Disable CONFIG_I2C_THUNDERX for snapdragon kernel

Bug #1696937 reported by Kleber Sacilotto de Souza on 2017-06-09
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-snapdragon (Ubuntu)
Undecided
Unassigned
Xenial
Undecided
Unassigned

Bug Description

The support for IPMI system interface on Cavium ThunderX (bug #1688132) has been added to Xenial kernel as a module compiled for arm64, so the config for the -snapdragon kernel needs to be updated to explicitly disable this module, otherwise the -snapdragon package build fails.

Changed in linux-snapdragon (Ubuntu Xenial):
status: New → Fix Committed
Launchpad Janitor (janitor) wrote :
Download full text (19.1 KiB)

This bug was fixed in the package linux-snapdragon - 4.4.0-1063.68

---------------
linux-snapdragon (4.4.0-1063.68) xenial; urgency=low

  * linux-snapdragon: 4.4.0-1063.68 -proposed tracker (LP: #1700545)

  [ Ubuntu: 4.4.0-83.106 ]

  * linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
  * CVE-2017-1000364
    - Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
    - Revert "mm: do not collapse stack gap into THP"
    - Revert "mm: enlarge stack guard gap"
    - mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
    - mm: larger stack guard gap, between vmas
    - mm: fix new crash in unmapped_area_topdown()
    - Allow stack to grow up to address space limit

linux-snapdragon (4.4.0-1062.67) xenial; urgency=low

  * linux-snapdragon: 4.4.0-1062.67 -proposed tracker (LP: #1699068)

  * Disable CONFIG_I2C_THUNDERX for snapdragon kernel (LP: #1696937)
    - [Config] Disable CONFIG_I2C_THUNDERX

  [ Ubuntu: 4.4.0-82.105 ]

  * linux: 4.4.0-82.105 -proposed tracker (LP: #1699064)
  * CVE-2017-1000364
    - SAUCE: mm: Only expand stack if guard area is hit
  * linux-aws/linux-gke incorrectly producing and using linux-*-tools-
    common/linux-*-cloud-tools-common (LP: #1688579)
    - [Config] make linux-tools-common and linux-cloud-tools-common protection
      consistent
  * CVE-2017-9242
    - ipv6: fix out of bound writes in __ip6_append_data()
  * CVE-2017-9075
    - sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
  * CVE-2017-9074
    - ipv6: Prevent overrun when parsing v6 header options
  * CVE-2017-9076
    - ipv6/dccp: do not inherit ipv6_mc_list from parent
  * CVE-2017-9077
    - ipv6/dccp: do not inherit ipv6_mc_list from parent
  * CVE-2017-8890
    - dccp/tcp: do not inherit mc_list from parent
  * Module signing exclusion for staging drivers does not work properly
    (LP: #1690908)
    - SAUCE: Fix module signing exclusion in package builds
  * extend-diff-ignore should use exact matches (LP: #1693504)
    - [Packaging] exact extend-diff-ignore matches
  * Dell XPS 9360 wifi 5G performance is poor (LP: #1692836)
    - SAUCE: ath10k: fix the wifi speed issue for kill 1535
  * Upgrade Redpine WLAN/BT driver to ver. 1.2.RC12 (LP: #1694607)
    - SAUCE: Redpine: Upgrade to ver. 1.2.RC12
  * [DP MST] No audio output through HDMI/DP/mDP ports in Dell WD15 and TB15
    docking stations (LP: #1694665)
    - drm/i915: Store port enum in intel_encoder
    - drm/i915: Eliminate redundant local variable definition
    - drm/i915: Switch to using port stored in intel_encoder
    - drm/i915: Move audio_connector to intel_encoder
    - drm/i915/dp: DP audio API changes for MST
    - drm/i915: abstract ddi being audio enabled
    - drm/i915/audio: extend get_saved_enc() to support more scenarios
    - drm/i915: enable dp mst audio
  * Xenial update to 4.4.70 stable release (LP: #1694621)
    - usb: misc: legousbtower: Fix buffers on stack
    - usb: misc: legousbtower: Fix memory leak
    - USB: ene_usb6250: fix DMA to the stack
    - watchdog: pcwd_usb: fix NULL-deref at probe
    - char: lp: fix possible integer overflow in lp_setup()
    - USB: core: replace %p with %pK
    - ARM: tegra: p...

Changed in linux-snapdragon (Ubuntu Xenial):
status: Fix Committed → Fix Released
Changed in linux-snapdragon (Ubuntu):
status: New → Fix Released
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers