xenial/linux-raspi2: 4.4.0-1115.124 -proposed tracker

Bug #1834911 reported by Kleber Sacilotto de Souza
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Confirmed
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Connor Kuehl
Prepare-package-meta
Fix Released
Medium
Connor Kuehl
Promote-to-proposed
Fix Released
Medium
Łukasz Zemczak
Promote-to-security
New
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
New
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Invalid
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Canonical Security Team
Verification-testing
Confirmed
Medium
Canonical Kernel Team
linux-raspi2 (Ubuntu)
Invalid
Undecided
Unassigned
Xenial
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
phase: Ready for Testing
phase-changed: Wednesday, 10. July 2019 23:38 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  certification-testing: Ongoing -- testing in progress
  verification-testing: Ongoing -- testing in progress
variant: debs

tags: added: kernel-release-tracking-bug xenial
Changed in linux-raspi2 (Ubuntu):
status: New → Invalid
Changed in linux-raspi2 (Ubuntu Xenial):
importance: Undecided → Medium
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2019.07.01-1
description: updated
description: updated
tags: added: kernel-sru-derivative-of-1834918
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
description: updated
description: updated
Connor Kuehl (connork)
summary: - linux-raspi2: <version to be filled> -proposed tracker
+ linux-raspi2: 4.4.0-1115.124 -proposed tracker
description: updated
description: updated
description: updated
description: updated
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
tags: removed: kernel-sru-derivative-of-1834918
description: updated
summary: - linux-raspi2: 4.4.0-1115.124 -proposed tracker
+ xenial/linux-raspi2: 4.4.0-1115.124 -proposed tracker
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (31.2 KiB)

This bug was fixed in the package linux-raspi2 - 4.4.0-1117.126

---------------
linux-raspi2 (4.4.0-1117.126) xenial; urgency=medium

  * xenial/linux-raspi2: 4.4.0-1117.126 -proposed tracker (LP: #1837472)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] update helper scripts

  [ Ubuntu: 4.4.0-157.185 ]

  * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476)
  * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)
    (LP: #1837235)
    - Revert "block/bio: Do not zero user pages"
    - Revert "block: Clear kernel memory before copying to user"
    - Revert "bio_copy_from_iter(): get rid of copying iov_iter"

linux-raspi2 (4.4.0-1116.125) xenial; urgency=medium

  * linux-raspi2: 4.4.0-1116.125 -proposed tracker (LP: #1836876)

  [ Ubuntu: 4.4.0-156.183 ]

  * linux: 4.4.0-156.183 -proposed tracker (LP: #1836880)
  * BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba (LP: #1836801)
    - brcmfmac: add eth_type_trans back for PCIe full dongle

linux-raspi2 (4.4.0-1115.124) xenial; urgency=medium

  * linux-raspi2: 4.4.0-1115.124 -proposed tracker (LP: #1834911)

  [ Ubuntu: 4.4.0-155.182 ]

  * linux: 4.4.0-155.182 -proposed tracker (LP: #1834918)
  * Geneve tunnels don't work when ipv6 is disabled (LP: #1794232)
    - geneve: correctly handle ipv6.disable module parameter
  * Kernel modules generated incorrectly when system is localized to a non-
    English language (LP: #1828084)
    - scripts: override locale from environment when running recordmcount.pl
  * Handle overflow in proc_get_long of sysctl (LP: #1833935)
    - sysctl: handle overflow in proc_get_long
  * Xenial update: 4.4.181 upstream stable release (LP: #1832661)
    - x86/speculation/mds: Revert CPU buffer clear on double fault exit
    - x86/speculation/mds: Improve CPU buffer clear documentation
    - ARM: exynos: Fix a leaked reference by adding missing of_node_put
    - crypto: vmx - fix copy-paste error in CTR mode
    - crypto: crct10dif-generic - fix use via crypto_shash_digest()
    - crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()
    - ALSA: usb-audio: Fix a memory leak bug
    - ALSA: hda/hdmi - Consider eld_valid when reporting jack event
    - ALSA: hda/realtek - EAPD turn on later
    - ASoC: max98090: Fix restore of DAPM Muxes
    - ASoC: RT5677-SPI: Disable 16Bit SPI Transfers
    - mm/mincore.c: make mincore() more conservative
    - ocfs2: fix ocfs2 read inode data panic in ocfs2_iget
    - mfd: da9063: Fix OTP control register names to match datasheets for
      DA9063/63L
    - tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
    - ext4: actually request zeroing of inode table after grow
    - ext4: fix ext4_show_options for file systems w/o journal
    - Btrfs: do not start a transaction at iterate_extent_inodes()
    - bcache: fix a race between cache register and cacheset unregister
    - bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim()
    - ipmi:ssif: compare block number correctly for multi-part return messages
    - crypto: gcm - Fix error return code in crypto_gcm_create_common()
    - crypto: gcm - fix incompatibility between ...

Changed in linux-raspi2 (Ubuntu Xenial):
status: New → Fix Released
Andy Whitcroft (apw)
tags: removed: kernel-release-tracking-bug-live
Changed in kernel-sru-workflow:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.