Activity log for bug #1853306

Date Who What changed Old value New value Message
2019-11-20 14:19:38 bugproxy bug added bug
2019-11-20 14:19:40 bugproxy tags architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2004
2019-11-20 14:19:41 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2019-11-20 14:19:44 bugproxy affects ubuntu linux (Ubuntu)
2019-11-20 14:19:45 bugproxy bug added subscriber CDE Administration
2019-11-20 14:19:46 bugproxy bug added subscriber Heinz-Werner Seeck
2019-11-20 14:19:48 bugproxy bug added subscriber Frank Heimes
2019-11-20 14:19:50 bugproxy bug added subscriber Lou Peers
2019-11-20 16:03:47 Frank Heimes bug task added ubuntu-z-systems
2019-11-20 16:03:54 Frank Heimes linux (Ubuntu): status New Incomplete
2019-11-20 16:03:57 Frank Heimes ubuntu-z-systems: status New Incomplete
2019-11-20 16:04:01 Frank Heimes ubuntu-z-systems: importance Undecided Medium
2019-11-20 16:04:07 Frank Heimes ubuntu-z-systems: assignee Frank Heimes (frank-heimes)
2020-01-12 21:12:56 Paul Collins removed subscriber Lou Peers
2020-01-28 09:12:27 Heinz-Werner Seeck summary [20.04 FEAT] Enhanced Interpretation for PCI Functions - kernel part [20.10 FEAT] Enhanced Interpretation for PCI Functions - kernel part
2020-01-28 09:18:09 bugproxy tags architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2004 architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2010
2020-08-27 06:26:02 Heinz-Werner Seeck summary [20.10 FEAT] Enhanced Interpretation for PCI Functions - kernel part [21.04 FEAT] Enhanced Interpretation for PCI Functions - kernel part
2020-08-27 06:27:50 bugproxy tags architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2010 architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2104
2021-02-23 08:55:10 Heinz-Werner Seeck summary [21.04 FEAT] Enhanced Interpretation for PCI Functions - kernel part [21.10 FEAT] Enhanced Interpretation for PCI Functions - kernel part
2021-02-23 08:58:36 bugproxy tags architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2104 architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2110
2021-06-18 09:25:14 Frank Heimes bug added subscriber Boris Barth
2021-09-01 13:20:09 bugproxy tags architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2110 architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2204
2021-09-01 14:12:17 Frank Heimes summary [21.10 FEAT] Enhanced Interpretation for PCI Functions - kernel part [22.04 FEAT] Enhanced Interpretation for PCI Functions - kernel part
2022-09-20 15:40:43 Frank Heimes ubuntu-z-systems: status Incomplete New
2022-09-20 15:40:47 Frank Heimes linux (Ubuntu): status Incomplete New
2022-09-20 15:40:58 Frank Heimes ubuntu-z-systems: assignee Frank Heimes (fheimes) Skipper Bug Screeners (skipper-screen-team)
2022-09-20 15:41:01 Frank Heimes linux (Ubuntu): assignee Skipper Bug Screeners (skipper-screen-team) Frank Heimes (fheimes)
2022-09-21 05:50:09 Frank Heimes summary [22.04 FEAT] Enhanced Interpretation for PCI Functions - kernel part [22.04 FEAT] Enhanced Interpretation for PCI Functions on s390x - kernel part
2022-09-21 05:59:46 Frank Heimes linux (Ubuntu): importance Undecided Medium
2022-09-21 05:59:58 Frank Heimes linux (Ubuntu): assignee Frank Heimes (fheimes) Canonical Kernel Team (canonical-kernel-team)
2022-09-21 06:00:04 Frank Heimes linux (Ubuntu): status New In Progress
2022-09-21 06:00:08 Frank Heimes ubuntu-z-systems: status New In Progress
2022-09-21 06:00:12 Frank Heimes information type Private Public
2022-10-03 07:25:42 Frank Heimes linux (Ubuntu): status In Progress Fix Committed
2022-10-03 07:25:46 Frank Heimes ubuntu-z-systems: status In Progress Fix Committed
2022-10-04 09:44:59 Launchpad Janitor linux (Ubuntu): status Fix Committed Fix Released
2022-10-04 09:44:59 Launchpad Janitor cve linked 2022-2978
2022-10-04 10:48:28 Frank Heimes ubuntu-z-systems: status Fix Committed Fix Released
2023-05-17 14:31:24 bugproxy attachment added backport of c435c54639aa vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM https://bugs.launchpad.net/bugs/1853306/+attachment/5673572/+files/0001-vfio-pci-introduce-CONFIG_VFIO_PCI_ZDEV_KVM.patch
2023-05-17 14:31:26 bugproxy attachment added <backport of 09340b2fca00 KVM: s390: pci: add routines to start/stop interpretive execution> https://bugs.launchpad.net/bugs/1853306/+attachment/5673573/+files/0002-KVM-s390-pci-add-routines-to-start-stop-interpretive.patch
2023-05-17 14:31:28 bugproxy attachment added backport of 8061d1c31f1a vfio-pci/zdev: add open/close device hooks https://bugs.launchpad.net/bugs/1853306/+attachment/5673574/+files/0003-vfio-pci-zdev-add-open-close-device-hooks.patch
2023-05-17 14:40:16 bugproxy attachment added backport of db1c875e0539 KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices https://bugs.launchpad.net/bugs/1853306/+attachment/5673575/+files/0004-KVM-s390-add-KVM_S390_ZPCI_OP-to-manage-guest-zPCI-d.patch
2023-05-17 14:40:18 bugproxy attachment added backport of ca922fecda6c KVM: s390: pci: Hook to access KVM lowlevel from VFIO https://bugs.launchpad.net/bugs/1853306/+attachment/5673576/+files/0005-KVM-s390-pci-Hook-to-access-KVM-lowlevel-from-VFIO.patch
2023-06-07 08:16:10 Frank Heimes nominated for series Ubuntu Kinetic
2023-06-07 08:16:10 Frank Heimes bug task added linux (Ubuntu Kinetic)
2023-06-07 08:16:10 Frank Heimes nominated for series Ubuntu Mantic
2023-06-07 08:16:10 Frank Heimes bug task added linux (Ubuntu Mantic)
2023-06-07 08:16:10 Frank Heimes nominated for series Ubuntu Lunar
2023-06-07 08:16:10 Frank Heimes bug task added linux (Ubuntu Lunar)
2023-06-07 08:16:10 Frank Heimes nominated for series Ubuntu Jammy
2023-06-07 08:16:10 Frank Heimes bug task added linux (Ubuntu Jammy)
2023-06-07 08:16:21 Frank Heimes linux (Ubuntu Lunar): status New Fix Released
2023-06-07 08:16:28 Frank Heimes linux (Ubuntu Kinetic): status New Won't Fix
2023-06-07 08:16:35 Frank Heimes linux (Ubuntu Jammy): status New In Progress
2023-06-13 19:22:26 Frank Heimes attachment added 0000-pull.patch https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853306/+attachment/5679544/+files/0000-pull.patch
2023-06-14 15:34:25 Frank Heimes description The PCI Passthrough implementation is based on intercepting PCI I/O instructions which leads to a reduced I/O performance compared to execution of PCI instructions in LPAR. For improved performance the interpretive execution of the PCI store and PCI load instructions get enabled. Further improvement is achieved by enabling the Adapter-Event-Notification [ Impact ] * Currently the PCI passthrough implementation for s390x is based on intercepting PCI I/O instructions, which leads to a reduced I/O performance compared to the execution of PCI instructions directly in LPAR. * Hence users may face I/O bottlenecks when using PCI devices in passthrough mode based on the current implementation. * For avoiding this and to improve performance, the interpretive execution of the PCI store and PCI load instructions get enabled. * A further improvement is achieved by enabling the Adapter-Event-Notification Interpretation (AENI). * Since LTS releases are the main focus for stable and long running KVM workloads, it is highly desired to get this backported to the jammy kernel (and because the next LTS is still some time away). [ Test Plan ] * Have an Ubuntu Server 22.04 installation on LPAR, that is able to access (ideally multiple) PCI devices, like RoCE Express (network) or NVMe disks. * Setup KVM and pass through (ideally multiple) of these PCI devices (that are otherwise unused on the KVM host). * Generate IO load on these passed through PCI devices, for example with stress-ng, using class network and/or device and/or io stressors. * This PR also introduces a new kernel config option 'VFIO_PCI_ZDEV_KVM' that allows to enable support for the s390x-specific extensions and enhancements to KVM passthrough, such as interpretive execution of zPCI instructions and is with this PR and got enabled. * The qemu autopkgtest (also needed due to LP#1853307) will be a got fit to identify any potential regressions, also in the kvm kernel area. * zPCI passthrough related test will be done by IBM. [ Where problems could occur ] * The modifications do not change the way users or APIs have to make use of PCI passthrough, only the internal implementation got modified. * The vast majority of the code changes/or additional code is s390x-specific, under arch/s390 and drivers/s390. * However there is also common code touched: * 'kvm: use kvfree() in kvm_arch_free_vm()' touches arch/arm64/include/asm/kvm_host.h, arch/arm64/kvm/arm.c, arch/x86/include/asm/kvm_host.h, arch/x86/kvm/x86.c, include/linux/kvm_host.h switches in kvm_arch_free_vm() from kfree() to kvfree() allowing to use the common variant, which is upstream since v5.16 and with that well established. * And 'vfio-pci/zdev: add open/close device hooks' touches drivers/vfio/pci/vfio_pci_core.c and drivers/vfio/pci/vfio_pci_zdev.c include/linux/vfio_pci_core.h add now code to introduce device hooks. It's upstream since kernel 6.0. * 'KVM: s390: pci: provide routines for en-/disabling interrupt forwarding' expands a single #if statement in include/linux/sched/user.h. * 'KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices' adds s390x specific KVM_S390_ZPCI_OP and it's