linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker

Bug #1444698 reported by Brad Figg
24
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Fix Released
Medium
Taihsiang Ho
Prepare-package
Fix Released
Medium
Luis Henriques
Prepare-package-meta
Fix Released
Medium
Luis Henriques
Prepare-package-signed
Fix Released
Medium
Luis Henriques
Promote-to-proposed
Fix Released
Medium
Chris J Arges
Promote-to-security
Fix Released
Medium
Chris J Arges
Promote-to-updates
Fix Released
Medium
Chris J Arges
Regression-testing
Fix Released
Medium
Canonical Platform QA Team
Security-signoff
Fix Released
Medium
John Johansen
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-lts-trusty (Ubuntu)
Invalid
Medium
Unassigned
Precise
Fix Released
Medium
Unassigned

Bug Description

This bug is for tracking the 3.13.0-51.84~precise1 upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Wednesday, 15. April 2015 21:03 UTC
kernel-stable-master-bug:1444141
kernel-stable-Prepare-package-end:Thursday, 16. April 2015 04:01 UTC
kernel-stable-Promote-to-proposed-start:Thursday, 16. April 2015 04:01 UTC
kernel-stable-Promote-to-proposed-end:Thursday, 16. April 2015 20:48 UTC
kernel-stable-Verification-testing-start:Thursday, 16. April 2015 22:04 UTC
kernel-stable-Certification-testing-start:Thursday, 16. April 2015 22:04 UTC
kernel-stable-Security-signoff-start:Thursday, 16. April 2015 22:04 UTC
proposed-announcement-sent:True
kernel-stable-Regression-testing-start:Thursday, 16. April 2015 22:04 UTC
kernel-stable-Security-signoff-end:Tuesday, 21. April 2015 20:01 UTC
kernel-stable-Regression-testing-end:Tuesday, 21. April 2015 21:01 UTC
kernel-stable-Certification-testing-end:Wednesday, 22. April 2015 14:01 UTC
kernel-stable-Promote-to-updates-start:Wednesday, 29. April 2015 12:23 UTC
kernel-stable-Promote-to-updates-end:Wednesday, 29. April 2015 16:42 UTC
kernel-stable-phase:Released
kernel-stable-phase-changed:Wednesday, 29. April 2015 18:03 UTC

CVE References

Brad Figg (brad-figg)
tags: added: kernel-release-tracking-bug
tags: added: block-proposed-precise
tags: added: precise
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-lts-trusty (Ubuntu):
importance: Undecided → Medium
Changed in linux-lts-trusty (Ubuntu Precise):
importance: Undecided → Medium
Revision history for this message
Brad Figg (brad-figg) wrote : Packages available

All builds are complete, packages in this bug can be copied to -proposed.

description: updated
Revision history for this message
Chris J Arges (arges) wrote :

Promoted to proposed:
 linux-lts-trusty | 3.13.0-51.84~precise1 | precise-proposed | source
 linux-meta-lts-trusty | 3.13.0.51.44 | precise-proposed | source
 linux-signed-lts-trusty | 3.13.0-51.84~precise1 | precise-proposed | source

Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : onza (amd64) - tests ran: 147, failed: 1
Revision history for this message
Brad Figg (brad-figg) wrote : onza (i386) - tests ran: 147, failed: 1
Revision history for this message
John Johansen (jjohansen) wrote :

Looks good

Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
tags: added: qa-testing-passed
Brad Figg (brad-figg)
description: updated
Revision history for this message
Taihsiang Ho (tai271828) wrote :

The Hardware Certification team have completed testing this -proposed kernel.
No regressions were observed.

The report is available at:
http://people.canonical.com/~hwcert/sru-testing/precise/3.13.0-51.84~precise1/precise-3.13-proposed-pass-150422.html

tags: added: certification-testing-passed
Brad Figg (brad-figg)
description: updated
Revision history for this message
Pali (pali) wrote :

After upgrading linux-image-3.13.0-49-generic to linux-image-3.13.0-51-generic I started getting this error message in dmesg:

[ 6.352555] mei_me 0000:00:16.0: irq 47 for MSI/MSI-X
[ 6.355708] mei_me 0000:00:16.0: version message write failed: ret = -5
[ 6.355712] mei_me 0000:00:16.0: hbm_start failed ret = -5
[ 6.355714] mei_me 0000:00:16.0: reset failed
[ 6.355716] mei_me 0000:00:16.0: link layer initialization failed.
[ 6.355717] mei_me 0000:00:16.0: init hw failure.
[ 6.355880] mei_me 0000:00:16.0: initialization failed.

Downgrading back to linux-image-3.13.0-49-generic fixed this problem. So this is regression for version 3.13.0-51.

