Added the SRU template to the bug summary

** Changed in: linux (Ubuntu)
     Assignee: (unassigned) => Jeff Lane (bladernr)

** Description changed:

  Here is a list of patches that need applied to 20.04.4 to bring the
  smartpqi up to date with kernel.org.
  
  64fc9015fbeb scsi: smartpqi: Switch to attribute groups
  0ca190805784 scsi: smartpqi: Call scsi_done() directly
  605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055
  80982656b78e scsi: smartpqi: Add 3252-8i PCI id
  d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers
  987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild
  28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs
  4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices
  be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE operation
  6ce1ddf53252 scsi: smartpqi: Update LUN reset handler
  5d1f03e6f49a scsi: smartpqi: Capture controller reason codes
  9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump
  819225b03dc7 scsi: smartpqi: Update device removal management
  5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array 
member
+ 
+ [Impact]
+ 
+  * An explanation of the effects of the bug on users and
+ 
+  * justification for backporting the fix to the stable release.
+ 
+  * In addition, it is helpful, but not required, to include an
+    explanation of how the upload fixes this bug.
+ 
+ [Test Plan]
+ 
+  * detailed instructions how to reproduce the bug
+ 
+  * these should allow someone who is not familiar with the affected
+    package to reproduce the bug and verify that the updated package fixes
+    the problem.
+ 
+  * if other testing is appropriate to perform before landing this update,
+    this should also be described here.
+ 
+ [Where problems could occur]
+ 
+  * Think about what the upload changes in the software. Imagine the change is
+    wrong or breaks something else: how would this show up?
+ 
+  * It is assumed that any SRU candidate patch is well-tested before
+    upload and has a low overall risk of regression, but it's important
+    to make the effort to think about what ''could'' happen in the
+    event of a regression.
+ 
+  * This must '''never''' be "None" or "Low", or entirely an argument as to why
+    your upload is low risk.
+ 
+  * This both shows the SRU team that the risks have been considered,
+    and provides guidance to testers in regression-testing the SRU.
+ 
+ [Other Info]
+  
+  * Anything else you think is useful to include
+  * Anticipate questions from users, SRU, +1 maintenance, security teams and 
the Technical Board
+  * and address these questions in advance

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1953689

Title:
  smartpqi: Update 20.04.4 to latest kernel.org patch level

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Here is a list of patches that need applied to 20.04.4 to bring the
  smartpqi up to date with kernel.org.

  64fc9015fbeb scsi: smartpqi: Switch to attribute groups
  0ca190805784 scsi: smartpqi: Call scsi_done() directly
  605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055
  80982656b78e scsi: smartpqi: Add 3252-8i PCI id
  d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers
  987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild
  28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs
  4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices
  be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE operation
  6ce1ddf53252 scsi: smartpqi: Update LUN reset handler
  5d1f03e6f49a scsi: smartpqi: Capture controller reason codes
  9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump
  819225b03dc7 scsi: smartpqi: Update device removal management
  5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array 
member

  [Impact]

   * An explanation of the effects of the bug on users and

   * justification for backporting the fix to the stable release.

   * In addition, it is helpful, but not required, to include an
     explanation of how the upload fixes this bug.

  [Test Plan]

   * detailed instructions how to reproduce the bug

   * these should allow someone who is not familiar with the affected
     package to reproduce the bug and verify that the updated package fixes
     the problem.

   * if other testing is appropriate to perform before landing this update,
     this should also be described here.

  [Where problems could occur]

   * Think about what the upload changes in the software. Imagine the change is
     wrong or breaks something else: how would this show up?

   * It is assumed that any SRU candidate patch is well-tested before
     upload and has a low overall risk of regression, but it's important
     to make the effort to think about what ''could'' happen in the
     event of a regression.

   * This must '''never''' be "None" or "Low", or entirely an argument as to why
     your upload is low risk.

   * This both shows the SRU team that the risks have been considered,
     and provides guidance to testers in regression-testing the SRU.

  [Other Info]
   
   * Anything else you think is useful to include
   * Anticipate questions from users, SRU, +1 maintenance, security teams and 
the Technical Board
   * and address these questions in advance

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to