definition to include/uapi/linux/kvm.h. * And 'vfio-pci/zdev: different maxstbl for interpreted devices' and 'vfio-pci/zdev: add function handle to clp base capability' expand s390x-specific (aka z-specific aka zdev) device structs in include/uapi/linux/vfio_zdev.h. * This shows that the vast majority of modifications are s390x specific, even in most of the common code files. * The remaining modifications in the (generally) common code files are related to the newly introduced kernel option 'CONFIG_VFIO_PCI_ZDEV_KVM' and documentation. * The s390x changes are more significant, and could not only harm passthrough itself for zPCI devices, but also KVM virtualization in general. * In addition to these kernel changes, qemu modifications are needed as well (that are addressed at LP#1853307), this modified kernel must be tested in combination with the updated qemu package. - The qemu autopkgtest will be a got fit to identify any regressions, also in the kernel. - In addition some passthrough related test will be done by IBM __________ The PCI Passthrough implementation is based on intercepting PCI I/O instructions which leads to a reduced I/O performance compared to execution of PCI instructions in LPAR. For improved performance the interpretive execution of the PCI store and PCI load instructions get enabled. Further improvement is achieved by enabling the Adapter-Event-Notification
2023-06-14 15:53:47 Frank Heimes linux (Ubuntu Jammy): assignee Canonical Kernel Team (canonical-kernel-team)
2023-07-07 13:35:47 Roxana Nicolescu linux (Ubuntu Jammy): status In Progress Fix Committed
2023-07-13 08:42:07 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 severity-high targetmilestone-inin2204 architecture-s39064 bugnameltc-182254 kernel-spammed-jammy-linux severity-high targetmilestone-inin2204 verification-needed-jammy
2023-07-18 14:29:49 Frank Heimes description [ Impact ] * Currently the PCI passthrough implementation for s390x is based on intercepting PCI I/O instructions, which leads to a reduced I/O performance compared to the execution of PCI instructions directly in LPAR. * Hence users may face I/O bottlenecks when using PCI devices in passthrough mode based on the current implementation. * For avoiding this and to improve performance, the interpretive execution of the PCI store and PCI load instructions get enabled. * A further improvement is achieved by enabling the Adapter-Event-Notification Interpretation (AENI). * Since LTS releases are the main focus for stable and long running KVM workloads, it is highly desired to get this backported to the jammy kernel (and because the next LTS is still some time away). [ Test Plan ] * Have an Ubuntu Server 22.04 installation on LPAR, that is able to access (ideally multiple) PCI devices, like RoCE Express (network) or NVMe disks. * Setup KVM and pass through (ideally multiple) of these PCI devices (that are otherwise unused on the KVM host). * Generate IO load on these passed through PCI devices, for example with stress-ng, using class network and/or device and/or io stressors. * This PR also introduces a new kernel config option 'VFIO_PCI_ZDEV_KVM' that allows to enable support for the s390x-specific extensions and enhancements to KVM passthrough, such as interpretive execution of zPCI instructions and is with this PR and got enabled. * The qemu autopkgtest (also needed due to LP#1853307) will be a got fit to identify any potential regressions, also in the kvm kernel area. * zPCI passthrough related test will be done by IBM. [ Where problems could occur ] * The modifications do not change the way users or APIs have to make use of PCI passthrough, only the internal implementation got modified. * The vast majority of the code changes/or additional code is s390x-specific, under arch/s390 and drivers/s390. * However there is also common code touched: * 'kvm: use kvfree() in kvm_arch_free_vm()' touches arch/arm64/include/asm/kvm_host.h, arch/arm64/kvm/arm.c, arch/x86/include/asm/kvm_host.h, arch/x86/kvm/x86.c, include/linux/kvm_host.h switches in kvm_arch_free_vm() from kfree() to kvfree() allowing to use the common variant, which is upstream since v5.16 and with that well established. * And 'vfio-pci/zdev: add open/close device hooks' touches drivers/vfio/pci/vfio_pci_core.c and drivers/vfio/pci/vfio_pci_zdev.c include/linux/vfio_pci_core.h add now code to introduce device hooks. It's upstream since kernel 6.0. * 'KVM: s390: pci: provide routines for en-/disabling interrupt forwarding' expands a single #if statement in include/linux/sched/user.h. * 'KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices' adds s390x specific KVM_S390_ZPCI_OP and it's definition to include/uapi/linux/kvm.h. * And 'vfio-pci/zdev: different maxstbl for interpreted devices' and 'vfio-pci/zdev: add function handle to clp base capability' expand s390x-specific (aka z-specific aka zdev) device structs in include/uapi/linux/vfio_zdev.h. * This shows that the vast majority of modifications are s390x specific, even in most of the common code files. * The remaining modifications in the (generally) common code files are related to the newly introduced kernel option 'CONFIG_VFIO_PCI_ZDEV_KVM' and documentation. * The s390x changes are more significant, and could not only harm passthrough itself for zPCI devices, but also KVM virtualization in general. * In addition to these kernel changes, qemu modifications are needed as well (that are addressed at LP#1853307), this modified kernel must be tested in combination with the updated qemu package. - The qemu autopkgtest will be a got fit to identify any regressions, also in the kernel. - In addition some passthrough related test will be done by IBM __________ The PCI Passthrough implementation is based on intercepting PCI I/O instructions which leads to a reduced I/O performance compared to execution of PCI instructions in LPAR. For improved performance the interpretive execution of the PCI store and PCI load instructions get enabled. Further improvement is achieved by enabling the Adapter-Event-Notification [ Impact ]  * Currently the PCI passthrough implementation for s390x is based on    intercepting PCI I/O instructions, which leads to a reduced I/O performance    compared to the execution of PCI instructions directly in LPAR.  * Hence users may face I/O bottlenecks when using PCI devices in passthrough    mode based on the current implementation.  * For avoiding this and to improve performance, the interpretive execution    of the PCI store and PCI load instructions get enabled.  * A further improvement is achieved by enabling the Adapter-Event-Notification    Interpretation (AENI).  * Since LTS releases are the main focus for stable and long running KVM    workloads, it is highly desired to get this backported to the jammy kernel    (and because the next LTS is still some time away). [ Test Plan ] * Hardware used: z14 or greater LPAR, PCI-attached devices (RoCE VFs, ISM devices, NVMe drive) * Setup: Both the kernel and QEMU features are needed for the feature to function (an upstream QEMU can be used to verify the kernel early), and the facility is only avaialble on z14 or newer. When any of those pieces is missing, the interpretation facility will not be used. When both the kernel and QEMU features are included in their respective packages, and running in an LPAR on a z14 or newer machine, this feature will be enabled automatically. Existing supported devices should behave as before with no changes required by an end-user (e.g. no changes to libvirt domain definitions) -- but will now make use of the interpretation facility. Additionally, ISM devices will now be eligible for vfio-pci passthrough (where before QEMU would exit on error if attempting to provide an ISM device for vfio-pci passthrough, preventing the guest from starting) * Testing will include the following scenarios, repeated each for RoCE, ISM and NVMe: 1) Testing of basic device passthrough (create a VM with a vfio-pci device as part of the libvirt domain definition, passing through a RoCE VF, an ISM device, or an NVMe drive. Verify that the device is available in the guest and functioning) 2) Testing of device hotplug/unplug (create a VM with a vfio-pci device, virsh detach-device to remove the device from the running guest, verify the device is removed from the guest, then virsh attach-device to hotplug the device to the guest again, verify the device functions in the guest) 3) Host power off testing: Power off the device from the host, verify that the device is unplugged from the guest as part of the poweroff 4) Guest power off testing: Power off the device from within the guest, verify that the device is unusuable in the guest, power the device back on within the guest and verify that the device is once again usable. 