Adam Conrad (adconrad)
Changed in linux-lts-trusty (Ubuntu):
status: New → Invalid
Brad Figg (brad-figg)
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (13.6 KiB)

This bug was fixed in the package linux-lts-trusty - 3.13.0-51.84~precise1

---------------
linux-lts-trusty (3.13.0-51.84~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1444698
  * Merged back Ubuntu-3.13.0-49.83 security release

linux (3.13.0-50.82) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
    - LP: #1442285

  [ Andy Whitcroft ]

  * [Config] CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64
    - LP: #1418140

  [ Chris J Arges ]

  * [Config] CONFIG_PCIEASPM_DEBUG=y
    - LP: #1398544

  [ Upstream Kernel Changes ]

  * KEYS: request_key() should reget expired keys rather than give
    EKEYEXPIRED
    - LP: #1124250
  * audit: correctly record file names with different path name types
    - LP: #1439441
  * KVM: x86: Check for nested events if there is an injectable interrupt
    - LP: #1413540
  * be2iscsi: fix memory leak in error path
    - LP: #1440156
  * block: remove old blk_iopoll_enabled variable
    - LP: #1440156
  * be2iscsi: Fix handling timed out MBX completion from FW
    - LP: #1440156
  * be2iscsi: Fix doorbell format for EQ/CQ/RQ s per SLI spec.
    - LP: #1440156
  * be2iscsi: Fix the session cleanup when reboot/shutdown happens
    - LP: #1440156
  * be2iscsi: Fix scsi_cmnd leakage in driver.
    - LP: #1440156
  * be2iscsi : Fix DMA Out of SW-IOMMU space error
    - LP: #1440156
  * be2iscsi: Fix retrieving MCCQ_WRB in non-embedded Mbox path
    - LP: #1440156
  * be2iscsi: Fix exposing Host in sysfs after adapter initialization is
    complete
    - LP: #1440156
  * be2iscsi: Fix interrupt Coalescing mechanism.
    - LP: #1440156
  * be2iscsi: Fix TCP parameters while connection offloading.
    - LP: #1440156
  * be2iscsi: Fix memory corruption in MBX path
    - LP: #1440156
  * be2iscsi: Fix destroy MCC-CQ before MCC-EQ is destroyed
    - LP: #1440156
  * be2iscsi: add an missing goto in error path
    - LP: #1440156
  * be2iscsi: remove potential junk pointer free
    - LP: #1440156
  * be2iscsi: Fix memory leak in mgmt_set_ip()
    - LP: #1440156
  * be2iscsi: Fix the sparse warning introduced in previous submission
    - LP: #1440156
  * be2iscsi: Fix updating the boot enteries in sysfs
    - LP: #1440156
  * be2iscsi: Fix processing CQE before connection resources are freed
    - LP: #1440156
  * be2iscsi : Fix kernel panic during reboot/shutdown
    - LP: #1440156
  * fixed invalid assignment of 64bit mask to host dma_boundary for scatter
    gather segment boundary limit.
    - LP: #1440156
  * quota: Store maximum space limit in bytes
    - LP: #1441284
  * ip: zero sockaddr returned on error queue
    - LP: #1441284
  * net: rps: fix cpu unplug
    - LP: #1441284
  * ipv6: stop sending PTB packets for MTU < 1280
    - LP: #1441284
  * netxen: fix netxen_nic_poll() logic
    - LP: #1441284
  * udp_diag: Fix socket skipping within chain
    - LP: #1441284
  * ping: Fix race in free in receive path
    - LP: #1441284
  * bnx2x: fix napi poll return value for repoll
    - LP: #1441284
  * net: don't OOPS on socket aio
    - LP: #1441284
  * bridge: dont send notification when skb->len == 0 in rtnl_bridge_notify
    - LP: #1441284
  *...

Changed in linux-lts-trusty (Ubuntu Precise):
status: New → Fix Released
Revision history for this message
Chris J Arges (arges) wrote :

Released to updates:
 linux-lts-trusty | 3.13.0-51.84~precise1 | precise-security | source
 linux-lts-trusty | 3.13.0-51.84~precise1 | precise-updates | source
 linux-meta-lts-trusty | 3.13.0.51.44 | precise-security | source
 linux-meta-lts-trusty | 3.13.0.51.44 | precise-updates | source
 linux-signed-lts-trusty | 3.13.0-51.84~precise1 | precise-security | source
 linux-signed-lts-trusty | 3.13.0-51.84~precise1 | precise-updates | source

Brad Figg (brad-figg)
description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : Package Released!

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
Revision history for this message
Miguel Ángel Molina (sslapp) wrote :

Still same errors commented at #7 on ubuntu 14.04 with 3.13.0-51.84 (trusty-updates) kernel updated at 8:55 a.m. UTC+2 04.30.2015

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.