenial: bug 1837475
  xenial/linux-aws: bug 1834908
  xenial/linux-fips: bug 1837155
  xenial/linux-kvm: bug 1834909
  xenial/linux-raspi2: bug 1837472
  xenial/linux-snapdragon: bug 1837474
  xenial/linux/pc-kernel: bug 1837470
variant: debs

tags: added: kernel-release-tracking-bug xenial
Changed in linux (Ubuntu Xenial):
status: New → Confirmed
Changed in linux (Ubuntu):
status: New → Invalid
Changed in linux (Ubuntu Xenial):
importance: Undecided → Medium
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2019.07.01-10
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
summary: - linux: <version to be filled> -proposed tracker
+ xenial/linux: <version to be filled> -proposed tracker
description: updated
Marcelo Cerri (mhcerri)
summary: - xenial/linux: <version to be filled> -proposed tracker
+ xenial/linux: 4.4.0-157.184 -proposed tracker
description: updated
description: updated
description: updated
Stefan Bader (smb)
tags: added: kernel-sru-cycle-2019.07.01-11
removed: kernel-sru-cycle-2019.07.01-10
Stefan Bader (smb)
summary: - xenial/linux: 4.4.0-157.184 -proposed tracker
+ linux: 4.4.0-157.185 -proposed tracker
summary: - linux: 4.4.0-157.185 -proposed tracker
+ xenial/linux: 4.4.0-157.185 -proposed tracker
description: updated
description: updated
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

Verification tests completed.

description: updated
Stefan Bader (smb)
description: updated
description: updated
description: updated
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

Certification tests completed successfully with 4.4.0-156.183 (bug #1836880). This re-spin doesn't contain any change that would affect hardware specific support, therefore I'm marking the task as 'Invalid'.

description: updated
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

Regression tests completed successfully with 4.4.0-155.182 (bug #1834918), the additional fixes for -156 and -157 were small enough to be verified with ADT and hw-cert. Marking task as 'Invalid'.

description: updated
tags: removed: block-proposed-xenial
tags: removed: block-proposed
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (30.5 KiB)

This bug was fixed in the package linux - 4.4.0-157.185

---------------
linux (4.4.0-157.185) xenial; urgency=medium

  * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476)

  * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)
    (LP: #1837235)
    - Revert "block/bio: Do not zero user pages"
    - Revert "block: Clear kernel memory before copying to user"
    - Revert "bio_copy_from_iter(): get rid of copying iov_iter"

linux (4.4.0-156.183) xenial; urgency=medium

  * linux: 4.4.0-156.183 -proposed tracker (LP: #1836880)

  * BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba (LP: #1836801)
    - brcmfmac: add eth_type_trans back for PCIe full dongle

linux (4.4.0-155.182) xenial; urgency=medium

  * linux: 4.4.0-155.182 -proposed tracker (LP: #1834918)

  * Geneve tunnels don't work when ipv6 is disabled (LP: #1794232)
    - geneve: correctly handle ipv6.disable module parameter

  * Kernel modules generated incorrectly when system is localized to a non-
    English language (LP: #1828084)
    - scripts: override locale from environment when running recordmcount.pl

  * Handle overflow in proc_get_long of sysctl (LP: #1833935)
    - sysctl: handle overflow in proc_get_long

  * Xenial update: 4.4.181 upstream stable release (LP: #1832661)
    - x86/speculation/mds: Revert CPU buffer clear on double fault exit
    - x86/speculation/mds: Improve CPU buffer clear documentation
    - ARM: exynos: Fix a leaked reference by adding missing of_node_put
    - crypto: vmx - fix copy-paste error in CTR mode
    - crypto: crct10dif-generic - fix use via crypto_shash_digest()
    - crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()
    - ALSA: usb-audio: Fix a memory leak bug
    - ALSA: hda/hdmi - Consider eld_valid when reporting jack event
    - ALSA: hda/realtek - EAPD turn on later
    - ASoC: max98090: Fix restore of DAPM Muxes
    - ASoC: RT5677-SPI: Disable 16Bit SPI Transfers
    - mm/mincore.c: make mincore() more conservative
    - ocfs2: fix ocfs2 read inode data panic in ocfs2_iget
    - mfd: da9063: Fix OTP control register names to match datasheets for
      DA9063/63L
    - tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
    - ext4: actually request zeroing of inode table after grow
    - ext4: fix ext4_show_options for file systems w/o journal
    - Btrfs: do not start a transaction at iterate_extent_inodes()
    - bcache: fix a race between cache register and cacheset unregister
    - bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim()
    - ipmi:ssif: compare block number correctly for multi-part return messages
    - crypto: gcm - Fix error return code in crypto_gcm_create_common()
    - crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
    - crypto: chacha20poly1305 - set cra_name correctly
    - crypto: salsa20 - don't access already-freed walk.iv
    - crypto: arm/aes-neonbs - don't access already-freed walk.iv
    - writeback: synchronize sync(2) against cgroup writeback membership switches
    - fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going
      into workqueue when umount
    - ALSA: hda/realtek - Fix for Lenovo B...

Changed in linux (Ubuntu Xenial):
status: Confirmed → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.