5) Guest reboot testing: (create a VM with a vfio-pci device, verify the device is in working condition, reboot the guest, verify that the device is still usable after reboot) Testing will include the following scenarios specifically for ISM devices: 1) Testing of SMC-D v1 fallback: Using 2 ISM devices on the same VCHID that share a PNETID, create 2 guests and pass one ISM device via vfio-pci device to each guest. Establish TCP connectivity between the 2 guests using the libvirt default network, and then use smc_run (https://manpages.ubuntu.com/manpages/jammy/man8/smc_run.8.html) to run an iperf workload between the 2 guests (will include both short workloads and longer-running workloads). Verify that SMC-D transfer was used between the guests instead of TCP via 'smcd stats' (https://manpages.ubuntu.com/manpages/jammy/man8/smcd.8.html) 2) Testing of SMC-D v2: Same as above, but using 2 ISM devices on the same VCHID that have no PNETID specified Testing will include the following scenarios specifically for RoCE devices: 1) Ping testing: Using 2 RoCE VFs that share a common network, create 2 guests and pass one RoCE device to each guest. Assign IP addresses within each guest to the associated TCP interface, perform a ping between the guests to verify connectivity. 2) Iperf testing: Similar to the above, but instead establish an iperf connection between the 2 guests and verify that the workload is successful / no errors. Will include both short workloads and longer-running workloads. Testing will include the following scenario specifically for NVMe devices: 1) Fio testing: Using a NVMe drive passed to the guest via vfio-pci, run a series of fio tests against the device from within the guest, verifying that the workload is successful / no errors. Will include both short workloads and longer-running workloads. [ Where problems could occur ]  * The modifications do not change the way users or APIs have to make    use of PCI passthrough, only the internal implementation got modified.  * The vast majority of the code changes/or additional code is s390x-specific,    under arch/s390 and drivers/s390.  * However there is also common code touched:  * 'kvm: use kvfree() in kvm_arch_free_vm()' touches    arch/arm64/include/asm/kvm_host.h, arch/arm64/kvm/arm.c,    arch/x86/include/asm/kvm_host.h, arch/x86/kvm/x86.c,    include/linux/kvm_host.h switches in kvm_arch_free_vm() from kfree() to    kvfree() allowing to use the common variant, which is upstream since v5.16    and with that well established.  * And 'vfio-pci/zdev: add open/close device hooks' touches    drivers/vfio/pci/vfio_pci_core.c and drivers/vfio/pci/vfio_pci_zdev.c    include/linux/vfio_pci_core.h add now code to introduce device hooks.    It's upstream since kernel 6.0.  * 'KVM: s390: pci: provide routines for en-/disabling interrupt forwarding'    expands a single #if statement in include/linux/sched/user.h.  * 'KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices'    adds s390x specific KVM_S390_ZPCI_OP and it's definition to    include/uapi/linux/kvm.h.  * And 'vfio-pci/zdev: different maxstbl for interpreted devices' and    'vfio-pci/zdev: add function handle to clp base capability' expand    s390x-specific (aka z-specific aka zdev) device structs in    include/uapi/linux/vfio_zdev.h.  * This shows that the vast majority of modifications are s390x specific,    even in most of the common code files.  * The remaining modifications in the (generally) common code files are    related to the newly introduced kernel option 'CONFIG_VFIO_PCI_ZDEV_KVM'    and documentation.  * The s390x changes are more significant, and could not only harm    passthrough itself for zPCI devices, but also KVM virtualization in general.  * In addition to these kernel changes, qemu modifications are needed    as well (that are addressed at LP#1853307), this modified kernel    must be tested in combination with the updated qemu package.    - The qemu autopkgtest will be a got fit to identify any regressions,    also in the kernel.    - In addition some passthrough related test will be done by IBM __________ The PCI Passthrough implementation is based on intercepting PCI I/O instructions which leads to a reduced I/O performance compared to execution of PCI instructions in LPAR. For improved performance the interpretive execution of the PCI store and PCI load instructions get enabled. Further improvement is achieved by enabling the Adapter-Event-Notification
2023-07-20 18:00:46 bugproxy tags architecture-s39064 bugnameltc-182254 kernel-spammed-jammy-linux severity-high targetmilestone-inin2204 verification-needed-jammy architecture-s39064 bugnameltc-182254 kernel-spammed-jammy-linux severity-high targetmilestone-inin2204 verification-done-jammy
2023-08-08 16:00:45 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-jammy-linux severity-high targetmilestone-inin2204 verification-done-jammy architecture-s39064 bugnameltc-182254 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-needed-jammy
2023-08-08 16:01:35 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-needed-jammy architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-needed-focal verification-needed-jammy
