focal/linux-bluefield: 5.4.0-1047.52 -proposed tracker

Bug #1989866 reported by Stefan Bader
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Unassigned
Boot-testing
Invalid
Medium
Unassigned
Certification-testing
Fix Released
Medium
Canonical Hardware Certification
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Bartlomiej Zolnierkiewicz
Prepare-package-meta
Fix Released
Medium
Bartlomiej Zolnierkiewicz
Prepare-package-signed
Fix Released
Medium
Bartlomiej Zolnierkiewicz
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Invalid
Medium
Unassigned
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Stakeholder-signoff
Fix Released
Medium
Kernel SRU linux-bluefield Signoff
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-bluefield (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: a5abfed36b691c9a
  route-entry: 1
delta:
  promote-to-proposed: [signed, main, meta]
  promote-to-security: []
  promote-to-updates: [main, meta, signed]
flag:
  bugs-spammed: true
  proposed-announcement-sent: true
issue: KSRU-4984
kernel-stable-master-bug: 1990152
packages:
  main: linux-bluefield
  meta: linux-meta-bluefield
  signed: linux-signed-bluefield
phase: Complete
phase-changed: Monday, 10. October 2022 13:59 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Fix Released
variant: debs
versions:
  main: 5.4.0-1047.52
  meta: 5.4.0.1047.46
  signed: 5.4.0-1047.52
~~:
  clamps:
    new-review: a5abfed36b691c9a
    promote-to-proposed: a5abfed36b691c9a
    self: 5.4.0-1047.52
    sru-review: a5abfed36b691c9a

CVE References

Stefan Bader (smb)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2022.09.19-1
description: updated
tags: added: kernel-sru-derivative-of-1989892
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-bluefield (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
tags: added: kernel-jira-issue-ksru-4984
description: updated
description: updated
description: updated
summary: - focal/linux-bluefield: <version to be filled> -proposed tracker
+ focal/linux-bluefield: 5.4.0-1047.52 -proposed tracker
description: updated
tags: added: kernel-jira-in-review
description: updated
tags: removed: kernel-jira-in-review
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Meriton Tuli (meritont) wrote :

Using Kernel 5.4.0-1047-bluefield, ATF: v2.2(release):3.9.3-1-gb9e3943, UEFI: 3.9.3-2-g8da8a99, DOCA Base (OFED): 5.7-1.0.2.0 ran Regression without any new issues. Note that MLN-SNAP Verification could not run due to nvme-rdma module failing to load:
# modprobe -v nvme-rdma
insmod /lib/modules/5.4.0-1047-bluefield/kernel/drivers/nvme/host/nvme-rdma.ko
modprobe: ERROR: could not insert 'nvme_rdma': Invalid argument

description: updated
Revision history for this message
Kevin Yeh (kevinyeh) wrote :

You can find test result at https://certification.canonical.com/submissions/status/163555
No regression found.

description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (20.4 KiB)

This bug was fixed in the package linux-bluefield - 5.4.0-1047.52

---------------
linux-bluefield (5.4.0-1047.52) focal; urgency=medium

  * focal/linux-bluefield: 5.4.0-1047.52 -proposed tracker (LP: #1989866)

  * Focal update: v5.4.208 upstream stable release (LP: #1988225)
    - [Config] bluefield: updateconfigs for IMA_TEMPLATE
    - [Config] bluefield: updateconfigs for REFCOUNT_FULL

  * mlxbf-pmc: error when reading unprogrammed events (LP: #1989172)
    - SAUCE: mlxbf-pmc: Fix error when reading unprogrammed events

  * mlxbf_gige: need to clear MDIO gateway lock after read (LP: #1989495)
    - SAUCE: mlxbf_gige: clear MDIO gateway lock after read

  [ Ubuntu: 5.4.0-128.144 ]

  * focal/linux: 5.4.0-128.144 -proposed tracker (LP: #1990152)
  * CVE-2022-3176
    - io_uring: disable polling pollfree files
  * ip/nexthop: fix default address selection for connected nexthop
    (LP: #1988809)
    - selftests/net: test nexthop without gw
  * ip/nexthop: fix default address selection for connected nexthop
    (LP: #1988809) // icmp_redirect.sh in ubuntu_kernel_selftests failed on
    Jammy 5.15.0-49.55 (LP: #1990124)
    - ip: fix triggering of 'icmp redirect'

  [ Ubuntu: 5.4.0-127.143 ]

  * focal/linux: 5.4.0-127.143 -proposed tracker (LP: #1989892)
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2022.09.19)
  * [UBUNTU 20.04] mlx5 driver crashes on accessing device attributes during
    recovery (LP: #1987287)
    - net/mlx5: Avoid processing commands before cmdif is ready
  * Focal update: v5.4.210 upstream stable release (LP: #1989230)
    - thermal: Fix NULL pointer dereferences in of_thermal_ functions
    - ACPI: video: Force backlight native for some TongFang devices
    - ACPI: video: Shortening quirk list by identifying Clevo by board_name only
    - ACPI: APEI: Better fix to avoid spamming the console with old error logs
    - bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
    - selftests/bpf: Extend verifier and bpf_sock tests for dst_port loads
    - bpf: Test_verifier, #70 error message updates for 32-bit right shift
    - KVM: Don't null dereference ops->destroy
    - selftests: KVM: Handle compiler optimizations in ucall
    - media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls
    - macintosh/adb: fix oob read in do_adb_query() function
    - x86/speculation: Add RSB VM Exit protections
    - x86/speculation: Add LFENCE to RSB fill sequence
    - Linux 5.4.210
  * Focal update: v5.4.209 upstream stable release (LP: #1989228)
    - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put
    - ntfs: fix use-after-free in ntfs_ucsncmp()
    - s390/archrandom: prevent CPACF trng invocations in interrupt context
    - tcp: Fix data-races around sysctl_tcp_dsack.
    - tcp: Fix a data-race around sysctl_tcp_app_win.
    - tcp: Fix a data-race around sysctl_tcp_adv_win_scale.
    - tcp: Fix a data-race around sysctl_tcp_frto.
    - tcp: Fix a data-race around sysctl_tcp_nometrics_save.
    - ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS)
    - ice: do not setup vlan for loopback VSI
    - scsi: ufs...

Changed in linux-bluefield (Ubuntu Focal):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Changed in kernel-sru-workflow:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.