2023-08-08 16:01:36 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-needed-focal verification-needed-jammy architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-needed-focal verification-needed-jammy
2023-08-08 16:38:35 Frank Heimes tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-needed-focal verification-needed-jammy architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy
2023-08-14 06:47:41 Launchpad Janitor linux (Ubuntu Jammy): status Fix Committed Fix Released
2023-08-14 06:47:41 Launchpad Janitor cve linked 2022-48502
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-0597
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-2124
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-3090
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-31248
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-3141
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-3389
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-3390
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-3439
2023-08-14 06:47:41 Launchpad Janitor cve linked 2023-35001
2023-08-22 18:56:49 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-jammy-linux-aws
2023-08-26 20:11:41 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-jammy-linux-aws architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-jammy-linux-aws verification-needed-jammy-linux-azure
2023-09-01 14:40:49 bugproxy tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-jammy-linux-aws verification-needed-jammy-linux-azure architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-jammy-linux-aws
2023-09-09 14:16:52 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-jammy-linux-aws architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-focal-linux-aws-5.15 verification-needed-jammy-linux-aws
2023-10-03 20:41:41 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-focal-linux-aws-5.15 verification-needed-jammy-linux-aws architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx kernel-spammed-jammy-linux-xilinx-zynqmp-v2 severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-focal-linux-aws-5.15 verification-needed-jammy-linux-aws verification-needed-jammy-linux-xilinx-zynqmp
2023-10-04 07:16:50 Frank Heimes tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx kernel-spammed-jammy-linux-xilinx-zynqmp-v2 severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy verification-needed-focal-linux-aws-5.15 verification-needed-jammy-linux-aws verification-needed-jammy-linux-xilinx-zynqmp architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx kernel-spammed-jammy-linux-xilinx-zynqmp-v2 severity-high targetmilestone-inin2204 verification-done-focal verification-done-focal-linux-aws-5.15 verification-done-jammy verification-done-jammy-linux-aws verification-done-jammy-linux-xilinx-zynqmp
2024-03-01 06:16:00 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx kernel-spammed-jammy-linux-xilinx-zynqmp-v2 severity-high targetmilestone-inin2204 verification-done-focal verification-done-focal-linux-aws-5.15 verification-done-jammy verification-done-jammy-linux-aws verification-done-jammy-linux-xilinx-zynqmp architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-mtk-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx kernel-spammed-jammy-linux-xilinx-zynqmp-v2 severity-high targetmilestone-inin2204 verification-done-focal verification-done-focal-linux-aws-5.15 verification-done-jammy verification-done-jammy-linux-aws verification-done-jammy-linux-xilinx-zynqmp verification-needed-jammy-linux-mtk
2024-03-01 07:46:14 Frank Heimes tags architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-mtk-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx kernel-spammed-jammy-linux-xilinx-zynqmp-v2 severity-high targetmilestone-inin2204 verification-done-focal verification-done-focal-linux-aws-5.15 verification-done-jammy verification-done-jammy-linux-aws verification-done-jammy-linux-xilinx-zynqmp verification-needed-jammy-linux-mtk architecture-s39064 bugnameltc-182254 kernel-spammed-focal-linux-aws-5.15-v2 kernel-spammed-focal-linux-nvidia-tegra-5.15 kernel-spammed-jammy-linux kernel-spammed-jammy-linux-aws-v2 kernel-spammed-jammy-linux-azure-v2 kernel-spammed-jammy-linux-mtk-v2 kernel-spammed-jammy-linux-nvidia-tegra kernel-spammed-jammy-linux-nvidia-tegra-igx kernel-spammed-jammy-linux-xilinx-zynqmp-v2 severity-high targetmilestone-inin2204 verification-done-focal verification-done-focal-linux-aws-5.15 verification-done-jammy verification-done-jammy-linux-aws verification-done-jammy-linux-mtk verification-done-jammy-linux-xilinx-zynqmp